1.1project Description: Online Crime Reporting System
1.1project Description: Online Crime Reporting System
1. INTRODUCTION
1.1PROJECT DESCRIPTION
The aim of this project is to develop on line crime reporting and management system
which is equally accessible to the public, the police department and to the
administrative department
2. SYSTEM ANALYSIS
The organization does and maintains all the data manually. It writes down the data
about the sales, stock, work status, expenditure, approvals and service engineer’s
details in the records. All this is a very tedious job requiring everything to be done
manually.
Crime reporting system addresses all these by automating many of the tasks of the
organization. It relieves the employees by letting them do all the tedious jobs
electronically.
All the work is done manually.
No use of web services and Remoting
Should wait for the approvals till the file reaches from desk to desk.
Risk of mismanagement and of data when the project is under development.
Less security.
2.2 SOLUTION OF THESE PROBLEMS
The development of the new system contains the following activities, which try to
automate the entire process keeping in view of the database integration approach.
1. User friendliness is provided in the application with various controls.
2. The system makes the overall project management much easier and flexible.
3. There is no risk of data mismanagement at any level while the project development is
under process.
4. It provides high level of security with different level of authentication.
2.5 REQUIREMENTS
2.5.1 HARDWARE REQUIREMENTS
Content Description
HDD 20 GB min
40 GB recommended
RAM 1 GB min
2 GB recommended
CPU Pentium IV
2.5.2 SOFTWARE REQUIREMENTS
Content Description
OS Windows XP with SP2
Language Ms-visual studio .Net 2005
Back end SQL server 2005
3. MODULES
3.1 Administrator Module
3.2Users module
3.3Public Module
3.1 ADMINISTRATOR MODULE
The responsibility of the administrator is to centrally control the data, register the
employees and users to all the departments and shifting the employees from one department
to other if needed.
The administrator can also have the rights to change the questions like adding,
modifying, deleting the records from the database.
The administrator provides the login names and password for all the users department
wise.
The administrator is responsible to answer all the questions posted by users.
3.2 USER AND PUBLIC MODULE
Each department will have one or more department heads and users. The
major responsibility of department head or user is to reports any types of questions.
The Administrator can add, modify or remove questions from all the subjects
based on reports wise.
All the questions posted by the users will be added to the list of existing
questions only when the department employees answers that question, simultaneously
a copy of answer is sent to user who initiated that question.
4 INTRODUCTION TO .NET
The .NET Framework can be hosted by unmanaged components that load the
common language runtime into their processes and initiate the execution of managed
code, thereby creating a software environment that can exploit both managed and
unmanaged features. The .NET Framework not only provides several runtime hosts,
but also supports the development of third-party runtime hosts.
For example, ASP.NET hosts the runtime to provide a scalable, server-side
environment for managed code. ASP.NET works directly with the runtime to enable
Web Forms applications and XML Web services, both of which are discussed later in
this topic.
Internet Explorer is an example of an unmanaged application that hosts the
runtime (in the form of a MIME type extension). Using Internet Explorer to host the
runtime enables you to embed managed components or Windows Forms controls in
HTML documents. Hosting the runtime in this way makes managed mobile code
(similar to Microsoft® ActiveX® controls) possible, but with significant
improvements that only managed code can offer, such as semi-trusted execution and
secure isolated file storage.
The following illustration shows the relationship of the common language
runtime and the class library to your applications and to the overall system. The
illustration also shows how managed code operates within a larger architecture.
.NET Framework available to existing code written in that language, greatly easing
the migration process for existing applications.
While the runtime is designed for the software of the future, it also supports
software of today and yesterday. Interoperability between managed and unmanaged
code enables developers to continue to use necessary COM components and DLLs.
The runtime is designed to enhance performance. Although the common
language runtime provides many standard runtime services, managed code is never
interpreted. A feature called just-in-time (JIT) compiling enables all managed code to
run in the native machine language of the system on which it is executing.
Meanwhile, the memory manager removes the possibilities of fragmented memory
and increases memory locality-of-reference to further increase performance.
Finally, the runtime can be hosted by high-performance, server-side
applications, such as Microsoft® SQL Server™ and Internet Information Services
(IIS). This infrastructure enables you to use managed code to write your business
logic, while still enjoying the superior performance of the industry's best enterprise
servers that support runtime hosting.
usually employ windows, menus, buttons, and other GUI elements, and they likely
access local resources such as the file system and peripherals such as printers.
Another kind of client application is the traditional ActiveX control (now
replaced by the managed Windows Forms control) deployed over the Internet as a
Web page. This application is much like other client applications: it is executed
natively, has access to local resources, and includes graphical elements.
In the past, developers created such applications using C/C++ in conjunction
with the Microsoft Foundation Classes (MFC) or with a rapid application
development (RAD) environment such as Microsoft® Visual Basic®. The .NET
Framework incorporates aspects of these existing products into a single, consistent
development environment that drastically simplifies the development of client
applications.
The Windows Forms classes contained in the .NET Framework are designed to
be used for GUI development. You can easily create command windows, buttons,
menus, toolbars, and other screen elements with the flexibility necessary to
accommodate shifting business needs.
For example, the .NET Framework provides simple properties to adjust visual
attributes associated with forms. In some cases the underlying operating system does
not support changing these attributes directly, and in these cases the .NET Framework
automatically recreates the forms. This is one of many ways in which the .NET
Framework integrates the developer interface, making coding simpler and more
consistent.
Unlike ActiveX controls, Windows Forms controls have semi-trusted access to a
user's computer. This means that binary or natively executing code can access some
of the resources on the user's system (such as GUI elements and limited file access)
without being able to access or compromise other resources. Because of code access
security, many applications that once needed to be installed on a user's system can
now be safely deployed through the Web. Your applications can implement the
features of a local application while being deployed like a Web page.
4.2 ASP.NET
4.2.1 SERVER APPLICATION DEVELOPMENT
Server-side applications in the managed world are implemented through runtime
hosts. Unmanaged applications host the common language runtime, which allows
your custom managed code to control the behavior of the server. This model provides
you with all the features of the common language runtime and class library while
gaining the performance and scalability of the host server.
The following illustration shows a basic network schema with managed code
running in different server environments. Servers such as IIS and SQL Server can
perform standard operations while your application logic executes through the
managed code.
4.2.2 SERVER-SIDE MANAGED CODE
ASP.NET is the hosting environment that enables developers to use the .NET
Framework to target Web-based applications. However, ASP.NET is more than just a
runtime host; it is a complete architecture for developing Web sites and Internet-
distributed objects using managed code. Both Web Forms and XML Web services use
IIS and ASP.NET as the publishing mechanism for applications, and both have a
collection of supporting classes in the .NET Framework.
XML Web services, an important evolution in Web-based technology, are
distributed, server-side application components similar to common Web sites.
However, unlike Web-based applications, XML Web services components have no UI
and are not targeted for browsers such as Internet Explorer and Netscape Navigator.
Instead, XML Web services consist of reusable software components designed to be
consumed by other applications, such as traditional client applications, Web-based
applications, or even other XML Web services. As a result, XML Web services
technology is rapidly moving application development and deployment into the highly
distributed environment of the Internet.
If you have used earlier versions of ASP technology, you will immediately
notice the improvements that ASP.NET and Web Forms offers. For example, you can
develop Web Forms pages in any language that supports the .NET Framework. In
addition, your code no longer needs to share the same file with your HTTP text
(although it can continue to do so if you prefer). Web Forms pages execute in native
machine language because, like any other managed application, they take full
AVANTHI INSTITUTE OF ENGINEERING &TECHNOLOGY
Department of computer science
11
Online crime reporting system
advantage of the runtime. In contrast, unmanaged ASP pages are always scripted and
interpreted. ASP.NET pages are faster, more functional, and easier to develop than
unmanaged ASP pages because they interact with the runtime like any managed
application.
The .NET Framework also provides a collection of classes and tools to aid in
development and consumption of XML Web services applications. XML Web
services are built on standards such as SOAP (a remote procedure-call protocol),
XML (an extensible data format), and WSDL (the Web Services Description
Language). The .NET Framework is built on these standards to promote
interoperability with non-Microsoft solutions.
For example, the Web Services Description Language tool included with
the .NET Framework SDK can query an XML Web service published on the Web,
parse its WSDL description, and produce C# or Visual Basic source code that your
application can use to become a client of the XML Web service. The source code can
create classes derived from classes in the class library that handle all the underlying
communication using SOAP and XML parsing. Although you can use the class
library to consume XML Web services directly, the Web Services Description
Language tool and the other tools contained in the SDK facilitate your development
efforts with the .NET Framework.
If you develop and publish your own XML Web service, the .NET Framework
provides a set of classes that conform to all the underlying communication standards,
such as SOAP, WSDL, and XML. Using those classes enables you to focus on the
logic of your service, without concerning yourself with the communications
infrastructure required by distributed software development.
Finally, like Web Forms pages in the managed environment, your XML Web
service will run with the speed of native machine language using the scalable
communication of IIS.
4.2.3ACTIVE SERVER PAGES.NET
ASP.NET is a programming framework built on the common language runtime that
can be used on a server to build powerful Web applications. ASP.NET offers several
important advantages over previous Web development models:
• Enhanced Performance. ASP.NET is compiled common language runtime code
running on the server. Unlike its interpreted predecessors, ASP.NET can take
AVANTHI INSTITUTE OF ENGINEERING &TECHNOLOGY
Department of computer science
12
Online crime reporting system
by the ASP.NET runtime, so that if one misbehaves (leaks, deadlocks), a new process
can be created in its place, which helps keep your application constantly available to
handle requests.
• Customizability and Extensibility. ASP.NET delivers a well-factored architecture that
allows developers to "plug-in" their code at the appropriate level. In fact, it is possible
to extend or replace any subcomponent of the ASP.NET runtime with your own
custom-written component. Implementing custom authentication or state services has
never been easier.
• Security. With built in Windows authentication and per-application configuration, you
can be assured that your applications are secure.
4.2.3 LANGUAGE SUPPORT
The Microsoft .NET Platform currently offers built-in support for three
languages: C#, Visual Basic, and JS cript.
WHAT IS ASP.NET WEB FORMS?
The ASP.NET Web Forms page framework is a scalable common language runtime
programming model that can be used on the server to dynamically generate Web
pages.
Intended as a logical evolution of ASP (ASP.NET provides syntax compatibility with
existing pages), the ASP.NET Web Forms framework has been specifically designed
to address a number of key deficiencies in the previous model. In particular, it
provides:
The ability to create and use reusable UI controls that can encapsulate
common functionality and thus reduce the amount of code that a page developer has
to write.
The ability for developers to cleanly structure their page logic in an orderly
fashion (not "spaghetti code").
The ability for development tools to provide strong WYSIWYG design
support for pages (existing ASP code is opaque to tools).
ASP.NET Web Forms pages are text files with an .aspx file name extension. They
can be deployed throughout an IIS virtual root directory tree. When a browser client
requests .aspx resources, the ASP.NET runtime parses and compiles the target file
into a .NET Framework class. This class can then be used to dynamically process
AVANTHI INSTITUTE OF ENGINEERING &TECHNOLOGY
Department of computer science
14
Online crime reporting system
incoming requests. (Note that the .aspx file is compiled only the first time it is
accessed; the compiled type instance is then reused across multiple requests).
An ASP.NET page can be created simply by taking an existing HTML file and
changing its file name extension to .aspx (no modification of code is required). For
example, the following sample demonstrates a simple HTML page that collects a
user's name and category preference and then performs a form post back to the
originating page when a button is clicked:
ASP.NET provides syntax compatibility with existing ASP pages. This
includes support for <% %> code render blocks that can be intermixed with HTML
content within an .aspx file. These code blocks execute in a top-down manner at page
render time.
CODE-BEHIND WEB FORMS
ASP.NET supports two methods of authoring dynamic pages. The first is the method
shown in the preceding samples, where the page code is physically declared within
the originating .aspx file. An alternative approach--known as the code-behind
method--enables the page code to be more cleanly separated from the HTML content
into an entirely separate file.
INTRODUCTION TO ASP.NET SERVER CONTROLS
In addition to (or instead of) using <% %> code blocks to program dynamic content,
ASP.NET page developers can use ASP.NET server controls to program Web pages.
Server controls are declared within an .aspx file using custom tags or intrinsic HTML
tags that contain a runat="server" attributes value. Intrinsic HTML tags are handled
by one of the controls in the System.Web.UI.HtmlControls namespace. Any tag that
doesn't explicitly map to one of the controls is assigned the type of
System.Web.UI.HtmlControls.HtmlGenericControl.
Server controls automatically maintain any client-entered values between round trips
to the server. This control state is not stored on the server (it is instead stored within
an <input type="hidden"> form field that is round-tripped between requests). Note
also that no client-side script is required.
In addition to supporting standard HTML input controls, ASP.NET enables
developers to utilize richer custom controls on their pages. For example, the following
sample demonstrates how the <asp:adrotator> control can be used to dynamically
display rotating ads on a page.
AVANTHI INSTITUTE OF ENGINEERING &TECHNOLOGY
Department of computer science
15
Online crime reporting system
1. ASP.NET Web Forms provide an easy and powerful way to build dynamic
Web UI.
2. ASP.NET Web Forms pages can target any browser client (there are no script
library or cookie requirements).
3. ASP.NET Web Forms pages provide syntax compatibility with existing ASP
pages.
4. ASP.NET server controls provide an easy way to encapsulate common
functionality.
5. ASP.NET ships with 45 built-in server controls. Developers can also use
controls built by third parties.
6. ASP.NET server controls can automatically project both up level and down
level HTML.
7. ASP.NET templates provide an easy way to customize the look and feel of list
server controls.
8. ASP.NET validation controls provide an easy way to do declarative client or
server data validation.
within the Data Set is, it is manipulated through the same set of standard APIs
exposed through the Data Set and its subordinate objects.
While the Data Set has no knowledge of the source of its data, the managed
provider has detailed and specific information. The role of the managed provider is to
connect, fill, and persist the Data Set to and from data stores. The OLE DB and SQL
Server .NET Data Providers (System.Data.OleDb and System.Data.SqlClient) that are
part of the .Net Framework provide four basic objects: the Command, Connection,
Data Reader and Data Adapter. In the remaining sections of this document, we'll walk
through each part of the Data Set and the OLE DB/SQL Server .NET Data Providers
explaining what they are, and how to program against them.
The following sections will introduce you to some objects that have evolved,
and some that are new. These objects are:
View level: This is the highest level of abstraction at which one describes only part of
the database.
ADVANTAGES OF RDBMS
Redundancy can be avoided
Inconsistency can be eliminated
Data can be Shared
Standards can be enforced
Security restrictions ca be applied
Integrity can be maintained
Conflicting requirements can be balanced
Data independence can be achieved.
DISADVANTAGES OF DBMS
A significant disadvantage of the DBMS system is cost. In addition to the cost of
purchasing of developing the software, the hardware has to be upgraded to allow for
the extensive programs and the workspace required for their execution and storage.
While centralization reduces duplication, the lack of duplication requires that the
database be adequately backed up so that in case of failure the data can be recovered.
SQL SERVER is one of the leading database management systems (DBMS) because
it is the only Database that meets the uncompromising requirements of today’s most
demanding information systems. From complex decision support systems (DSS) to
the most rigorous online transaction processing (OLTP) application, even application
that require simultaneous DSS and OLTP access to the same critical data, SQL Server
leads the industry in both performance and capability
SQL SERVER is a truly portable, distributed, and open DBMS that delivers
unmatched performance, continuous operation and support for every database.
SQL SERVER RDBMS is high performance fault tolerant DBMS which is specially
designed for online transactions processing and for handling large database
application.
SQL SERVER with transactions processing option offers two features which
contribute to very high level of transaction processing throughput, which are
The row level lock manager
ENTERPRISE WIDE DATA SHARING
The unrivaled portability and connectivity of the SQL SERVER DBMS enables all
the systems in the organization to be linked into a singular, integrated computing
resource.
PORTABILITY
SQL SERVER is fully portable to more than 80 distinct hardware and operating
systems platforms, including UNIX, MSDOS, OS/2, Macintosh and dozens of
proprietary platforms. This portability gives complete freedom to choose the database
sever platform that meets the system requirements.
OPEN SYSTEMS
SQL SERVER offers a leading implementation of industry –standard SQL. SQL
Server’s open architecture integrates SQL SERVER and non –SQL SERVER DBMS
with industries most comprehensive collection of tools, application, and third party
software products SQL Server’s Open architecture provides transparent access to data
from other relational database and even non-relational database.
DISTRIBUTED DATA SHARING
SQL Server’s networking and distributed database capabilities to access data stored
on remote server with the same ease as if the information was stored on a single local
computer. A single SQL statement can access data at multiple sites. You can store
data where system requirements such as performance, security or availability dictate.
UNMATCHED PERFORMANCE
The most advanced architecture in the industry allows the SQL SERVER DBMS to
deliver unmatched performance.
SOPHISTICATED CONCURRENCY CONTROL
Real World applications demand access to critical data. With
most database Systems application becomes “contention bound” – which performance
is limited not by the CPU power or by disk I/O, but user waiting on one another for
data access . SQL Server employs full, unrestricted row-level locking and contention
free queries to minimize and in many cases entirely eliminates contention wait times.
NO I/O BOTTLENECKS
SQL Server’s fast commit groups commit and deferred write technologies
dramatically reduce disk I/O bottlenecks. While some database write whole data block
to disk at commit time, SQL Server commits transactions with at most sequential log
file on disk at commit time, On high throughput systems, one sequential writes
typically group commit multiple transactions. Data read by the transaction remains as
shared memory so that other transactions may access that data without reading it
again from disk. Since fast commits write all data necessary to the recovery to the log
file, modified blocks are written back to the database independently of the transaction
commit, when written from memory to disk.
5. SOFTWARE DESIGN
5.1System Design
5.1.1 Scenario
A Scenario is “A narrative description of what people do and experience as they try to
make use of computer system and application. a scenario is a concrete focused,
informal description of a single feature of the system from the point of view of a
single actor.
Scenario Name: Admin, Login
Participating Actors: Admin, server
Flow of events:
1. The Admin has to fill the details like his username and password
2. The username and password are validated
3. He can enter into the site
Scenario Name: user Login
Participating Actors: User, server
Flow of events:
1. The User has to fill the details like his username and password
2. The username and password are validated
3. He can enter into the site
Scenario Name: Change Password
Participating Actors: Admin or User, server
Flow of events:
1. The user should fill in the form for change password
2. The fields are verified and a new password is given to him
Scenario Name: Theft
Participating Actors: Public , server
Flow of events:
1. The Public should fill in the form Theft.
5.2.1CLASS DIAGRAMS
CASE DETAILS
STATUS
REGISTERAION Cid
cid number Id number Number
Desc Varchar(200)
Add( ) Add( )
Update( ) Update( )
Add( ) Delete( )
5.2.2USECASE DIAGRAM
Create Employee
Update Employee
Create Report
User
Update Report
ADMIN
User
Change Password
Employee
Reports Booking
5.2.3COLLABORATION DIAGRAMS
Admin:
Changes the
DBS
status
Create Accounts
Login
ADMIN
User:
Changes the
DBS
status
Create Accounts
Login
User
Employee:
Changes the
DBS
Password
Create Accounts
Login
User
Enter Case
Details
Createsan
userusrtuusrUser/Empl
oyee
Enters The Case details
User:
Login
Creates an account
Employee:
Login
Create Account
Login
Creates reports
YES
NO Employee
Available
EXIT
START
Admin
User Login
Invalid
Valid
Enter Case
details
Report a compliant
STOP
User Login
Invalid
Valid
Create an Account
STOP
Crs_Crime
Fileld Name Constraint DataType
CrimeID NOT NULL BIG INT
UID Int
CrimeType NOT NULL VARCHAR(50)
CrimeDate VARCHAR(25)
AVANTHI INSTITUTE OF ENGINEERING &TECHNOLOGY
Department of computer science
40
Online crime reporting system
CrimeTime VARCHAR(10)
Location VARCHAR(25)
LandMark VARCHAR(50)
PersonName VARCHAR(50)
PersonAge VARCHAR(25)
MurderedBy VARCHAR(20)
CrimeDesc VARCHAR(200)
Progress VARCHAR(15)
PersonImage IMAGE
Steal VARCHAR(20)
Fraud
Fileld Name Constraint DataType
fraudID NOT NULL INT
UID Int
FraudType VARCHAR(50)
FraudDate VARCHAR(25)
FraudTime VARCHAR(10)
Location VARCHAR(25)
Landmark VARCHAR(50)
FraudDescription VARCHAR(200)
PersonName VARCHAR(50)
Progrss VARCHAR(15)
PersonImage IMAGE
CRS_MissPersons
Fileld Name Constraint DataType
MissID NOT NULL INT
UID Int
MissPersonName VARCHAR(25)
MissGender VARCHAR(10)
MissAge VARCHAR(25)
MissDate VARCHAR(15)
MissTime VARCHAR(10)
MissPic IMAGE
MissProgress VARCHAR(15)
MissDesc VARCHAR(200)
CRS_Users
Fileld Name Constraint DataType
UserID NOT NULL INT
UserName VARCHAR(50)
Password VARCHAR(25)
Gender VARCHAR(15)
UserType VARCHAR(25)
AVANTHI INSTITUTE OF ENGINEERING &TECHNOLOGY
Department of computer science
41
Online crime reporting system
Address VARCHAR(500)
PhNo BIGINT
Email VARCHAR(25)
RegDate VARCHAR(50)
6. IMPLEMENTATIONS
6.1 SCREENSHOTS
Registration:
Crime admin:
Login:
Home:
Murder
status
Change password:
Users Registration:
6.2 CODING
Code for Login Page:
Design Page
<center>
<table>
<tr>
<tr>
<td align="left">
Email</td>
<td align="left">
</tr>
<tr>
<td align="left">
Password</td>
<td align="left">
</tr>
<tr>
<td>
</td>
<td align="left">
</tr>
<tr>
<td >
New User</td>
<td align="left">
</tr>
</table>
</center>
</asp:Content>
Code behind:
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
}
protected void LinkButton1_Click(object sender, EventArgs e)
{
}
protected void btnLogin_Click(object sender, EventArgs e)
{
if (Page.IsValid)
{
ds = (DataSet)objbl.retLogin(txtUserID.Text, txtPassword.Text);
if (ds.Tables[0].Rows.Count > 0)
{
Session["username"] = ds.Tables[0].Rows[0]["userName"].ToString();
Session["uID"] = ds.Tables[0].Rows[0]["UserID"].ToString();
Session["userType"] = ds.Tables[0].Rows[0]["usertype"].ToString();
Response.Redirect("home.aspx");
}
else
{
ClientScript.RegisterStartupScript(GetType(), "", "alert('Your Login Details
are incorrect.Please try again')", true);
}
}
Session["userType"] = "MissAdmin";
Response.Redirect("home.aspx");
}
}
7. TESTING
Actually in this system the menu links will be generated dynamically based on type of
user.
Forms:
Testing forms has been done at two different levels i.e. at minimum level and
at more targeted level. At minimum level we have tested for:
1. Whether labels been correctly defined for fields.
2. Tested for appropriate defaults are available when the user does not select any
pull-down menu.
At more targeted level we have tested for:
1. Verified for whether form fields have proper width to enter data.
2. Verified for whether form fields preclude the user from entering text.
3. String longer than some predefined maximum.
4. Verified whether the tab key initiated proper movements between form fields.
Usability tests:
In this testing we had verified up to, which level that, users can interact
effectively. Tests are designed to determine the degree to which the applications
interface makes users easy. We have designed test case so that usability testing can be
verified at different levels:
AVANTHI INSTITUTE OF ENGINEERING &TECHNOLOGY
Department of computer science
52
Online crime reporting system
Usability has been performed on each and every individual interface i.e.
forms.
Usability has been performed on total application.
Component Level Testing:
This level of testing focused on tests that uncover errors in application
functions. Each applications function is a software module and is tested using black-
box techniques.
Component-level test cases are often driven by forms-level input. Once the
input has given, the user calls mechanism to initiate by clicking a button or other
control. In order to test the functions we have performed several methods:
Equivalence Partitioning
Boundary value Analysis
Forced error Testing
Each component-level test case specifies all input values and the expected
output to be provided by the component. Some of the forms that have been tested
using these methods are tested below.
All the case design that has been specified in system design has
performed.
Navigation Testing:
As every application has many links user may makes a move as he likes, but
links should be provided so that he can easily move from one page to other. At the
time of navigation testing we had verified whether each link that has provided might
travel user to correct page.
At the time of testing we had verified each and every internal links within the
application, external links to other application
8.1 Types of Testing
Black box testing And White box testing:-
Black Box Testing:
A black box testing alludes to test that are conducted at the software
interfaces. These are used to demonstrate that software functions operational, that
input is properly accepted and correctly produced.
White Box Testing:
AVANTHI INSTITUTE OF ENGINEERING &TECHNOLOGY
Department of computer science
53
Online crime reporting system
A strategy for software testing integrates software test case design methods
into a well-planned series of steps that result in the successful construction of
software. Testing is the set of activities that can be planned in advance and conducted
systematically. The underlying motivation of program testing is to affirm software
quality with methods that can economically and effectively apply to both strategic to
both large and small-scale systems.
Implementation literally means to put into effect or to carry out. The system
implementation phase of the software deals with the translation of the design
specifications into the source code. The ultimate goal of the implementation is to
write the source code and the internal documentation so that is can be verified easily.
The code and documentation should be written in a manner that eases debugging,
testing and modification. System flowcharts, sample run on packages, sample output
etc.
Is part of the implementation?
An effort was made to satisfy the following goals in order specified.
Minimization of Response Time.
Clarity and Simplicity of the Code.
Minimization of Hard-Coding.
Minimization of the Amount of Memory Used.
Various types of bugs were discovered while debugging the modules. These ranged
from logical errors to failure on account of various processing cases.
System Security:
The protection of computer based resources that includes hardware, software, data,
procedures and people against unauthorized use or natural Disaster is known as
System Security.
System Security can be divided into four related issues:
Security
Integrity
Privacy
Confidentiality
SYSTEM SECURITY refers to the technical innovations and procedures applied to
the hardware and operation systems to protect against deliberate or accidental damage
from a defined threat.
AVANTHI INSTITUTE OF ENGINEERING &TECHNOLOGY
Department of computer science
55
Online crime reporting system
DATA SECURITY is the protection of data from loss, disclosure, modification and
destruction.
SYSTEM INTEGRITY refers to the power functioning of hardware and programs,
appropriate physical security and safety against external threats such as eavesdropping
and wiretapping.
PRIVACY defines the rights of the user or organizations to determine what
information they are willing to share with or accept from others and how the
organization can be protected against unwelcome, unfair or excessive dissemination
of information about it.
CONFIDENTIALITY is a special status given to sensitive information in a database
to minimize the possible invasion of privacy. It is an attribute of information that
characterizes its need for protection.
SECURITY IN SOFTWARE
System security refers to various validations on data in form of checks and controls to
avoid the system from failing. It is always important to ensure that only valid data is
entered and only valid operations are performed on the system. The system employees
two types of checks and controls:
CLIENT SIDE VALIDATION
Various client side validations are used to ensure on the client side that only valid data
is entered. Client side validation saves server time and load to handle invalid data.
Some checks imposed are:
VBScript in used to ensure those required fields are filled with suitable data only.
Maximum lengths of the fields of the forms are appropriately defined.
Forms cannot be submitted without filling up the mandatory data so that manual
mistakes of submitting empty fields that are mandatory can be sorted out at the client
side to save the server time and load.
Tab-indexes are set according to the need and taking into account the ease of user
while working with the system.
SERVER SIDE VALIDATION
Some checks cannot be applied at client side. Server side checks are necessary to save
the system from failing and intimating the user that some invalid operation has been
performed or the performed operation is restricted. Some of the server side checks
imposed is:
AVANTHI INSTITUTE OF ENGINEERING &TECHNOLOGY
Department of computer science
56
Online crime reporting system
Server side constraint has been imposed to check for the validity of primary key
and foreign key. A primary key value cannot be duplicated. Any attempt to duplicate
the primary value results into a message intimating the user about those values
through the forms using foreign key can be updated only of the existing foreign key
values.
Various Access Control Mechanisms have been built so that one user may not
agitate upon another. Access permissions to various types of users are controlled
according to the organizational structure. Only permitted users can log on to the
system and can have access according to their category. User- name, passwords and
permissions are controlled o the server side.
Using server side validation, constraints on several restricted operations are
imposed.
8. CONCLUSION
It has been a great pleasure for me to work on this exciting and challenging
project. This project proved good for me as it provided practical knowledge of not
only programming in ASP.NET and VB.NET web based application and no some
extent Windows Application and SQL Server, but also about all handling procedure
related with “CRIME REPORTING SYSTEM” It also provides knowledge about the
latest technology used in developing web enabled application and client server
technology that will be great demand in future. This will provide better opportunities
and guidance in future in developing projects independently.
BENEFITS:
The project is identified by the merits of the system offered to the user. The merits of
this project are as follows: -
It’s a web-enabled project.
This project offers user to enter the data through simple and interactive forms.
This is very helpful for the client to enter the desired information through so much
simplicity.
The user is mainly more concerned about the validity of the data, whatever he is
entering. There are checks on every stages of any new creation, data entry or updation
so that the user cannot enter the invalid data, which can create problems at later date.
Sometimes the user finds in the later stages of using project that he needs to
update some of the information that he entered earlier. There are options for him by
which he can update the records. Moreover there is restriction for his that he cannot
change the primary data field. This keeps the validity of the data to longer extent.
User is provided the option of monitoring the records he entered earlier. He can
see the desired records with the variety of options provided by him.
From every part of the project the user is provided with the links through framing
so that he can go from one option of the project to other as per the requirement. This
is bound to be simple and very friendly as per the user is concerned. That is, we can
sat that the project is user friendly which is one of the primary concerns of any good
project.
Data storage and retrieval will become faster and easier to maintain because data
is stored in a systematic manner and in a single database.
Decision making process would be greatly enhanced because of faster processing
of information since data collection from information available on computer takes
much less time then manual system.
Allocating of sample results becomes much faster because at a time the user can
see the records of last years.
Easier and faster data transfer through latest technology associated with the
computer and communication.
Through these features it will increase the efficiency, accuracy and transparency,
LIMITATIONS:
The size of the database increases day-by-day, increasing the load on the database
back up and data maintenance activity.
Training for simple computer operations is necessary for the users working on
the system.
9. BIBILOGRAPHY