You are on page 1of 23

PROFESSIONAL TRAINING REPORT

at
Sathyabama University

Submitted in partial fulfillment of the requirements for the award of


Bachelor of Engineering Degree in

Computer Science and Engineering


By

NAME (Reg. No. 3511..)

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


SCHOOL OF COMPUTING
SATHYABAMA UNIVERSITY
JEPPIAAR NAGAR, RAJIV GANDHI SALAI,
CHENNAI 600119. TAMILNADU.

JUNE 2017
SATHYABAMA UNIVERSITY
(Established under Section 3 of UGC Act, 1956)
Jeppiaar Nagar, Rajiv Gandhi Salai, Chennai - 600119
www.sathyabamauniversity.ac.in

_________________________________________________________________

SCHOOL OF COMPUTING

BONAFIDE CERTIFICATE

This is to certify that this Professional Training Report is the bonafide work of
NAME (Reg. No. 3511..) who underwent the professional training in TITLE OF
THE PROJECT under our supervision from May 2017 to June 2017.

Internal Guide
Guide name, Qualification

Head of the Department


Dr. S.MURUGAN, M.E., Ph.D.,

Submitted for Viva voce Examination held on_____________________

Internal Examiner External Examiner


DECLARATION

I, NAME (Reg. No. 3511..) hereby declare that the Professional Training Report on

TITLE OF THE PROJECT done by me under the guidance of guide name

qualification., at Sathyabama university is submitted in partial fulfillment of the

requirements for the award of Bachelor of Engineering degree in Computer

Science and Engineering.

DATE:
PLACE: SIGNATURE OF THE CANDIDATE
ACKNOWLEDGEMENT

The satisfaction and elation that accompany the successful completion of


any task would be incomplete without the mention of the people who have made it
possible. It is our great privilege to express our gratitude and respect to all those
who have guided me during the course of my Professional Training.

First and foremost, we would express our sincere gratitude to our beloved
Founder Chancellor Col. Dr. JEPPIAAR, M.A., B.L., Ph.D., and Chancellor
Thirumathi. REMIBAI JEPPIAAR. I extend my sincere thanks to our Pro
Chancellor Dr. Mariazeena Johnson, B.E., M.B.A., M.Phil., Ph.D., and the Vice
President Dr. Marie Johnson, B.E., M.B.A., M.Phil., Ph.D., and for providing me
the necessary facilities for the completion of the professional training. I also
acknowledge our Vice Chancellor Dr. K. V. Narayanan, M.E., Ph.D., and the Pro
Vice Chancellor Dr. T. Sasipraba, M.E., Ph.D., for their constant support and
endorsement.

I would like to express our gratitude to our Registrar Dr. S. S. Rau, Ph.D.
and Controller of Examinations Dr. Igni Sabasti Prabu M.E., Ph.D., for their
valuable support offered to complete my professional training successfully.

I like to express our gratitude to Dr. M. Lakshmi, M.E., Ph.D., Dean, School
of Computing and Dr. S. Murugan, M.E., Ph.D., Head of the Department of
Computer Science and Engineering, Sathyabama University for having been a
constant source of support and encouragement for the completion of the
professional training.

I would also like to express our sincere thanks to our internal guide Guide
name(Qualification) who guided me in the preparation of the report.
Also, I thank the Almighty and my Parents for supporting me in the
completion of the professional Training.
(PLACE THE TRAINING CERTIFICATE)

v
ABSTRACT

The Java Application World software is a platform where the user can use different
applications which are developed in Java language . In this project, there are given 10
questions to play. User can bookmark any question for the reconsideration while going
to result.

We are using here java array to store the questions, options and answers not
database. You can use collection framework or database in place of array.

The front end tool required for this project is the JAVA swing but no such back end tools
are being used. The user interface has been given a nice and trendy look with a
professional feeling.

vi
OUTLINE OF THE PROJECT

To develop A Java Application where user can write an an online exam and can
bookmark any question for the reconsideration while going to result.

Functional Requirements
1. User
1. Can use exam system

Front End and Back End


1. Front End: Java Swing
2. Back End: No

vii
LITERATURE REVIEW

2.1 Java Technology

This complete section of the thesis gives the whole details about the Java language
security which is a highly great software development technology. All has been
described in the coming discussions.

2.1.1 Java Language

Features Platform Autonomy (Portable):

It is the methodology named as WORAW which is well understood by us as an


independent to the computer system configuration. It is the best property of the Java
language. Other languages are not achieving this feature; this is the one which gained
a lot to be very nearer to this property. All the programs which are prepared on the
Java platform can be executed on any different platform with the help of JVM (Java
Virtual Machine).

Very Easy: There are diverse marks that make it as a straightforward programming
language. Programming is so comfortable as well as to be tested easily because Java
not explicitly uses the pointers. Object Oriented: Around an object to be, that
language is oriented, some language has to go after the successive 4 fundamental
concepts. o Inheritance: Concept tells the reusability of the system. be reused the
procedure to create of novel classes as well as use manners present in the available
classes through expanding it only the accessible code and the adding of the extra
marks when necessary. o Encapsulation: In it, the data and their functionality are
wrapped up under one cover and then furnishing of the abstraction. o Polymorphism:
It is the word which is taken from the Greek language. Here poly means many, and
morph means forms. From one name we can do lot of functioning according to the
situations. Or we can say it is the technique to furnish of the diverse functionalities
through the methods which is based on the same name but different on the signatures
of the methods. o

Dynamic binding: Occasionally we are not aware about the objects and their
particular working, when we go for the programming. This is the technique to furnish
the maximal functionality to the programs at the time of their execution. There are so
many languages like Objective C, C++ which accomplish all the mentioned properties.
But so far these are not to be called as object oriented one completely. The reason
behind is that they are procedural plus object oriented. However, the Java that is

viii
completely an object-oriented language. It is because the objects are the ones which
are the external level of the data structure, as we talk about the Java language.
Robust: There is the powerful storage allocation and the rubbish collection mechanism
which is automatic in Java language. There is the strong exception handling system
and strong type checking system in it as we contrast with the other available
languages. The compiler ensures the written programs to be error free. Distributed: In
the current scenario the mostly used protocols are the main internet protocols (like
FTP, HTTP, etc.). Both of the protocols are created in the Java language. The networks
programmers call the functions on these protocols. And they can utilize the files which
are stored on the distant computers which are the part of the network. There is no
need to write the program code on the local computer. Dynamic: In the carrying out
the Java programmed the consumer can get away the required files dynamically of a
local drive or of a computer thousands of miles of the consumer only through
connecting with the Internet. Safe: Java does not use storage pointer explicitly. The
entire programs in java ran under a zone well known as the sand box. Security
manager intends the attainability option of a class such as harvests and letter of a file
for the local disk. The byte code verifier tests the classes after loading. Performance:
Java utilizes indigenous code practice. The threads are used to share code and data
sections. At the very start of the interpretation of byte code results, the performance
was slow. But, the most recent versions of JVM utilizes according to the environment.
Now the compilation has increased the performance of the Java programs.
Multithreaded: With the help of Java programming language, we can also do the
multithreaded programming. Multithreading is a technique in which a single program
has dissimilar threads. These threads are separate one which is carried out
concurrently. The instructions of the numerous threads are executed regarding the
program. There may be many threads under one process (a program in execution) of
the computer. Multithreading analogy is shown as many processes execute on a single
computing machine. The programming of multithreading has a lot of curiosity of the
developers. Interpreted: We know very well that Java language has both the facilities
of translator. These facilities are to interpret and to compile. With the help of
interpreter, we can execute the programs from their source code directly. The on-the-
fly translator (the interpreter) reads the source code instructions one by one. So, Java
is a good programming language to interpret and due to it is very easy to find out the
errors from the new programs. Architecture Neutral: The concept architecturally
neutrally seems to be eccentric, but Java language is an architectural neutral one.
Networking has gained reputation among people. It has given the idea of distribution
on the networks to the programmers. Today is the world of networks in which so
many computers are interconnected from distant. So we can move around the
applications easily to separate computer machines. The applications can be distributed
on diversity of computer architectures and diverse number of operating systems. The

ix
Java language programs are converted to the byte code after the compilation and that
code is then interpreted on any type of machine. The machine must have the Java
Virtual Machine.

2.1.2 Java Security Basics

Here are two types of security in the Java language that are as follows: Security at
Language level Entire security is put through some systems that are built up at
diverse occasions. The bases of the java security can be seen in several fundamental
language marks: o Has and easily simplifies, to use. Java is a large amount
straightforward to compare to new languages such as C++. Consequently the load is
on the developer is more less and so the likelihood to make of fine mistakes is
diminished; o Finalization of classes and routines. This mark does not let sub classing
to if used to incorporate definitions, and canceling lets when for method definitions
counted doesn't have to, and the unwanted change of that of functionality firm stops
object oriented; o Severity. There are packaging classes that even for the
straightforward data types, and it defined become, can give no constructions exterior
of classes. Consequently all securities told advantages of the object oriented pattern
example can be utilized; o Automatic storage management: The pointers are not
directly used here and there is no arithmetic for the memory addresses. It does not
allow wrong storage accessing and has the less likelihood of the leakage of memory.
There is no trespasser data admittance and execution time slumps; o Physically
powerfully typed minimizes. Polymorphism is a extremely influential object oriented
mark, but it embraces possible risks to disguise of aggressive objects. Both the
compiler and the execution time testing does not allow such opportunities since no
task can be made, if against types objects, there is not compatibility; o More severe
exception treating mechanism is. At the moment of method use, there may be heavy
mistakes; at that time the developer is compelled by the Java compiler to treat all
types of exceptions. Consequently the manners of the Java code are unsurprising the
program code turns into "fool-proof". o Defined clear performance to uninitialized of
variable. All on pile, that involuntarily is been based memory, is initialized. But all on
pile, that is been based memory, is not. So all class and case variable never are set to
indeterminate values, and all the local variables must be allotted certainly before
exercise or the source compiler is forced to give you a mistake. Java is a revolutionary
new application platform of Sun Microsystems. Such as other operating systems,
platform developer with I/O furnishes the java, must networking, window and graphics
productivity and other arrangements and develops to run refined applications. Also an
important productivity that is not found in traditional operating systems furnishes the
java platform.

x
OBJECTIVES

To Develop a Java App Where the user can use exam system

Source Codes:

Online Java Paper Test Program:

/*Online Java Paper Test*/

import java.awt.*;
import java.awt.event.*;
import javax.swing.*;

class OnlineTest extends JFrame implements ActionListener


{
JLabel l;
JRadioButton jb[]=new JRadioButton[5];
JButton b1,b2;
ButtonGroup bg;
int count=0,current=0,x=1,y=1,now=0;
int m[]=new int[10];
OnlineTest(String s)
{
super(s);
l=new JLabel();
add(l);
bg=new ButtonGroup();
for(int i=0;i<5;i++)
{
jb[i]=new JRadioButton();
add(jb[i]);
bg.add(jb[i]);
}
b1=new JButton("Next");
b2=new JButton("Bookmark");
b1.addActionListener(this);
b2.addActionListener(this);
add(b1);add(b2);
set();
l.setBounds(30,40,450,20);
jb[0].setBounds(50,80,100,20);
jb[1].setBounds(50,110,100,20);
jb[2].setBounds(50,140,100,20);
jb[3].setBounds(50,170,100,20);
b1.setBounds(100,240,100,30);

xi
b2.setBounds(270,240,100,30);
setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);
setLayout(null);
setLocation(250,100);
setVisible(true);
setSize(600,350);
}
public void actionPerformed(ActionEvent e)
{
if(e.getSource()==b1)
{
if(check())
count=count+1;
current++;
set();
if(current==9)
{
b1.setEnabled(false);
b2.setText("Result");
}
}
if(e.getActionCommand().equals("Bookmark"))
{
JButton bk=new JButton("Bookmark"+x);
bk.setBounds(480,20+30*x,100,30);
add(bk);
bk.addActionListener(this);
m[x]=current;
x++;
current++;
set();
if(current==9)
b2.setText("Result");
setVisible(false);
setVisible(true);
}
for(int i=0,y=1;i<x;i++,y++)
{
if(e.getActionCommand().equals("Bookmark"+y))
{
if(check())
count=count+1;
now=current;
current=m[y];
set();
((JButton)e.getSource()).setEnabled(false);
current=now;

xii
}
}

if(e.getActionCommand().equals("Result"))
{
if(check())
count=count+1;
current++;
//System.out.println("correct ans="+count);
JOptionPane.showMessageDialog(this,"correct ans="+count);
System.exit(0);
}
}
void set()
{
jb[4].setSelected(true);
if(current==0)
{
l.setText("Que1: Which one among these is not a primitive datatype?");

jb[0].setText("int");jb[1].setText("Float");jb[2].setText("boolean");jb[3].setText("char");
}
if(current==1)
{
l.setText("Que2: Which class is available to all the class automatically?");

jb[0].setText("Swing");jb[1].setText("Applet");jb[2].setText("Object");jb[3].setText("ActionE
vent");
}
if(current==2)
{
l.setText("Que3: Which package is directly available to our class without importing
it?");

jb[0].setText("swing");jb[1].setText("applet");jb[2].setText("net");jb[3].setText("lang");
}
if(current==3)
{
l.setText("Que4: String class is defined in which package?");

jb[0].setText("lang");jb[1].setText("Swing");jb[2].setText("Applet");jb[3].setText("awt");
}
if(current==4)
{
l.setText("Que5: Which institute is best for java coaching?");
jb[0].setText("Utek");jb[1].setText("Aptech");jb[2].setText("SSS
IT");jb[3].setText("jtek");

xiii
}
if(current==5)
{
l.setText("Que6: Which one among these is not a keyword?");
jb[0].setText("class");jb[1].setText("int");jb[2].setText("get");jb[3].setText("if");
}
if(current==6)
{
l.setText("Que7: Which one among these is not a class? ");

jb[0].setText("Swing");jb[1].setText("Actionperformed");jb[2].setText("ActionEvent");
jb[3].setText("Button");
}
if(current==7)
{
l.setText("Que8: which one among these is not a function of Object class?");
jb[0].setText("toString");jb[1].setText("finalize");jb[2].setText("equals");
jb[3].setText("getDocumentBase");
}
if(current==8)
{
l.setText("Que9: which function is not present in Applet class?");

jb[0].setText("init");jb[1].setText("main");jb[2].setText("start");jb[3].setText("destroy");
}
if(current==9)
{
l.setText("Que10: Which one among these is not a valid component?");
jb[0].setText("JButton");jb[1].setText("JList");jb[2].setText("JButtonGroup");
jb[3].setText("JTextArea");
}
l.setBounds(30,40,450,20);
for(int i=0,j=0;i<=90;i+=30,j++)
jb[j].setBounds(50,80+i,200,20);
}
boolean check()
{
if(current==0)
return(jb[1].isSelected());
if(current==1)
return(jb[2].isSelected());
if(current==2)
return(jb[3].isSelected());
if(current==3)
return(jb[0].isSelected());
if(current==4)
return(jb[2].isSelected());

xiv
if(current==5)
return(jb[2].isSelected());
if(current==6)
return(jb[1].isSelected());
if(current==7)
return(jb[3].isSelected());
if(current==8)
return(jb[1].isSelected());
if(current==9)
return(jb[2].isSelected());
return false;
}
public static void main(String s[])
{
new OnlineTest("Online Test Of Java");
}
}

xv
Output Screen Shots

xvi
TABLE OF CONTENTS

Chapter TITLE Page


No. No.

ABSTRACT v
LIST OF TABLES viii
LIST OF FIGURES ix
LIST OF ABBREVIATIONS x

1 INTRODUCTION 1
1.1 OUTLINE OF THE PROJECT 1
1.2 LITERATURE REVIEW 2
1.3 OBJECTIVES 6

2. ALGORITHMS AND METHODS (GIVE THE NAME OF THE ALGORITHM


/ METHODOLOGY )
2.1 GENERAL
2.2 OVERVIEW
2.3 MODUALR DESIGN
2.3.1(Subheadings)
2.3.1( )
2.4 SUMMARY

3 SYSTEM IMPLEMENTATION
3.1 GENERAL

xvii
3.2 OVERVIEW OF THE PLATFORM
3.3 RESULTS AND DISCUSSION
3.4 SUMMARY

Chapter TITLE Page


No. No.

4 CONCLUSION AND FUTURE WORK


4.1 SUMMARY
4.2 FUTURE WORK

REFERENCES
APPENDIX
A. SOURCE CODE
B. SCREEN SHOTS
C. PUBLICATIONS (IF ANY)

xviii
LIST OF TABLES

TABLE No. TITLE PAGE No.

LIST OF FIGURES

FIGURE No. TITLE PAGE No.

2.1 Sequence Diagram 13

xix
LIST OF SYMBOLS AND ABBREVIATIONS

LBS - Location Based Services

xx
REFERENCES
[1] Arnold, K.; Gosling, J. The Java programming Language, Addison-Wesley, 1998.
[2] Crnkovic, I.; Larsson, M. Building Reliable Component-Based Software Systems,
Artech House, Boston, 2002.
[3] Czarnecki, K.; Eisenecker, U. W. Generative programming: methods, tools and
applications, Addison-Wesley, 2000.
[4] Flanagan, D. Java Foundation Classes in a Nutshell: A Desktop Quick Reference,
O'Reilly, 1999.
[5] Gmez-Perez A.; Lozano A. Impact of Software Components Characteristics above
Decision-making Factors, International Workshop on Component-Based Software
Engineering (CBSE 2000), pp. 15 23, Limerick, Ireland, 2000
[6] Kand, M. M.; Kienzle, J.; Strohmeier, A. From AOP to UML - A Bottom-Up
Approach, 1st International Conference on Aspect-Oriented Software Development, 2002.,
Enschede, The Netherlands, URL:
http://lglwww.epfl.ch/workshops/aosduml/Allsubs/kande.pdf
[7] Kiczales, G.; Lamping, J.; Mendhekar, A.; Maeda, C.; Lopes, C. V.; Loingtier, J. M.;
Irwin, J. Aspect-Oriented Programming, Lecture Notes in Computer Science, Vol.
1241/1997, pp. 220 242, 1997.
[8] Lee, K.W.K. An Introduction to Aspect-Oriented Programming, COMP 610E 2002
Spring Software Development of E-Business Applications. The Hong Kong University of
Science and Technology, 2002.
[9] Ousterhout J. K. Scripting : Higher Level programming for the 21st Century,
Computer, Vol. 31, No. 3, pp. 23 30, 1998.
[10] Parsons, R. Components and the World of Chaos, Software, Vol. 20, No. 3, pp. 83
85, 2003.
[11] Radoevi!, D. Integration of Generative Programming and Scripting Languages, PhD
thesis, Faculty of Organization and Informatics, Varadin, Croatia, 2005.
[12] Radoevi!, D., Kozina, M.; Kli"ek, B. Comparison between UML and Generator
Application Scripting Model, Proceedings of the 16th International Conference on
Information and Intelligent Systems (IIS), pp. 115 122, Faculty of Organization and
Informatics, Varadin, Croatia

1
[13] Reenskaug, T. The Model-View-Controller (MVC): Its Past and Present, University of
Oslo, URL: http://heim.ifi.uio.no/~trygver/2003/javazone-jaoo/MVC_pattern.pdf,
Retrieved May 15 2007
[14] Simo, R. P. S.; Belchior, A. D. Quality Characteristics for Software Components:
Hierarchy and Quality Guides, Lecture Notes in Computer Science, Volume 2693, pp. 184-
206., Springer, 2003.

You might also like