Vous êtes sur la page 1sur 36

PROJECT TRAINING REPORT

OF

SIX WEEKS INDUSTRIAL TRAINING

UNDERTAKEN AT

“STELLAR EDGE SOLUTIONS”

ON

“LIBRARY MANAGEMENT SYSTEM”

SUBMITTED IN PARTIAL FULFILLMENT OF THE DEGREE

OF

BACHELOR OF TECHNOLOGY

IN

COMPUTER SCIENCE AND ENGINEERING

Under the Guidance of: Submitted By:

Name: Mr. Vinod Bagga NEERAJ KUMAR

Designation: java Developer PARDEEP GARG

NAVDEEP KUMAR

1
DECLARATION

We hereby certify that the project entitled “LIBRARY MANAGEMENT SYSTEM” in partial
fulfillment of requirements for the award of degree of B.Tech submitted in the department of
Computer Science and Engineering. The matter has not been submitted by me in any other
University / Institute for the award of B.Tech degree.

I shall be accountable for any misleading information in any part of this report.

Signature of candidate

2
ACKNOWLEDGEMENT

It is a pleasure that we find ourselves penning down these lines to express our sincere thanks to
the people who helped us along the way in completing our project. We find inadequate words to
express our sincere gratitude towards them.

First and foremost we would like to express our gratitude towards our training guide Mr. Vinod,
for placing complete faith and confidence in our ability to carry out this project and for providing
her time, inspiration, encouragement, help, valuable guidance, constructive criticism and
constant interest. He took personal interest in spite of numerous commitments and busy schedule
to help us complete this project. Without the sincere and honest guidance of our project guide we
would have not been able to reach the present stage.

Neeraj Kumar

Pardeep Garg

3
ABSTRACT

This is a project report on “LIBRARY MANAGEMENT SYSTEM”. During the making /


developing of this project we explored new ideas and functionalities behind the working of
notepad.

This project is the output of our planning, schedule, programming skill and the hard work. This
report reflects our steps taken at various levels of programming skill, planning and schedule.

We have learnt a lot during this project and liked the improvement in our testing skills and deep
concept related to these kinds of projects.

Our project is LIBRARY MANAGEMNT SYSTEM.

Library Management System can be used by education institutes to maintain the


records of Library easily. Achieving this objective is difficult using amanual system
as the information is scattered, can be redundant and collecting relevant information
may be very time consuming. All these problems are solved using this project

4
PREFACE

Learning comes from doing. To learn something one has to go through practical conditions.
Recognizing this fact, the University has made it essential for Computer Science and
Engineering (CSE) students to undergo Industrial Training for six weeks. During this period, the
students learn about the functionality of the computer languages as well as database and the
actual business environment. Also this training helps the students how to implement the
theoretical knowledge into practical life, in our day to day life. This project report was prepared
during the training period in the month of July-November.

During this period, an effort was made to understand Student Information System and to finish
the project work assigned to us. This report lays special emphasis on the operational work, tasks
and project carried out during the training period.

5
SUMMARY

Our Project “Library Management System” . It can be used by education institutes to


maintain the records of Library Books easily. Achieving this objective is difficult
using amanual system as the information is scattered, can be redundant and
collecting relevant information may be very time consuming .All these problems can
be solved using this project.

6
1. COMPANY PROFILE

Stellar Edge Solutions Pvt. Ltd is a Software Development Company based at Chandigarh. It
provides solutions to its customers that add value to the customer’s business in terms of adding
competitive advantage which can be measured through the results achieved. Stellar Edge
Solutions, the Training Division of Stellar Data Solutions is one of the leading Software
Development & Training Company having a base of the parent company (STELLAR DATA
SOLUTIONS) which is recognized globally as Management Consulting, Technology services
and RFID solutions providing company. Committed to delivering information Stellar Solutions
collaborates with its clients to help them become high performance professionals. With deep
Industry & Business process expertise, global services and proven track record, Stellar can
mobilize the right people, skills and technologies to help people excel.

Over the past 9 years Stellar with a vision to become the most admired technology service
providers globally and also preparing the people to work in the competitive environment, Stellar
has expanded its operations in 23 countries and today it has distinguished itself by one of the
software development Company which is sharing its rich experience of Industry with
B.Tech/MCA students who aspire to become IT Professional by preparing them through their
Training Division Stellar Edge Solution.

Stellar Edge Solutions has state of the art infrastructure which provides an unmatched range of
high quality training in various high-end IT Technologies for engineering/MCA students as well
as for professionals who seeks to upgrade in the IT world. The Training Modules are designed to
prepare the student skills through expert Trainers and Mentors. Whatever skill the student gains
here is provided a Real Time Live Project Exposure through STELLAR DATA SOLUTIONS
which actually makes the student an Industrial Ready Professional.

7
Stellar Data Solutions Pvt. Ltd is a global management consulting, technology services and
R.F.I.D. solution providing company. Committed to delivering innovation, Stellar Data Solutions
collaborates with its clients to help them become high-performance business.

They conceptualize and realize technology driven business transformation initiatives with
multiple skill and competencies that combine to accomplish world class technology driven
solutions especially with our commitment to provide global clients a fresh approach to
methodologies for IT and business consulting services. These complement to define, optimize
and align their client’s business strategy with technology initiatives.

Their services address needs of consulting, outsourcing enterprise IT programs, R.F.I.D. based
solutions, communications, Internet technology, product development and also engineering
product design and data management. Their expertise in focused industries, strong quality
orientation, cross-technology and distributed project management capabilities benefit their
clients in addition to seamless coordination in strategy, implementation and management of their
technology programs.

Since 2001 they have built a reputation of research and planned integrated approach to
technology with amazing and measurable results for successful delivery of end-to-end solutions.
They have helped our clients maximize their software and marketing investment through unique
combination of business planning, innovative solutions and quality services – all powered by the
Stellar Data Solutions team.

Our forte is to take your requirement, apply our understanding of analytical methodologies and
purpose innovative and technical featured solution and site enhancements that help you to
achieve maximum benefits from the minimum resources – while taking into account commercial
consideration and timeframe with high level of communication and support.

1.1TECHNOLOGY EXPERTISE

8
Stellar excels in the following technologies:
 Java technologies – EJB, JSP, J2EE, STRUTS, ECLIPSE, AJAX.
 Microsoft Technologies - .NET Framework 4.0, ASP.NET, SILVERLIGHT.
 Oracle Solutions – 10g DBA, PLSQL.
 Operating System – Windows 7, XP, LINUX, Solaris.
 Designing – Flash, Adobe Photoshop, Dreamweaver, GIF animator.
 Open Sourcing Technologies – PHP / MYSQL.
 Data Warehousing – Data Mart, Data extraction, Parallel Queries.

1.2PROJECTS
Stellar provides Industrial Training on Live Projects to B.Tech/MCA students, which gives them
an edge over others as it provides them Real Time Software Development Experience as students
supply their skills and knowledge under the supervision of their Project Mentors. The projects
provided to the students are need based using the todays high-end technologies like
.NET,J2EE,Oracle,SEO,SQT,PHP etc.

Some of the projects designed and developed by Stellar are:


 School Manager.
 Finaxis.
 Campus live(Online)
 Nursing Home Management System
 Dental Hospital Management System
 Institute Management System
 Hotel Management System
 Hospital Management System
 Lab-o-Care (Pathology & Radiology Lab)
 Eye Care Hospital Management System
 Online Information Portal
 Business Management Suites
 Pay Masters (Payroll Online and Offline)

9
 Stellar + ERP
 Transport Management System Online with Integrated MIS
 Shopping Cart Integrated with Inventory Management and CRM
 CRM
 Document Management System
 Project Management System
 Asset Management System
The above mentioned projects have been designed and developed for some of their
prestigious clients who have valued Stellar’s R&D.
Some of our prestigious clients are:
 PUNSUP, Chandigarh
 Backward Financial Corporation, Chandigarh
 Central Warehousing Corporation, Chandigarh
 Sonya International Education Center, Delhi
 TESOL University, Dante Fe, USA
 National College, Mumbai
 Westa College, South Hall, London, U.K.
 Toon School, Bangalore
 Delta International School, Riyadh, Saudi Arabia
 British Higher School of Art and Design, Moscow
 Total Learning Academy, Yangon, Myanmar
 Idea – Gate, Kuwait
 Phyllis- Riccia School, Singapore
 Chandigarh Sports Association, Sector42, Chandigarh

1.3CONTACTS
Stellar Edge Solutions Pvt. Ltd
S.C.O. – 371-373 Second Floor,
Sector 34-A,
Chandigarh,

10
Pin Code- 160044.

Tel No.: 0172-4668899

For queries: Stellaredgeseema@gmail.com

OBJECTIVE AND SCOPE

PURPOSE:

Library Management System is an application that will be:

1. Enabling the administrator to register books, manage books record, manage student

records.

2. Storing the records of books which comes into the library at regular intervals.

3. Storing the record of student under different branches.

4. Storing the record of issued books to different students .

5. To generate record of new books,issued books,books which are deleted.

OBJECTIVE:

Objectives of project are:

1. Easy handling of books details.

2. Easy handling of student registration by admin.

3. Easy handling of books which are issued to different students and which are returned by

them .

4. Easy updating.

11
5. Easy seaching.

6. Easy result generation.

BASIC FEATURES:

 Fast registration.

 Fast updating.

 Easy to retrieve the data.

 Centralization of the data.

 Auto generation.

 Resource saving.

 Interactive user interface.

PROJECT SCOPE:

The scope of the project is wide. The objective of this document is to analyze the managing

system and formulate the scope and objective of the proposed automated system. It also analyses

the some alternative solutions about different other queries. The document shall be alternative

solution about other queries. The document shall be guide to develop a prototype for the

proposed system.

ADVANCE TECHNOLOGY:

12
Before the automation all the work was managed manually. Because of the enormous amount of

paper work the chances of errors were more. The problems faced before this software was

introduced are:

 Manual Registration – All the registrations were done manually and was very

cumbersome i.e. separate registers were maintained.

 Difficult To Retrieve – Any kind of searching was time consuming.

 Difficult To Update – Any kind of updation was time consuming.

 Difficult to Verify – Any kind of verification such as account verification was time

consuming.

 Insecure – Large books or registers were less secure.

 Data Redundancy – Lot of data was duplicated and inconsistent.

 All the work done manually gave rise to several major problems which led to automation

of existing system. The availability of this system made the data storage task easier.

13
INDEX

14
INTRODUCTION

As mentioned earlier, the project is all about storing and managing the data related to books and

student . Also the project helps admin to view the details at any time and at any place. About the

working of our project, we plan to include the few basic options which deal with recording,

retrieving, registration or updating.

Our project will contain basic functions like:

1.It provides the facility for the Admin login and admin works as :

 Admin can add new books to the database.

 Admin can issue books to students.

 Admin is responsible for taking back books which are issued to students at right

time.

 Admin can check each book detail, i.e About its Author , Title , Book Id etc.

 Admin can do various updations.

 Admin can add/remove a book from database whem it is no longer used in library.

 Admin can add/view student record.

 Admin can update student record.

15
 Admin can remove student and books.

 Admin can delete/modify student record.

2.It provides the facility for student login and student can:

 Student can view hiss/her basic profile.

 Student can update his/her profile.

 Student can see the books issued to him/her.

 Student can view his/her result.

 Student can also take help to undersatnd his/her work

16
HARDWARE AND SOFTWARE

MINIMUM HARDWARE REQUIREMENTS:

 Processor P3 500Mhz or above

 Memory 256MB RAM

 Hard Disk 100MB free hard disk space

 Monitor CRT or LCD monitor

MINIMUM SOFTWARE REQUIREMENTS:

 Operating system with the java installed.

 MYSQL Query Browser.

OPERATING SYSTEM:

 Microsoft Windows XP service pack 2 or higher versions.

OTHER NONFUNCTIONAL REQUIREMENTS:

i. Performance Requirements

System should provide the accurate information according to the requirements of the user and the

retrieval of data should be fast.

17
System should be efficient, precise and easy to maintain.

ii. Safety Requirements

The database used for this project should be backed up on routine basis in order to protect the

loss of data or damage resulted due to any reason i.e. proper backup and recovery procedure

should be there.

iii. Security Requirements

System should be capable of handling all types of malicious attacks made by intruders. System

should not provide access to any unauthorized user.

PROGRAMMING LANGUAGES AND DEVELOPMENT TOOLS

 JAVA:

JAVA is a programming language originally developed by James Gosling at Sun Microsystems

(which has since merged into Oracle Corporation) and released in 1995 as a core component of

Sun Microsystems’ Java platform. The language derives much of its syntax from C and C++ but

has a simpler object model and fewer low-level facilities. Java applications are typically

compiled to byte code (class file) that can run on any Java Machine (JVM) regardless f computer

architecture. Java is a general-purpose, concurrent, class-based, object-oriented language that is

specifically designed to have as few implementation dependencies as possible. It is intended to

18
let application developers “write once, run anywhere” (WORA), meaning that code that runs on

one platform does not need to be recompiled to run on another. Java is as of 2012 one of the

most popular programming language in use, particularly for client-Query Browser web

applications, with a reported 10 million users.

 SIGNIFICANT NEW FEATURES OF JAVA:

 Platform Independence

The Write-Once-Run-Anywhere ideal has not been achieved (tuning for different platforms

usually required), but closer than with other languages.

 Object Oriented

- Object oriented throughout- no coding of class definitions,, including main().

- An extensive class is library available in the core language packages.

 Robust

Exception handling built-in, strong type checking (that is, all data must be declared an explicit

type), local variables must be initialized.

 Compiler/Interpreter Combo

- Code is compiled to byte codes that are interpreted by Java Virtual Machine (JVM).

- This provides portability to any machine for which a virtual machine has been written.

- The two steps of compilation and interpretation allow for extensive code checking and

improved security.

19
 Several dangerous features of C & C++ eliminated

- No preprocessors.

- No memory pointers.

- Array

 Automatic Memory Management

Automatic garbage collection - memory management handled by JVM.


 Security

- No memory pointers

- Programs run inside the virtual machine sandbox.

- Array index limit checking.

 Dynamic Binding

- The linking of data and methods to where they are located, is done at run-time.

- New classes can be loaded while a program is running. Linking is done on the fly.

- Even if libraries are compiled, there is no need to recompile code that uses classes in

those libraries.

This differs from C++, which uses static binding. This can result in fragile classes for

cases where linked code is changed and memory pointers then point to the wrong

addresses.

 Good Performance

Interpretation of byte codes slowed performance in early versions, but advanced virtual machines

with adaptive and just-in-time compilation and other techniques now typically provide

performance up to 50% to 100% the speed of C++ programs.

 Threading

20
- Lightweight processes, called threads, can easily be spun off to perform multiprocessing.

- Can take advantage of multiprocessors where available

- Great for multimedia displays.

 ADVANTAGES OF JAVA:

1. Java is easy to learn

Java was designed to be easy to use and is therefore easy to write, compile, debug and learn than

other programming languages.

2. Java is object-oriented

Java allows you to create modular programs and reusable code.

3. Java is platform-independent

One of the most significant advantages of Java is its ability to move easily from one computer

system to another. The ability to run the same program on many different systems is crucial to

World Wide Web software, and Java succeeds at this by being platform-independent at both the

source and binary levels.

4. Java is distributed

Java is designed to make distributed computing easy with the networking capability that is

inherently integrated into it. Writing network programs in Java is like sending and receiving data

to and from a file.

5. Java is secure

21
Java considers security as part of its design. The Java language, compiler, interpreter, and

runtime environment were each developed with security in mind.

6. Java is robust

Robust means reliability. Java puts a lot of emphasis on early checking for possible errors, as

Java compilers are able to detect many problems that would first show up during execution time

in other languages.

7. Java is multithreaded

Multithreaded is the capability for a program to perform several tasks simultaneously within a

program. In Java, multithreaded programming has been smoothly integrated into it, while in

other languages, operating system-specific procedures have to be called in order to enable

multithreading.

 DISADVANTAGES OF JAVA:

1. No separation of specification from implementation

Java classes are not divided into specification and implementation parts. Lacking such a

separation, he would at least like to be able to write prototypes for methods, which Java doesn’t

allow except within an abstract class or interface.

2. No preconditions and postconditions

Java, like most languages, has no such support for preconditions and postconditions.

3. No support for genericity

Java lacks support for writing generic data structures and methods.

22
4. No enumeration types

Java lacks enumeration types entirely, although they can be simulated by creating a series of

named constants.

5. No local constants

In Java, variables that belong to a class can be made constant by declaring them to be final.

Variable that are local to a method cannot be declared final, however.

6. Exceptions not caught within a method must be declared as thrown by that method

For introductory students, Exception Handling is a sequence of ugly, unintelligible syntactic

marks.

DATABASE: MYSQL Query Browser

 What is MYSQL?

 MYSQL stands for Structural Query Language.

 MYSQL lets you access and manipulate databases.

 MYSQL is an ANSI (American National Standards Institute) standard.

 What can MYSQL do?

 MYSQL can execute queries against a database.

 MYSQL can retrieve data from a database.

 MYSQL can insert records in a database.

 MYSQL can update records in a database.

 MYSQL can delete records from a database.

23
 MYSQL can create new databases.

 MYSQL can create new tables in a database.

 MYSQL can create stored procedures in a database.

 MYSQL can create views in a database.

 MYSQL can set permissions on tables, procedures, and views.

INTRODUCTION TO MYSQL QUERY BROWSER:

MYSQL query Browser is an MYSQL-compliant RDBMS. MYSQL-compliant means it uses the

ANSI (American National Standard Institute) version of Structured Query Language or

‘MYSQL’. Structured Query Language is a command that allow us to modify or retrieve

information from the database. It works on client Query Browser environment. Client Query

Browser means that MYSQL Query Browser is designed to store data in the central location (the

Query Browser) and deliver it on demand to numerous other locations.

Microsoft MYSQL Query Browser is a relational database management system (RDBMS)

produced by Microsoft. Its primary query language is Transact-MYSQL, an implementation of

the ANSI/ISO standard Structured Query Language (MYSQL). An RDBMS stores and retrieves

data for multiple sources.

At the center of any MYSQL relational database implementation is the MYSQL Query Browser.

This is the software platform (usually multi-user) that manages the database itself. It has much in

common with traditional Query Browser implementations in that the user model consists of an

administrative ‘super user’, various user groups and users all with authentication.

Microsoft MYSQL Query Browser and the Oracle family are the two best-known commercial

MYSQL implementation.

24
METHODOLOGY

1. WELCOME FORM:

The project flow begins with the WELCOME FORM. This form provides the user with the

three options:

 Admin Login

 Student Login

The hierarchy is as shown below:

WELCOME FORM

Admin Login Student Login

ADMIN LOGIN provides the facility for the admin to login to his account and then

access the various services or controls.

25
STUDENT LOGIN provides the facility for the student to login to his account and then

access the various services.

2. ADMIN LOGIN:

After the admin presses the ADMIN LOGIN button, the LOGIN FORM opens which asks for

the “User Name” and “Password”. After filling the fields with correct entries the

ADMINMENU opens.

LOGIN FORM

WELCOME FORM

ADMIN MENU

ADMIN MENU provides the various options to admin for accessing various controls over the

system. The various options provides with the updating, registration, recording, etc.

The various options include:

 Add Books Record

26
 Issue Books

 Student return books to Admin…nd Admin re-enter them into database.

 Delete a particular Book.

 Add New Student Record

 Search Student Detail.

 Search Books Issued to differnet Students

 Update a particular Student detail.

 Delete Student record from Database.

All the above options provide flexibility to the managing record. This helps inn saving the time

and even the paper work. This results in less errors and complications. We implemented some

dynamic databases like Student_record, , id_result, etc. to implement the above updation options

easily.

OPTIONS FUNCTIONS

Enables the admin to register a new book in the


Add New Book
database newbooks and newbooks1

Enables the admin to issue a book to student and


Issue Book
temporarly delete availabilty of that book from

databases newbooks nd add that book to newstudent

databse.

Enables the admin to take back issued book from


Return Book

27
student and add that book back to databse newbook and

show avaialability yes and delete that book from student

database newstudent.

Enables the admin to Search Book Detail from database


Search Books
Newbooks .i.e about its name,author,title,publisher .

Enables the admin to remove the record of books from


Remove Books
respective databases i.e. newbooks.

Enables the admin to add the Student detail in


Add Student
newstudent database.

Enables the admin to view the registered student’s


View Student Detail
details. The admin can view the student id, name,

mobile number, email-id, branch, etc. from the database

newstudent

Enable the admin to see the various books issued to


View issued books
various students

Admin can Update/Delete Student from databse


Delete Student
newstudent.

Hence by implementing dynamic databases we have made updation, registration and

management work easier as well as flexible for the user. This innovation makes our

project stand out from the rest of the projects. The dynamic databases we used in our

project are: newbooks,newbooks1,newstuden etc.

28
3. STUDENT LOGIN:

After the student presses the STUDENT LOGIN button, the STUDENT WELCOME PAGE

opens. This window provides the student with five buttons:

 SHOW DETAILS

 EDIT DETAILS

 VIEW ISSUED BOOK

SHOW DETAILS • for the students who want to see their details

•for the students who want to edit their details


EDIT DETAILS

•for the students who want to see books issued to


VIEW ISSUED BOOK him/her.

29
By clicking on SHOW DETAILS button theREGISTRATION FORM opens which

show all the details of student like student id,username, branch , rool no. mobile no. etc.

student can only view his/her details but cant edit it.:

STUDENT SHOW DETAILS REGISTRATION


WELCOME PAGE BUTTON FORM

By clicking on the EDIT DETAILS button the REGISTRATION FORM opens. This

form shows all the basic information of student and if student want to do any changes

then student can easily update the entries with the data from the database student_record.

STUDENT EDIT DETAIL REGISTRATION


WELCOME PAGE BUTTON FORM

By clicking on ISSUED BOOK button ISSUED BOOK PAGE will be open in form of

form.

30
RESULTS AND DISCUSSIONS

FEASIBILITY STUDY:

Feasibility study is done so that an ill-conceived system is recognized early in definition

phase. During system engineering, however, we concentrate our attention on four primary

areas of interest. This phase is fairly important as before starting with the real work of

building the system it was very important to find out whether the idea thought is possible

or not. This evaluates the systems and provides for the selection of the best system that

meets the system performance requirements. Three key considerations are involved in the

feasibility analysis:

 Economic Feasibility

 Technical Feasibility

 Operational Feasibility

Feasibility study of LIBRARY MANAGEMENT SYSTEM:

Yes, the Library Management System can be implemented and its various types of feasibilities

are given below:

 ECONOMIC FEASIBILITY: In the cost benefit analysis of this project can be clearly

seen that the benefits of the existing project are very much higher than its cost running

manually.

 TECHNICAL FEASIBILITY: The Library Management System is technically feasible.

The only things required are a computer with appropriate configuration and MYSQL

Query Browser.

31
 BEHAVIOURAL FEASIBILITY: We all know that it is modern time and everybody

want to do every work in a modernized way. So the behavior of the people wants such

sort of systems. Hence, this automation of the manual is behaviorally feasible.

PROBLEM STATEMENT:

Project risk is the main problem for any project. The top most software project risk that

may affect the successful completion of project is:

RISK 1: Inherent schedule flaws

Explanation: Software development, given the intangible nature and uniqueness of

software, is inherently difficult to estimate and schedule.

Solution: We have selected basic features that can be implemented in given time

constraints.

RISK 2: Specification Breakdown

Explanation: When coding and integration begin it becomes apparent that the

specification is incomplete or contains conflicting requirements.

Solution: Continuously studying existing project to understand requirements of project to

take necessary decisions as soon as possible.

RISK 3: Requirement Inflation

Explanation: As the project progresses more and more features that were not identified at

the beginning of the project emerge that threaten estimates and timeliness.

Solution: We have selected basic features that can be implemented in given time

constraints.

32
RISK 4: Poor Productivity

Explanation: Given long project timeliness, the sense of urgency to work in earnest is

often absent resulting t time lost in early project stages that can never be regained.

Solution: Given a deadline, people tend to wait until the deadline is nearly here before

starting work. By having short iterations,, work is time boxed into a manageable

iteration(typically 1-2 weeks) and there is always a sense of urgency.

 Security mechanisms are implemented at Login page. Programmatic security

refers to security-aware applications. Programmatic security is useful when

declarative security alone is not sufficient to express the security model of an

application. For example, an application might make authorization decisions

based on the time of the day, the parameters of a call, or the internal state of an

enterprise bean or Web component. Another application might restrict access

based on user information stored in a database. Often, you need to protect

resources to ensure that only authorized users have access. Authorization provides

controlled access to protected resources. Authorization provides controlled access

to protected resources. Authorization is based on identification and authentication.

Identification is a process that enables recognition of an entity by a system, and

authentication is a process that verifies the identity of a user, device, or other

entity in a computer system, usually as a perquisite to allowing access to

resources in a system. Authorization is not required to access unprotected

resources. Because authorization is built upon authentication, authentication is

also needed to access unprotected resources. Accessing a resource without

authentication is referred to as unauthenticated or anonymous access.

33
 Safety: Protecting Software

Protect software by never sharing the password and looking out for suspicious links and

behavior. To keep the data save, change the password regularly.

 Keep software username, password and personal information secret, and change the

password regularly.

 Scan your computer regularly for viruses, spy ware and ad ware.

PROJECT FUNCTIONALITY:

 Request to admin for new account by student and then admin will create account with

Student id . If account already exists, then student can login or can register him/herself.

 Admin will maintain the student details as well as book record.

 Enquiries regarding books, books available, students etc. can be requested.

 Any updation in profile information can be done by clicking on updation options.

 When one is to exit from the software then the user must logout or exit.

34
ANNEXURES

35
BIBLIOGRAPHY

36

Vous aimerez peut-être aussi