Documentation According to Contents (1)
-
Upload
vvijayasekhar -
Category
Documents
-
view
160 -
download
5
Transcript of Documentation According to Contents (1)
![Page 1: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/1.jpg)
Virus Information System
1. INTRODUCTION
1.1 MOTIVATION
As the use of the Internet began to grow in the late 1980s and early 1990s, viruses
began to be created for different reasons. Although a lot of viruses are written for fame and
proof of concept, more viruses began to be created for spying on other people, other
companies, and other governments. The term spying does not just refer to spyware, which is
a form of malicious code that tracks the actions of users and then sells this information to
advertisers. Instead, spying viruses refer to any type of virus that is installed on a computer to
allow remote access to a computer by unauthorized persons. These viruses can be in the form
of a Trojan horse that creates a backdoor, a virus that installs a key logger for capturing data,
or any other type of software that provides unauthorized access to information on a computer
system.
Due to the above poblems faced by the people or the organisations who are using the
personal computer for doning there work have to install an antivirus software into there
system which prevents there system form virus. Now a days every one is using an antivirus
in there system to project there system from virus. If a virus attacks to a system they are
using a antivirus available in the market ofcorce it is hamfull to such but they don’t know
what is the correct antivirus required to them. So this is the reason why we have developed
this project which give the information to the user about virus and the correct antivirus to the
virus, is provided in our project.
1.2 Problem Defination
Systems such as ebay, tucows, download.com only provide Antivirus downloads .But
they don’t provide information about updates.They don’t contain latest Virus
information.They don’t have all Antivirus developers at one place.Visitor cannot get any
information about the existing virus.Visitor may not get correct information about which
antivirus he has to purchase. Any person cannot post their information with respect to the
Viruses.User cannot update the system.Visitor may face some unnecessary problems.
Feed back may not be taken properly
Tenali Engineering College Page 1
![Page 2: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/2.jpg)
Virus Information System
1.3 Objectives of Project
The main objective of our poject is to provide the information of virus to the users.
Here we proviede the information of various viruses at one place and user can give the
feedback about the project and he can upload a virus to which he need an antivirus not only
that if any user developed an antivirus he can upload it into our site so it can be used by the
other users who need it.
1.4 Limitations of Project
As this project is about giving the information of virus to the users which is usefull to
them but there is a drwaback in our porject that every one may use our site and there is no
security porvided to them in this site. At present in our project the antivirus available to the
user are not lisensed so they may cause problem to the user system who download them.
1.5 Organisation of Documentation
In this project documentation we have initially put the definition and objective
of the project as well as the design of the project which is followed by the
implementation and testing phases. Finally the project has been concluded
successfully and also the future enhancements of the project were given in this
documentation.
Tenali Engineering College Page 2
![Page 3: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/3.jpg)
Virus Information System
2. LETERATURE SURVEY2.1 INTODCUTION
1981/82, the first computer viruses in a wild have been developed. The programs
infect Apple 11 disks without deleting data. It is called Elk Cloner. In 1983, the first
documented experimental virus has been developed by Fred Cohen. Ralf Burger from
Germany has presented Virdem virus during Chaos Computer Club conference. It establishes
itself in the disk's boot sector. A small Pakistani computer firm developed Brain virus whose
purpose is to foster customer loyalty. In 1987, Lehigh virus becomes the first virus to infect
command.com. Jerusalem or also known as Friday the Thirteenth is the first virus to establish
itself in the main memory (RAM). It affects the computer in two ways: On any thirteenth day
of the month falling on Friday and on all other days, the virus reduces computer speed after
30 minutes. In 1988, Denny Yanuar Ramdhani from Bandung, Indonesia has developed Zuk;
the first anti-virus. It recognizes and removes the Brain virus and then replaces it with a copy
itself. The first memory resident virus; Cascade, loose into the wilderness in 1988. This virus
has been developed by anonymous from Germany. In 1989, the first polymorphic virus is
discovered. It is called as Washburn or V2Px 1260.
Symantec introduces Norton Anti-virus in 1990. This is the first anti-virus programs
developed by a large Internet company. In 1990, Verband Deutscher Virenhebhaber has
developed the first virus construction kit for DOS systems. This kit enables someone to
assemble new viruses. Mutation Engine program has been developed by Dark Avenger. This
program can be used to generate polymorphic viruses from simple viruses. This program has
been introduced in 1992. In 1993, the anti-virus industry presents its first wild list. This is a
list of all computer viruses which surface "in the wild" that is directly on the user's PC.
Goodd Times is the first hoax. This virus supposedly causes the entire contents of the hard
disk to be deleted, merely by reading the message. This virus was launched on 1994. In 1995,
the first macro virus which infects Microsoft Word documents was introduced. It is called
Concept. WM/Concept was the first virus specifically written for the Microsoft Word system
and discovered "in the wild". In 1995, the first Windows 95 virus; Boza was launched. On
the 31"' of each month it issues a message regarding its creators; Quantum. Beside that,
XM.Laroux; the first Excel virus make sits appearance in Alaska and Africa. Staog, the first
Linuc virus is found in the lab but it is never spotted in the wild. Linux Bliss is the first Linux
Tenali Engineering College Page 3
![Page 4: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/4.jpg)
Virus Information System
virus in the wild found in 1997. It searches for programs for which current process has write
permission and then overwrite such files with its viral code. In 1998, the first VB script virus;
VBS.Rabbit was found.
2.2 Existing System:
Systems such as ebay, tucows, download.com only provide Antivirus downloads .But
they don’t provide information about updates.They don’t contain latest Virus
information.They don’t have all Antivirus developers at one place.
2.3 Disadvantages of Existing System:
1. Visitor cannot get any information about the existing virus.
2. Visitor may not get correct information about which antivirus he has to purchase
3. Any person cannot post their information with respect to the Viruses.
4. User cannot update the system.
5. Visitor may face some unnecessary problems.
6. Feed back may not be taken properly
2.4 Proposed System:
This system allows the users to report about new viruses and their symptoms.Allows
freelance developers to develop antivirus.Provide latest updates.Take Feedbacks to optimize
the system.Give performance rankings to the members
2.5 Advantages of Proposed System
1. Time & money can be saved
2. Can access any type of information required by anyone.
3. User can upload the antiviruses which he have.
4. Employees week ness & strengths can be known online
5. Features are added with respect to the feedback sent.
2.6 CONCLUSION
In this we specify the how proposed system is more usefull than the existing system.
It is operationally feasible because now a days every one uses system and internet so every
one can easily use this porject
Tenali Engineering College Page 4
![Page 5: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/5.jpg)
Virus Information System
3. ANYALYSIS
3.1 Introduction
After analyzing the requirements of the task to be performed, the next step is to
analyze the problem and understand its context. The first activity in the phase is studying
the existing system and other is to understand the requirements and domain of the new
system. Both the activities are equally important but the first activity serves as a basis of
giving the functional specifications and then successful design of the proposed system.
Understanding the properties and requirements of a new system is more difficult and
requires creative thinking as well as understanding of existing system is also difficult.
Improper understanding of present system can lead diversion from solution.
Technical Feasibility
This project, Employee Performance and Recognition Portal needs the support to
average technology already being implemented for other useful systems in a company. It
requires PC’s and a modem with normal configuration for Internet access. Almost all
administrators have their own PC on their desk. Thus it is technically feasible to implement
the new system here.
Economic Feasibility
“Employee Performance and Recognition Portal” is a mid-scale project. It is very
much useful to employees as well as admin people in reducing manual work which increases
the productivity of the company. The infrastructure for the development of their new system
is available in the company. The system is developed at no additional cost. Hence it is
economically feasible for the new system to be implemented.
Operational Feasibility
This system is being automated on the request of the employees of a company and the
management people. This new system meets their requirement and covers all aspects
required much better than the old manual system. Most of the people involved in this
company are computer literates and do not need much training if this system is implemented.
Hence it is operationally feasible.
Tenali Engineering College Page 5
![Page 6: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/6.jpg)
Virus Information System
3.2 Software Requirement Specification
3.2.1 User requirement
Personal computer with modem connection
Username and password for the purpose of logining into the site and download an
antivirus
3.2.2 Software requirement
Operating System : Windows 2000/xp Professional
Operating environment : HTML
Front End : JAVA
Back End : Oracle 10g
Server Side Programming Tool : JSP
Web Server : Apache Tomcat 5.0
3.2.2.1 HTML
Hyper Text Markup Language (HTML) is a language used to create hypertext
documents that have hyper links embedded in them. It consists of tags embedded in the text
of a document with HTML. We can build web pages or web document s. it is basically a
formatting language and not a programming language. The browser reading the document
interprets mark up tags to help format the document for subsequent display to a reader.
HTML is a language for describing structured documents. HTML is a platform independent.
WWW (World Wide Web) pages are written using HTML. HTML tags control in part the
representation of the WWW page when view with web browser. The browser interprets
Tenali Engineering College Page 6
![Page 7: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/7.jpg)
Virus Information System
HTML tags in the web document and displays it. Different browsers show data differently.
Examples of browsers used to be web pages include:
Netscape
Internet Explorer
HTML: What It Is
HTML is a document-layout and hyperlink-specification language. It defines the
syntax and placement of special, embedded directions that aren't displayed by the browser,
but tell it how to display the contents of the document, including text, images, and other
support media. The language also tells you how to make a document interactive through
special hypertext links, which connect your document with other documents--on either your
computer or someone else's, as well as with other Internet resources, like FTP and Gopher.
IMAGE HTML TAG:
This command presents Select File dialog box to select image file. If you want to
insert the image tag directly without the dialog box, hold down Shift key when running this
command.
<IMG SRC="" ALT="">
The Table Generator helps you to insert table tag into the HTML document very easily. Press
left mouse button on a table cell and drag to the desired size then release the mouse button.
Inserts Frame HTML tag:
<FRAMESET ROWS="," COLS=",">
<FRAME NAME="" SRC="" SCROLLING="">
<FRAME NAME="" SRC="" SCROLLING="">
</FRAMESET>
Inserts Font HTML tag:
<FONT SIZE=""></FONT>
This command presents Heading popup menu. Heading 1 - 6 tags are available on heading
popup menu.
Tenali Engineering College Page 7
![Page 8: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/8.jpg)
Virus Information System
Inserts Horizontal Ruler HTML tag:
<HR>
This command presents List tag popup menu. Unordered list, ordered list and Definition list
are available on List tag popup menu.
Inserts List Box HTML tag:
<SELECT NAME=""></SELECT>
Inserts Ordered List HTML tag.
<OL>
<LI>
</LI>
</OL>
With all its multimedia-enabling, new page layout features, and the hot technologies
that give life to HTML documents over the Internet, it is also important to understand the
language's limitations: HTML is not a word processing tool, a desktop publishing solution, or
even a programming language, for that matter. That's because its fundamental purpose is to
define the structure and appearance of documents and document families so that they might
be delivered quickly and easily to a user over a network for rendering on a variety of display
devices.
Structure of an HTML Document :
An HTML document consists of text, which defines the content of the document, and
tags, which define the structure and appearance of the document. The structure of an HTML
document is simple, too, consisting of an outer <html> tag enclosing the document header
and body:
<Html>
<Head>
<Title>Barebones HTML Document</title>
</head>
<Body>
Tenali Engineering College Page 8
![Page 9: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/9.jpg)
Virus Information System
………………….………….
……………………………..
</Body>
</Html>
Each document has a head and a body, delimited by the <head> and <body> tags. The head is
where you give your HTML document a title and where you indicate other parameters the
browser may use when displaying the document. The body is where you put the actual
contents of the HTML document. This includes the text for display and document control
markers (tags) that advise the browser how to display the text. Tags also reference special-
effects files including graphics and sound, and indicate the hot spots (hyperlinks and
anchors) that link your document to other documents.
Basic HTML Tags :
<! -- --> Specifies comments
<A>……….</A> Creates hypertext links
<B>……….</B> Formats text as bold
<BIG>………. </BIG> Formats text in large font.
<BODY>…</BODY> Contains all tags and text in the HTML document
<CENTER>...</CENTER> Creates text
<DD>…</DD> Definition of a term
<DL>...</DL> Creates definition list
<FONT>…</FONT> Formats text with a particular font
<FORM>...</FORM> Encloses a fill-out form
<FRAME>...</FRAME> Defines a particular frame in a set of frames
<H#>…</H#> Creates headings of different levels
<HEAD>...</HEAD> Contains tags that specify information about a
document
<HR>...</HR> Creates a horizontal rule
<HTML>…</HTML> Contains all other HTML tags
<META>...</META> Provides meta-information about a document
<SCRIPT>…</SCRIPT> Contains client-side or server-side script
Tenali Engineering College Page 9
![Page 10: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/10.jpg)
Virus Information System
<TABLE>…</TABLE> Creates a table
<TD>…</TD> Indicates table data in a table
<TR>…</TR> Designates a table row
<TH>…</TH> Creates a heading in a table
Advantages
A HTML document is small and hence easy to send over the net. It is small
because it does not include formatted information.
HTML is platform independent.
HTML tags are not case-sensitive.
3.2.2.2 JAVA
About JAVA:
Java was conceived by James Gosling, Patrick Naughton, Chris Warth, Ed Frank and
Mike Sheridan at SUN Micro Systems Incorporation in 199I.It took 18 months to develop the
first working version .This language initially called "OAK", but was renamed " JAVA " In
1995.Beforde the initial implementation of OAK in 1992 and the public announcement of
Java in 1995, many more contributed to the design and evolution of the language.
JAVA Overview:
Java is a powerful but lean object oriented programming language. lt has generated a
lot of excitement because it makes it possible to program for internet by creating applets.
Programs that can be embedded in a web page. The context of an applet is limited only by
one's imagination. For example an applet can be an animation with sound, an interactive
game or a ticker tape with constantly updated stock prices. Applets can be just little de-
corations to liven up web page, or they can be serious applications like word processors or
spreadsheets. But Java is more than programming language for writing applets. It is being
used more and more for writing standalone application as well. It is becoming so popular that
many people believe it will become standard language for both general purpose and internet
programming.
Tenali Engineering College Page 10
![Page 11: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/11.jpg)
Virus Information System
JAVA is Robust:
The multiplatform environment of the Web places extraordinary demands on a
program, because it must execute reliably in a variety of systems. Thus the ability to create
robust programs was given a high priority in the design of java. To gain reliability Java
restricted you in a few key areas to force you to find your mistakes early in program
developments. At the same Java frees you from having to worry about many of the most
common causes of programming errors. Because Java is strictly typed language, it checks
your code at compile time.
JAVA Scales Well:
Java platform is designed to scale well, for portable consumer electronic devices to
powerful desktop and several machines. The virtual machine takes a small foot print and Java
byte code is optimized to be small and compact. As a result java accommodates the need for
low storage and bandwidth transmission over the internet.
JAVA is Multithreaded:
Multithreading is simply the ability of a program to do more than one thing at a time.
For example an application could be faxing documentation at the same time is printing
another document. Multithreading is particularly important in multimedia: a multimedia
program might often be running a movie, running an audio track and displaying text at the
same time.
JAVA is Extensible:
A big plus for Java is the fact it can be extended. lt was purposely written to be lean
with the emphasis on doing what it does very well: instead of typing of trying to do
everything from the beginning, it was written so that extending it is very easy.
JAVA is Secure:
The Java platform builds security in four ways.
1 .The way memory is allocated and laid out.
2. The way incoming code checked.
3. The classes are loaded
4. The way access is restricted for untrusted code.
JAVA performs well:
Java's performs is better than one might expect. Java's many advantages, such as
having built-in security and being interpreted as well as compiled, does have a cost attached
Tenali Engineering College Page 11
![Page 12: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/12.jpg)
Virus Information System
them. However, various optimizations have been built-in, and the byte code interpreter can
run very fast the cost it does not have to do any checking.
No pointers:
Eliminates big source errors by using object references instead of memory pointers,
problems with pointer arithmetic are eliminated and problems with in adversely accessing the
wrong memory address are greatly reduced.
Strong Typing:
Cuts down on runtime errors because Java enforces strong type checking, many errors
are caught when code is compiled. Dynamic binding is possible and often very useful but
static binding with strict type checking is used when possible.
Simplicity:
Makes Java easier to learn and correctly Java keeps it simple by having just one way
to do something instead of having several alternatives as in some languages Java also stays
lean by not including multiple inheritance which eliminates the errors and ambiguity that
arise when you create a subclass that inherits from two or more classes.
JAVA includes a Library of classes and interfaces:
The Java platform includes an extensive class library so that programmers can use
already existing classes it is create sub classes to modify existing classes or implements
interfaces to augment the capabilities of classes.
3.2.2.3 Java Server Pages:
A server side technology, Java Server Pages are an extension to the Java servlet
technology that was developed by Sun.JSPs have dynamic scripting capability that works in
tandem with HTML code, separating the page logic from the static elements -- the actual
design and display of the page -- to help make the HTML more functional (i.e. dynamic
database queries).
A JSP is translated into Java servlet before being run, and it processes HTTP requests
and generates responses like any servlet. However, JSP technology provides a more
convenient way to code a servlet. Translation occurs the first time the application is run. A
JSP translator is triggered by the .jsp file name extension in a URL. JSPs are fully
interoperable with servlets. You can include output from a servlet or forward the output to a
servlet, and a servlet can include output from a JSP or forward output to a JSP.
Tenali Engineering College Page 12
![Page 13: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/13.jpg)
Virus Information System
JSPs are not restricted to any specific platform or server. It was originally created as
an alternative to Microsoft's ASP’s(Active Server Pages). Recently, however, Microsoft has
countered JSP technology with its own ASP.NET, part of the .NET initiative.
Java Server Pages (JSP) is a technology that lets you mix regular, static HTML with
dynamically-generated HTML. Many Web pages that are built by CGI programs are mostly
static, with the dynamic part limited to a few small locations. But most CGI variations,
including servlets, make you generate the entire page via your program, even though most of
it is always the same. JSP lets you create the two parts separately
Advantages of JSP?
Vs. Active Server Pages (ASP). ASP is a similar technology from Microsoft. The
advantages of JSP are twofold. First, the dynamic part is written in Java, not Visual
Basic or other MS-specific language, so it is more powerful and easier to use. Second,
it is portable to other operating systems and non-Microsoft Web servers.
Vs. Pure Servlets. JSP doesn't give you anything that you couldn't in principle do
with a servlet. But it is more convenient to write (and to modify!) regular HTML than
to have a zillion println statements that generate the HTML. Plus, by separating the
look from the content you can put different people on different tasks: your Web page
Tenali Engineering College Page 13
![Page 14: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/14.jpg)
Virus Information System
design experts can build the HTML, leaving places for your servlet programmers to
insert the dynamic content.
Vs. JavaScript. JavaScript can generate HTML dynamically on the client. This is a
useful capability, but only handles situations where the dynamic information is based
on the client's environment. With the exception of cookies, HTTP and form
submission data is not available to JavaScript. And, since it runs on the client,
JavaScript can't access server-side resources like databases, catalogs, pricing
information, and the like.
Vs. Static HTML. Regular HTML, of course, cannot contain dynamic information.
JSP is so easy and convenient that it is quite feasible to augment HTML pages that
only benefit marginally by the insertion of small amounts of dynamic data.
Previously, the cost of using dynamic data would preclude its use in all but the most
valuable instances.
Steps in the execution of a JSP Application:
1. The client sends a request to the web server for a JSP file by giving the name of the
JSP file within the form tag of a HTML page.This request is transferred to the
JavaWebServer. At the server side JavaWebServer receives the request and if it is a
request for a jsp file server gives this request to the JSP engine.
Tenali Engineering College Page 14
![Page 15: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/15.jpg)
Virus Information System
2. JSP engine is program which can understands the tags of the jsp and then it converts
those tags into a Servlet program and it is stored at the server side. This Servlet is
loaded in the memory and then it is executed and the result is given back to the
JavaWebServer and then it is transferred back to the result is given back to the
JavaWebServer and then it is transferred back to the client.
3.2.2.4 ABOUT ORACLE:
Database Management System (DBMS):
A Database is an integrated collection of user related data stored with minimum
redundancy, serves many users/application quickly and efficiency.
A Database system is basically a computerized record keeping system, i.e. it is a
computerized system whose coverall purpose is to maintain information and make that
information available on demand.
DBMS is a collection of inter-related data and set of programs that allow several users to
access and manipulate data. Its main purpose is to provide users with an abstract view of
the data, i.e. the system hides certain details of how the data is stored and maintained.
Database Management System is divided into 4 main components.
Database
Hardware
Software
User
Database:
It consists of collection of persistent data that is used by the application system.
Hardware: The processor (s) and associated main memory that are used to support
the execution of database system software.
Software: The layer between the physical database and the users that handle all
requests from the user for access to the database.
User: There are three types of users
Tenali Engineering College Page 15
![Page 16: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/16.jpg)
Virus Information System
Application Programmers
End User
Database Administrator (DBA)
TYPES OF DBMS:
There are four major categories of DBMS data models.
Hierarchical
Network
Inverted
Relational
3.2.2.5 STRUCTURED QUERY LANGUAGE:
SQL (pronounced “SEQUEL”) stands for Structured Query Language, which is used
to communicate with relational database, which are in turn a set of related information stored
in the form of tables.
SQL is a non-procedural language because it process sets of record rather than just
one data at a time and also provides automatic navigation to the data. Here one can
manipulate a set or rows rather than one at a time. SQL commands accept a set or rows as
input and return sets as outputs. The set property of SQL allows the results of one SQL
statement to be used as input to another. Here one need not specify the access method of the
data.
SQL is utilized as the communication language with the database among the database
user like database administrators, System administrators, security administrators and
application programmers. SQL provides command for a variety of tasks including:
1. Inserting, updating, and deleting rows in an object.
2. Creating, replacing, altering and dropping objects.
3. Controlling access to the database and its objects.
4. Guaranteeing database consistency and integrity.
Tenali Engineering College Page 16
![Page 17: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/17.jpg)
Virus Information System
The commands in SQL is subdivided according to their functions as follows:
Data Definition Language (DDL)-create, alter, drop,
Truncate, rename
Data Manipulation Language (DML)-insert, update, delete
Data Control Language (DCL)-grant, revoke
Data Retrival Language (DRL)-select
Transaction Control Language (TCL)-commit, savepoint, rollback
SQL*PLUS is a program or a tool available for working with an ORACLE
Database. It allows the user to:
1. Create tables in a database.
2. Stores information in the tables.
3. Changes information in the tables.
4. Retrieve the information in the form we choose,
5. performing calculations on it and combining it in new ways.
6. Maintain the database itself.
3.2.2.5 Apache Tomcat
Apache tomcat is an open source servlet continer develeped by the apache software
foundation. Tomcat implements the java servlets and the java server pages (jsp) specification
form sun microsystems and provides a pure java. HTTP web server environment for java
code to run.
3.2.2.6 JAVA Database Connectivity:
JDBC is an API developed by Sun Microsystems that provides a standard way to
access data using the Java programming language. Using JDBC, an application can access a
variety of databases and run on any platform with a Java Virtual Machine. It isn’t necessary
to write separate applications to access different database systems, JDBC allows you to write
one application that can send SQL statements to different database systems. SQL is the
standard language for accessing relational databases.
How Does JDBC Work?
JDBC makes it possible to do the following things within a Java application:
Tenali Engineering College Page 17
![Page 18: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/18.jpg)
Virus Information System
Establish a connection with a data source
Send queries and update statements to the data source
Process the results
The following figure shows the components of the JDBC model.
Why Do We Need JDBC?
Why can’t application developers use ODBC (Open Database Connectivity) on the Java
platform? After all, it’s an established standard API for database access. You can use ODBC;
however, ODBC isn’t appropriate for direct use from the Java programming language
because it uses a C interface. The JDBC API was modeled after ODBC, but, because JDBC
is a Java API, it offers a natural Java interface for working with SQL. JDBC is needed to
provide a “pure Java” solution for application development.
Features of JDBC
Following are some of the features that are part of the JDBC 3.0 specification:
Retrieval of auto-generated keys
Blob/Clob Updates
Multiple open result sets
Tenali Engineering College Page 18
![Page 19: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/19.jpg)
Virus Information System
Transactional Save points
Statement Pooling
Types of JDBC Drivers
There are four types of JDBC drivers in use:
Type 1: JDBC-ODBC bridge
Type 2: partial Java driver
Type 3: pure Java driver for database middleware
Type 4: pure Java driver for direct-to-database
Establishing A Connection
The first thing to do, of course, is to install Java, JDBC and the DBMS on your
working machines. Since we want to interface with an Oracle database, we would need a
driver for this specific database as well. Fortunately, we have a responsible administrator
who has already done all this for us on the Leland machines.
To access a database, a connection must be opened between our program (client) and
the database (server). This involves two steps:
Load the vendor specific driver
Why would we need this step? To ensure portability and code reuse, the API was designed to
be as independent of the version or the vendor of a database as possible. Since different
DBMS’s have different behavior, we need to tell the driver manager which DBMS we wish
to use, so that it can invoke the correct driver.
Make the connection
Once the driver is loaded and ready for a connection to be made, you may create an
instance of a Connection object using: The connection returned in the last step is an open
Tenali Engineering College Page 19
![Page 20: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/20.jpg)
Virus Information System
connection which we will use to pass SQL statements to the database. In this code snippet,
con is an open connection, and we will use it below.
Creating JDBC Statements
A JDBC Statement object is used to send your SQL statements to the DBMS, and
should not to be confused with an SQL statement. A JDBC Statement object is associated
with an open connection, and not any single SQL Statement. You can think of a JDBC
Statement object as a channel sitting on a connection, and passing one or more of your SQL
statements (which you ask it to execute) to the DBMS.
An active connection is needed to create a Statement object. The following code
snippet, using our Connection object con, does it for you:
Statement stmt = con.createStatement() ;
At this point, a Statement object exists, but it does not have an SQL statement to pass on to
the DBMS. We learn how to do that in a following section.
Executing SELECT Statements
As opposed to the previous section statements, a query is expected to return a set of
tuples as the result, and not change the state of the database. Not surprisingly, there is a
corresponding method called executeQuery, which returns its results as a ResultSet object:
Transactions
JDBC allows SQL statements to be grouped together into a single transaction. Thus,
we can ensure the ACID (Atomicity, Consistency, Isolation, Durability) properties using
JDBC transactional features. The Connection object performs transaction control. When a
connection is created, by default it is in the auto-commit mode. This means that each
individual SQL statement is treated as a transaction by itself, and will be committed as soon
as it’s execution finished. (This is not exactly precise, but we can gloss over this subtlety for
most purposes).
Handling Errors with Exceptions
The truth is errors always occur in software programs. Often, database programs are
critical applications, and it is imperative that errors be caught and handled gracefully.
Programs should recover and leave the database in a consistent state. Rollback-s used in
conjunction with Java exception handlers is a clean way of achieving such a requirement.
The client (program) accessing a server (database) needs to be aware of any errors returned
Tenali Engineering College Page 20
![Page 21: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/21.jpg)
Virus Information System
from the server. JDBC give access to such information by providing two levels of error
conditions: SQLException and SQLWarning. SQLExceptions are Java exceptions, which, if
not handled, will terminate the application. SQLWarnings are subclasses of SQLException,
but they represent nonfatal errors or unexpected conditions, and as such, can be ignored.
3.2.3 HARDWARE REQUIREMENTS:
Processor : Pentium IV
Ram : 128 MB
Hard Disk : 20 GB
3.5 CONCLUSION
In this phase, we understand the software requirement specifications for the
project. We arrange all the required components to develop the project in this phase itself
so that we will have a clear idea regarding the requirements before designing the project.
Thus we will proceed to the design phase followed by the implementation phase of the
project.
4.DESIGN
4.1 INTODUCTION
It details how the softare rquirements should be implemented and it gives the
programmers a blueprint to follow.Once the software design document is approved by the
appropriate parties, it becomes a baseline for limiting changes in the scope of the project.
4.2 UML DIAGRAMS
Use cases are narrative descriptions of processes that you create early in a
development cycle. They describe the interactions between external actors and your system,
and help to understand the system requirements and the terminology used in the domain area.
During the use case phase, you create use case diagrams.To understand the UML diagrams,
Tenali Engineering College Page 21
![Page 22: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/22.jpg)
Virus Information System
we first need to understand the distinction between a diagram and a model.Models appear in
a hierarchical tree view.Diagrams are views of a model that are represented by icons in the
tree view.
4.2.1 Use case diagram:
After you can identify the use cases, you can create use case diagrams to put the use
cases in context. Creating a use case diagram involves establishing a system boundary for a
set of use cases and defining the lines of communication between a particular actor and use
case.
In the early stages of a development project, use case diagrams describe real world
activities and motivations. You can refine the diagrams in later stages to reflect user interface
and design details.
4.2.1.1 OVERVIEW/DFD
Tenali Engineering College Page 22
![Page 23: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/23.jpg)
Virus Information System
Post virus
Logout
Administrator
User
Login
Search virus
Visitor
View virus
4.2.1.2 USECASE FOR ADMINISTRATOR:
Tenali Engineering College Page 23
![Page 24: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/24.jpg)
Virus Information System
Post Anti-virus
View Feedback
Searchvirus
Accept/reject Virus
administrator
Update virus
4.2.1.3 USECASE FOR USER:
Viewvirus
Post anti-virus
download antivirus
send Feedback
SearchVirus
user
Postvirus
4.2.1.4 USECASE FOR VISITOR:
Tenali Engineering College Page 24
![Page 25: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/25.jpg)
Virus Information System
search virus
Send feedbackvisitor
ViewVirus
4.2.2 CLASS DIAGRAM:
1
*
1 *
Visitor
Name : varchar(2)Email : varchar(2)message : varchar(2)
view virus()send feedback()Search virus()
User
ID : varchar(2)password : pwd
View virus()post virus()post antivirus()download antivirus()send feed back()search virus()
Adminstrator
ID : varchar(2)password : pwd
View virus()Accept/reject users()post antivirus()view feedback()search virus()update virus()
4.2.3 SEQUENCE DIAGRAMS:
Tenali Engineering College Page 25
![Page 26: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/26.jpg)
Virus Information System
A type of interaction diagram, a sequence diagram shows the actors of objects
participating in an interaction and the events they generate arranged in a time sequence.
Often, a sequence diagram shows the events that result from a particular instance of a use
case but a sequence diagram can also exist in a more generic form.The vertical dimension in
a sequence diagram represents time, with time proceeding down the page. The horizontal
dimension represents different actors or objects.
4.2.3.1Sequence Diagram for Administrator:
LOGIN POST VIRUS POST ANTIVIRUS
VIEW FEEDBACK
SEARCH VIRUS
LOGOUT : ADMIN
ACCEPT/REJECT USERS
LOGIN
ACCEPT/REJECT
POST VIRUS
POST ANTIVIRUS
VIEW FEEDBACK
SEARCH VIRUS
LOGOUT
4.2.3.2 Sequence Diagram for Visitor:
Tenali Engineering College Page 26
![Page 27: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/27.jpg)
Virus Information System
: VISITOR
VIEW VIRUS SEND FEEDBACK
SEARCH VIRUS
VIEW VIRUS
SEND FEEDBACK
SEARCH VIRUS
4.2.3.3 Sequence Diagram For User:
: USER
LOGIN VIEW VIRUS POSTVIRUS POST ANTIVIRUS
DOWNLOAD ANTIVIRUS
SEND FEEDBACK
SEARCH VIRUS
LOGOUT
LOGINVIEW VIRUS
POST VIRUS
POST ANTIVIRUS
DOWNLOAD ANTIVIRUS
SEND FEEDBACK
SEARCH VIRUS
LOGOUT
4.3 MODULE DESIGN
Tenali Engineering College Page 27
![Page 28: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/28.jpg)
Virus Information System
There are three modules related to this system.
They are
1. visitor module
2. User module
3. administrator module
Visitor module:
He/she can search for virus
He/she can view virus information
He/she can send feedback to administrator
User module:
He/she first login into the system
He/she can upload and download antivirus for the existing virus
He/she can send feedback to the administrator
He/she Can receive virus updates
He/she Can post virus
He/she Can view virus information
He/she Can develop further to the existing system
Administrator module:
He/she Maintains or updates the wholr information system about viruses
antiviruses
He/she Has right to add or remove users
He/she Can upload the antivirus with respect to the virus posted by users
He/she Can view feedbacks that are3 sent by the users and visitors
He/she Can view whole system information that is given by the users.
4.4 CONCLUSION
In this way we can design the layout of the project which is to be implemented during
theconstruction phase. Thus we will have a clear picture of the project before being coded.
Hence any necessary enhancements can be made during this phase and coding can be started.
Tenali Engineering College Page 28
![Page 29: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/29.jpg)
Virus Information System
5. IMPLEMENTATION AND RESULTS
5.1 INTRODUCTION
The implementation part is the most important phase of the project. In this phase, we
code the entire project in the chosen software according to the design laid during the
previous phase. The code has to be in such a way that the user requirements are satisfied
and also not complicated for the user i.e., the user interface or GUI has to be easy to
navigate. The code should be efficient in all terms like space, easy to update, etc. In this
manner, we can complete the coding part of the project and later it can be sent for testing
before being delivered to the customer.
5.2 Methods of Implementation
Installing softwares:
First of all install java(jdk 1.6) next install OracleXE and finally install Apache
tomcat5.0 while installing tomcat give the port number as 8009. You caninstall an IDE like
ECLIPSE or an EditPlus editor to write Java programs (optional). Youcan even write them in
notepad also. For the purpose of Testing you need to install J2MEUNIT testing tool.
Enable Path Settings
Now the path settings have to be enabled so that your system will be able torecognize
the above installed softwares. Note that correct path have to be given otherwiseit may raise
an error. The following picture depicts the method of setting path:
Tenali Engineering College Page 29
![Page 30: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/30.jpg)
Virus Information System
5.2.1 CREATING TABLES
Data Dictionary :
The Data dictionary describes the data base that can be used to manage the
details of the organization. This will provide the administrator and also to the employees
that are work in the organization to know the details whenever they want to retrieve the
details.
Table Name: User
Table Name: Administrator
Tenali Engineering College Page 30
Sno Column name Data type Constraints Description
1 Uno Number(6) Primary key Userno
2 Uname Varchar2(20) Not null Username
3 Password Varchar2(15) Not null Password
4 Gender Varchar2(6) Not null Gender
5 Address Varchar2(40) Not null Address
6 Emailid Varchar2(25) Emailid
7 Qualification Varchar2(20) Not null Qualification
![Page 31: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/31.jpg)
Virus Information System
Table Name: Visitor
Sno Column name Data type Constraints Description
1 Vno Varchar2(20) Primary key Virus no
2 Vname Varchar2(15) Not null Virus name
3 Gender Varchar2(6) Not null Gender
4 Address Varchar2(40) Not null Address
5 Emailid Varchar2(25) Emailid
6 Comments Varchar2(40) Comments
Table Name: Upload
Tenali Engineering College Page 31
Sno Column name Data type Constraints Description
1 Adname Varchar2(20) Primary key Admin name
2 Password Varchar2(15) Not null Password
3 Gender Varchar2(6) Not null Gender
4 Address Varchar2(40) Not null Address
5 Emailid Varchar2(25) Emailid
![Page 32: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/32.jpg)
Virus Information System
Table Name: Virus
Table Name: Anti Virus
Sno Column name Data type Constraints Description
1 Avno Number(6) Primary key Anti virusno
2 Avname Varchar2(15) Not null Antivirus name
3 Avtype Varchar2(15) Not null Antivirus type
4 Date Posted Date Not null Date Posted
5 Locate File Varchar2(40) Not null Locate File
6 Posted By Number(6) Not null Posted By
Table Name: User Feedback
Tenali Engineering College Page 32
Sn
oColumn name Data type Constraints Description
1 Vno Number(6) Primary key Virus no
2 Vname Varchar2(15) Not null Virus name
3 Vtype Varchar2(15) Not null Virus type
4 Date Posted Date Not null Date Posted
5 Posted By Number(6) Not null Posted By
6 Effected Files Varchar2(40) Not null Effected Files
7 Effected Date Date Not null Effected Date
8 Other Details Varchar2(30) Other Details
Sno Column name Data type Constraints Description
1 Id Number(6) Primary key Id
2 Vname Varchar2(100) Not null Virusname
Sno Column name Data type Constraints Description
1 Uno Number(6) Primary key User no
2 Send By Varchar2(15) Not null Send By
3 Address Varchar2(15) Not null Address
4 Email Id Varchar2(25) Not null Email Id
5 Comments Varchar2(50) Not null Comments
![Page 33: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/33.jpg)
Virus Information System
Table Name: Visitor Feedback
Table Name: Antivirus for Virus
5.2.2 Output Screens
HOME PAGE SCREEN
Tenali Engineering College Page 33
Sno Column name Data type Constraints Description
1 Vno Number(6) Primary key Virus no
2 Visitor name Varchar2(15) Not null Visitor name
3 Address Varchar2(15) Not null Address
4 Email Id Varchar2(25) Not null Email Id
5 Comments Varchar2(50) Not null Comments
Sno Column name Data type Constraints Description
1 Vno Number(6) Primary key Virus no
2 Vname Varchar2(15) Not null Virus name
3 Avname Varchar2(15) Not null Antivirus name
4 Avcost Varchar2(25) Not null Antivirus cost
![Page 34: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/34.jpg)
Virus Information System
HOME PAGE
Tenali Engineering College Page 34
![Page 35: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/35.jpg)
Virus Information System
ADMIN LOGIN SCREEN
ADMINSTRATOR MODULES SCREEN
Tenali Engineering College Page 35
![Page 36: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/36.jpg)
Virus Information System
POST VIRUS SCREEN
ACCEPT/REJECT SCREEN
Tenali Engineering College Page 36
![Page 37: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/37.jpg)
Virus Information System
POST ANTIVIRUS SCREEN
USER FEEDBACK SCREEN
Tenali Engineering College Page 37
![Page 38: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/38.jpg)
Virus Information System
SEARCH VIRUS SCREEN
LOGOUT SCREEN
Tenali Engineering College Page 38
![Page 39: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/39.jpg)
Virus Information System
NEWUSER REGISTRATION SCREEN
USER LOGIN SCREEN
Tenali Engineering College Page 39
![Page 40: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/40.jpg)
Virus Information System
VIRUS INFORMATION SCREEN
ANTIVIRUS INFORMATION SCREEN
Tenali Engineering College Page 40
![Page 41: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/41.jpg)
Virus Information System
NEW ANTIVIRUS UPLOAD SCREEN
USER ANTIVIRUS INFORMATION SCREEN
Tenali Engineering College Page 41
![Page 42: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/42.jpg)
Virus Information System
DOWNLOAD ANTIVIRUS SCREEN
USER FEEDBACK FORM
Tenali Engineering College Page 42
![Page 43: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/43.jpg)
Virus Information System
NEW USER DETAILS
5.2.3 Result Analysis
Tenali Engineering College Page 43
![Page 44: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/44.jpg)
Virus Information System
This system allows the users to report about new viruses and their symptoms.Allows
freelance developers to develop antivirus.Provide latest updates.Take Feedbacks to optimize
the system.Give performance rankings to the members.
5.3 Conclusion
In this way we implement the project successfully using java server pages for an easy
interaction of the user to virus information with less effort work . we proceed to the next
phase i.e.,testing which is very important while delevering the porject.
Tenali Engineering College Page 44
![Page 45: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/45.jpg)
Virus Information System
6.SYSTEM TESTING
6.1 INTRODUCTION:
Testing is performed after the coding phase. It is a major software quality control
measure employed during software development. Its basic function is to detect the errors in
the software. The goal of the testing is to uncover required design and coding errors in the
programs. The input phase of the testing is the written code. Testing is performed with unit
testing which detects errors in each module. These modules are integrated into subsystems
and tested for integration. Eventually the overall system is tested which is called system
testing. At the end, the system is tested with the real data at the place of installation called as
acceptance testing.
Testing involves selection of test cases on the basis of two methods. Functional
testing, which involves selection test cases for testing the specifications of the system or the
module. Structural testing, which involves testing the internal structure of the system or
module. The goal of the testing is to select the test cases such that maximum number of
errors can be detected by making use of minimum number of test cases. For this reason we
generate the test cases on the basis of the test criteria.
A criterion is valid if any error in the software can be revealed by the same test case
satisfying the criteria.
6.2 Design of testcases:
Testing means quality test. Testing is a process of executing a program with the intent
of finding an error. A good test case is one that has a high probability of finding an as yet
undiscovered error. Objective should be to design test that systematically uncovers different
classes of error. And to do with a minimum amount of time and effort. Testing cannot show
the absence of Defects, it can only show that soft wear defects are present. It is important to
keep this statement in one of these ways knowing the specific function that a product has
been designed to perform, test can be conducted that demonstrate each function is fully
operational. This approach is called ‘black box testing’. Knowing the internal working of the
product, test can be conducted to ensure that “all gears mesh” that internal operation of the
product performs according to specification and all internal components have been
adequately exercised. This Approach is call “white box testing”.
Tenali Engineering College Page 45
![Page 46: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/46.jpg)
Virus Information System
TESTING PROCESS:
Testing performs a very critical role for quality assurance and ensuring the reliability
of the software. During testing, the program to be tested is executed with a set of test cases
and output of the program for the test case is evaluated to determine if the program is
performing as it is expected to.
Testing is a process of executing a program with the intent of finding errors.
A good test case is one that has a high probability of finding as yet undiscovered
error.
A successful test is one yet uncovers as yet-undiscovered error.
TESTING TYPES:
Black box Testing focuses on the input/output behavior of the component. Black box tests
do not deal with the internal aspects of the component nor with the behavior or the structure
of the component.
White box Testing focuses on the internal structure of the component. A white box test
makes sure that every state in the
dynamic model of the object and interactions among the objects are tested.
Types of Testing
Tenali Engineering College Page 46
Client Needs Acceptance Testing
Requirements System Testing
Design Integration Testing
![Page 47: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/47.jpg)
Virus Information System
6.3 Testcases:
TEST
CASE
ID
TEST CASE EXPECTING
BEHAVIOUR
EXHIBITING
BEHAVIOUR
RES
ULT
VIS_01 Enter the wrong username
and password for Admin
Error Message has to
be displayed
Error Message is
displaying
Pass
VIS_02 Login as Admin and Try
to Add the new virus
It has to Add the new
virus
It is Adding
successfully
Pass
VIS_03 Login as Admin and Try
to View the virus Details
It has to Display all
virus details
It is Displaying all
virus details
Pass
VIS_04 Enter Registration first to
access the site
It has to add the user
details
It is adding
registration details
Pass
VIS_05 Enter the wrong username
and password for User
Error Message has to
be displayed
Error Message is
displaying
Pass
VIS_06 Login as User and try to
View virus
It has to Display
all Virus Details
It is Displaying all
Virus Details
Pass
VIS_07 Login as User and try to
add virus
It has to add new virus
details
It is adding virus
details
Pass
VIS_08 Login as User and try to
add antivirus information
It has to add new
antivirus information
It is adding
antivirus
information
Pass
VIS_09 Login as User and try to
download antivirus
It has to download
antivirus information
It is downloaded
antivirus
information
Pass
10 Login as User and try to
Search virus
It has to display the
virus information
It id displaying
virus information
Pass
Tenali Engineering College Page 47
![Page 48: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/48.jpg)
Virus Information System
6.3 VALIDATION
Validation aims to demonstrate that the software functions in a manner that can be
reasonably expected by the customer. This tests conformance the software to the
Software Requirements Specification.
Here an experiment has done for checking the consistency for the user
requirements regarding the username and password which should be validated through
the server and the username and password should be matched and also the method
Steganography implemented also checked for its consistency to provide security.
6.4 CONCLUSION:
In this way we also completed the testing phase of the project and ensured that the
system is ready to go live
Tenali Engineering College Page 48
![Page 49: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/49.jpg)
Virus Information System
7.CONCLUSION & FUTURE SCOPE
CONCLUSION:
Using this project we can maintain all the information about viruses and details of
different antivirus programs developed to counter and quarantine them.
This project is a web application which runs on a web server so that users of any
platform can access the system to utilize its resources and features.
We have given centralized control of the system to the administrator so that he can
act as a moderator between users and members of the system and they can have total
abstraction of the internal details. The User interface is made user friendly so that novices
can also access it.
We have fulfilled all the requirements that are specified in the project abstract and all
the necessary steps are taken for further development.
FUTURE SCOPE:
In Feature this application can be developed with effectively with Security
implementation.
It also implemented with different new tools also used for development.
In feature the users can provide the different tips for the virus removal
In feature the administrator can also upload the licensed antivirus for user access
to purchase from the site.
In feature it can also implemented to provide more security for the application.
Tenali Engineering College Page 49
![Page 50: Documentation According to Contents (1)](https://reader033.fdocuments.in/reader033/viewer/2022051015/55375a3a4a7959ba1e8b4cca/html5/thumbnails/50.jpg)
Virus Information System
BIBLIOGRAPHY
S. No Author of the Book Name of the Book Publisher Magazine Edition Year
01 Herbert Shieldt The Complete Gold 2 2003
Reference of Java
02 Ivan Bayross Web Enabled TatMcGrahil 6 2001
Commercial
Application
Development
03 Subramanyam Professional Java Pattern And Java 2 1999
Allam Raju Programming
04 Roger Pressman Software Engineering Pearson Edition 6 1996
05 Roger S.Pressman Software Engineering MC-Graw-Hill 3 1992
International
06 Bernerd Object-Oriented Wiley Edition 2 2000
Bruegge Soft ware
Engineering
WEBSITES:
www.java2s.com
www.javascript.internet.com
www.freecsstemplates.org
www.roseindia.net
Tenali Engineering College Page 50