Final - Database Enterprise Manager
Final - Database Enterprise Manager
INTRODUCTION
Enterprise Manager allows you to manage your MS SQL Server 2005 database as
well as upload data to it. Before creating the connection to your SQL database ensure you
know your SQL user name and password for you database and also make sure you know
the IP Address of the server your SQL database is located on. This is located in the
HSPHERE Control Panel.
Enterprise Manager is the primary administrative tool for Microsoft SQL Server
2000 and provides a MMCcompliant user interface that allows users to:
Create and administer all SQL Server databases, objects, logins, users, and
permissions in each registered server.
Define and execute all SQL Server administrative tasks on each registered
server.
2. Create Database:
After connection establishment, the user has to create the database for their
purpose. This can be done in the way of click the database properties, then the database
properties windows open. In that window, give the database name as we want. The size,
growth, max size is set as default. After enter the name in the database name click the
save login button. Then the database is created for that user with the specified name. The
table properties such as tables, views, stored procedures, users, roles are generated as
default.
3. Database Manipulation:
Extensive data manipulation facilities for creating, copying, moving, converting
reformatting and validating application test data are essential for the efficient
development of reliable z/OS applications.
The same facilities are also essential in addressing failures in live systems, where
it is imperative to find and fix production data errors with confidence and precision.
1. Data Manipulation is:
o retrieval of information from the database
o
2. A DML is a language which enables users to access and manipulate data. The goal
is to provide efficient human interaction with the system.
3. There are two types of DML:
o procedural: the user specifies what data is needed and how to get it
o
Note that the default format for dates is day-month-year, where month is a three
digit character abbreviation. The date should be between single quotes (e.g., 20JUL-95).
4. Query Processing:
Select Query
The select query used in Oracle is standard SQL so you should look in your text
book for syntax and examples. The following sections illustrate some capabilities or
syntax variations in Oracle that are not in the text.
Outer Joins
Unlike Outer Joins in the text, outer joins in Oracle are declared in the Where
clause through the use of the (+) symbol. An example follows:
Select b.title, c.pid
From Book b, Checkout c
Where b.callno = (+) c.callno
The =(+) says to join the book callno with the checkout callno. But if there is no
checkout callno to match book callno, use a null in the checkout attributes. Notice that
the above example would be considered a left outer join in our book even though the (+)
is to the right of the equal sign.
Group Functions
Oracle supports the following group functions in a SQL query:
AVG -- average
COUNT
MAX -- Returns the maximum value
MIN -- Returns the minimum value
STDDEV -- Standard Deviation
SUM -- The total of some column
VARIANCE
CHAPTER 2
TASK
DURATION
REQUIREMENT
10 DAYS
SPECIFICATION
REQUIREMENT
10 DAYS
DOCUMENT SPECIFICATION
3
DESIGN ANALYSIS
20 DAYS
DESIGN
15 DAYS
5
6
DOCUMENTATION
DESIGN REVIEW
20 DAYS
CODING
15 DAYS
TOTAL
90 DAYS
CHAPTER 3
Backup and recovery: Detecting failures due to power failure, disk crash,
software errors, etc., and restoring the database to its state before the failure
Concurrency control: Preserving data consistency when there are
concurrent users.
Some small database systems may miss some of these features, resulting
in simpler database managers. (For example, no concurrency is required on a PC running
MS-DOS.) These features are necessary on larger systems.
CHAPTER 4
SOFTWARE REQUIREMENTS SPECIFICATION
Connection
Special
Operator
Create Connection
Group
Joins
functio
n
Database
Query
Create Database
Enterpris
Processing
e
Manager
Databas
e
Database
Manipulation
DML
Insert
Delet
e
Update
Select
The project must the end user requirements. Accuracy and fast must be imposed
in the Project.
The project is development as easy as possible for the sake of end user. The
project has to be developed with view of satisfying the future requirements and future
enhancement.
This processing as well as tine taken to generate well reports where also even
when large amount of data was used. The system is designed in such a way that even
when large amount of data used for processing there would less performance degradation.
PROCESSOR
RAM
128 MD SD RAM
MONITOR
15 COLOR
HARD DISK
20 GB
FLOPPY DRIVE
1.44 MB
CD DRIVE
LG 52X
KEYBOARD
MOUSE
3 BUTTONS
Windows XP Professional
ENVIRONMENT
.NET FRAMEWORK
Version 3.5
LANGUAGE
C#.NET
WEB TECHNOLOGY
BACKEND
ASP.NET
:
Error recovery
Input validation and recovery
CHAPTER 5
SYSTEM ANALYSIS
In this section discussed about data flow diagram, Entity relationship
diagram. These things are represented as diagrams with proper notation.
5.1 Data Flow Diagram
The data flow diagram is one of the most improvement tools used by the
system analyst DeMacro (1978) Nad Gand Sarson (1979) popularized the use if the data
flow diagram as modeling tools through their structured system analysis methodologies.
A data flow diagram should be the first tool used by system analyst to
model system components. These components are the system processes; the data used by
this processes and external entities that interact
5.2 ER DIAGRAM
Connection
Special
Operator
Create Connection
Group
Joins
functio
n
Database
Query
Create Database
Enterpris
Processing
e
Manager
Databas
e
Database
Manipulation
DML
Insert
Delet
Update
Select
Novice user
application programmer
sophisticate user
database administrator
Application
Application
usercase
program
query
scheme
Xml
Xml
Query
precompiler
processor
compiler
Database
Application
program
Database
object
manager
code
File manager
datafiles
Data
directory
Disk storage
Authorization
Submission
Certificate
Students
DB
Learning
Training
Process
Problem Analysis:
DATABASE ENTERPRISE
MANAGER
Authorization
Signatory
Front-end Asp.net
Back-end: SQL Server
Networking Design:
Internet Explorer 6.0
Coding
Validation
Testing
Document
Reports
nnn
Certificate
Complete Certificate
ProgrammerTraining
Certificate
CHAPTER 6
SYSTEM DESIGN
Design is multi-step process that focuses on data structure software
architecture, procedural details, (algorithms etc.) and interface between modules.
The design process also translates the requirements into the presentation of
software that can be accessed for quality before coding begins.
Computer software design changes continuously as new methods; better
analysis and broader understanding evolved. Software Design is at relatively early
stage in its revolution.
Therefore, Software Design methodology lacks the depth, flexibility and
quantitative nature that are normally associated with more classical engineering
disciplines. However techniques for software designs do exist, criteria for design
qualities are available and design notation can be applied.
developing the system and the basis on which they evaluate the usefulness of the
application.
In the project, if the employee has to communicate with other employees
they can communicate through send and receive message.
6.3 INTERFACE DESIGN
The ODBC (Open Database Connectivity) interface is a pure .NET to
execute SQl statement. The ODBC provides a set classes and interfaces that can
be used by developers to write database applications. Basic ODBC interactions in
its simplest form, can be broken down into four steps:
1. Open a connection to the database.
2. Execute a SQL statement
3. Process the result
4. Close the connection to the database
data or business logic, which in turn can be obtained and manipulated by client and server
applications. XML Web services enable the exchange of data in client-server or serverserver scenarios, using standards like HTTP and XML messaging to move data across
firewalls. XML Web services are not tied to a particular component technology or objectcalling convention. As a result, programs written in any language, using any component
model, and running on any operating system can access XML Web services
Each of these models can take full advantage of all ASP.NET features,
as well as the power of the .NET Framework and .NET Framework common language
runtime.
Accessing databases from ASP.NET applications is an often-used
technique for displaying data to Web site visitors. ASP.NET makes it easier than ever to
access databases for this purpose. It also allows us to manage the database from your
code .
ASP.NET provides a simple model that enables Web developers to
write logic that runs at the application level. Developers can write this code in the
global.aspx text file or in a compiled class deployed as an assembly. This logic can
include application-level events, but developers can easily extend this model to suit the
needs of their Web application.
ASP.NET provides easy-to-use application and session-state facilities
that are familiar to ASP developers and are readily compatible with all other .NET
Framework APIs.
ASP.NET offers the IHttpHandler and IHttpModule interfaces.
Implementing the IHttpHandler interface gives you a means of interacting with the lowlevel request and response services of the IIS Web server and provides functionality much
like ISAPI extensions, but with a simpler programming model. Implementing the
IHttpModule interface allows you to include custom events that participate in every
request made to your application.
ASP.NET takes advantage of performance enhancements found in
the .NET Framework and common language runtime. Additionally, it has been designed
to offer significant performance improvements over ASP and other Web development
platforms. All ASP.NET code is compiled, rather than interpreted, which allows early
binding, strong typing, and just-in-time (JIT) compilation to native code, to name only a
few of its benefits. ASP.NET is also easily factorable, meaning that developers can
remove modules (a session module, for instance) that are not relevant to the application
they are developing.
ASP.NET provides extensive caching services (both built-in services and
caching APIs). ASP.NET also ships with performance counters that developers and
system administrators can monitor to test new applications and gather metrics on existing
applications.
Writing custom debug statements to your Web page can help immensely in
troubleshooting your application's code. However, it can cause embarrassment if it is not
removed. The problem is that removing the debug statements from your pages when your
application is ready to be ported to a production server can require significant effort.
ASP.NET offers the TraceContext class, which allows us to write custom
debug statements to our pages as we develop them. They appear only when you have
enabled tracing for a page or entire application. Enabling tracing also appends details
about a request to the page, or, if you so specify, to a custom trace viewer that is stored in
the root directory of your application.
The .NET Framework and ASP.NET provide default authorization and
authentication schemes for Web applications. we can easily remove, add to, or replace
these schemes, depending upon the needs of our application .
ASP.NET configuration settings are stored in XML-based files, which are
human readable and writable. Each of our applications can have a distinct configuration
file and we can extend the configuration scheme to suit our requirements.
Microsoft SQL Server 2000 Meta Data Services. References to the component now use
the term Meta Data Services. The term repository is used only in reference to the
repository engine within Meta Data Service.
SQL-SERVER database consist of six type of objects,
They are,
1. TABLE
2. QUERY
3. FORM
4. REPORT
5. MACRO
TABLE:
A database is a collection of data about a specific topic.
VIEWS OF TABLE:
We can work with a table in two types,
1. Design View
2. Datasheet View
Design View
To build or modify the structure of a table we work in the table design view. We
can specify what kind of data will be hold.
Datasheet View
To add, edit or analyses the data itself we work in tables datasheet view mode.
QUERY:
A query is a question that has to be asked the data. Access gathers data that
answers the question from one or more table. The data that make up the answer is either
dynaset (if you edit it) or a snapshot(it cannot be edited).Each time we run query, we get
latest information in the dynaset.Access either displays the dynaset or snapshot for us to
view or perform an action on it ,such as deleting or updating.
FORMS:
A form is used to view and edit information in the database record by record .A
form displays only the information we want to see in the way we want to see it. Forms
use the familiar controls such as textboxes and checkboxes. This makes viewing and
entering data easy.
Views of Form:
We can work with forms in several primarily there are two views,
They are,
1. Design View
2. Form View
Design View
To build or modify the structure of a form, we work in forms design
view. We can add control to the form that are bound to fields in a table or query, includes
textboxes, option buttons, graphs and pictures.
Form View
The form view which display the whole design of the form.
REPORT:
A report is used to vies and print information from the database. The report
can ground records into many levels and compute totals and average by checking values
from many records at once. Also the report is attractive and distinctive because we have
control over the size and appearance of it.
MACRO:
A macro is a set of actions. Each action in macros does something. Such
as opening a form or printing a report .We write macros to automate the common tasks
the work easy and save the time.
MODULE:
Modules are units of code written in access basic language. We can write
and use module to automate and customize the database in very sophisticated ways.
CHAPTER 7
CODINGS
using System;
using System.Drawing;
using System.Collections;
using System.ComponentModel;
using System.Windows.Forms;
using System.Data;
namespace QueryGenerator
{
/// <summary>
/// Summary description for Form1.
/// </summary>
public class frmMain : System.Windows.Forms.Form
{
private System.Windows.Forms.TextBox txtTableName;
private System.Windows.Forms.TextBox txtColumnNo;
private System.Windows.Forms.Button btnReload;
private int no = 0;
private ucColumn[] colList;
private System.Windows.Forms.Button btnGenerateQueries;
private System.Windows.Forms.TextBox txtInsertQuery;
private System.Windows.Forms.TextBox txtUpdateQuery;
private System.Windows.Forms.TextBox txtDeleteQuery;
private System.Windows.Forms.Button btnCopyInsert;
private System.Windows.Forms.Button btnCopyUpdate;
private System.Windows.Forms.Button btnCopyDelete;
private System.Windows.Forms.Label lblTableName;
private System.Windows.Forms.Label lblColumnNo;
}
base.Dispose( disposing );
}
#region Windows Form Designer generated code
/// <summary>
/// Required method for Designer support - do not modify
/// the contents of this method with the code editor.
/// </summary>
private void InitializeComponent()
{
this.lblTableName = new System.Windows.Forms.Label();
this.txtTableName = new System.Windows.Forms.TextBox();
this.txtColumnNo = new System.Windows.Forms.TextBox();
this.lblColumnNo = new System.Windows.Forms.Label();
this.btnReload = new System.Windows.Forms.Button();
this.lblPrimary = new System.Windows.Forms.Label();
this.lblColName = new System.Windows.Forms.Label();
this.lblDataType = new System.Windows.Forms.Label();
this.lblSize = new System.Windows.Forms.Label();
this.lblAllowNulls = new System.Windows.Forms.Label();
this.btnGenerateQueries = new System.Windows.Forms.Button();
this.lblInsertQuery = new System.Windows.Forms.Label();
this.txtInsertQuery = new System.Windows.Forms.TextBox();
this.btnCopyInsert = new System.Windows.Forms.Button();
this.btnCopyUpdate = new System.Windows.Forms.Button();
this.txtUpdateQuery = new System.Windows.Forms.TextBox();
this.lblUpdateQuery = new System.Windows.Forms.Label();
this.btnCopyDelete = new System.Windows.Forms.Button();
this.txtDeleteQuery = new System.Windows.Forms.TextBox();
this.lblDeleteQuery = new System.Windows.Forms.Label();
this.btnClose = new System.Windows.Forms.Button();
this.SuspendLayout();
//
// lblTableName
//
this.lblTableName.Location = new System.Drawing.Point(8, 8);
this.lblTableName.Name = "lblTableName";
this.btnReload.Click += new
System.EventHandler(this.btnReload_Click);
//
// lblPrimary
//
this.lblPrimary.Location = new System.Drawing.Point(8, 72);
this.lblPrimary.Name = "lblPrimary";
this.lblPrimary.Size = new System.Drawing.Size(48, 16);
this.lblPrimary.TabIndex = 5;
this.lblPrimary.Text = "Primary";
//
// lblColName
//
this.lblColName.Location = new System.Drawing.Point(56, 72);
this.lblColName.Name = "lblColName";
this.lblColName.Size = new System.Drawing.Size(80, 16);
this.lblColName.TabIndex = 6;
this.lblColName.Text = "Column name";
//
// lblDataType
//
this.lblDataType.Location = new System.Drawing.Point(216,
72);
this.lblDataType.Name = "lblDataType";
this.lblDataType.Size = new System.Drawing.Size(56, 16);
this.lblDataType.TabIndex = 7;
this.lblDataType.Text = "Data type";
//
// lblSize
//
this.lblSize.Location = new System.Drawing.Point(320, 72);
this.lblSize.Name = "lblSize";
this.lblSize.Size = new System.Drawing.Size(24, 16);
this.lblSize.TabIndex = 8;
this.lblSize.Text = "Size";
//
// lblAllowNulls
//
this.txtInsertQuery.TabIndex = 12;
//
// btnCopyInsert
//
this.btnCopyInsert.Location = new System.Drawing.Point(760,
224);
this.btnCopyInsert.Name = "btnCopyInsert";
this.btnCopyInsert.Size = new System.Drawing.Size(112, 24);
this.btnCopyInsert.TabIndex = 13;
this.btnCopyInsert.Text = "Copy to clipboard";
this.btnCopyInsert.Click += new
System.EventHandler(this.btnCopyInsert_Click);
//
// btnCopyUpdate
//
this.btnCopyUpdate.Location = new System.Drawing.Point(760,
400);
this.btnCopyUpdate.Name = "btnCopyUpdate";
this.btnCopyUpdate.Size = new System.Drawing.Size(112, 24);
this.btnCopyUpdate.TabIndex = 16;
this.btnCopyUpdate.Text = "Copy to clipboard";
this.btnCopyUpdate.Click += new
System.EventHandler(this.btnCopyUpdate_Click);
//
// txtUpdateQuery
//
this.txtUpdateQuery.Location = new System.Drawing.Point(480,
264);
this.txtUpdateQuery.Multiline = true;
this.txtUpdateQuery.Name = "txtUpdateQuery";
this.txtUpdateQuery.ScrollBars =
System.Windows.Forms.ScrollBars.Both;
this.txtUpdateQuery.Size = new System.Drawing.Size(392,
128);
this.txtUpdateQuery.TabIndex = 15;
//
// lblUpdateQuery
//
//
// btnClose
//
this.btnClose.Location = new System.Drawing.Point(752, 24);
this.btnClose.Name = "btnClose";
this.btnClose.Size = new System.Drawing.Size(112, 24);
this.btnClose.TabIndex = 20;
this.btnClose.Text = "Close";
this.btnClose.Click += new
System.EventHandler(this.btnClose_Click);
//
// frmMain
//
this.AutoScaleBaseSize = new System.Drawing.Size(5, 14);
this.ClientSize = new System.Drawing.Size(880, 613);
this.Controls.Add(this.btnClose);
this.Controls.Add(this.btnCopyDelete);
this.Controls.Add(this.txtDeleteQuery);
this.Controls.Add(this.lblDeleteQuery);
this.Controls.Add(this.btnCopyUpdate);
this.Controls.Add(this.txtUpdateQuery);
this.Controls.Add(this.lblUpdateQuery);
this.Controls.Add(this.btnCopyInsert);
this.Controls.Add(this.txtInsertQuery);
this.Controls.Add(this.lblInsertQuery);
this.Controls.Add(this.btnGenerateQueries);
this.Controls.Add(this.lblAllowNulls);
this.Controls.Add(this.lblSize);
this.Controls.Add(this.lblDataType);
this.Controls.Add(this.lblColName);
this.Controls.Add(this.lblPrimary);
this.Controls.Add(this.btnReload);
this.Controls.Add(this.txtColumnNo);
this.Controls.Add(this.lblColumnNo);
this.Controls.Add(this.txtTableName);
this.Controls.Add(this.lblTableName);
colList[i].Size = new
System.Drawing.Size(432, 21);
this.Controls.Add(colList[i]);
}
}
catch(Exception ex)
{
MessageBox.Show("Please type valid integer for
number of columns.","Error",MessageBoxButtons.OK,MessageBoxIcon.Error);
}
}
private string createtype(string size)
{
if(size != "") return "("+size+")"; else return "";
}
public string allownull(string logic)
{
if(logic=="Yes") return "=NULL"; else return "";
}
private string checkvalidity()
{
for(int i=0; i<no; i++)
if(colList[i].txtSize.Text !="" )
try
{
Convert.ToInt32(colList[i].txtSize.Text);
}
catch(Exception x)
{
return "Wrong size entered for
field: "+colList[i].txtColumn.Text;
}
return "";
}
private bool checkforprimary()
{
bool check = false;
for(int i=0; i<no; i++)
if(colList[i].chbPrimary.Checked) check = true;
return check;
}
private void btnGenerateQueries_Click(object sender,
System.EventArgs e)
{
if(checkvalidity()=="")
{
if((no > 0) && (txtTableName.Text != ""))
{
txtInsertQuery.Text = "CREATE PROCEDURE
dbo.sp_Insert_"+txtTableName.Text;
txtInsertQuery.Text += "\r\n(";
if(no>1)
{
for(int i=0;i<no-1;i++)
txtInsertQuery.Text += "\r\n
@"+colList[i].txtColumn.Text+"
"+colList[i].cmbType.Text+createtype(colList[i].txtSize.Text)
+allownull(colList[i].cmbNull.Text)+",";
txtInsertQuery.Text += "\r\n
@"+colList[no-1].txtColumn.Text+"
"+colList[no-
1].cmbType.Text+createtype(colList[no-1].txtSize.Text)
+allownull(colList[no-1].cmbNull.Text);
}
else
{
txtInsertQuery.Text += "\r\n
@"+colList[0].txtColumn.Text+"
"+colList[0].cmbType.Text+createtype(colList[0].txtSize.Text)
+allownull(colList[0].cmbNull.Text);
}
txtInsertQuery.Text += "\r\n)";
txtInsertQuery.Text += "\r\nAS\r\nINSERT
INTO "+txtTableName.Text+"(";
if(no>1)
{
for(int i=0;i<no-1;i++)
txtInsertQuery.Text += colList[i].txtColumn.Text+",
";
txtInsertQuery.Text += colList[no1].txtColumn.Text+")";
}
else
{
txtInsertQuery.Text +=
colList[0].txtColumn.Text+")";
}
txtInsertQuery.Text += "\r\nVALUES(";
if(no>1)
{
for(int i=0;i<no-1;i++)
txtInsertQuery.Text += "@"+colList[i].txtColumn.Text+",
";
txtInsertQuery.Text +=
"@"+colList[no-1].txtColumn.Text+")";
}
else
{
txtInsertQuery.Text +=
"@"+colList[0].txtColumn.Text+")";
}
txtInsertQuery.Text += "\r\nGO";
if(checkforprimary())
{
int no_of_primkeys = 0;
for(int i=0; i<no; i++)
if(colList[i].chbPrimary.Checked) no_of_primkeys++;
if(no>no_of_primkeys)
{
txtUpdateQuery.Text = "CREATE
PROCEDURE dbo.sp_Update_"+txtTableName.Text;
txtUpdateQuery.Text +=
"\r\n(";
if(no>1)
{
for(int i=0;i<no-1;i++)
txtUpdateQuery.Text += "\r\n
@"+colList[i].txtColumn.Text+"
"+colList[i].cmbType.Text+createtype(colList[i].txtSize.Text)
+allownull(colList[i].cmbNull.Text)+",";
txtUpdateQuery.Text +=
"\r\n
@"+colList[no-1].txtColumn.Text+"
"+colList[no-
1].cmbType.Text+createtype(colList[no-1].txtSize.Text)
+allownull(colList[no-1].cmbNull.Text);
}
else
{
txtUpdateQuery.Text +=
"\r\n
@"+colList[0].txtColumn.Text+"
"+colList[0].cmbType.Text+createtype(colList[0].txtSize.Text)
+allownull(colList[0].cmbNull.Text);
}
txtUpdateQuery.Text +=
"\r\n)";
txtUpdateQuery.Text +=
"\r\nAS";
txtUpdateQuery.Text +=
"\r\nUPDATE "+txtTableName.Text;
txtUpdateQuery.Text +=
"\r\nSET ";
int no_of_noprimkeys = nono_of_primkeys;
for(int i=0;i<no;i++)
if(!
colList[i].chbPrimary.Checked)
{
no_of_noprimkeys--;
if(no_of_noprimkeys == 0) txtUpdateQuery.Text +=
colList[i].txtColumn.Text+"=@"+colList[i].txtColumn.Text;else
txtUpdateQuery.Text +=
colList[i].txtColumn.Text+"=@"+colList[i].txtColumn.Text+", ";
}
txtUpdateQuery.Text +=
"\r\nWHERE ";
int temp_no_of_primkeys =
no_of_primkeys;
for(int i=0;i<no;i++)
if(colList[i].chbPrimary.Checked)
{
temp_no_of_primkeys--;
if(temp_no_of_primkeys == 0) txtUpdateQuery.Text +=
colList[i].txtColumn.Text+"=@"+colList[i].txtColumn.Text;else
txtUpdateQuery.Text +=
colList[i].txtColumn.Text+"=@"+colList[i].txtColumn.Text+", ";
}
txtUpdateQuery.Text +=
"\r\nGO";
}
else
{
MessageBox.Show("Number of
primary key fields has to be less or equal to the total number of fields
for the UPDATE query to be
generated.","Warning",MessageBoxButtons.OK,MessageBoxIcon.Warning);
txtUpdateQuery.Text = "";
}
txtDeleteQuery.Text = "CREATE
PROCEDURE dbo.sp_Delete_"+txtTableName.Text;
txtDeleteQuery.Text += "\r\n(";
int tem_no_of_primkeys =
no_of_primkeys;
for(int i=0;i<no;i++)
if(colList[i].chbPrimary.Checked)
{
tem_no_of_primkeys--;
if(tem_no_of_primkeys ==
0) txtDeleteQuery.Text += "\r\n
@"+colList[i].txtColumn.Text+"
"+colList[i].cmbType.Text+createtype(colList[i].txtSize.Text)
+allownull(colList[i].cmbNull.Text);else txtDeleteQuery.Text +="\r\n
@"+ colList[i].txtColumn.Text+"
"+colList[i].cmbType.Text+createtype(colList[i].txtSize.Text)
+allownull(colList[i].cmbNull.Text)+",";
}
txtDeleteQuery.Text += "\r\n)";
txtDeleteQuery.Text += "\r\nAS";
txtDeleteQuery.Text += "\r\nDELETE
FROM "+txtTableName.Text;
txtDeleteQuery.Text += "\r\nWHERE ";
tem_no_of_primkeys = no_of_primkeys;
for(int i=0;i<no;i++)
if(colList[i].chbPrimary.Checked)
{
tem_no_of_primkeys--;
if(tem_no_of_primkeys ==
0) txtDeleteQuery.Text +=
colList[i].txtColumn.Text+"=@"+colList[i].txtColumn.Text;else
txtDeleteQuery.Text +=
colList[i].txtColumn.Text+"=@"+colList[i].txtColumn.Text+", ";
}
txtDeleteQuery.Text += "\r\nGO";
}
else
{
MessageBox.Show("There has to be at
least one field with primary key for the UPDATE and DELETE queries to be
generated.","Warning",MessageBoxButtons.OK,MessageBoxIcon.Warning);
txtUpdateQuery.Text = "";
txtDeleteQuery.Text = "";
}
}
else
CREATE DATABASE :
using
using
using
using
using
using
using
using
using
using
using
using
System;
System.Collections;
System.Configuration;
System.Data;
System.Linq;
System.Web;
System.Web.Security;
System.Web.UI;
System.Web.UI.HtmlControls;
System.Web.UI.WebControls;
System.Web.UI.WebControls.WebParts;
System.Xml.Linq;
USER LOGIN :
using
using
using
using
using
using
using
using
using
using
using
using
System;
System.Collections;
System.Configuration;
System.Data;
System.Linq;
System.Web;
System.Web.Security;
System.Web.UI;
System.Web.UI.HtmlControls;
System.Web.UI.WebControls;
System.Web.UI.WebControls.WebParts;
System.Xml.Linq;
User management:
using
using
using
using
using
using
using
using
using
using
using
using
System;
System.Collections;
System.Configuration;
System.Data;
System.Linq;
System.Web;
System.Web.Security;
System.Web.UI;
System.Web.UI.HtmlControls;
System.Web.UI.WebControls;
System.Web.UI.WebControls.WebParts;
System.Xml.Linq;
CHAPTER-8
SYSTEM TESTING
System testing involves user training system testing and successful running of the
developed proposed system. The user tests the developed system and changes are made
according to their needs. The testing phase involves the testing of developed system using
various kinds of data.
An elaborate testing of data is prepared and the system is tested using the test
data. While testing, errors are noted and the corrections are made. The corrections are
also noted for the future use. The users are trained to operate the developed system.
TESTING:
System testing is the stage of implementation that is aimed at ensuring that the
system works accurately and efficiently before live operation commences. Testing is vital
to the success of the system. System testing makes logical assumption that if all the parts
of the system are correct, then the goal will be successfully achieved. A series of testing
are done for the proposed system before the system is ready for the user acceptance
testing.
The following are the types of Testing:
1. Unit Testing
2. Integration Testing
3. Validation Testing
4. Verification testing
5. User acceptance testing
8.1 Unit Testing
Unit testing focuses verification efforts on the smallest unit of the software
design, the module. This is also known as module testing. The modules are tested
separately. This testing was carried out during programming stage itself. In this testing
each module is found to be working satisfactorily as regards to the expected output from
the module.
8.2 Integration Testing
Data can be lost across an interface: one module can have adverse efforts on
another. Integration testing is the systematic testing for construction of program structure,
while at the same time conducting tests to uncover errors associated within the interface.
Here correction is difficult because the isolation of cause is complicated by the cast
expense of the entire program. Thus in the integration testing step, all the errors
uncovered are corrected for the next testing steps.
8.3 Validation Testing
At the conclusion of integration testing, software is completely assembled as a
package, interfacing errors have been uncovered and corrected and a final series of
software tests begins validation test has been conducted one of the two possible
conditions exists. One is the function or performance characteristics confirm to
specification and are accepted and the other is deviation from specification is uncovered
and a deficiency list is created.
MAINTENANCE:
The objectives of this maintenance work are to make sure that the system gets
into work all time without any bug. Provision must be for environmental changes which
may affect the computer or software system. This is called the maintenance of the system.
Nowadays there is the rapid change in the software world. Due to this rapid change, the
system should be capable of adapting these changes. In our project the process can be
added without affecting other parts of the system.
Maintenance plays a vital role. The system liable to accept any modification after its
implementation. This system has been designed to favour all new changes. Doing this
will not affect the systems performance or its accuracy.
In the project system testing is made as follows:
The procedure level testing is made first. By giving improper inputs, the errors
occurred are noted and eliminated. Then the web form level testing is made. For example
storage of data to the table in the correct manner.
In the form, the zero length username and password are given and checked.
Also the duplicate username is given and checked. The client side validations are made.
The dates are entered in wrong manner and checked. Wrong email-id is given
and checked.
This is the final step in system life cycle. Here we implement the tested
error-free system into real-life environment and make necessary changes, which runs in
an online fashion. Here system maintenance is done every months or year based on
company policies, and is checked for errors like runtime errors, long run errors and other
maintenances like table verification and reports.
Implementation is the stage of the project when the theoretical design is
turned out into a working system. Thus it can be considered to be the most critical stage
in achieving a successful new system and in giving the user, confidence that the new
system will work and be effective.
The implementation stage involves careful planning, investigation of the
existing system and its constraints on implementation, designing of methods to achieve
changeover and evaluation of changeover methods.
Implementation is the process of converting a new system design into
operation. It is the phase that focuses on user training, site preparation and file conversion
for installing a candidate system. The important factor that should be considered here is
that the conversion should not disrupt the functioning of the organization.
SYSTEM IMPLEMENTATION
Implementation is the most crucial stage in achieving a successful
system and giving the users confidence that the new system is workable and effective.
Implementation of a modified application to replace an existing one. This type of
conversation is relatively easy to handle, provide there are no major changes in the
system.
Each program is tested individually at the time of development
using the data and has verified that this program linked together in the way specified in
the programs specification, the computer system and its environment is tested to the
satisfaction of the user. The system that has been developed is accepted and proved to be
satisfactory for the user. And so the system is going to be implemented very soon. A
simple operating procedure is included so that the user can understand the different
functions clearly and quickly.
Initially as a first step the executable form of the application is to be
created and loaded in the common server machine which is accessible to all the user and
the server is to be connected to a network. The final stage is to document the entire
system which provides components and the operating procedures of the system.
CHAPTER 9
PROBLEMS FASED
When there is a clear goal in sight but no clear set of directions or means to attain
that goal, then it is called a problem. problems can be broken down into four aspects;
goal, givens, means of transforming conditions, and obstacles.
Goal the goal is the desired end state which the problem solving is being
directed toward.
The hope is to reach that end state and be able to assess whether or not you
achieved what you wanted.
Givens- these are the objects , conditions ,and constraints that accompany a
problem ,and can be either explicit or implicit.
Means of transforming conditions- there should be a way of changing the initial
stateof the problem.this is most usually a persons knowledge or skill level. For
instance ,a computer programmer presented with a problem would utilize his or her
knowledge of programming language to transform the state of the problem.
Obstacles- the problem should present a challenge.if there are no challenges
involved and the situation can be easily solved then it is not so a problem so much as a
rountine task.
Every problem has a problem faced, which is the whole range of possible
states and operators.only some of these states and operators will bring the person closer
to the goal state. The problem starts at the initial state and operators are applied to
change the state, creating a series of intermediate states that should hopefully lead to the
final goal state
CHAPTER 10
FUTURE PLANS
Every application has its own merits and demerits. The project has
covered almost all the requirements. Further requirements and improvements can easily
be done since the coding is mainly structured or modular in nature. Changing the existing
modules or adding new modules can append improvements. Further enhancements can be
made to the application, so that the web site functions very attractive and useful manner
than the present one.
CONCLUSION
It is concluded that the application works well and satisfy the users. The
application is tested very well and errors are properly debugged. The site is
simultaneously accessed from more than one system. Simultaneous login from more than
one place is tested.
The application works according to the restrictions provided in their
respective System. Further enhancements can be made to the application, so that the
application functions very attractive and useful manner than the present one. The speed of
the transactions become more enough now.
APPENDIX
BIBLIOGRAPHY