• No results found

Online Medical Shop Management

N/A
N/A
Protected

Academic year: 2021

Share "Online Medical Shop Management"

Copied!
66
0
0

Loading.... (view fulltext now)

Full text

(1)

1

Submitted

In The Partial Fulfillment of The

Requirement For The Award of Degree

Of

Master Of Computer Applications (MCA)

(Session: 2011-2012)

(2)

2

Declaration from the student

I, XYZ, a student of Master of Computer Applications (MCA), in

the Directorate of Distance Education, Kurukshetra University,

Kurukshetra, under Regn. No-09DE1418, for the session

2011-2012, hereby, declare that the project entitled ―CITY GUIDE‖ has

been completed by me under the supervision of Mr. Kumar.

The matter embodied in this project has not been submitted earlier

for award of any degree or diploma to the best of my knowledge

and belief.

(3)

3

CERTIFICATE

It is certified that XYZ, a student of Master of Computer

Applications (MCA) in the Directorate of Distance

Education, Kurukshetra University, Kurukshetra, under

Regn. No.09DE1418 fi=or the session 2011-2012, has

completed the project entitled ―CITY GUIDE‖ under my

supervision.

Guide Name:

Mr. Kumar

(4)

4

ACKONWLEDGEMENT

During the entire project I encounter many new experience and problem with several difficulties. As any project work, this one wouldn‘t have been possible without the contribution of many people behind the scenes .It is not always easy to make and introduces new things but I am very happy to complete this project.

I extend my sincerest thanks to our respected trainer Mr. Kumar under whose management and direction this project has been undertaken. He guiding force and prime motivation to lift me from the initialization state to the successful completion of the project.

His friendly guidance and discussion over the complexities of a real time project invoked a deep though in me. Undertaking a project such as this place an equal if not greater pressure on friends and family members closest to me.

Thanks to although who helped me in one-way or, other to all whose name unmentioned. The website is developed using Front End C# ASP.NET and MSSQL Server.

(5)

5

INDEX

S. No .

Topic

Page No.

1.

Introduction

About the project

About the company

6-7

2.

Current System

6

3.

Limitations of current system

7

4.

Proposed System

7

5.

ER-Diagram

10

6.

DFDs

11

7.

System Flowchart

17

8.

Structured Chart

18

9.

Gantt Chart

19

10.

Menu Tree

20

11.

Form Layout

21

12.

Table Listing

22

13.

Report Listing

24

14.

References

25

15.

Conclusion

26

(6)

6

1. Introduction

1.1

About the project :

Mandi district (earlier known as Mandavya Nagar) is one of the central

districts of Himachal Pradesh state in northern India. Mandi town is the headquarters of Mandi district Mandi. The town has both mythological and historical significance and boasts of a unique temple architecture. It is also referred to as ChhotaKashi as there are many ancient temples in the city and on the banks of river Beas. The river Beas flows through the town and hills, which makes this town more scenic.

It has a serene ambiance though the modern development has made its inroads here in terms of infrastructural developments. The town is an important commercial hub of the state. It is a major transit route to Kullu-Manali and other adjoining places from both NH-21 (Chandigarh-Kullu-Manali highway) and NH-20 (Pathankot-Mandi highway). Sundarnagar is one of the emerging towns of the district. Mandi has an educated middle class and people converse in Mandyali, one of the Pahari languages of Himachal. This web site contains information about Distt. Mandi, including geography, health studies, science, history, news, and preparation.

This we site also contains links District Blog, Forum, News & Events, Industries, Hotels, Tour & Travels, Bank & ATM, Hospitals, Govt. Offices, Internet & Computers, Bakers &Resturant, Malls & Shops, Studio & Printing, Jewelers.

1.2

About the company :

Swarniminfosoft Pvt. Ltd. a leading offshore Development Company that

delivers solutions to meet the client's objectives by combining technical expertise, quality and value has been providing services to its clients from India, Working with Swarniminfosoft makes life open to a world on innovation, creativity,

(7)

7

challenge and style. We are here with the opportunity that gives you continual career growth and knowledge.

IT Training

Training is often your opportunity to proactively move your IT career forward.This hunger is driven by the rapid rate of change in all spheres of life that are now affected by information technology.Cramming for tests and reading text materials alone are not enough to establish your IT career.If you want to build a career in IT and you have a degree or certification without practical skills, training is essential for you. You need to acquire these skills and knowledge to advance your IT career. SwarnimInfosoft Pvt. Ltd. is specialized in imparting different types of training according to the needs of the IT Global Market.

SwarnimInfosoft Pvt. Ltd. offers high end industrial training under the brand Tech Mentro. Tech Mentro is a renowned name in IT training in Noida, Delhi

(8)

8

System Analysis and Design:

Systems are created to solve problems. One can think of the systems approach as an organized way of dealing with a problem. In this dynamic world, the subject System Analysis and Design (SAD), mainly deals with the software development activities.

OBJECTIVES

After going through this lesson, you should be able to - define a system

- explain the different phases of system development life cycle - enumerate the components of system analysis

- explain the components of system designing

DEFINING A SYSTEM

A collection of components that work together to realize some objectives forms a system. Basically there are three major components in every system, namely input, processing and output.

Basic System Components

Input Output Processing

Computer Applications

In a system the different components are connected with each otherand they are interdependent. For example, human body representsa complete natural system. We are also bound by many nationalsystems such as political system, economic system, educational systemand so forth. The objective of the system demands that someoutput is produced as a result of processing the suitable inputs. Awell-designed system also includes an additional element referredto as ‗control‘ that provides a feedback to achieve desired objectivesof the system.

(9)

9

System life cycle is an organizational process of developing and maintainingsystems. It helps in establishing a system project plan, becauseit gives overall list of processes and sub-processes required fordeveloping a system.System development life cycle means combination of various activities.In other words we can say that various activities put togetherare referred as system development life cycle. In the System Analysisand Design terminology, the system development life cycle alsomeans software development life cycle.

Following are the different phases of system development life cycle: Preliminary study

Feasibility study Detailed system study System analysis System design Coding Testing Implementation Maintenance

Phases of System Development Life Cycle System Study Feasibility Study System Analysis System Design Maintenance Implementation Testing Software Development Life Cycle Coding

PHASES OF SYSTEM DEVELOPMENT LIFE CYCLE

Let us now describe the different phases and related activities ofsystem development life cycle.

(10)

10 (a) Preliminary System Study

Preliminary system study is the first stage of system developmentlife cycle. This is a brief investigation of the system under considerationand gives a clear picture of what actually the physical systemis? In practice, the initial system study involves the preparation of a‗System Proposal‘ which lists the Problem Definition, Objectives ofthe Study, Terms of reference for Study, Constraints, Expected benefitsof the new system, etc. in the light of the user requirements.The system proposal is prepared by the System Analyst (who studiesthe system) and places it before the user management. The managementmay accept the proposal and the cycle proceeds to thenext stage. The management may also reject the proposal or requestsome modifications in the proposal. In summary, we wouldsay that system study phase passes through the following steps:

problem identification and project initiation background analysis inference or findings (system proposal)(b) Feasibility StudyIn case the system proposal is acceptable to the management, the Computer Applicationsnext phase is to examine the feasibility of the system. The feasibilitystudy is basically the test of the proposed system in the light of its workability, meeting user‘s requirements, effective use of resourcesand of course, the cost effectiveness. These are categorized as technical,operational, economic and schedule feasibility. The main goalof feasibility study is not to solve the problem but to achieve thescope. In the process of feasibility study, the cost and benefits areestimated with greater accuracy to find the Return on Investment(ROI). This also defines the resources needed to complete the detailedinvestigation. The result is a feasibility report submitted tothe management. This may be accepted or accepted with modificationsor rejected. The system cycle proceeds only if the managementaccepts it.

Detailed System Study

The detailed investigation of the system is carried out in accordancewith the objectives of the proposed system. This involves detailedstudy of various operations performed by a system and their relationshipswithin and outside the system. During this process, dataare collected on the available files, decision points and transactionshandled by the present system. Interviews, on-site observation andquestionnaire are the tools used for detailed system study. Usingthe following steps it becomes easy to draw the exact boundary ofthe new system under consideration:

Keeping in view the problems and new requirements

(11)

11

All the data and the findings must be documented in the form ofdetailed data flow diagrams (DFDs), data dictionary, logical data structuresand miniature specification. The main points to be discussedin this stage are:

Specification of what the new system is to accomplish based onthe user requirements. Functional hierarchy showing the functions to be performed bythe new system and their relationship with each other.

Functional network, which are similar to function hierarchy butthey highlight the functions which are common to more thanone procedure.

List of attributes of the entities – these are the data items whichneed to be held about each entity (record)Introduction to System Analysis and Design

System Analysis

Systems analysis is a process of collecting factual data, understandthe processes involved, identifying problems and recommending feasiblesuggestions for improving the system functioning. This involve studying the business processes, gathering operational data, understandthe information flow, finding out bottlenecks and evolvingsolutions for overcoming the weaknesses of the system so as toachieve the organizational goals. System Analysis also includes subdividingof complex process involving the entire system, identificationof data store and manual processes.

System Design

Based on the user requirements and the detailed analysis of theexisting system, the new system must be designed. This is the phaseof system designing. It is the most crucial phase in the developmentsof a system. The logical system design arrived at as a result of systems analysis is converted into physical system design. Normally,the design proceeds in two stages:

Preliminary or General Design Structured or Detailed Design

Preliminary or General Design: In the preliminary or general design,the features of the

new system are specified. The costs of implementingthese features and the benefits to be derived are estimated.If the project is still considered to be feasible, we move to the detaileddesign stage.

Structured or Detailed Design: In the detailed design stage, computeroriented work

(12)

12

Structure design is a blueprint of a computer system solution to a given problem having the Computer Applicationssame components and inter-relationships among the same componentsas the original problem. Input, output, databases, forms, codificationschemes and processing specifications are drawn up in detail.

There are several tools and techniques used for describing the system design of the system. These tools and techniques are:

Flowchart

Data flow diagram (DFD) Data dictionary

Structured English Decision table Decision tree

Each of the above tools for designing will be discussed in detailed in the next lesson.

The system design involves:

i. Defining precisely the required system output

ii. Determining the data requirement for producing the output iii. Determining the medium and format of files and databases iv. Devising processing methods and use of software to produce output

v. Determine the methods of data capture and data input vi. Designing Input forms

vii. Designing Codification Schemes viii. Detailed manual procedures ix. Documenting the Design

Coding

The system design needs to be implemented to make it a workablesystem. This demands the coding of design into computer understandablelanguage, i.e., programming language. This is also calledthe programming phase in which the programmer converts the proIntroductionto System Analysis and Design gram specifications into computer instructions, which we refer to asprograms. It is an important stage where the defined procedures aretransformed into control specifications by the help of a computerlanguage. The programs coordinate the data movements and controlthe entire process in a system.It

(13)

13

is generally felt that the programs must be modular in nature.This helps in fast development, maintenance and future changes, if required.

Testing

Before actually implementing the new system into operation, a testrun of the system is done for removing the bugs, if any. It is animportant phase of a successful system. After codifying the wholeprograms of the system, a test plan should be developed and run ona given set of test data. The output of the test run should match theexpected results. Sometimes, system testing is considered a part ofimplementation process.Using the test data following test run are carried out:

Program test System test

Program test: When the programs have been coded, compiled andbrought to working conditions, they must be individually tested withthe prepared test data. Any undesirable happening must be notedand debugged (error corrections)System Test: After carrying out the program test for each of theprograms of the system and errors removed, then system test isdone. At this stage the test is done on actual data. The completesystem is executed on the actual data. At each stage of the execution,the results or output of the system is analysed. During theresult analysis, it may be found that the outputs are not matchingthe expected output of the system. In such case, the errors in theparticular programs are identified and are fixed and further testedfor the expected output.When it is ensured that the system is running error-free, the usersare called with their own actual data so that the system could beshown running as per their requirements.

Implementation

After having the user acceptance of the new system developed, theimplementation phase begins. Implementation is the stage of a projectduring which theory is turned into practice. The major steps involvedin this phase are:

l Acquisition and Installation of Hardware and Software l Conversion

l User Training l Documentation

The hardware and the relevant software required for running the system must be made fully operational before implementation. The

(14)

14

conversion is also one of the most critical and expensive activities in the system development life cycle. The data from the old system needs to be converted to operate in the new format of the new system. The database needs to be setup with security and recovery procedures fully defined.

During this phase, all the programs of the system are loaded onto the user‘s computer. After loading the system, training of the user starts. Main topics of such type of training are:

How to execute the package How to enter the data

How to process the data (processing details) How to take out the reports

After the users are trained about the computerized system, workinghas to shift from manual to computerized working. The process iscalled ‗Changeover‘. The following strategies are followed forchangeover of the system.

(i) Direct Changeover: This is the complete replacement of the oldsystem by the new system. It is a risky approach and requirescomprehensive system testing and training. (ii) Parallel run: In parallel run both the systems, i.e., computerizedand manual, are executed simultaneously for certain definedperiod. The same data is processed by both the systems. Thisstrategy is less risky but more expensive because of the following: Manual results can be compared with the results of the computerizedsystem.

Online Medical shop Management

system

Overview:-

It is the complete Online medical shop management software is so designed as to ease the work load of medical shop professionals. The main feature includes invoicing, inventory and stock control, accounting, client and vendor management.

This software helps you to track all the profits, loss, profitable clients and

products of medical shop moreover it‘s a medical shop accounting software. Flexible and adaptive software suited to medical shops or stores or pharmacies of any size.

(15)

15

 Menu driven, Key board and mouse navigation  Paperless practice

 Improve efficiency, productivity  Cost effective solutions

 Graphical User Interface with Context Sensitive Help  Automatic importing of drug list

 Inbuilt account group and account ledgers  Option for setting default company

 Keep address book / telephone directory for easy access  Option for setting default company

Limitations of current system:-

 We can‘t view a financial report of past financial year

 We can‘t created multiple companies with different financial year  Not maintain all financial report and financial statements such as day

book, profit and loss amount and balance sheet

 It allows only one user therefore it is not provide a high security

 Not have a better search option for finding available product of company  It provide only 50 reports

~ 15 ~

Proposed system:-

It is the complete medical shop management software is so designed as to ease the work load of medical shop professionals. The main feature includes invoicing, inventory and stock control, accounting, client and vendor management.

This software helps you to track all the profits, loss, profitable clients and

products of medical shop moreover it‘s a medical shop accounting software. Flexible and adaptive software suited to medical shops or stores or pharmacies of any size.

This System will store the information of medicines & customers in the system. It will also store the information about stock details. This system provides security by granting access rights for changing the sensitive data to administrator only. Customized search

(16)

16

options are also available in this system. This system can generate all kinds of reports as per the user‘s requirements.

Proposed system feature:-

Multiple companies with different financial year can be created

We can view report of past financial year

Back up and restore facility

Keep record of daily customers

Keep records of salesmen

Tracking sales done by a particular salesman

Manage counter sale

Keep track of instant collecting medicines from near by medical shop and selling directly

 Reminders for product low stock, product short expiry  Keeps track of all payment , receipt of company

 Creating different users with different privilege level for providing high security  Handle financial accounting.

 Provides around 100 reports with maximum filtering option  Better search option for finding available products of company  Search can be filtered by product group, product, shelf,

System Requirements:-

• Required processor :Pentium 90 MHz or faster • Required RAM :128 MB (256 or more recommended) • 25 MB of available hard-disk space for installation • CD-ROM drive (only for installation)

(17)

17

Software Specification:-

• Operating system: .Net framework 2.0 version compactable software platform

• Technology: Microsoft .net 2005 • Front end: C#.NET

• Back end: Microsoft SQL Server 2005

INTRODUCTION

C# Language

Welcome to this C# tutorial. With the introduction of the .NET framework, Microsoft included a new language called C# (pronounced C Sharp). C# is designed to be a simple, modern, general-purpose, object-oriented programming language, borrowing key

concepts from several other languages, most notably Java.

C# could theoretically be compiled to machine code, but in real life, it's always used in combination with the .NET framework. Therefore, applications written in C#, requires the

(18)

18

.NET framework to be installed on the computer running the application. While the .NET framework makes it possible to use a wide range of languages, C# is sometimes referred to as THE .NET language, perhaps because it was designed together with the framework.

C# is an Object Oriented language and does not offer global variables or functions. Everything is wrapped in classes, even simple types like int and string, which inherits from the System.Object class.

C# can be written with any text editor, like Windows Notepad, and then compiled with the C# Command line compiler, csc.exe, which comes with the .NET framework.

However, most people prefer to use an IDE (Integrated Development Environment), and Microsoft offers several options for this. Their flagship is Visual Studio, which can be used to work on every possible aspect of the .NET framework. This product is very advanced, and comes in several editions. Visual Studio is not exactly cheap, and might even be too advanced for hobby programmers.

With .NET framework 2.0, Microsoft introduced the so-called Express versions, targeted at hobby programmers and people wanting to try .NET, and they continued this tradition with the later release of .NET 3.0 and 3.5. The Express versions only work for one language, like C# or VB.NET, and miss some of the really advanced features of Visual Studio. However, they are free and will work just fine for learning the languages, which is why we will use it for this tutorial.

(19)

19

1. C# is a simple, modern, object oriented language derived from C++ and Java. 2. It aims to combine the high productivity of Visual Basic and the raw power of C++. 3. It is a part of Microsoft Visual Studio7.0.

4. Visual studio supports Vb, VC++, C++, Vbscript, Jscript. All of these languages provide access to the Microsoft .NET platform.

5. .NET includes a Common Execution engine and a rich class library. 6. Microsoft's

JVM equiv. is Common language run time (CLR).

7. CLR accommodates more than one languages such as C#, VB.NET, Jscript, ASP.NET, C++.

8. Source code --->Intermediate Language code (IL) ---> (JIT Compiler) Native code. 9.The classes and data types are common to all of the .NET languages.

10. We may develop Console application, Windows application, and Web application

using C#.

11. In C# Microsoft has taken care of C++ problems such as Memory management, pointers etc.

12. It supports garbage collection, automatic memory management and a lot.

MAIN FEATURES OF C#LANGUAGE

1. Pointers are missing in C#.

2. Unsafe operations such as direct memory manipulation are not allowed. 3. In C# there is no usage of ":‖ or "->" operators.

4. Since it`s on .NET, it inherits the features of automatic memory management and garbage collection.

(20)

20

6. Integer values of 0 and 1 are no longer accepted as Boolean values. Boolean values are pure true or false values in C# so no more errors of "="operator and "=="operator. "==" is used for comparison operation aC# and its Features.

CHAPTER 9

INTRODUCTION ABOUT ASP .NET AND RDBMS:-

(21)

21

Microsoft introduced the .NET Framework with the intention of enhancing the interoperability of applications. This framework aims at integrating various programming languages and services. It is designed to make significant improvements in code reuse, code specialization resource management, Multilanguage development, security, deployment and administration. It consists of all the technologies that help in creating and running robust, scalable and distributed applications. .NET offer complete suit for developing and deploying applications. This suite consist of .NET Products, .NET Services and the .NET framework.

.NET Product:

Microsoft has already introduced Visual Studio.NET, which is a tool for developing .NET applications, by using programing language with Visual Basic, Visual C# and Visual C++.

This product allows developer to create applications that are capable of interacting seamlessly with each other.

.NET Service:

.NET Framework helps us to create software such as web services. A web service is an application or business logic that is accessible through slandered Internet protocol such as HTTP (Hyper Text Transfer Protocol) and Simple object Access Protocol (SOAP). We can identify the service by a Uniform Resource Locator (URL). The public Interfaces and binding of

(22)

22

the web service are described by using XML. Users can subscribe to such a service and use it as long as they need it, regardless of their hardware and software platforms.

.NET Framework:

it is the foundation on which you design, develop, and deploy applications. It is a consistent and simplified programming model that helps you to easily build robust applications. It is the core of the .NET infrastructure because it exists as a layer between .NET applications and the underlying operating system. In other words , the .NET Framework encapsulates most of the basic functionality, such as debugging and security services, which were earlier built into various programming languages in the form of a collection of services and classes.

Common Language Runtime (CLR)

The CLR is one of the essential components of the .NET framework. CLR is the

environment in which all programs that use .NET technologies are executed. It provides services such as code compilation, memory allocation, and garbage collection. The CLR allows the execution of code across Different platforms by translating code into

Intermediate Language (IL). IL is a low –level language that the CLR understands.

IL is converted into machine language during execution by the JIT compiler. During JIT compilation, code is also checked for type safety. Type safety ensures that objects are always accessed in a compatible way. If you try to assign an 8-byte value to a variable of size 4 byte, the CLR will detect and trap it.

(23)

23

CLR consists of a set of common rules followed by all the languages of the .NET framework. This set of rules is known as CLS. CLS enables an objects or application to interact with objects or applications of other languages. The classes that follow the rules specified by CLS are termed as CLS-compliant classes.

One of the specifications defined in CLS is common Type System (CLS), which provides a type system that is common across all languages. CTS defines how data types, how data types are declared, used, and managed in the code during run time.

The CTS also defines the rules that ensure that the data types of objects written in various languages are table to interact with each other.

The source code needs to be compiled before execution.CLR plays an important role in the process of compilation and execution of the program.

During execution ,CLR performs the following steps:

 Loading assemblies and identifying namespaces: Assemblies are loaded into the memory.After loading assemblies, CLR identifies namespace for code in assemblies. Namespace are a collection of classes. The .NET Framework uses namespaces to organize its classes in a hierarchy.Namespace implicitly have public access and this cannot be changed.

pRO

Program code IL

(24)

24

 JIT compilation: Before execution, IL is converted into machine language by JIT compiler. Next, during the verification process, the IL code is examined to confirm the following points:

The memory location that code needs to access is available.

Methods are called only through properly defined types

IL has been correctly generated.

 Garbage collection:

The garbage collection process begins after JIT compilation and manages the allocation and deallocation of memory for an application. Whenever you create an object, the CLR allocates memory for the object from the managed heap. A managed heap is of the memory that is available for program execution. If sufficient memory is not available on the managed heap, the garbage collection process is invoked.

Advantage of the.NET Framework

Some of the advantages of the .NET Framework are:

 Consistent programming model :

The .NET Framework provides a common object-oriented programming model across language. This model can be used to perform severl, and retrieving data.

 Multi-platform applications:

There are several versions of Windows most of which run on x86 CPUs. Some versions, such as Windows CE and the 64-bit Windows, run on non-x86 CPUs as well. A .NET application can execute on any architecture that is supported by the CLR. In future, a CLR version could even be built for non-Windows platforms.

(25)

25

 Multi-language integration:

.NET allows multiple languages to be integrated. For example, it is possible to create a class in VC# that is derived from a class implemented in VB.NET. To enable objects to interact with each other regardless of the language used to develop them, a set of

language feature has been defined in CLS.

Automatic resource management:

While creating an application, a programmer may be required to write code for managing resources such as files, memory, network connections, and database resources.

Ease of develop

:

One of the goals of the .NET Framework is to simplify application deployment. .NET application can be deployed simply by copying files to the target computer. Deployment of components has also been simplified. Till now, Microsoft‘s

Component Object Model(COM) has been used for creating components. However, COM sffers from various problems related to deployment. For example, every COM component needs to be before it can be used in an application.

The .NET framework is a new computing platform that simplifies application development in the highly distributed environment of the internet. The .NET Framework

(26)

26

is designed to fulfill the following objectives: the .NET Framework is an integral Windows component that supports building and running the next generation of applications and XML Web services. The key components of the .NET Framework are the common language runtime and the .NET Framework class library, which include VB.NET, ADO.NET and Windows Forms. The .NET Framework provides a managed execution environment, simplified development and deployment, and integration with a wide variety of programming languages.

 To provide a consistent objectives-oriented programming environment whether object code is stored and executed locally, executed locally but internet-distributed or executed remotely.

 To provide a code-execution environment that minimizes software deployment and versioning conflicts.

 To provide a code-execution environment that guarantees safe execution of code, including code created by an unknown or semi trusted hired party.

 To provide a code-execution environment that eliminates the performance problems of scripted or interpreted environments.

 To build all communication on industry standards to ensure that code based on the .NET Framework can integrate with any other code.

(27)

27

 The common language runtime and

The .NET Framework class library.

ASP (Active Server Pages)

Microsoft Active Server Pages (ASP) was developed by Microsoft on July 16, 1996. It is a powerful and easy technology to create dynamic web pages. The main purpose of ASP is to decrease the load on the browser by performing many of the tasks done earlier by the Browser, which increases the response time for each request. With the help of ASP, you can combine HTML pages, script commands and Active X components to create interactive web pages.

Server-Side Scripting

ASP is a Server-Side Scripting language. Server-Side Scripting deals with storage of data, server-side validations, security issues and the management of transactions.ASP Scripts are processed on the Web Server. The Web Server then generates the Web pages that are sent to the browser. The benefit of ASP is that users cannot view document, because only the generated result is sent to the browser.

(28)

28

ASP is process on the web server. So it requires web server application to be executed. You can use Internet Information Server (IIS) or Personal Web Server (PWS) to process ASP files.

In executing ASP files following steps are performed:

1. The browser sends a request for an ASP page to the web server by form or URL. 2. The web server receives the request and finds the ASP file from the storage unit. 3. The web server forwards the ASP file to the ASP script engine i.e. ASP.DLL for

processing.

4. ASP engine reads the ASP file to generate an HTML file and sends HTML page to the server.

5. The web server sends the HTML page to the client.

In this way the ASP file is processed and output is displayed in the browser.

ASP File

An ASP file is a text file with the extension .asp, which contains  HTML tags

 Client-Side Scripts  ASP Scripts

Using ASP Scripts

ASP scripts are written simply in the HTML file. It also includes scripting language, whether it is VB Script or Java Script or other. You can write ASP Scripts in two ways: Using <Script> and </Script> tags:

(29)

29

The <Script> and </Script> tags are normally used in client side scripting to enclose VB Script or Java Script. Using the attribute RUNAT within the tags can also use these tags to enclose ASP Scripts. E.g.:

<Script Language= ―VBScript‖ Runat= ―Server‖> ………..

………. </Script>

Using the <%and %> delimiters

You can enclose the ASP scripts between the <% and %> delimiters. These delimiters are used in two ways in the script.

a) If you want to enclose general ASP script, you can use <% and %> delimiters. b) If you want to display output of variable of expression directly in HTML page,

you can use <%= and %> delimiters.

Accessing ASP Files

ASP files are stored on the web server. So to host the asp files on the web server, you have to create a virtual directory in the server application. To create virtual directory in IIS you can follow the steps given below:

1. Open Internet Service Manager, through start menu programs.

2. Click the right button of mouse on the Default Web Site icon and from the context menu select New option to click Virtual Directory option. This will display New Virtual Directory Wizard.

(30)

30

3. Type the name of the Virtual Directory and Click Next button.

4. Now, type the path of the directory where ASP files are located on the disk (or you can used Browse button to select the path) and click Next button.

5. Now make sure that read and script permissions are selected for this directory and click on the Finish button.

This will set the virtual directory to host the asp files on the server.

You can browser the asp file in the Internet Explorer, using the following format: http://<servername>/<virtual_directory_name>/asp_filename

e.g. http://server/neha/ttt.asp

Scripting Engine

Scripting Engine is a special program that processes the scripting statement in a web page. A browser can execute a client-side script if the proper runtime script engine is built into it. To execute server – side script the script engine must b e available with the web server. ASP scripts are processed by script engine ―ASP.DLL‖ installed in the IIS application. ASP.DLL executes ASP scripts to generate HTML.

ASP Objects

ASP provides some built in objects, which have methods, properties and collections. Methods of an object are used to perform some tasks with an object. A property of an object can be set to a

value to specify the state of object. The collections of an object consist of different sets of key and value pairs related to the object. The asp objects are:

(31)

31

Request: This object is used to specify information about a client request send using http request through GET or POST method.

Response: This object is used to control the response sent from the server to the client. Server: This object is used to provide access to the methods and properties of web server. Application: This object is used for the processes of a web application.

Session: This object is used for storing user information that is needed for a particular user session.

ASP Error: This Object can be used to trap ASP Error and provide information to the users.

Object Context:This object is used to link ASP and the Microsoft Transaction Server

ASP.NET

Visual Basic developers have long enjoyed the ease of programming with forms and controls. Writing a VB form-based application is as simple as dragging some controls onto a form and writing some event-handling functions. This is one of the reasons VB has attracted lots of programmers interested in speed of development. Microsoft wisely built this feature into ASP.NET.

ASP.NET simplifies web page development with form-based Programming. In ASP.NET, these forms are called Web Formsand are analogous to VB forms, replacing ASP pages. Similar to VB, Web Forms programming is also event based. We don't have to write in-line ASP scripts and rely on the top-down parsing interpretation as in ASP programming. To match the rich set of

(32)

32

ActiveX controls that VB programmers love in their toolset, ASP.NET equips ASP programmers with server controls. To further enhance the productivity of developers, ASP. Net‘s Web Forms also allow for the separation of the application logic and the presentation layer.

ASP.NET evolves from the ASP programming model with the following additional benefits:

 Clean separation between the application logic (server-side code) and the presentation layer (HTML markup)—no more spaghetti code

 A rich set of server controls that automatically render HTML suitable for any clients and that additionally manage their states

 Enhanced session-state management

 An event-based programming model on the server side, which is simpler and more intuitive

 Application logic that can be written in any Microsoft .NET language (VB, C# etc.); application server-side code is compiled for better performance

 Visual Studio.NET as a RAD tool, which simplifies the development process of Web Forms

(33)

33

ASP.NET Architecture

As the illustration shows, all Web clients communicate with ASP.NET

applications through IIS. IIS deciphers and optionally authenticates the request. If Allow

Anonymous is turned

on, no authentication occurs. IIS also finds the requested resource (such as an ASP.NET application), and, if the client is authorized, returns the appropriate resource.

Internet Information Services (IIS)

Internet Information Services (IIS) is the Windows component that makes it easy to publish information and bring business applications to the Web. IIS makes it easy for you to create a strong platform for network applications and communications.

Internet Information Services 5.1 has many features to help Web administrators to create scalable, flexible Web applications.

(34)

34

 Administration

 Programmability

 Internet Standards

Microsoft Internet Information Services 5.0 and 5.1 comply with the HTTP 1.1 standard, including features such as PUT and DELETE, the ability to customize HTTP error messages, and support for custom HTTP headers.

IIS 5.1 offers greater protection and increased reliability for your Web applications. By default, IIS runs all of your applications in a common or pooled process that is separate from core IIS processes.

In IIS 5.1, administrators and application developers have the ability to add custom objects, properties, and methods to the existing ADSI provider, giving

Administrators even more flexibility in configuring their sites.

Internet Information Services (IIS) makes it easy for you to publish

information on the Internet or your intranet. IIS includes a broad range of administrative features for managing

CHAPTER 10

MSSQL SERVER 2005:-

SQL server is a Microsoft Back office product that is deployed on Windows NT, Windows 95,98,SQL server is a SQL based, client-server, RDBMS.SQL stands for structured Query Language is used in writing queries to retrieve data from

(35)

35

databases.SOLserver stores data at a central location known as server and delivers it on demand to others locations known as clients. The server is responsible to manage the databases and memory for multiple requests. The clients are responsible for presenting data and business logic to the end users. Clients programming interfaces provides the means for applications to run on separate clients computers and communicate to the server over a network.

SQL server takes care of the following:  Updating the databases.

 Retrieving information from the databases.  Accepting query language statements.  Enforcing security specifications  Enforcing data integrity specifications.  Enforcing transaction consistency.  Managing data sharing.

 Optimizing system catalogs.

Query Analyzer

The query analyzer is the interface for passing SQL statements to the SQL servers, view results or analyze the results or analyze a query plan. The query analyzer can be started from two places.

 From the SQL server program icon.

 From command prompt by typing the command. The first dialog box that is displayed enables you to login.

Once a server name and login name is authenticated by the SQL server, the query analyzer screen is displayed .once the query analyzer is opened the SQL statements can

(36)

36

be typed in it. The SQL statements then need to be submitted to SQL server by using the F5 key or clicking on the toolbar (Execute query) button.

THE OTHERS TOOLS THAT SQL SERVER IS SHIPPED WITH

ARE:

 Service Manager  Client Network  Utility Server  Network Utility

System Analysis

The basic aim of System Analysis is to obtain a clear understanding of the needs of the clients and the users, what exactly is desired from the software and what the constraints on the solution are. Analysis leads to actual specification.

Analysis involves interviewing the clients and the actual users. These people and the existing documents about the current mode of operation are the basic source of

information for the analysis.

There are two approaches to system analysis:

 Informal Approach

(37)

37

The informal approach to analysis is one where no defined methodology is used. The information about the system is obtained by interaction with the client, end, users, questionnaires, study of existing documents etc.

The structured analysis uses function-based decomposition while modeling the problem. It focuses on the function performed in the problem domain and the data consumed and produced by these functions. This method helps the analyst decide what type of information to obtain at different points in analysis, and it helps organize information. It is top down refinement approach.

Table: -

MS-Sql 2005 table makes data that should be organized in a table structure. With the help of tables we can present data organized in raw and columns. The rules of which elements occurs in a table is called a table model. After we have decided upon the tables that we will have in our database, we can define the various field and their properties. For every field we have to decide the

o Field Name o Field Type o Field size

Queries:-

We use a query to extract information from a database. A query can select a group of records that fulfill a certain condition. An example of query is when we want to see the list of books published Name Publishing. The query feature of access creates a search based on the criteria that the publisher‘s name is ―Name Publishing‖ and displays

(38)

38

the selected records in a datasheet format. Most access databases contain more then one table. We can combine specific fields from multiple tables into one datasheet.

Reports:-

A report is a flexible way of viewing and printing summary information. It enables us to display information to the required level or detail. The information can be viewed or printed in any format. Subtotals, statistical evaluations, pictures and graphs can be inserted into a report.

Database:-

Database is a collection of related items grouped together under a single heading, for e.g. a customer file, Bank A/C in a Bank, Employee Details etc. According to Oxford dictionary ―a database is organized store of data for computer processing‖. A database can be said as a collection of files containing records of similar nature. Each record contains all the data relating to one subject in the file. The grouping of such files is called a Database. Database can be kept manually or electronically.

Components of database

1. Records: A record is a collection of fields containing the alphanumeric characters. 2. Fields: A field is an item, which distinguishes one record, from another. A field can

either be in form of alphabets, numeric, or alphanumeric. Each field is identified by a field name.

(39)

39

3. Key Fields: a key field is a field that is unique to a particular record and is used to distinguish a file from another in one or the other respect.

4. Entity: A person, place, thing or event about which information must be kept.

5. Attribute: Piece of information describing a particular entity. These are mainly characteristics about the individual entity.

Data Base Models:-

Database models are broadly classified into two categories, They are: Object-based logical models

Record-based logical models

Object Based Logical Models

Object based logical models are used in describing data at the logical and view levels. They are characterized by the fact that they provide fairly flexible structuring capabilities and allow data constraints to be specified explicitly. There are many different models, and are likely to come. Several of the widely known ones are

The entity-relationship model The object-oriented model The semantic data model The functional data model

(40)

40

Record-Based Logical Model

Record-based logical models are used in describing data at the logical and view level. In contrast to object-based data models, they are used both to specify the overall logical structure of the database and to provide a higher-level description of the implementation. Record-based models are so named because the database is structured in fixed format record of several types. Each records type defines a fixed number of fields, or attributes, and each field is usually of a fixed length. The three most widely accepted record-based models are

The Hierarchical models. The Network models. The Relational models.

Hierarchical Database Model

Data storage is in form of child parent relationship. The origin of data tree is root. Data located at different levels among a particular branch is called node. The last node in tree is called a leaf. This models support one-to-many relationship.

Network Model

Data in network model is represented by collection of records (in Pascal sense), and relationships among data are represented by links, which can be viewed as pointers. The records in the database are organized as collections of arbitrary graphs.

(41)

41

The main idea behind the Network Database System model is to bring about Many-to-Many relationship. The relationship between the different data items is called as sets. This system also uses pointers to locate a particular record.

The Relation Database System came into existence to overcome all the drawbacks of these models. Now, let us consider an example of the network model. The network model differs from the relational model in that data are represented by collections of records, and relationships among data are represented by links.

Relational Model

Dr E.F Codd first introduced the relational Database model in 1970. The relational model allows data to be represented in a simple row-column format. Each data field is considered as a column and each record is considered as a row of a table.

Object Relational Model

As the name implies the object relational model supports both object-oriented and relational concepts. It eliminates certain discrepancies in the relational model. In this model it is possible to provide well-defined interfaces for the application. A structure once created can be reused-this in the fundamental property of the OOP‘s concept. By combining the object oriented and relational concepts Oracle now offers the best of both worlds.

(42)

42

Let us now examine the components and structure of a database management system. A DBMS is a complex software system that is used to manage, store and manipulate data and the metadata used to describe the data. It is utilized by a large variety of users from the very naïve user to most sophisticated to retrieve and to manipulate data under its control. The users could be utilizing the database concurrently from online terminals and/or in a batch environment via application programs written in a high level language. Before looking at various components of the DBMS, let us examine its facilities and classify its users.

Classification of DBMS Users

The primary goal of a database system is to provide an environment for retrieving information from and storing new information into the database. There are four different type of database system users differentiated by the way that they expect to interact with the system.

(43)

43

Naïve users are unsophisticated users who interact with the system by invoking one of the application programs that have been written previously. These are users who are not aware of the presence of database system or any other system supporting their usage. Example: A user of an automatic teller machine falls under this category.

Online Users

Online users are the users who may communicate with the database directly. These users are aware of presence of the database system. The more sophisticated of these users may also use a data manipulation language (which will dealt in later chapters) to manipulate the database.

Application Programmers

Application programmers are computer professionals who interact with the system through Data Manipulation Language calls, which are embedded in a program written in a host language (for example, COBOL, PL/I, PASCAL, C). These programs are commonly referred to as application programs.

Example:In banking system include a program that generate payroll checks, that debit accounts, that credit accounts, or that transfers fund between accounts.

(44)

44

Centralized control of the database –in exerted by a person or group of persons under the supervision of a high level administrator, this person is referred to as the Data Base Administrator (D.B.A). He is the user who is most familiar with the database and is responsible for creating, modifying and maintaining it. He is custodian of the data and controls the database structure.

Advantages of a RDBMS

One of the main advantages of using a database system is that the organization can exert, via the DBA, centralized management and control over the data. The database administrator is the focus of the centralized control. Any application requiring a change in the structure of a data record requires an arrangement with the DBA, who makes the necessary modifications.

Reduction in Redundancies

Centralized control of the data by the DBA avoids unnecessary duplication of the data and effectively reduces the total amount of data storage is required. It also eliminates the extra processing necessary to trace the required data in large mass of data. Another advantage of avoiding duplication is the elimination of the inconsistencies that tend to be present in redundant data files. Any redundancies that exist in the DBMS are controlled and the system ensures that these multiple copies are consistent.

(45)

45

A database allows the sharing of data under its control by any number of applications programmers or users.

For the sake of an example, let‘s consider a situation in the office of a publishing company, where a data file is shared or worked upon by many users, for instance, the data is shared by the different departments/sections of the company, like Accounts Department, Editing Department, Personnel Department, etc. So, a single resource is shared and used by multiple users.

Integrity

Centralized control can also ensure that adequate checks are incorporated in the DBMS to provide data integrity. Data integrity means that the data contained in the database is both accurate and consistent. Therefore, data values being entered for storage could be checked to ensure that they fall within a specified range and are of the correct format. Another data integrity check that should be incorporated in the database is to ensure that if there is a reference to certain object, that object must exist.

In case of Automatic Teller Machine, for example, a user is not allowed to transfer funds from a nonexistent savings account to a checking account.

Security

Data is of vital importance to an organization and may be confidential. Unauthorized persons must not access such confidential data. The DBA who has the ultimate responsibility for the data in the DBMS can ensure that proper access to the RDBMS and additional checks before permitting access to sensitive data. Different levels of security should be implemented for various types of data and operations.

(46)

46

Since the database is under the control of the DBA, she or he should resolve the

conflicting requirements of various users and applications. In essence, the DBA chooses the best file structure and access method to get optimal performance for the response-critical applications, while permitting less response-critical applications to continue to use the database, albeit with a relatively slower application.

Disadvantages of RDBMS

A main disadvantage of the DBMS system is cost. In addition to the cost of purchasing or developing the software, the hardware has to be upgraded to allow for the extensive programs and the workspaces required for their execution and storage. The processing overheads introduced by the DBMS to implement security, integrity, and sharing of the data causes a degradation of the response and through-put times. An additional cost is that of the migration from traditionally separate application environment to an integrated one.While centralization reduces duplication, the lack of duplication requires that the database be adequately backed up so that in case of failure the data can be recovered. Backup and recovery operations are fairly complex in DBMS environment, and this is exacerbated in a concurrent multiuser database system In Summary

Advantages are:-

Centralized control

Data independence allows dynamic changes and growth potential Data duplication eliminated with controlled redundancy

(47)

47 Security enforcement possible

Disadvantages are:-

Problems associated with centralization Cost of software/hardware and migration

(48)

48

Context level diagram:-

(49)

49

Context analysis diagram:-

(50)

50

LOGICAL DFD:-

(51)

51

DFD FRAGMENTATION:-

First level

(52)

DFD:-52

Second level DFD :-

1.3

View

(53)
(54)

54

Third level DFD:-

(55)

55

STRUCTURE

(56)
(57)
(58)
(59)
(60)
(61)
(62)

62

Table layout:-

(63)

63

Product:-

Pharmacist:-

Company:-

Column name

Data type

Phar_name

Varchar(50)

Phar_id

int

Phar_cont_no

int

timing

int

Date of joining

int

Column name data type

P

_idint

P_namevarchar (50)

P_gen_namevarchar (50)

P_quality float

P_priceint

(64)

64

Customer:-

Reference:-

Column name

Data type

Comp_id

int

Comp_name

Varchar(50)

Column name

Data type

Cust_name

Varchar(30)

Cust_ID

int

(65)

65

www.projectguidance.com

http://e-library.net/

www.sourcecodeonline.com

www.developers.net

www.codeproject.com

Conclusion:-

It is the complete online medical shop

management software is so designed as to ease the

work load of medical shop professionals. The main

(66)

66

feature includes invoicing, inventory and stock

control, accounting, client and vendor

References

Related documents

The key segments in the mattress industry in India are; Natural latex foam, Memory foam, PU foam, Inner spring and Rubberized coir.. Natural Latex mattresses are

Different configurations of hybrid model combining wavelet analysis and artificial neural network for time series forecasting of monthly precipitation have been developed and

We have loved them during life, let us not abandon them until we have conducted them, by our prayers, into the House of the Lord.. Jesus, have mercy on the

For the poorest farmers in eastern India, then, the benefits of groundwater irrigation have come through three routes: in large part, through purchased pump irrigation and, in a

 HCC is developing in 85% in cirrhosis hepatis Chronic liver damage Hepatocita regeneration Cirrhosis Genetic changes

UPnP Control Point (DLNA) Device Discovery HTTP Server (DLNA, Chormecast, AirPlay Photo/Video) RTSP Server (AirPlay Audio) Streaming Server.. Figure 11: Simplified

The PROMs questionnaire used in the national programme, contains several elements; the EQ-5D measure, which forms the basis for all individual procedure

Results of the survey are categorized into the following four areas: primary method used to conduct student evaluations, Internet collection of student evaluation data,