e-tender system

92
E-Tender System J.G.College of Computer Application Page 1 A System Development Project On E-Tender System A DISSERTATION SUBMITTED FOR THE PARTIAL FULFILLMENT TOWARDS Submitted By: Patel Smit

Upload: smit-patel

Post on 06-May-2015

4.410 views

Category:

Education


2 download

DESCRIPTION

E-tender System Presentation

TRANSCRIPT

Page 1: E-Tender System

E-Tender System

J.G.College of Computer Application Page 1

A

System Development Project On

E-Tender System

A DISSERTATION SUBMITTED FOR

THE PARTIAL FULFILLMENT TOWARDS

Submitted By:

Patel Smit

Page 2: E-Tender System

E-Tender System

J.G.College of Computer Application Page 2

Part I Introduction

1. Preface

2. About organization 3. Project Profile 4. Tools & Platform

Part II System Analysis and Design

5 Analysis 5.1 Requirement Analysis 5.2 E-R Diagram 5.3 Data Flow Diagram (DFD)

6 Design

6.1 Data Dictionary 6.2 User Interface Design

Part III Testing & Quality Assurance

7 Unit Testing

8 Integrity Testing

Part IV Conclusion

9 Future Enhancement 10 Bibliography

Index

Page 3: E-Tender System

E-Tender System

J.G.College of Computer Application Page 3

Part 1

IInnttrroodduuccttiioonn

1. Preface

2. About organization 3. Project Profile

4. Tools & Platform

Page 4: E-Tender System

E-Tender System

J.G.College of Computer Application Page 4

PREFACE

It gives us great pleasure in placing in the hands of ower

esteemed Faculties this individual report which, We believe, will

go through the documentation of the project work done by us.

The objective of this report is to provide both a conceptual

understanding of the system as well as working guide.

Surely no other technology the Information Technology is

proven as the driving force of the Nation. I.T. not only decides

the present but also the future. The need for software

development today is a competence in a G.U.I based front-end

tool as far as the database programming is concerned.

In highly competitive world of today all the business have

to be alert and advance in order to survive in the market and for

this, company has to be on constant look out for changing

trends and technology in the market.

A typical scenario today involves an application consisting

of a visual front end for presenting data and reporting options to

the enterprise users, and a connection to a database for piping

data to controls such as text boxes, tables, and list boxes.

Moreover We have found DBMS/RDBMS to be the most

exciting environment to work with, especially when the G.U.I

Tool like Visual Basic .NET.

Page 5: E-Tender System

E-Tender System

J.G.College of Computer Application Page 5

About organization

Virtual Softech And InfoTech. Is established in

Ahmadabad. Virtual is a enable services company providing

most efficient and cost effective solution. Virtual Softech and

InfoTech. Brings together world-class resources and expertise to

help create valuable relationships between clients, their users

and their employees. It located in Ahmadabad One of the fastest

growing industrial cities in Western India with a population base

of 4.4 million.

Virtual Softech And InfoTech. will carry on business of

developing, analyzing, testing, improving, importing, modifying,

customizing, exporting, buying, selling, distributing,

transferring, altering and converting all kinds of scalable internet

architectures and performance measurements and each and

every kind of information management activities.

To work with leading edge technologies.

Providing internet marketing, online branding, data

entry etc.

To use our expertise to the benefit of our clients and

partners through an open, collaborative approach.

Page 6: E-Tender System

E-Tender System

J.G.College of Computer Application Page 6

PROJECT PROFILE

Project Title : E-Tender System.

Develop at/for : Virtual Softech & InfoTech.

Team members : Patel smit.

Front-End : Asp.Net 2005.

Back-End : SQL Server, JAVA script.

Page 7: E-Tender System

E-Tender System

J.G.College of Computer Application Page 7

A Salient Feature

The purpose of the E –Tender System is to provide the

interface between the Tender buyers and the sellers on the

internet. It is the online website to make an advertise about.

Commercial Tender

Government Tender

Global Tender

So this system is going to be used for making the advertise

about Tender You want to sale and if You want to purchase any

Tender then this website is the best resource to get the Tender

alerts and To find the Tender as per the requirements.

New System:

The new of the E – Tender system is to provide the

interface between the Tender buyers and the sellers on the

internet. It is the website to make an advertise about Tender and

this system will be more help full to get the better scope for

Tender advertisement.

So because of the Drawbacks of the current manual

system the company has decided to automate the current system

into the computer application as the Website.

Page 8: E-Tender System

E-Tender System

J.G.College of Computer Application Page 8

Saving the time:

Here as we know there is not the manual system. And so it

becomes more faster than the manual system and so there is

less amount of paper work. Because when a customer Request

for the Tender then there will be the online system in which a

user have to first of all go through the registration process. And

as soon as the user becomes the registered then he will be able

to advertise and buy the Tenders. So paper work doesn’t require.

And so process for Registration and the searching the property

becomes easy and fast. So the system helps to save the time at

the both Side. As well as for company and for customer also.

Human resources can be managed properly:

Here the system is Computer generated so the work

Becomes fast and most of the paper Work becomes half. As an

example there is no need of an employee for creating the reports.

And as the paper work requires more no. of the Employees to

handle the database and the information. And there is easy to

maintain database by computer system. And accuracy also can

be achieved by the automated System.

Page 9: E-Tender System

E-Tender System

J.G.College of Computer Application Page 9

Easy to manage the database:

Because of the automated system the employees are not

responsible for managing the data base manually and so

followings are the benefits of it.

Here data management accuracy can be maintained...

Data consistency can be maintained...

Data reports can be prepared properly...

Data updating can be managed properly...

Easy for accessing data:

Here also the data can be easily accessed. Because we

know that here the system is responsible to manage the data.

Management becomes easy. And the data can be fetched and

accessed as soon as the user request for particular information.

Because data are stored in the proper format. And also if

employee want to search for any record. Then the employee

would not have to go through each and every record

sequentially. So it is easy to manage and get the data easily.

Fast service:

And so because of not being Time consuming and being

Easy in managing the data and being easy in accessing the data

the service becomes very fast and comfortable. And because of

fast service it becomes to give the service to the large no. of the

customers. And results of the fast service become beneficial for

the organization as well as the Customer also. These are the

benefits of having the computer System.

Page 10: E-Tender System

E-Tender System

J.G.College of Computer Application Page 10

TOOLS & PLATFORM

Front End Tools

Front End tools support the development of graphical

method of system and process

Asp.net – Microsoft Visual Studio 2005

Adobe Photoshop 8.0

1 Introduction To ASP.NET :

ASP.net is more than the next version of Active server

pages (ASP); it is unified web development platform that provide

the services necessary for developers to build enterprise-class

based web Application. While Asp.net is largely syntax

compatible with ASP, it also provides the new programming

model and instruction for more secure, scalable and stable

application. You can feel free to augment your existing ASP

applications by incrementally adding ASP.NET functionality to

them.

ASP.NET is compiled, NET-based environment; you can

author application in any NET Compatible language, including

Visual Basic.Net, C# and Jscript NET. Additionally, the entire

NET Framework is available to any ASP.NET application.

Developers can easily access the benefits of these technologies,

Which include the managed common language runtime

environment, type safety, inheritance, and so on.

Page 11: E-Tender System

E-Tender System

J.G.College of Computer Application Page 11

ASP.NET has been designed to work seamlessly with HTML

editors and other programming tools, including Microsoft Visual

studio NET. Not only does this make web development easier,

but it also provides all the benefits that these tools have to offer,

including the GUI that developers can use to drop server

controls onto a web page and fully integrated debugging support.

Developers can use web forms or XML web services when

creating an ASP.NET application, or combine these in any way

they see fit. Each supported by the same infrastructure that

allow you to use authentication schemes, cache frequently use

data, or customize your application configuration to name only a

few possibilities

Web forms allow you to build powerful forms-based Web

pages. When building these pages, you can use ASP.NET server

control to create common UI elements, and program them for

common tasks. These controls allow you to rapidly build a Web

form out of reusable build-in or custom components, simplifying

the code of a page.

An XML Web services provides the means to access server

functionality remotely. Using XML Web services, businesses can

expose programmatic interface to their data or business logic,

which in turn can be obtained and manipulated by client and

server application XML Web services enable the exchange of data

in client-server or server-server scenarios, using standards like

Page 12: E-Tender System

E-Tender System

J.G.College of Computer Application Page 12

HTTP and XML Messaging to move data across firewalls. XML

Web services are not tied to a particular component technology

or object-calling convention. As a result, programs written in any

language using any component model, and running on any

operating system can access XML Web services.

Each of these models can take full advantage of all

ASP.NET features, as well as the power of the NET Framework

and NET Framework common language runtime. These features

and how you can use them are outlined as follow if you have ASP

development skills, the new ASP.NET programming model will

seem very familiar to you. However, the ASP.NET object model

has changed significantly from unfortunately, this means that

ASP.NET ids not fully backward compatible; almost all exciting

ASP pages will have to be modified to some extend in order to

run under ASP.NET

Accessing database from ASP.NET application is often use

technique for displaying data to Web site visitors. ASP.Net makes

it easier than ever to access database for this purpose it also

allows to manage the database from your code.

ASP.NET provides a simple model that enables Web developers

to write logic that runs at the application level. Developers can

write this code in the global Ajax text or in a compiled class

deployed as an assembly.

ASP.NET provides easy-to-use application and session-

state facilities that are familiar to ASP developers and are readily

compatible with all other.NET Framework APIs.

Page 13: E-Tender System

E-Tender System

J.G.College of Computer Application Page 13

The NET Framework and ASP.NET provide default

Authorization and authentication schemes for Web application.

You can easily remove, add to, or replace these schemes,

depending upon the needs of your application.

ASP.net configuration setting are stored in XML-based

which are human readable and writable. Each of your

application can have a distinct configuration file and you can

extend the configuration scheme to suit your requirements.

Application are said to be running side by side when they

are installed on the same computer but use different versions of

the NET Framework.

IIS 6.0 uses a new process model called worker process

isolation mode, which a different from the process model used in

previous versions of 11S ASPNET uses this process model by

default when running on windows server 2003.

Page 14: E-Tender System

E-Tender System

J.G.College of Computer Application Page 14

ELEMENTS OF ASP.NET WEB APPLICATION

Creating ASP.NET Web application involves working with

many of the same elements you use in any desktop of client-

server application. These include:

Project Management features

When creating an ASP.NET Web application, you need to

keep track of the files you need, which ones need to be compiled,

and which need to be deployed.

User Interface

Your application typically presents information to users, in

an ASP.NET Web application the user interface is presented in

Web forms pages, which send output to a browser. Optically, you

can create output tailored for mobile devices or other Web

application.

Components

Many applications include reusable elements container

code to perform specific tasks. In Web applications, you c,' create

these components as XML Web services, which make them

callable across the Web from a web application, another XML

Web services, or a Window Form, for Example.

Page 15: E-Tender System

E-Tender System

J.G.College of Computer Application Page 15

Data

Most applications require some form of data access.

ASP.NET Web application you can use ADO.NET, the data

services that are part of the NET Framework. Security,

performance, and other in structure feature.

As in any application, you must implement security

prevent unauthorized use, test and debug the application, tune

its performance, and perform other tasks not directly related to

the application function.

The following diagram provides an overview of how the

pieces of ASP.NET Web applications fit together and fit into the

broader context of the NET Framework of ASP.NET.

Page 16: E-Tender System

E-Tender System

J.G.College of Computer Application Page 16

2. Adobe Photoshop 8.0

Photoshop, or simply Photoshop, is a graphics editor

developed and published by Adobe Systems. It is the current

market leader for commercial bitmap and image manipulation,

and is the flagship product of Adobe Systems.

Photoshop can utilize the color models RGB, lab, CMYK,

grayscale, binary and bitmap. Photoshop has the ability to read

and write raster and vector image formats such as: .EPS, .PNG,

.GIF, .JPEG, Fireworks, etc.

Page 17: E-Tender System

E-Tender System

J.G.College of Computer Application Page 17

Back End Tools :

Back End tools support the development of Database of system

Microsoft Sql Server 2005

C#

1. Microsoft Sql Server 2005:

Advantages of SQL Server 2005

Because It Is built on the new SQL Server 2005 relational

database engine, SQL Server 2005 Express provides some

important advantages over MSDE, which is based on the older

SQL Server 2000 technology. In addition to the core database

engine enhancements that SQL Server 2005 Express inherits

from the SQL Server 2005 family, SQL Server 2005 Express has

been redesigned; some core database capabilities and

characteristics have changed.

Increased maximum database size

One of the most important advantages that SQL Server

2005 Express has over MSDE Is the increased database size.

MSDE is limited to a maximum database size of 2 GB. SQL

Server 2005 Express effectively doubles this by bumping up the

maximum database size to 4 GB. It's Important to note that the

Page 18: E-Tender System

E-Tender System

J.G.College of Computer Application Page 18

4-GB limitation Is per database not per instance. For example,

you can have multiple 4-GB databases on one SQL Server 2005

Express instance, all of which can be online simultaneously.

No workload governor

Another Important advantage that SQL Server 2005

Express has over MSDE is that it does not have the MSDE

workload governor. The MSDE query governor is a widely

misunderstood MSDE feature that was intended to limit the type

of workloads that MSDE could be used for. The MSDE query

governor throttles performance by stalling a user connection for

a few milliseconds each time the connection requests a read or

write operation on a database when there are more than eight

concurrent connections.

SQL Server 2005 Management Studio Express Edition

The graphical user Interface tools for SQL Server 2005

Express makes it easy for even novices to use the database

functionality in SQL Server 2005 Express. The new SQL Server

2005 Management Studio Express (SSMSE) Is available as a

separate Web download. It is also included In SQL Server 2005

Express Edition with Advanced Services and the SQL Server

2005 Express Edition Toolkit. SSMSE allows easy database

management and query analysis capabilities, and is

redistributable with SQL Server 2005 Express.

Page 19: E-Tender System

E-Tender System

J.G.College of Computer Application Page 19

However, that doesn't mean that you should replace all of

your Transact-SQL stored procedures with new CLR-based objects.

Transact-SQL Is stills the best choice for data-centric stored

procedures and functions.

By default, CLR support In SQL Server 2005 Express Is

turned off because not all applications require CLR support. To

enable CLR support in SQL Server 2005, you can use the SQL

Server 2005 Surface Area Configuration tool.

New data types

Another important advantage over MSDE that SQL Server

2005 Express inherits from SQL Server 2005 is support for the new

SQL Server 2005 data types. SQL Server 2005 has a new XML data

type as well as a new varbinary (max) data type. The new XML data

type provides support for typed and untyped XML documents. In

both cases, the SQL Server relational database engine ensures that

the data inserted into the XML data type is well-formed XML. In the

case of typed XML documents, SQL Server will only store the XML

data if it complies with the associated XSD (Extensible Schema

Definition).

Like the earlier image data type that is supported by SQL

Server 2000 and MSDE, the new varbinary (max) data type can

store up to 2 GB of data and is primarily intended to store large

binary objects like bitmaps, jpegs, and other large binary objects.

Page 20: E-Tender System

E-Tender System

J.G.College of Computer Application Page 20

However, unlike the older image data type where the application

needed to use an entirely different data access mechanism to read

and write the binary data, the new varbinary (max) data type

enables applications to access the data stored in the same way as

the other SQL Server data types.

User Instance support

Another Important advantage that SQL Server 2005 Express

has over MSDE is support for user instances. MSDE supports only

server Instances-it does not provide support for user Instances.

User Instances simplify the ability to deploy database applications

that are built on the NET Framework. A user instance is similar to a

normal server instance. However, user Instances are created on

demand unlike standard SQL Server instances, which are created

only during setup. The user does not need to be an administrator to

dynamically attach to the database. A user instance is created when

the User Instance keyword is used as a part of the Native SQL

Client connection string. In addition, the Attach DB Filename

keyword is used to specify the name and path of the SQL Server

mdf database file that is enabling the application to connect to the

target database. The following connection string illustrates using

the user Instance support in SQL Server 2005 Express. "Data

source=.\SQLExpress; integrated security=true;

Attachdbfilename=|DataDirectory|mydb.mdf; user instance=true;"

The application connects to a user instance of SQL Server 2005

Express that is running as the user who opened the connection.

This is a feature only available in SQL Server 2005 Express.

Page 21: E-Tender System

E-Tender System

J.G.College of Computer Application Page 21

Reporting Services

Like MSDE, SQL Server 2005 Express does not possess

business intelligence (BI) features such as Analysis Services,

Integration Services, or data mining. However, SQL Server 2005

Express does provide support for Reporting Services. While the

Initial version of SQL Server 2005 Express did not include

support for Reporting Services, It is now available via separate

downloads. SQL Server 2005 Express Edition with Advanced

Services provides the Report Server. The SQL Server 2005

Express Toolkit provides the Business Intelligence Development

Studio.

SQL Server 2005 Express can act as a data source for

relational data that is on your local server for Reporting Services.

Plus, Reporting Services in SQL Server 2005 Express can render

reports in Excel, PDF, Image, Print, and DHTML formats. The

Report Manager utility In SQL Server 2005 Express manages

reports. Reporting Services reports used in SQL Server 2005

Express are completely compatible with the Reporting Services

In the other SQL Server 2005 editions.

SQL Service Broker

A new SQL Server 2005 development feature that is

supported by SQL Server 2005 Express and has no counterpart

in MSDE is support for the new SQL Server Service Broker. The

SQL Server 2005 Service Broker Is an application development

framework that supports the creation of asynchronous

Messaging applications.

Page 22: E-Tender System

E-Tender System

J.G.College of Computer Application Page 22

SQL Server 2005 Express can act as a Client to SQL Server

Service Broker applications running on the other editions of SQL

Server 2005. This is useful In scale-out scenarios where multiple

applications running on a distributed set of SQL Server 2005

Express systems all connect Into a central SQL Server 2005

system running one of the other editions of SQL Server 2005. It

should be noted that SQL Server 2005 Express also supports

Intra-instance SQL Server Service Broker messaging, which can

be used to replace some of the job scheduling functionality that

SQL Agent provides for MSDE and the other editions of SQL

Server 2005. You can find more information on using SQL Server

Service Broker to manage tasks at

http://wwwmicrosoft.com/technet/technetmag/issues/2005/05

/ServiceBroker/default.aspx on Microsoft TechNet.

Full-text search

Support for full-text search is another feature that wasn't

present in the initial release of SQL Server 2005 Express.

However, it is available in the SQL Server 2005 Express Edition

with Advanced Services download. As in the other editions of

SQL Server 2005, the full-text search feature of SQL Server 2005

Express allows fast and flexible indexing for keyword-based

queries of text data stored in a SQL Server database. Unlike the

LIKE predicate, which only works on character patterns, full text

search operates on words and phrases based on the rules of a

particular language. Full-text search indexes can be built on

Page 23: E-Tender System

E-Tender System

J.G.College of Computer Application Page 23

Columns using the char, varchar, marcher, varbinary (max) and

Image data types. However, one limitation of full-text search with

SQL Server 2005 Express is that it doesn't work in user

instances.

Enhanced security

Another important advantage that SQL Server 2005

Express has over MSDE is the enhanced security that Is built

into the product. SQL Server 2005 Express is installed securely

by default. Network connections are disabled. Likewise, support

for the CLR is turned off. You need to explicitly enable these

features in order to use them. In addition, like the other

members of the SQL Server 2005 product line, SQL Server 2005

Express has the ability to encrypt database data, thereby

ensuring that sensitive data can be accessed only by users who

have the appropriate permissions. SQL Server 2005 Express

supports both symmetric and asymmetric data encryption.

Page 24: E-Tender System

E-Tender System

J.G.College of Computer Application Page 24

2. C#

C# is an object-oriented programming language

developed by Microsoft as part of the .NET initiative and later

approved as a standard by ECMA (ECMA-334) and ISO (ISO/IEC

23270).

C# is the programming language that most directly

reflects the underlying Common Language Infrastructure (CLI).

Most of C#'s intrinsic types correspond to value-types

implemented by the CLI framework.

C# language specification does not state the code

generation requirements of the compiler: that is, it does not state

that a C# compiler must target a Common Language Runtime

(CLR), or generate Common Intermediate Language (CIL), or

generate any other specific format.

Page 25: E-Tender System

E-Tender System

J.G.College of Computer Application Page 25

HARDWARE AND SOFTWARE ENVIRONMENT

1. SOFTWARE REQUIREMENTS OF THE SYSTEM

Along with the hardware, used in the system it

requires software to make a system as well as to run a system

with the computer hardware. Collection of different types of

hardware into a specific type can form a computer but it can not

execute different process on its own. For efficient and proper

working of any system software must be installed. This

software’s may be in the form of operating system or application

software. To make the system one also needs to use software.

The software’s used in the proposed system are the latest

versions of them and can give up-to-date and perfect result of

every process in the system. This software comprises operating

system and application software used in the system.

Visual Studio 2005

Microsoft SQL Server2005

Page 26: E-Tender System

E-Tender System

J.G.College of Computer Application Page 26

2. HARDWARE REQUIREMENTS OF THE SYSTEM

This phase of the software development process deals

with a brief study of different hardware used in the computerized

system. There is a list of hardware materials used during the

making and also during the use of the proposed system. As the

new system to be made into a computerized functional system,

requirement of a computer is must. All the hardware needed

here are generally the basic configuration of a typical office

computer. A list of the hardware requirement used in the system

given below:

1. 2.80 GHz Pentium(R) D2processor or other compatible.

2. Intel 81x Chipset Motherboard.

3. 512 GB SD-RAM.

4. 160 GB-Hard-Disk.

5. 52x Compact Disc drive or faster.

6. Color Monitor. [1024 * 768 Display]

7. Keyboard.

8. Mouse.

Page 27: E-Tender System

E-Tender System

J.G.College of Computer Application Page 27

Part 2

SYSTEM ANALYSIS & DESIGN

5 Analysis

5.1 Requirement Analysis 5.2 E-R Diagram

5.3 Data Flow Diagram (DFD)

6 Design 6.1 Data Dictionary

6.2 User Interface Design

Page 28: E-Tender System

E-Tender System

J.G.College of Computer Application Page 28

ANALYSIS

Page 29: E-Tender System

E-Tender System

J.G.College of Computer Application Page 29

Requirement Analysis

Analysis of system is the process of gathering facts, solution of

problem and to decide over all constitution of desired system. In

system analysis, we have to analyze all the process related

features, required functions, available sources and the time

which should be specified for the analysis stage.

System analysis's broad outline decides how the problems in

outside the world can be related to a computer. It is the

examination of the problem. It is concerned with identifying all

the constraints and influences. System analysis deals with data

collection and a detailed evaluation of present system. It portrays

logical modal of the system through Data Flow Diagram and

Data Dictionaries.

Page 30: E-Tender System

E-Tender System

J.G.College of Computer Application Page 30

ENTITY-RELATIONSHIP DIAGRAM

About E –R Diagram

The Entity Relationship Model Is a collation of basic

Objects, called entitles and relationship among these objects. An

Entity is a "thing" or "object" in the real world that is

distinguishable from other objects Entities are described in

database by a set of attributes. Relationship is association

among several entities. The overall logical structure of a

database can be expressed graphically by Entities Relationship

Diagram.

Page 31: E-Tender System

E-Tender System

J.G.College of Computer Application Page 31

Symbol for E – R Diagram

For Entities

For attributes

For Relation

For Direction

For ISA Relation

Page 32: E-Tender System

E-Tender System

J.G.College of Computer Application Page 32

User

Is A

Register

User

UPLoginIDUPName

UPID

Visitor

Free Register

User

Can

Subscrib

e

Can

Approve

orRejected

Or Quary

Gives

Can

Search

Can

Search

Feedback

FBIDUPID

Can

Replay

DA B C

FTID

Can

Search & Download

111

1

1

M

M

M

M

1

1

Page 33: E-Tender System

E-Tender System

J.G.College of Computer Application Page 33

TenderMast

A B C D

Can

upload

Addmin

ALoginIdAID

Data eatery

Operator

DName

DLoginId

DID

TenderIDTenderNo

OrgName

MM

MM

1

1

Page 34: E-Tender System

E-Tender System

J.G.College of Computer Application Page 34

DATA FLOW DIAGRAM

☼ General rules for drawing data flow diagram:

All data flows that appeared on the previous diagram

explaining the process are included in the lower level

diagram

New data flows and data stores are added if they are used

internally in the process to link processes introduced for

the first time in the explosion at this level.

Data flows and data stored that originate within the

process must be shown.

No entries should contradict the descriptions of the higher

level data flow diagram( and if they do one or the other is

either incorrect or incomplete and a change must be

introduced)

In general we should go as far as necessary to understand

the details of the system and the way it functions, taking

care to verify all aspects with knowledgeable users.

Page 35: E-Tender System

E-Tender System

J.G.College of Computer Application Page 35

☼ Guidelines for drawing DFD:

Explode Processes for more details :

In large systems a single process can be exploded many

times until an adequate amount of detail is described

for analysts to understand the process.

Maintain consistency between processes :

The inputs and outputs of the processes should match

at last. No one should be missing for consistency.

Allow Meaningful Leveling conventions :

Leveling refers to the handling of local files (Those that

are used within a process).The details that Pertain

only to a single process on a particular level should be

held within the process. Data stores and data flows

that are relevant only to the inside of a process are

concealed until that process is exploded into greater

detail.

Add Control on lower level diagrams only :

The logical data flow diagram developed to this Point

does not include control information. No mention has

been made of how to handle errors or exceptions, such

as processing incoming invoices that are incomplete.

The earlier stages did not include such exceptions as

unsigned invoices or invoices without authorized

Page 36: E-Tender System

E-Tender System

J.G.College of Computer Application Page 36

purchase orders. Yet these conditions are important in

correct invoice processing.

Assign meaningful Labels :

The descriptions assigned to data flows and processes

should tell the reader what is going on.

Data flow naming :

The names assigned to data flows should reflect the

data of interest to the analysts.

Process naming :

Use the proper action verb and an object to receive the

action is most appropriate. E.g.: Instead of ‘Inventory

control’ use ‘Adjust Quantity on hand’. Also avoid the

vague process names such as PROCESS, REVIEW,

ASSEMBLE, HANDLE, And ORGANIZE.

Page 37: E-Tender System

E-Tender System

J.G.College of Computer Application Page 37

Symbol for Dataflow Diagram:

Direction of data flow

Processes

Source or destination

Data Stores

Page 38: E-Tender System

E-Tender System

J.G.College of Computer Application Page 38

CONTEXT LEVEL DIAGRAM FOR TENDER SYSTEM

E – Tender

System

Visitor Data

Entry

Operator

Register

User

Administer

Request Accept / Rejected

Request for Free Trial

Or Registration

Search Tender

Notice in Detail

Get Tender Notice As

per Required / Search

Gets Alerts As per plan

Get feedback

Manage Query

Manage Accounts

Upload Tender

Give Error To The

Duplication Of Data

Search Tender

View Tender Notice

Free Register

User

View Free

Tender Notice &

Get Free Alerts

Search

Tender

Notice

In Detail

Replay for Feedback

Gives Feedback

Download Tender

Page 39: E-Tender System

E-Tender System

J.G.College of Computer Application Page 39

FIRST LEVEL DATA FLOW DIAGRAM FOR TENDER SYSTEM

1.0

2.0

Log-in

3.0

Utility

4.0

Data Entry

5.0

Management

6.0

Feedback

7.0

Registration

Search

Visitor

Register

User

Free

Register

User

Data Eatery

Operator

Administrator

Search Criteria

Search Result

Search Criteria

Search Result

Search Criteria

Search Result

Tender

Master

Gives Tender List

Login Id and Password

Give Message

Login Id and Password

Give Message

Give Message

Login Id and Password

Dataentry

Operator

Admin

Master User

Personal

Gives Data Entry

Operator

Info

User Id / Password

Give Admin Info

Gives Message

Input

Visitor detail

Free

TrialUser

Personal

Register

User Details

Free Register

User Details

Gives Feedback

FeedbackFeedback Details

Gives Feedback

Tender

Master

Tender

info

Upload

Tender

Update

Manage

Query

Give Account

Detail

User

Personal

Payment

master

Plan master

Manage feedback

Query

Master

Query DetailRegister user

Feedback

Update

profile

View

Profile /

Payment detail

Give Profile

Detail

Give Plan

Detail

update plan

Update

Profile

Gives

Payment Detail

Gives Detail Gives Detail

Give Query

Info

Give wrong

Entry Or Error

Message

Gives Detail

Gives Detail

Tender

Detail

Page 40: E-Tender System

E-Tender System

J.G.College of Computer Application Page 40

SECOND LEVEL DATA FLOW DIAGRAM FOR SEARCH

Quick Search

1.1

Registor User Or

Visitor

Search Tender Using

Date, Price etc By

Advance Search

Search Tender Using

Keyword

TenderMaster

Advance

Search

1.2

Tender List

1.3

TenderMaster

Generate Tender List

Page 41: E-Tender System

E-Tender System

J.G.College of Computer Application Page 41

SECOND LEVEL DIAGRAM FOR TENDER SYSTEM

4.1

Register User

Request view or

update utility view utility

My

Profile

My

FeedbackMy

Query

My

Payment

4.64.54.44.3

Update profile

Show profile

Gives Feedback Submit

Query

Show

Query

Show feedback

Show payment info

Query master Payment MasterUser

Personal

ch

an

ge

Pro

file

Vie

w P

rofile

Vie

w Q

ue

ry

Su

bm

it Q

ue

ry

Giv

esP

aym

en

t

De

tail

Feedback

Vie

w p

revio

us

fee

db

ack

Sto

re fe

ed

ba

ck

Utility

Process

Page 42: E-Tender System

E-Tender System

J.G.College of Computer Application Page 42

SECOND LEVEL DIAGRAM FOR TENDER SYSTEM

Management

6.1Administer

Manage account,

query

View query,

account Detail

ACCOUNT

6.36.2

Give Message

QueryMasterFree trial

Giv

e In

fo

Fre

e T

ria

l u

se

r

De

tail

Manage QueryQ

ue

ry In

fo

Qu

rey D

eta

il

User

personal

Use

r A

cco

un

t

De

tail

Give account Detail

Request For Manage account

Query

Giv

e In

fo

Page 43: E-Tender System

E-Tender System

J.G.College of Computer Application Page 43

DESIGN

Page 44: E-Tender System

E-Tender System

J.G.College of Computer Application Page 44

DATA DICTIONARY

The data dictionary of any system is an integral component

of structure analysis, since data flow diagrams by themselves do

not fully describe the subject under investigation about the

system.

A data dictionary is a catalog – a repository – of the

elements in the system. These elements center on data and the

way they are structured to meet user requirements and

organization needs. This step of creating a data dictionary is

simultaneous with the process of making data flow diagram(s).

Here all the data fields in their respective tables are allotted so

as to access these data in the system. The data tables are

created in a back-end tool like Microsoft Access, Oracle, FoxPro,

etc…. Here in the Billing system for Book stall we using tables

created in Access as it are the back-end tool used in the system.

The data dictionary consists of different major elements like Data

Elements, Data Store [Tables Used], Data Flow, Processes and

other External entities used in the system. The data dictionary

stores details and description of these elements.

It is developed during data flow analysis and assists the

analysts involved in determining the system requirements.

Analysts use data dictionary for the following important reasons:

To manage the details in large system.

To communicate a common meaning for all system elements.

To document the features of the system.

Page 45: E-Tender System

E-Tender System

J.G.College of Computer Application Page 45

To facilitate analysis of the details in order to evaluate the

characteristics and determine where system changes should be

made. To locate errors and omissions in the system. The data

dictionary contains different types of descriptions for the data

flowing through the system.

Data Elements is the most fundamental level which is also

considered as the building block for all other data in the system.

It refers to all the different data used like fields, data item, etc. to

make the system fully functional irrespective to the table used in

the system. Here all the different type of fields used to make

table are written sequentially without referring to the tables. This

process helps in the process of Normalization of tables.

Next to Data Elements comes the Data Storage which

provides the information of where and how each data element is

stored in which table and it also give information of any

constraints if there. This step also gives knowledge of different

data types used for different field and their size. All the

normalized tables are showed in data storage.

Data Flow stage shows the flow of data in the system. This

step is can be already seen in the data flow diagrams above in

this document. This step refers to all the data flow paths were

transactions are done in the computerized system.

The data flow step also includes different processes used in

the system and it is followed by External Entities used in the

system.

Page 46: E-Tender System

E-Tender System

J.G.College of Computer Application Page 46

TABLE: - UserPersonal

DISCRIPTION: This table shows Register User detail

Field Data type CONSTRAINS Allow

Null

Description

UPID Int Primary Key No Auto Increment

UPName Varchar(100) No Name ofRegister

user

UPLoginID Varchar(50) Unique No Login ID.

Password Varchar(50) No Hash

Email Varchar(100) No Emailed of user

Alter _email Varchar(100) Yes AlterNet Emailed of user

Address Varchar(250) No Address of user

Phone Varchar(30) Yes Phone No.

Fax Varchar(30) Yes Fax No.

Mobile Varchar(20) Yes Mobile No.

City Varchar(50) Forgin Key of City Detail

No City Name

State Varchar(50) Forgin Key of

City Detail

No State Name

Country Varchar(50) Forgin Key of City Detail

No Country Name

PlanID Int Forgin Key of

plan Masters

No Plan id of user.

Amount Numeric(7,2) No Amount of pay.

BankName Varchar(50) Yes Bank Name

Payment Mode Varchar(50) No Pay mode cash or

cheque.

dd_ck_no Varchar(50) No Dd or cheque no.

Registration Date

Date Time No Date of Registration

Activate Varchar(50) No User active or not

Page 47: E-Tender System

E-Tender System

J.G.College of Computer Application Page 47

Activation Date Date Time No User active date

Expiry Date Date Time No Expire Date

question Varchar(50) No Security Question

Answer Varchar(50) No Answer

PaymtId int Forging Key of Payment Master

No Payment Id

TABLE: OrganizationMaster

DISCRIPTION: This table shows all organization detail.

TABLE: City Detail

DISCRIPTION: This table shows all city and id detail

Filed name Data Type Constrains Allow

Null

Description

OrgId Int Primary Key NO Organization id

OrgName Varchar(250) No Organization

name

CatgoryName Varchar(50) NO Category Name

Filed Data type CONSTRAINS Allow

Null

Description

Id int PrimaryKey No Auto Increment

City Varchar(100) No Name of City

State Varchar(100) No Name of State

Country Varchar(100) No Name of Country

Region Varchar(100) No Name of Region

Page 48: E-Tender System

E-Tender System

J.G.College of Computer Application Page 48

TABLE: QueryMaster

DISCRIPTION: This table shows all Query detail.

TABLE: PlanMaster

DISCRIPTION: This table shows all Plan detail

Filed name Data Type Constrains Allow Null Description

PlanID Int Primary Key NO Plan id

PlanName Varchar(50) NO Plan Name

Price Numeric(7,2) NO Plan amount

TABLE: LoginMaster

DISCRIPTION: This table giving information about user login and logout

Filed name Data Type Constrains Allow

Null

Description

Id Int Primary Key NO AutoIncrement

Filed name Data Type Constrains Allow

Null

Description

QueID Int PrimaryKey No Auto Increment

UPID Int Forgin Key of UserPersonal

No User Personal Id

QueDetail Varchar(100) No Query Detail

QueDate DateTime No Query Date

Status varchar(50) No Query Status

Page 49: E-Tender System

E-Tender System

J.G.College of Computer Application Page 49

UPID Int Forgin Key of UserPersonal

NO Id of user personal

Password Varchar2(50) NO Password

TABLE: CategoryMaster

DISCRIPTION: This table giving information about and category

TABLE: TenderMaster

DISCRIPTION:This table giving Tender information

Filed name Data Type Constrains Allow

Null

Description

TenderId Int PrimaryKey NO Auto Increment

TenderNo Varchar(100) NO TenderNo

OrgName Varchar(250) NO Organize Name

Address Varchar(500) NO Address of company

NoticeType Varchar(50) NO Auction,Tender

City Varchar(50) NO Name of City

State Varchar(50) NO Name of State

Country Varchar(50) NO Name of Country

Region Varchar(50)

NO Name of Region

CatName

Varchar(50) NO Category Name

TenderBrief Varchar(5000) NO Brief Detail of Tender

TenderDetail Varchar(500) NO Short Detail of

Tender

TenderValue Float NO Price of Tender

DocFees Float Yes Document Fees

Filed name Data Type Constrains Allow Null Description

CategoryID Int PrimaryKey NO Auto Increment

CategoryName Varchar(50) No Road,water etc.

Page 50: E-Tender System

E-Tender System

J.G.College of Computer Application Page 50

EMD Float Yes Early Money Deposite

OpeningDate DateTime NO Openig date

ClosingDate DateTime NO Closing date

InfoSource Varchar(50) NO Information source Name

TABLE: Free Trial

DISCRIPTION: This table giving free trial user information

Filed name Data Type Constrains Allow Null Description FTID Int PrimaryKey No Auto Increment

Name Varchar(100) No Name Of User

Address Varchar(100) No Address Detail

City Varchar(100) No Name of city

State Varchar(100) No Name of State

Country Varchar(500) No Name of Country

Phone nchar(15) Yes Phone No.

FaxNumber nchar(15) Yes Fax No.

Mobile Varchar(50) Yes Mobile No.

Email varchar(100) No EmailId of user

KeyWord Varchar(100) No Keyword ,which

get a alert.

ActivationDate datetime No Activation Date

ExpiryDate datetime No Expiry Date

Activate Varchar(50) No User active or not.

TABLE: FeedBack

DISCRIPTION: this table giving user Feedback information

Page 51: E-Tender System

E-Tender System

J.G.College of Computer Application Page 51

TABLE: PaymentMaster

DISCRIPTION: This table giving user Pymt information

Filed name Data Type Constrains Allow Null

Description

PaymtID Int PrimaryKey No Auto Increment

UPID Int Forgin Key UserPersonal

No Id of user

Amount Numeric(7,2) No Amount of user Pay

DDno Varchar(20) Yes Demand Draft NO

BankName Varchar(50) Yes Name of Bank

Filed name Data Type Constrains Allow

Null

Description

FBID Int

PrimaryKey No Auto Increment

UPID Int Forgin Key of UserPersonal

No Id of user

FeedBackDetail Varchar(500) No Detail of feedback

FeedBackDate DateTime No Feed Back Date

Page 52: E-Tender System

E-Tender System

J.G.College of Computer Application Page 52

TABLE: Admin

DISCRIPTION:This table giving Admin information

TABLE: DataentryOperator

DISCRIPTION: This table shows data entry operator detail

Filed name Data Type Constrains Allow

Null

Description

AID Int Primary Key No Auto Increment

ALoginID Varchar(50) No Admin Login id

Password Varchar(50) No Password

AName Varchar(50) No Admin Name

Address Varchar(100) No Address

Phone Varchar(50) Yes Phone No.

Email Varchar(50) No Email Id of admin

Filed name

Data Type Constrains Allow Null Description

DID Int PrimaryKey No Auto Increment id

DLoginID Varchar(50) No Operator Login Id

Password Varchar(50) No Operator Password

DName Varchar(50) No Operator Name

Address Varchar(100) No Operator Address

Phone Varchar(50) Yes Phone No.

Page 53: E-Tender System

E-Tender System

J.G.College of Computer Application Page 53

TABLE:InfoSourceMaster

DISCRIPTION: This table shows InformationSource detail

Email Varchar(50) No Email Id of Data Entry Operator

Filed name Data Type Constrains Allow

Null

Description

InfosourceId Int PrimaryKey No Auto Increment

Infosource Varchar(50) Contain Info source where tender Detail

get.

Page 54: E-Tender System

E-Tender System

J.G.College of Computer Application Page 54

USER INTERFACE

DESIGN

Page 55: E-Tender System

E-Tender System

J.G.College of Computer Application Page 55

Home Page

In Home Page, display a simple detail of the tender.

Page 56: E-Tender System

E-Tender System

J.G.College of Computer Application Page 56

User click different link to go other page of website.

User can also search tender using tender search.

Login Form

In Login Page, you must enter the user name & password.

Page 57: E-Tender System

E-Tender System

J.G.College of Computer Application Page 57

If user is not register, Click subscribe now link and fill Detail.

Advance Search Form

Advance search page, user can search more different Tender

Page 58: E-Tender System

E-Tender System

J.G.College of Computer Application Page 58

using Category, Date, city, Value etc…

Forgot Password Form

Page 59: E-Tender System

E-Tender System

J.G.College of Computer Application Page 59

If user forgot his password, to get his password using forgot password form.

Free Alert Form

Page 60: E-Tender System

E-Tender System

J.G.College of Computer Application Page 60

User get a free alert for15 Day of tender after register free alert form.

Subscribe Now Form

Page 61: E-Tender System

E-Tender System

J.G.College of Computer Application Page 61

User can member of the website after his register with subscribe now form.

About Us Form

About us form contains basic information of the website.

Page 62: E-Tender System

E-Tender System

J.G.College of Computer Application Page 62

Information Source Form

Information source page contain formation of news paper

were tender notices is give

Page 63: E-Tender System

E-Tender System

J.G.College of Computer Application Page 63

Privacy Policy Form

rivacy Policy page contain formation of policy notice of website.

Page 64: E-Tender System

E-Tender System

J.G.College of Computer Application Page 64

Services Form

Services page contain payment detail of different plan.

Page 65: E-Tender System

E-Tender System

J.G.College of Computer Application Page 65

Support Form

Support page contain customer care support detail.

Page 66: E-Tender System

E-Tender System

J.G.College of Computer Application Page 66

Term of Usage Form

Term of usage page contain term and condition of use

website.

Page 67: E-Tender System

E-Tender System

J.G.College of Computer Application Page 67

Add With Us Form

Add with us page contain Detail of advertisement.

Page 68: E-Tender System

E-Tender System

J.G.College of Computer Application Page 68

Contact Us Form

Contacts us page contain contact detail of company.

Page 69: E-Tender System

E-Tender System

J.G.College of Computer Application Page 69

Register User Home Form

Register user home page contain full detail of tender.

Page 70: E-Tender System

E-Tender System

J.G.College of Computer Application Page 70

Register User Change Password Form

Using change password page user can change his password.

Page 71: E-Tender System

E-Tender System

J.G.College of Computer Application Page 71

Register User Profile Form

My profile page contains register user detail.

User also modifies his profile.

Page 72: E-Tender System

E-Tender System

J.G.College of Computer Application Page 72

Register User Query Form

My query page, user sends his query to customer care.

User can also see his previous query.

Page 73: E-Tender System

E-Tender System

J.G.College of Computer Application Page 73

Register User Plan Form

My Payment page, user see his payment.

User can also see his current plan.

Page 74: E-Tender System

E-Tender System

J.G.College of Computer Application Page 74

Register User Feedback Form

My Feedback form, user can send feedback.

User can also see his previous feedback.

Page 75: E-Tender System

E-Tender System

J.G.College of Computer Application Page 75

Admin Login Form

Using Login Page, Addmin can Login.

Page 76: E-Tender System

E-Tender System

J.G.College of Computer Application Page 76

Admin Query Management Form

Query management page display query which send by user or it is approve or not.

Page 77: E-Tender System

E-Tender System

J.G.College of Computer Application Page 77

Admin account Management Form

Account management page display Number of user which is

activate or not and also admin can activate the user.

Page 78: E-Tender System

E-Tender System

J.G.College of Computer Application Page 78

Data-Entry Login Form

In Data Entry Login Page, Data entry must enter the user

name & password.

If user is not register, Click subscribe now link and fill Detail.

Page 79: E-Tender System

E-Tender System

J.G.College of Computer Application Page 79

Data-Entry Form

Data Entry page, Data-Entry operator add, update and delete

tender detail.

Page 80: E-Tender System

E-Tender System

J.G.College of Computer Application Page 80

Data-Entry Category Form

In category page, Data-Entry operators add, update and

delete category of the tender.

Page 81: E-Tender System

E-Tender System

J.G.College of Computer Application Page 81

Data-Entry Add City Form

In New city page, Data-Entry operators add, update and

delete city detail.

Page 82: E-Tender System

E-Tender System

J.G.College of Computer Application Page 82

Data-Entry Information Source Form

In Information Source page, Data-Entry operators add,

update and delete information-source of the tender.

Page 83: E-Tender System

E-Tender System

J.G.College of Computer Application Page 83

Data-Entry Organization Form

In Organization page, Data-Entry operators add, update and delete Organization.

Page 84: E-Tender System

E-Tender System

J.G.College of Computer Application Page 84

Part 3

Testing & Quality Assurance

7 Unit Testing

8 Integrity Testing

Page 85: E-Tender System

E-Tender System

J.G.College of Computer Application Page 85

IMPORTANCE OF TESTING

In today’s competitive business environment, companies

are intensely concerned with the quality of their products and

services. A successful organization constantly must improve

quality in every area, including its information systems. Top

management must provide the leadership, encouragement, and

support needed for high quality IT resources.

No matter how carefully a system is designed and

implemented, some problem can occur, especially in a complex

system. Rigorous testing catches errors in the final stages, but it

is much less expensive to correct mistakes earlier in the

development process. The main objective of quality assurance is

t avoid problems, or to detect them as soon as possible. Poor

quality can result from inaccurate requirements, design

problems, coding errors, faulty documentation, and ineffective

testing.

In an effort to achieve high standards of quality, software

systems developers should consider software engineering

concepts and internationally recognized quality standards.

Testing the application

After coding, a programmer must test the program to make

sure that it functions correctly. Later, programs are tested in

groups, and finally the programmer must test the entire system.

The first step is to compile the program using a CASE tool or a

language compiler. This process detects syntax errors, which are

Page 86: E-Tender System

E-Tender System

J.G.College of Computer Application Page 86

language programmer errors. The programmer corrects the

errors until the program executes properly.

Next, the programmer desk checks the program. Desk

checking is the process of reviewing the program code to spot

logic errors, which produce incorrect results. This process can be

performed by the person who wrote the program or by other

programmers. Many organizations require a more formal type of

desk checking called a structured walkthroughs, or code review.

Typically, a group of three to five IT staff members

participate in code review. The group usually consists of project

team members and might include other programmers and

analysts who did not work on the project. The objective is to

have a peer group identify errors, apply quality standards, and

verify that the program meets the requirements of the system

design specification. Errors found during a structured

walkthroughs are easier to fix while coding is still in the

developmental stages.

In addition to analyzing logic and program code, the project

team usually holds a session with users called a design

walkthrough, to review the interface with a cross-section of

people who will work with the new system. This is a continuation

of the modeling and prototyping effort that began early in the

systems development process.

The next step in application development is to initiate a

sequence of unit testing, integration testing, and system testing.

Page 87: E-Tender System

E-Tender System

J.G.College of Computer Application Page 87

UNIT TESTING

The testing of an individual program or module is called

unit testing. The objective is to identify and eliminate execution

errors that could cause program to terminate abnormally, and

logic errors that could have been missed during desk checking.

Test data should contain both correct data and erroneous

data and should test all possible situations that could occur.

For example, for a field that allows a range of numeric values,

the test data should contain minimum values, maximum values,

values outside the acceptable range, and alphanumeric

characters. During testing, programmers can use software tools

to determine the location and potential causes of program errors.

During unit testing, programmers must test programs that

interact with other programs and files individually, before they

are integrated system. This requires a technique called stub

testing. In stub testing, the programmer simulates each

programs outcome or result and displays a message to indicate

whether or not the program executed successfully. Each stub

represents and entry or exit point that will be linked later to

another program or data file.

Page 88: E-Tender System

E-Tender System

J.G.College of Computer Application Page 88

To obtain an independent analysis, someone other than the

programmer who wrote the program usually creates the test data

and reviews the results. Systems analysis frequently create

details products that specify how and when the testing will ne

performed, who will participate, and what test data will be used.

A comprehensive test plan should include scenarios for every

possible situation the program could encounter.

Regardless of who creates the test plan, the project

manager or a designated analyst also reviews the final test

results. Some organizations also require users to approve final

unit test results.

Page 89: E-Tender System

E-Tender System

J.G.College of Computer Application Page 89

INTEGRITY TESTING

Testing one or more programs that depend on each other is

called integration testing, or link testing.

For example, consider an information system with a

program that checks and validates customer credit status, and a

separate program that updates data in the customer master file.

The output from the validation program becomes input to the

master file update program. Testing the programs independently

does not guarantee that the data passed between them is

correct. Only by performing integration testing for this pair of

programs can you make sure that the programs work together

properly. Notice that a program can have membership in two or

more groups.

Systems analysts usually develop the data they use in

integration testing. As is the case with all forms of testing,

integration test data must consider both normal and unusual

situations.

For example, integration testing might include passing

typical records between two programs, followed by blank records,

to simulate an unusual event or an operational problem. You

should use test data that simulates actual conditions because

you are testing the interface that links the programs. A testing

sequence should not move to the integration test stage unless it

has performed properly in all unit tests.

Page 90: E-Tender System

E-Tender System

J.G.College of Computer Application Page 90

Part 4

Conclusion

9 Future Enhancement

10 Bibliography

Page 91: E-Tender System

E-Tender System

J.G.College of Computer Application Page 91

FUTURE ENHANCEMENT

Even though the project was completed to the original

requirements, there are a few features that we could add or

improve on, if time allowed. The file system implementation

should be revised. We could look at other DBMS file systems to

get a better idea on how to design a more efficient and space

conserving system.

Security is the most important feature of the system. In

this some security measures are taken to avoid the mishandling

of the database. So, we can add more powerful security to

system.

These are the some of the addition that We are fill that can

be added to the system.

Login Time Limitation.

Different Type of Reports is can be added.

Modules like Register User and Admin can be expanded

further.

Page 92: E-Tender System

E-Tender System

J.G.College of Computer Application Page 92

BIBLIOGRAPHY

Bibliography means that we have refer while doing project

like, which sites we gone through and which books we have

referred or which magazines we have seen to implements this

project. We are referring many books and websites that can help

us proper guild line to implements our system in the right

direction.

Reference Book

Unleashed ASP.NET 2.0

Addison-Wesley - C # Developer's Guide to ASP.NET

Wrox.Professional ASP.NET

Reference Website

www.google.com

www.cuil.com

www.codeguru.com

www.codeplex.com

www.asp.net