1. TRAINING REPORT
ON
JAVA(J2SE)
PROJECT: MANAGEMENT SYSTEM
Submitted to
MAHARAJA RANJIT SINGH PUNJAB TECHNICAL UNIVERSITY
in partial fulfilment of the requirement for the award of the degree
of
B.TECH
In
COMPUTER SCIENCE ENGINEERING
(ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING)
SUBMITTED BY: SUBMITTED TO:
Omsharan Gupt DR. SWATI BANSAL
ROLL_NO: 221950004 INCHARGE T & P
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
GIANI ZAIL SINGH COLLEGE CAMPUS OF ENGINEERING &
TECHNOLOGY, BATHINDA-151001
DEC- 2024
1
2. PREFACE
Training is an integral part of B.Tech and each and every student has to undergo the training for
six weeks in a company.
This record is concerned about my practical training during the Summer Vacations after the 4th
Semester of my B.Tech. I have taken my Practical training in Core JAVA. During this training, I
got to learn many new things about the industry and the current requirements of companies. This
training proved to be a milestone in my knowledge of present industry. Every day and every
moment was an experience in itself, an experience with theoretical study can’t provide.
2
3. ACKNOWLEDGEMENT
It is my pleasure to be indebted to various people, who directly or indirectly contributed in the
development of this work and who influenced my thinking, behaviour and acts during the course
of study.
I express my sincere gratitude to Er Jyoti Rani, worth HOD and Dr. Swati Bansal, Training &
Placement Incharge for providing me an opportunity to undergo summer training at TechHub
Institute, Bathinda.
I am thankful to Er. Anshuman Kansal for his support, cooperation and motivation provided to
me during the training for constant inspiration, presence and blessings.
Lastly, I would like to thank the almighty and my parents for their moral support and my friends
with whom I shared my day-to-day experience and received lots of suggestions that my quality
of work.
RITIN SETIA
Roll_no: 221950006
3
4. CANDIDATE’S DECLARATION
I RITIN SETIA, Roll No. 221950006 B.Tech (Semester-5) of the Giani Zail Singh Campus
College of Engineering & Technology, Bathinda hereby declare that the Training Report
“COLLEGE MANAGEMENT” is an original work and data provided in the study is authentic to
the best of my knowledge . This report has not been submitted to any other Institute for the
award of any other degree.
RITIN SETIA
(Roll No. 221950006)
Place: Bathinda
Date: NOV 27,2024
4
5. Table of Contents
Sr. No. Topic Page No.
1 PREFACE 3
2 ACKNOWLEDGEMENT 4
3 DECLARATION 5
4 EXECUTIVE SUMMARY 8
5 Chapter-1
Introduction
1.1 Introduction to Institute
1.2 Introduction to Project
1.3 Technologies Used
1.3.1 Java
1.3.2 Netbeans .2
1.3.3 Database: Oracle
9-30
6 Chapter-2
Project Work
2.1 System Requirements
2.1.1 Hardware Requirements
2.1.2 Software Requirements
2.2 System Analysis
2.3 System Design
2.4 Data Flow Diagram(DFD’S)
2.5 Main Modules Of Project
2.6 Screenshots
2.6.1 Database Snapshots
2.6.2 Project Snapshots
30-43
7 Chapter-3 Result and Discussion 44
5
7. EXECUTIVE SUMMARY
In this report we have first explained introduction to project which contains objectives of project,
scope of project, limitations of project. Then we have explained about the platform and
technologies used. We have used java and netbeans to make this project. Database used for this
project is SQLite. After introduction to compnay and project, detailing of project is done in
chapter 2. In this we firstly include system requirements. Then complete SDLC of project is
explained. Firstly requirements are gathered. Then designing of project is done. Designing starts
by identifying reports and other outputs, the system will produce. Then the specific data on each
are pinpointed.
While designing the user interface we kept in mind that it should be simple, easy to use and
understand and flow of control goes properly. Information system establishes procedures
ensuring that right people receive right data at right time. These procedures determine what is to
be done at it enter and passed through the system.
Main modules of this project are login providing high security at this point, making new bank
account, depositing and withdrawing money, and transfer of money, viewing list of customers
and their details, view transactions and changing of pin.
This project is very useful in bank management as it provides more convenience than the manual
work. It provides easy methods to manage the load of work easily for the users. It is much fast
and more efficient as the data once entered can be modified and accessed easily. The project can
be used per the requirement of the user as it is very easy to understand.
7
8. CHAPTER-1
INTRODUCTION
1.1 INTRODUCTION TO ORGANISATION
Tech hub bathinda (ISO 9001-2001 organization) is a leading name in the computer training
industry. We are known for churning out globally competent professionals who are miles ahead
of others in skill set, knowledge and ability to deliver. We have a wide bouquet of IT courses that
are industry centric and job oriented. These courses have enabled many fresher’s find lucrative
jobs and the experienced professionals advance in their career.
Tech hub bathinda knows when students approach an institute they expect more value than the
books on technology can offer. Hence our IT courses are designed and delivered by consultants
working in the specific technologies. The students get the triple benefit of in-depth understanding
of the technology, its practical application in real time scenarios and opportunity to work in live
projects.
We are also in software development, instructor led campus workshops and placement services.
We conduct placement assistance workshops frequently to prepare our students to face job
interviews and also provide placement assistance. We make them industry ready and offers
would automatically knock their door.
Tech hub bathinda is quality oriented Java, J2SE, .Net, Android, PHP, C, C++, Struts, Spring
and Hibernate Training Institute of Bathinda (PB) India. It is managed by a team of highly
talented professionals. The mission of Tech hub is to make engineering graduates and
professionals employable so that they can have blooming careers.
The goal of Tech hub is to make their student self-learners of technology by understanding each
perspective of technology rather than teaching any particular concepts of the technology by
referring some local writer books. To achieve our goal we have charted a path for ourselves,
8
9. main elements of which are our students and professionals who shall move us to the top. The
success that we have achieved so far is the indicator that we are moving swiftly towards our goal.
1.2 INTRODUCTION TO PROJECT-College Management
A institute grows only when it is well managed and systematic. For that one has to keep track of
every record so that right decision can be taken on right time and resources can be fully utilized.
Every organisation, company or firm keeps track of various records in different forms. When
computer was not common for all persons used to keep their record in form of books/files. But
maintaining large volume of data on books was difficult task. Firms started using computers for
their records. Computer has different types of applications which can be used for different
purposes.
For storage, we have used ORACLE 10g. A RDBMS, that creates and manages database
This is a dekstop-related application that permits us to approach the entire knowledge regarding
the college, employees, students, faculties etc. This application is also called as institute
management system. It offers an actual trip of the college campus. Here we would gain the
recent knowledge regarding the students and employees.
This general application planned for aiding the students of an organization about details on the
courses, subjects, classes, assignments, grades and time-table. It also allows the faculty to know
his time-table, upload assignments and issue circulars to the pupil.
The administrator would maintain the accounts of the pupil and staff, prepares the time-table and
upload the current information regarding the campus.
The main problem projected is that pupil’s particulars are reported manually in distinct records,
which is a laborious job. Handling and updating these records manually increase the chances of
mistakes.
It takes a lot of time and needs many employees to accomplish the task. It even lacks security
and disability to produce various types of reports.
9
10. In order to solve these problems, a new system has been created, that attempts to operate the
whole procedure considering the database integration approach.
● Several controls help the application to be friendly to the users.
● The entire project maintenance is made simpler and more adaptable.
● Internet access is possible.
● Several tiers have been employed to offer file upload and mail characteristics.
● During the process of project progression, there is no chance of data mishandling.
● It offers great degree of security employing various protocols.
Advantages
1.Easy to use.
2.No technical knowledge required.
3.Fast
4.Practically unlimited data can be stored.
5.Old data can be retrieved.
1.3 TECHNOLOGIES USED
1.3.1 JAVA
The Java platform and language began as an internal project at Sun Microsystems in December 1990,
providing an alternative to the C++/C programming languages. Engineer Patrick Naughton had become
increasingly frustrated with the state of Sun's C++ and C application programming interfaces (APIs) and
tools. While considering moving to Next , Naughton was offered chance to work on new technology, and
thus the Stealth Project started.
10
11. The Stealth Project was soon renamed to the Green Project, with James Gosling and Mike
Sheridan joining Naughton. Together with other engineers, they began work in a small office
on Sand Hill Road in Menlo Park, California. They aimed to develop new technology for
programming next-generation smart appliances, which Sun expected to offer major new
opportunities.
By the summer of 1992, the team could demonstrate portions of the new platform, including the
Green OS, the Oak language, the libraries, and the hardware. Their first demonstration, on
September 3, 1992, focused on building a personal digital assistant (PDA) device
named Star7 that had a graphical interface and a smart agent called "Duke" to assist the user. In
November of that year, the Green Project was spun off to become, a wholly owned subsidiary of
Sun Microsystems, and the team relocated to Palo Alto, California. The first person team had an
interest in building highly interactive devices, and when Time Warner issued a request for
proposal (RFP) for aset-top box, first person changed their target and responded with a proposal
for a set-top box platform. However, the cable industry felt that their platform gave too much
control to the user; first person lost their bid to SGI.
PLATFORM
The Java platform is a suite of programs that facilitate developing and running programs written
in the Java programming language. The platform is not specific to any one processor or operating
system, rather an execution engine (called a virtual machine) and a compiler with a set of
libraries are implemented for various hardware and operating systems so that Java programs can
run identically on all of them. There are multiple platforms, each targeting a different class of
devices:
● Java Card: A technology that allows small Java-based applications (applets) to be run
securely on smart cards and similar small-memory devices.
● Java ME (Micro Edition): Specifies several different sets of libraries (known as profiles) for
devices with limited storage, display, and power capacities.
● Java SE (Standard Edition): For general-purpose use on desktop PCs, servers and similar
devices.
11
12. ● Java EE (Enterprise Edition): Java SE plus various APIs useful for multi-tier client–
server enterprise applications.
The Java platform consists of several programs, each of which provides a portion of its overall
capabilities. For example, the Java compiler, which converts Java source code into Java byte
code (an intermediate language for the JVM), is provided as part of the Java Development
Kit (JDK). The Java Runtime Environment (JRE), complementing the JVM with a just-in-time
(JIT) compiler, converts intermediate byte code into native machine code on the fly. An
extensive set of libraries are also part of the Java platform.
Java Virtual Machine
The heart of the Java platform is the concept of a "virtual machine" that executes Java byte
code programs. This byte code is the same no matter what hardware or operating system the
program is running under. There is a JIT (Just In Time) compiler within the Java Virtual
Machine, or JVM. The JIT compiler translates the Java byte code into native processor
instructions at run-time and caches the native code in memory during execution.The use of byte
code as an intermediate language permits Java programs to run on any platform that has a virtual
machine available.
Class Libraries
In most modern operating systems (OSs), a large body of reusable code is provided to simplify
the programmer's job. This code is typically provided as a set of dynamically loadable
libraries that applications can call at runtime. Because the Java platform is not dependent on any
specific operating system, applications cannot rely on any of the pre-existing OS libraries.
Instead, the Java platform provides a comprehensive set of its own standard class libraries
containing much of the same reusable functions commonly found in modern operating systems.
Most of the system library is also written in Java. For instance, Swing library paints the user
interface and handles the events itself, eliminating many subtle differences between how
different platforms handle even similar components.
12
13. Java Development Kit
The Java Development Kit (JDK) is a Sun product aimed at Java developers. Since the
introduction of Java, it has been by far the most widely used Java software development
kit (SDK). It contains a Java compiler, a full copy of the Java Runtime
Environment (JRE), and many other important development tools.
USAGE
● Desktop use: According to Oracle, the Java Runtime Environment is found on over 850
million PCs. Microsoft has not bundled a Java Runtime Environment (JRE) with
its operating systems since Sun Microsystems sued Microsoft for adding Windows-
specific classes to the bundled Java runtime environment, and for making the new classes
available through Visual J++. Apple no longer includes a Java runtime with OS X as of
version 10.7, but the system prompts the user to download and install it the first time an
application requiring the JRE is launched Many Linux distributions include the partially
compatible free software package Gnu Class path and increasingly mostly compatible
Iced Tea.
● Mobile devices: Java ME has become popular in mobile devices, where it competes
with Symbian, BREW, and the .NET Compact Framework. The diversity of mobile
phone manufacturers has led to a need for new unified standards so programs can run on
phones from different suppliers - MIDP. The first standard was MIDP 1, which assumed
a small screen size, no access to audio, and a 32kB program limit. The more recent MIDP
2 allows access to audio, and up to 64kB for the program size.
13
14. ● Web server and enterprise use: The Java platform has become a mainstay of enterprise
IT development since the introduction of the Enterprise Edition in 1998, in two different
ways:
1. Through the coupling of Java to the web server, the Java platform has become a leading
platform for integrating the Web with enterprise backend systems. This has allowed
companies to move part or all of their business to the Internet environment by way of
highly interactive online environments (such as highly dynamic websites) that allow the
customer direct access to the business processes (e.g. online banking websites, airline
booking systems and so on).
2. The Java platform has become the main development platform for many software tools
and platforms that are produced by third-party software groups (commercial, open source
and hybrid) and are used as configurable (rather than programmable) tools by companies.
LICENSING
The source code for Sun's implementations of Java (that is the de facto reference
implementation) has been available for some time, but until recently the license terms severely
restricted what could be done with it without signing (and generally paying for) a contract with
Sun. As such these terms did not satisfy the requirements of either the Open Source Initiative or
the Free Software Foundation to be considered open source or free software, and Sun Java was
therefore a proprietary platform.
CRITICISM
In most cases Java support is unnecessary in Web browsers, and security experts recommend that
it not be run in a browser unless absolutely necessary. It was suggested that, if Java is required
by a few Web sites, users should have a separate browser installation specifically for those sites.
GENERICS
When generics were added to Java 5.0, there was already a large framework of classes (many of
which were already deprecated), so generics were chosen to be implemented using erasure to
14
15. allow for migration compatibility and re-use of these existing classes. This limited the features
that could be provided by this addition as compared to some other languages.
Unsigned integer types
Java lacks native unsigned integer types. Unsigned data are often generated from programs
written in C and the lack of these types prevents direct data interchange between C and Java.
Unsigned large numbers are also used in many numeric processing fields, including
cryptography, which can make Java less convenient to use for these tasks. Although it is possible
to partially circumvent this problem with conversion code and using larger data types, it makes
using Java cumbersome for handling the unsigned data.
Floating point arithmetic
While Java's floating point arithmetic is largely based on IEEE 754 (Standard for Binary
Floating-Point Arithmetic), certain features are not supported even when using the
strictfp modifier, such as Exception Flags and Directed Roundings — capabilities mandated by
IEEE Standard 754. Additionally, the extended precision floating-point types permitted in 754
and present in many processors are not permitted in Java.
Performance
In the early days of Java (before the Hot Spot VM was implemented in Java 1.3 in 2000) there
were some criticisms of performance. However, benchmarks typically report Java as being about
two times slower than C (a language which compiles to native code). Java's performance has
improved substantially since the early versions. Performance of JIT compilers relative to native
compilers has in some optimized tests been shown to be quite similar.
Java byte code can either be interpreted at run time by a virtual machine, or it can be compiled at
load time or runtime into native code which runs directly on the computer's hardware.
Interpretation is slower than native execution, and compilation at load time or runtime has an
initial performance penalty for the compilation.
15
16. Security
The Java platform provides a security architecture which is designed to allow the user to run
untrusted byte code in a "sandboxed" manner to protect against malicious or poorly written
software. This "sandboxing" feature is intended to protect the user by restricting access to certain
platform features and APIs which could be exploited by malware, such as accessing the local file
system, running arbitrary commands, or accessing communication networks.
In recent years, researchers have discovered numerous security flaws in some widely used Java
implementations, including Oracle's, which allow untrusted code to bypass the sandboxing
mechanism, exposing users to malicious attacks.
Adware
The Java browser runtime environment has a history of bundling sponsored software to be
installed by default during installation and during the updates which roll out every month or so.
This includes the "Ask.com toolbar" that will redirect browser searches to ads and "McAfee
Security Scan Plus".
Redundancy
Several authors inline with recent Java security and vulnerability issues have called for users to
ditch Java. "Once promising, it has outlived its usefulness in the browser, and has become a
nightmare that delights cyber-criminals at the expense of computer users." "I think everyone
should uninstall Java from all their PCs and Macs, and then think carefully about whether they
need to add it back. If you are a typical home user, you can probably do without it. If you are a
business user, you may not have a choice."
Update System
Java has yet to release an automatic updater that does not require user intervention and
administrative rights unlike Google Chrome and Flash player.
1.3.2 NetBeans IDE 8.2
Java Development Kit (JDK) Version 8
GlassFish Server Open Source Edition 4.2
16
17. GETTING STARTED WITH NETBEANS
Creating a Project
1. Choose File, New Project to display the New Project
2. Select General in the Categories section and Java
Application in the Projects section and click Next to
Display the New Java Application dialog box.
17
18. 3. Type demo in the Project Name field and c:michael in
Project Location field.
4. (Optional) you can create classes after a project is
Created. Optionally you may also create the first
Class when creating a new project. To do so, check the
Create Main Class box and type a class name, say
First, as the Main Class name.
5. Click Finish to create the project. The new project is Displayed.
18
19. CREATE A CLASS
1: Right click on project name (demo) and select New Java Class.
2: Enter class name and click on “finish”.
19
20. 3: A new class will be see and enter java code in class.
4: compile and run class.
20
22. Creating a Web Service in Java using NetBeans IDE
This document provides step-by-step instructions to create and deploy a web service in Java
using NetBeans IDE and GlassFish 4.0. In the project, we will create a calculation service.
Prerequisites:
NetBeans 8.0 IDE
1.3.3 ORACLE DATABASE
(commonly referred to as Oracle RDBMS or simply as Oracle) is an object-relational database
management system produced and marketed by Oracle Corporation.
Storage
The Oracle RDBMS stores data logically in the form of tablespaces and physically in the form
of data files ("datafiles"). Tablespaces can contain various types of memory segments, such as
Data Segments, Index Segments, etc. Segments in turn comprise one or more extents. Extents
comprise groups of contiguous data blocks. Data blocks form the basic units of data storage.
22
23. A DBA can impose maximum quotas on storage per user within each tablespace.
Partitioning
The partitioning feature was introduced in Oracle 8. This allows the partitioning of tables based
on different set of keys. Specific partitions can then be added or dropped to help manage large
data sets.
Monitoring
Oracle database management tracks its computer data storage with the help of information stored
in the SYSTEM tablespace. The SYSTEM tablespace contains the data dictionary, indexes and
clusters. A data dictionary consists of a special collection of tables that contains information
about all user-objects in the database. Since version 8i, the Oracle RDBMS also supports "locally
managed" tablespaces that store space management information in bitmaps in their own headers
rather than in the SYSTEM tablespace (as happens with the default "dictionary-managed"
tablespaces). Version 10g and later introduced the SYSAUX tablespace, which contains some of
the tables formerly stored in the SYSTEM tablespace, along with objects for other tools such as
OEM, which previously required its own tablespace.
Disk files
Disk files primarily represent one of the following structures:
● Data and index files: These files provide the physical storage of data, which can consist
of the data-dictionary data (associated with the tablespace SYSTEM), user data, or index
data. DBAs can manage these files manually or leave their administration to Oracle itself.
Note that a datafile has to belong to exactly one tablespace, whereas a tablespace can
consist of multiple datafiles.
● Redo log files, recording all changes to the database – used to recover from an instance
failure. Often, a database stores these files multiple times for extra security in case of disk
failure. Identical redo log files are associated in a "group".
23
24. ● Undo files: These special datafiles, which can only contain undo information, aid in
recovery, rollbacks, and read-consistency.
● Archive log files: These files, copies of the redo log files, are usually stored at different
locations. They are necessary (for example) when applying changes to a standby
database, or when performing recovery after a media failure. One can store identical
archive logs in multiple locations.
● Temp files: These special datafiles serve exclusively for temporary storage data (used for
example during large sorts or for global temporary tables)
● Control files, necessary for database startup. Oracle Corporation defines a control file as
"[a] binary file that records the physical structure of a database and contains the names
and locations of redo log files, the time stamp of the database creation, the current log
sequence number, checkpoint information, and so on".
At the physical level, data files comprise one or more data blocks, where the block size can vary
between data files.
Data files can occupy pre-allocated space in the file system of a computer server, use raw disk
directly, or exist within ASM logical volumes.
Configuration
Database administrators control many of the tunable variations in an Oracle instance by means of
values in a parameter file. This file in its ASCII default form ("pfile") normally has a name of the
format init<SID-name>ora. The default binary equivalent server parameter file ("spfile")
(dynamically reconfigurable to some extent) defaults to the format spfile<SID-name>ora. Within
an SQL-based environment, the views V$PARAMETER and V$SPPARAMETER give access to
reading parameter values.
Implementation
The Oracle DBMS kernel code depends on C programming. Database administrators have
limited access to Oracle-internal C structures via V$ views and their underlying X$ "tables".
24
25. Layers or modules in the kernel (depending on different releases) may include the following
(given with their inferred meaning):
K: Kernel
KA: Kernel Access
KC: Kernel Cache
KCB: Kernel Cache Buffer
KCBW: Kernel Cache Buffer Wait
KCC: Kernel Cache Control file
KCCB: Kernel Cache Control file Backup
KCCCF: Kernel Cache Copy Flash recovery area
KCCDC: Kernel cache Control file Copy
KCP: Kernel Cache transPortable tablespace
KCR: Kernel Cache Redo
KCT: Kernel Cache insTance
KD: Kernel Data
KG: Kernel Generic
KGL: Kernel Generic library cache
KGLJ: Kernel Generic library cache Java
KJ: Kernel Locking
KK: Kernel Compilation
KQ: Kernel Query
KS: Kernel Service(s)
KSB: Kernel Service Background
KSM: Kernel Service Memory
KSR: Kernel Service Reliable message
KSU: Kernel Service User
KSUSE: Kernel Service User SEssion
KSUSECON: Kernel Service User SEssion CONnection
KSUSEH: Kernel Service User SEssion History
KT: Kernel Transaction(s)
25
26. KTU: Kernel Transaction Undo
KX: Kernel Execution
KXS: Kernel eXecution Sql
KZ: Kernel Security
K2: Kernel Distributed Transactions
Oracle Database product family
Based on licensing and pricing, Oracle Corporation groups its Oracle Database-related product
portfolio into the Oracle Database product family, which consists of the following:
● Oracle Database editions: variations of the software designed for different scenarios.
● Database options: extra cost offers providing additional database functionality.
● Oracle data models: database schemas, offering pre-built data models with database
analytics and business intelligence capabilities for specific industries.
● Management packs: integrated set of Oracle Enterprise Manager tools for maintaining
various aspects of Oracle Database.
● Some of Oracle engineered systems, either specifically built for Oracle Database
deployment or supporting such capability.
● Other related products intended for use with Oracle Database.
Database editions
As of 2016 the latest Oracle Database version (12.1.0.2) comes in two editions:
● Oracle Database 12c Enterprise Edition (EE): Oracle Corporation's flagship database
product. A fully featured edition of Oracle Database, it also allows purchase of add-on
features in the form of Database Options and Management packs and imposes no
limitation on server resources available to the database.
26
27. ● Oracle Database 12c Standard Edition 2 (SE2): intended for small- to medium-sized
implementations, this edition comes with Real Application Clusters option included, a
reduced set of database features, and the licensing restriction to run on servers or clusters
with a maximum of 2 sockets total and capped to use a maximum of 16 concurrent user
threads. Oracle positions SE2 as a starter edition, stressing complete upward
compatibility and ease of upgrade to the more costly Enterprise Edition.
Oracle Corporation also makes the following editions available:
● Oracle Database Express Edition 11gR2 (Oracle Database XE), a free-to-use entry-level
version of Oracle Database 11gR2 available for Windows and Linux platforms limited to
using only one CPU, up to 1 GB of RAM and storing up to 11 GB of user data. Oracle
Database XE is a separate product from the rest of Oracle Database product family. It
provides a subset of Standard Edition functionality (lacking features such as Java Virtual
Machine, managed backup and recovery and high availability), is community-supported
and comes with its own license terms. Express Edition was first introduced in 2005 with
Oracle 10g release with a limitation to a maximum of 4 GB of user data. Oracle 11g
Express Edition, released on 24 September 2011, increased user data cap to 11 GB.
● Oracle Database Personal Edition, a single-user, single-machine development and
deployment license, allows use of all database features and extra-cost database options
(with the exception of the Oracle RAC option). It is available for purchase for Windows
and Linux platforms only and does not include management packs.
Up to and including Oracle Database 12.1.0.1, Oracle also offered the following:
● Standard Edition (SE) ran on single or clustered servers with a maximum capacity of 4
CPU sockets. It was largely the same as the current SE2 offer, including Real Application
Clusters option at no additional cost, however allowing twice as much CPU sockets in a
server or a cluster.
● Standard Edition One (SE1), introduced with Oracle 10g, offered the same features as SE
and was licensed to run on single servers with a maximum of two CPU sockets.
27
28. Oracle Corporation discontinued SE and SE1 with the 12.1.0.2 release and stopped offering new
licenses for these editions on December 1, 2015. Industry journalists and some ISVs perceived
Oracle's desupport of affordable SE1 and restrictive updates to SE in the form of SE2
(specifically, the introduction of thread throttling and halving the number of licensable CPU
sockets without changing price-per-socket) as an attempt to repress customers' efforts to scale
SE/SE1 installations up to "enterprise" class by means of virtualization, while at the same time
pushing them towards the more expensive Enterprise Edition or to Oracle Cloud Database as a
service.
Supported platforms
Oracle Database 12c is supported on the following OS and architecture combinations:
● Linux on x86-64 (only Red Hat Enterprise Linux, Oracle Linux and SUSE distributions
are supported)
● Microsoft Windows on x86-64
● Oracle Solaris on SPARC and x86-64
● IBM AIX on POWER Systems
● IBM Linux on z Systems
● HP-UX on Itanium
In 2011, Oracle Corporation announced the availability of Oracle Database Appliance, a pre-
built, pre-tuned, highly available clustered database server built using two SunFire X86 servers
and direct attached storage.
Some Oracle Enterprise edition databases running on certain Oracle-supplied hardware can use
Hybrid Columnar Compression for more efficient storage.
Features:
28
29. Active Session History (ASH), the collection of data for immediate monitoring of very recent
database activity.
Automatic Workload Repository (AWR), providing monitoring and statistical services to
Oracle database installations from Oracle version 10. Prior to the release of Oracle version 10,
the Stats pack facility provided similar functionality. AWR requires an Oracle Database Pack
license.
Clusterware
Data Aggregation and Consolidation
Data Guard for high availability
Generic Connectivity for connecting to non-Oracle systems.
Data Pump utilities, which aid in importing and exporting data and metadata between
databases
SQL*Loader, utility that facilitates high performance data loading.
Database Resource Manager (DRM), which controls the use of computing resources.
Expression filtering
Fast-start parallel rollback
Fine-grained auditing (FGA) (in Oracle Enterprise Edition) supplements standard security-
auditing features
Flashback for selective data recovery and reconstruction
Heterogeneous Services (HS), providing connectivity to non-Oracle systems and code.
iSQL*Plus, a web-browser-based graphical user interface (GUI) for manipulating data in an
Oracle database (compare SQL*Plus)
Oracle-managed files (OMF) – a feature allowing automated naming, creation and deletion of
datafiles at the operating-system level.
29
30. Oracle Multimedia (known as "Oracle
inter Media" before Oracle 11g) for storing and
integrating multimedia data within a database
Oracle Spatial and Graph – extra-cost software for managing spatial and location data
● Oracle Locator – a freely-available subset of Oracle Spatial and Graph
Recovery Manager (RMAN) for database backup, restoration and recovery
SQL*Plus, a program that allows users to interact with Oracle database(s) via SQL and
PL/SQL commands on a command-line. Compare iSQL*Plus.
SQLcl, a command-line interface for queries, developed on the basis of Oracle SQL
Developer
Universal Connection Pool (UCP), a connection pool based on Java and supporting JDBC,
LDAP, and JCA
Virtual Private Database (VPD), an implementation of fine-grained access control.
Oracle Application Express, a no-cost environment for database-oriented software-
development
Oracle XML DB, or XDB, a no-cost component in each edition of the database, provides high-
performance technology for storing and retrieving native XML.
Oracle Golden
Gate 11g (distributed real-time data acquisition)
Oracle Text uses standard SQL to index, search, and analyse text and documents stored in the
Oracle database.
Orace JSON Store - Oracle Database supports JavaScript Object Notation (JSON) data
natively with relational database features, including transactions, indexing, declarative querying,
and views.
Workspace Manager version-enables tables using the WMSYS schema.
30
31. CHAPTER-2
PROJECT WORK
2.1 SYSTEM REQUIREMENTS
2.1.1 Hardware Requirements
Table 1: Hardware requirements
● Physical memory (RAM) ● 512 MB recommended
● Virtual memory ● Double the amount of RAM
● Temp disk space ● Hard disk space 40 GB
● Video adapter ● 256 colors
● CPU Processor ● C2D 2.00 GHz minimum
2.1.2 Software Requirements
⮚ Notepad++
⮚ Operating System: Microsoft Windows XP Professional, Microsoft Windows Vista,
Microsoft Windows 10.
⮚ Front-end Technologies and languages: JAVA.
⮚ Back-end Tool Database: Tables created and manipulated using MySQL.
31
32. ⮚ Server: WAMP server.
The project is developed and implemented on Microsoft Windows 7 professional as the
operating system using the above said tools.
2.2 PROJECT DESIGNING
This is the most creative and challenging phase of the System Development Life Cycle. The
design of the system produces the detail of the system that state how system will meet the
requirements identified during system analysis. The system specialists often refer to this stage as
Logical Design, in contrast to the process of developing program software, which is referred to
as Physical Design.
Designing starts by identifying reports and other outputs, the system will produce. Then the
specific data on each are pinpointed. Usually designer sketch the form or display, as they are to
appear when system is complete. This may be done on a paper or on a Computer Display, using
one of the automated system design tool available. The System Design also describes the data to
input, calculated or stored individual data items and calculated procedures are written in details
which tell how to process the data & to produce the output.
Physical System Design includes designing the various physical components such as
❖ User Interface
❖ Database Designing
2.2.1 DESIGNING THE USER INTERFACE
Following important issues that were kept in mind while designing the User Interface:
✔ Foremost among them was that the User Interface would be the first object with which
the user would interact.
32
33. ✔ It would be the only object through which he will be able to communicate with and hence
would be able to utilize its services.
✔ It should not be complex interface rather it should be as simple as possible, so that it is
easy for the user to handle it with minimum efforts.
✔ The various controls and options used should be compatible with activities with which
they are associated.
✔ The various controls and options been provided through this interface should be self-
explanatory by themselves.
✔ It should be highly interactive so that if the user goes for the wrong option, then it should
be able to respond with some notification message.
✔ Hence keeping in mind the various above purposes, a user interface was designed which
would be self-descriptive by itself.
2.2 SYSTEM ANALYSIS
Analysis is a detailed study of the various operations performed by a system and their
relationship within and outside of the system. In general view system is collection of people,
procedures and equipments. Information is produced and used by people in an organization in
their everyday activities to make decisions. Information system establishes procedures ensuring
that right people receive right data at right time. These procedures determine what is to be done
at it enter and passed through the system. System analysis is the method that is used to analyze
the system, design them and build them. Analysis is used to gain an understanding of existing
and what is required in system. The analysis phase ends with the system description and a set of
requirement of the new system. Analysis is a process of diagnosing the situation with the
boundaries of system kept in mind to produce a report based own findings. Planning for
33
34. information system development is done within in the FIGURE work of organizations overall
MIS plan
2.3 SYSTEM DESIGN
The design phase focuses on the detailed implementation for the system recommendation in the
feasibility study. The design phase is a translation from a program-oriented-document to user-
oriented-document. The design activity begins when the required document for the software to
be developed is available. This may be SRS for the complete system, in case of waterfall model
is being followed or the requirement for the next iteration, if the iterative enhancement is being
followed or the requirement for the prototype if the prototyping is being followed. Design is
essentially the bridge between requirement specification and the final solution for satisfying the
requirements. The term “design” is used in two ways, when used as a verb it represent the
process the designing while it represents the result of design process. The goal of design process
is to produce some order, which can be later used to build that system. The produced model is
called the design of the system.
The design of the system is essentially a blueprint or a plan for solution for the system. Here we
consider a system to be asset of components which clearly defines the behavior that interacts
with each other in a fixed define manner. A component of a system can be considered as a
system with its own components. In a software system a component is a software module.
The design process for software system has two levels, Top level and logical design. In top level,
it is indicated that how the modules should be integrated. Logical design expands the system
design to contain more detailed description of processing logic and data structures.
Design is essentially the bridge between requirement specification and the final solution for
satisfying the requirements. The term “design” is used in two ways, when used as a verb it
represent the process the designing while it represents the result of design process. The goal of
design process is to produce some order, which can be later used to build that system. The
produced model is called the design of the system. The design of the system is essentially a
blueprint or a plan for solution for the system. Here we consider a system to be asset of
components which clearly defines the behavior that interacts with each other in a fixed define
manner. A component of a system can be3 considered as a system with its own components. In a
software system a component is a software module.
34
35. 2.4 DATA FLOW DIAGRAMS (DFDS)
2.5 MAIN MODULES OF THE PROJECT:
2.5.1 MY PAGE
1. Profile
2. Courses
3. Student Registration
4. Teacher Information
5. Fee Structure
6. Marks Record
7. Welcome Page
1. PROFILE: On this page the admin can view this profile and select appropriate option either
for student registration, course selection, teacher information, can view fee structure, and also
students can see there marks record.
2. COURSES: On this page admin can view and select the course in which he/she want to be
enrolled.
3. STUDENT REGSITERATION: On this page student can register himself for admission in
appropriate course and branch.
35
PROFILE
STUDENT
REGISTERATION
COURSES
College
System FEE
SYRUCTURE
TEACHERS
INFORMATION
MARKS
RECORD
36. 4. TEACHER INFORMATION: On this page teacher can add his/her information or any new
applicant for job can also be applied for particular branch and course.
5. FEE STRUCTRE: On this page admin can view the fee structure of particular course and
branch.
6. MARKS RECORD: On this page student can view their marks in exams they appeared
according to results uploaded by the faculty staff.
7. WELCOME PAGE: On this page there is a welcome note which welcomes the new registered
student or teacher to the college.
2.6SCREENSHOTS
2.6.1 DATABASE DESIGNS
Courses
36
45. CHAPTER-3
RESULTS AND DISCUSSION
Here we will discuss about a process that describes how to develop, design and maintain the software
project ensuring that all the functional and user requirement, goals and objectives are met. This process
is called software development life cycle (SDLC).
It has different phases that describes how it can help us in designing a better project. These are defined
below:
● Requirement and Gathering Phase: First and important phase of SDLC for the success of
software. This phase includes communication between project stakeholders, end users and
project team as requirements being gathered from clients. This phase includes creating
prototypes of project, to show how project will look like.
● Design Phase: In design phase, architecture design is proposed for project and captured in
design document. This phase includes:
a) Partition of requirements into hardware and software systems
b) Designing system and architecture.
● Developments Phase: This is the longest phase of SDLC as in this the actual project is developed
and build. This phase includes:
a) Actual code is written.
b) Unit testing is performed.
● Testing Phase: The testing is involved in almost all stages of SDLC. However this phase refers to
only testing of system where bugs/errors are reported, tracked and fixed.
● Deploy and Maintenance Phase: In this phase once the system is tested, it is ready to go live.
The system may be released for limited users, and tested in real business environment for UAT
(user acceptance testing). This phase includes:
a) System is ready to be delivered.
b) System is installed and put into use.
45
46. c) Correction of errors that were not caught before.
d) Improving system and ultimately enhanced system in data center.
CHAPTER-4
CONCLUSION:
After thoroughly analyzing the existing system the following objectives have been
achieved:
⮚ Providing easy user friendly interface.
⮚ Easy access of data.
⮚ Easy Maintenance.
⮚ Providing better performance.
⮚ To create a layer between the user and administrators view.
⮚ Stability and operability by people of average intelligence.
⮚ Enhancement in the completion of work within the constraints of time.
⮚ Maintaining data consistency and integrity.
⮚ Adequate validation checks for data entry.
⮚ It is used in Live Networking.
⮚ It provides Network sniffing which further helps in checking network attacks.
46