Win-Win Ad Sense – Effective Online Advertisement System (MCA)
1.1Abstract
Ad Sense is a wonderful advertising concept and it also lies at the
heart of Advertising empire. Though new advertising concepts keep coming up all
the time, this one is something that is altogether different. AdSense
(Advertising program) presents an earning opportunity to the website owners by
allowing to post advertisements on their websites. These advertisements are
either text advertisements or image based advertisements
AdSense is content-targeted advertising program. It is the program
that can give you advertising revenue - with a minimal investment in time and
no additional resources. It delivers relevant text and image advertisement that
are precisely targeted to your site and your site content. AdSense has become
popular with bloggers and other people who run noncommercial sites. Blogger
provides a simple way for you to make money with your blog.
When people visit your website they are able to see these
advertisements. Your earnings are based on how many sponsored links are
displayed on website and also based on how many times visitors to your website
actually click on one of those links. The AdSense system calculates your
revenue on per-click.
DHS
Informatics Private Limited is a training division of multi-national IT
consulting and outsourcing firm Intersoft KK, which has head-quarters in Japan
and branch offices in the United States, Singapore, Taiwan and an offshore
development center in Bangalore, India. The company aims to give quality
training on advanced IT related subjects those from different fields.
DHS
Informatics train people on various technologies and place them in On the JOB
Training (OJT) at Intersoft KK development division and get them job at
Intersoft KK and other IT companies. Also DHS Informatics conducts campus
training for college students at college premises itself and corporate training
for various corporate offices in and around Bangalore .
Apart
from this, DHS Informatics occasionally conducting special offshore training
program for overseas students from various countries like Japan , Australia ,
Singapore , Malaysia , and
Taiwan etc. For Offshore training candidates, DHS Informatics provides
facilities like Accommodation, Travel, Cultural Knowledge, Entertainments and Tours .
For
overseas students those who are lacking in English language, DHS Informatics
provides coaching on English together with technical training through bilingual
trainers. For local students DHS Informatics provides coaching on Japanese or
Chinese/Mandarin according to their wish and places them in India or Japan ,
Singapore , Malaysia and Taiwan .
Some
the other projects that DHS Informatics has undertaken are as follows:
I.
Secret Hiding Techniques
II.
Save Data Migration over Company Intranet
III.
HAWKEYE (Trade Surveillance System)
2.1SYSTEM CONCEPT
There are many
meanings for the word ‘system’ but in broad sense, a system is simply “An orderly grouping of
independent components linked together according to a plan to achieve specific
goal or an objective”. The word component linked together according to a plan,
managerial steps or a subsystem in multilevel structure. The components may be
simple or complex, basic or advanced.
Each of the
system depends more or less on abstract entity called information system. An
information system is a set of devices, procedures and operating system
designed around user-based criteria to produce information and communicate it
user for planning, control and performance. The information system which I have
used comprises of 3 categories of system. They are
§
Transaction Processing System
§
Management
Information System
§
Decision
Support System
Transaction Processing System
Transaction
processing system is an operation-oriented system, which helps in carrying out
day-to-day activities of an organization. Standard operation procedure, which
facilitate handling of transactions are often embedded in computer program that
control the entry of data, processing of details and storage and presentation
of data and information.
Management
Information System
Management
Information System is a decision-oriented system, which helps the top
management in decision-making and problem solving. They draw on data storage as
result of transaction processing but they may use other information as well.
MIS provides input to be used in the managerial decision situation. MIS helps
in taking issues that recur regularly i.e., weekly, quarterly, monthly.
Decision
Support System (DSS) constitute of 3 words
§
Decision: “ Emphasis decision making in problem
situation not information processing, retrieved or reporting”
§
Support:
“ requires computer aided decisions with
enough structure to permit computer support”
§
System:
“accentuates
the integrated nature of problem solving, suggestion a combined man machine and
environment”.
2.2SYSTEM DEVELOPMENT CYCLE (SDLC)
The most accepted phases
in SDLC which I have used are
1.
Preliminary Investigation
2.
Detailed Investigation
3.
Requirement Analysis
4.
System Design
5.
System Development
6.
System Testing
7.
System Implementation and evaluation
1. Preliminary Investigation
It is made when a request
to the system is made
a.
Request Clarification
b. Feasibility Study
c. Request Approval
Request Clarification: It is very important to note before any further steps in the
system development can take place, the project request must clearly be stated
.It is because it may happen that the requester is asked for help without
knowledge of what is wrong or why there is problem clarification is very
essential.
a.
Feasibility Study:
An
important outcome of preliminary outcome of preliminary investigation is
determination that the system is feasible. There are mainly 3 feasible. There
are mainly 3 feasibility study
§
Technical Feasibility
§
Economic Feasibility
§
Operation Feasibility
b.
Request Approval: All requested projects are not feasible or
desirable. Only those projects that are both desirable and feasible are both
desirable and feasible are put into schedule.
2.
Detailed
Investigation:
This
phase begins after the approval of the project request detailed investigation
help the analyst to have detailed understanding of the system .During this
phase analyst interacts with the end user. This interaction is to collection
information about
What
are the current systems?
How
do they function?
What
are the drawbacks of current system?
3.
Requirement
Analysis:
Analyzing
the requirements of the new system is very essential for the further
development of the approved system. During this phase the I/p and o/p of the
system, methods and process, storage requirements, controls and to be provided,
schedules, resource allocation.
4.
System Design:
This
design of an information system produces the details that sate how a system
will meet the requirements identified
during system analysis. Different ways such as charts, tables and special
symbols. During this phase models are prepared, structured tools such as
dataflow diagram, decision tree and decision tables are used to generate a
complete picture of the system and its specification.
5. System Development:
Begins after the entire software is
designed. Depending on the cost and availability of time and programmer
software can be developed in the organization or else can be purchased from
outside. The development phase consists of coding of computer program and
compilation.
6.
System
Testing:
During
system testing the system is used experimentally to ensure that the software
does not fall i.e., it will run according to its specification and in the way
the user expects.
There are two strategies of testing
1. Code
testing strategy examines logic of program
2. Specification
testing examines the specification stating what the program
Should do how it should perform under various condition
2.3RISK MANAGEMENT
In risk management there are 2
processes
1.
Risk Identification
2.
Risk Analysis
1 Risk Identification:
During
risk identification we have to identify all the possible risk which we are
going to face during the software development process, and can be named as Risk
Description.
2
Risk
Analysis:
During the risk analysis process, each identified risk is
concerned in turn and a judgment made about the probability and the seriousness
of the risk.
Ø The probability of risk can be accessed as
§
Very Low (<10%)
§
Low (10-25%)
§
Moderate (25-50%)
§
High (50-75%)
§
Very High (>75%)
Ø The effect of the risk can be access as
§
1 – Catastrophic
§
2 – Critical
§
3 – Marginal
§
4 – Negligible
3.1 System Environment
INTRODUCTION TO WIN-WIN ONLINE ADVERTISEMENT
Advertisement is cost oriented work
and some time very costlier advertisement also doesn’t work out. Now-a-days
placing the advertisement in web site becomes popular and getting more response
than any other advertisement which is practicing in earlier.
Suppose a company wants to place an
ad in a famous web site they have pay huge amount to the web site owner, which
is not possible for smaller or middle size companies. Keeping this all in the
mind this Ad- Sense System is developed.
Here the advertisement company need
not to give the huge amount at one stock, they are paying to the web site ad
management company for the number of response they got for their ad like by
click based, each click will cost very less amount almost less than one rupee.
Similarly the web site owner also got amount for each click on the ads which
are placed in their web site.
System Design & Implementation
Modules:
1.
Admin Session
·
Login Module
·
Admin (Add, Delete)
·
Member (Add, Edit,
Delete)
·
Ads (Create, Edit,
Delete & Allocate to members)
·
Change Password
·
Reports
Description :
Admin will login and also have the
permission to create new members, Ads (Sponsored Links). Admin user also has
the privilege to delete & edit the Member User & Ads. And admin should
only allocate the ads to all the member users. Admin also have the authority to
view the AdSense points of member users. Admin also can change their password.
Member Module
Ø
Login Session
Ø
Product Details (Add, Edit, Delete)
Ø
Edit Profile
Ø
View
Description:
Member will login by using login
session. Here member means Organization (A Company). Member has the permission
to add a product, so that end user can view the products. And then member also
able to edit and delete the products corresponding to them. Then member also
able to view the products and sponsored links corresponding to them. By using
edit profile member can edit their profile.
For members who want to advertise
their products and services through the AdSense system, it’s just a matter of
signing up through member login and letting know how much they want to spend
towards advertising through AdSense.
End User Module
Ø
View
Ø
AdSense Points
Description:
There is no registration for end
users. Any one can use this website with out registration. End user has the
permission to view all the products and sponsored links of all the members.
When the end user clicks any one of the sponsored links some points will
incremented to corresponding member.
3.2HARDWARE REQUIREMENTS
The
selection of hardware is very important for the proper working of the proposed
system. The technologies that we will be using for developing our project
depend on the hardware configuration. When selecting hardware, the size and
capacity requirement are also important.
>
Operating System : Windows 98/2000/XP
:
Processor : Pentium III or above
p
Mother Board : Genuine Intel X86 Family
=
Memory : Minimum 10GB & Maximum 40GB
7 Keyboard : Standard Windows
108 keys Keyboard
8 Mouse : Scroll
or Optical Mouse
SOFTWARE REQUIREMENTS
Once the system requirements are
finalized then we have to determine whether a particular software package fits
system requirements or not. This section summarizes the software requirement.
ÿ
.NET Technologies :
Microsoft Visual Studio 2005
ÿ Front End :
ASP.NET with C#
ÿ Database Connectivity : ODBC connection
ÿ Client side Validations :
C#
ÿ Browser
: Internet Explorer
5.0 and above
ÿ Back End :
SQL Server 2000
3.3.1 .NET Tools and Technologies:
.NET is a library, one that is just as extensive as the
Windows API. We can use it to call up all the same sorts of features that have
traditionally been the role of the Windows operating systems; displaying
windows and dialog boxes, verifying security credentials, calling on base
operating systems services, creating threads and so on, as well as newer areas
such as accessing databases or connecting to the internet or providing web
services.
.NET
provides the environment in which our program is run. When .NET aware code is
executed, it will be .NET that starts up your code, manage the running threads,
provides various background services, and in real senses is the immediate
environment seen by the code.
ADVANTAGES:
¨ Object Oriented Programming
¨ Good Design
¨ Language Independence
¨ Better support for dynamic web pages
¨ Efficient Data Access
¨ Code Sharing
¨ Improved Security
INTRODUCTION TO ASP.NET:
ASP.NET is
the latest version of Active Server Pages (ASP), Microsoft’s server-side web
technology for building dynamic, interactive, and database-driven web sites.
ASP.NET is
a unified web platform that provides all the services necessary for to build
enterprise-class applications. It hopes to do for the web what visual basic has
done for windows. ASP.NET expects to reduce and replace coding with components.
It is based on the .NET framework, which provides a platform independent of
programming languages and operating systems for developing and deploying web
applications.
ASP.NET is a unified web platform that provides all the
services necessary for to build enterprise-class applications. It hopes to do
for the web what visual basic has done for windows. ASP.NET expects to reduce
and replace coding with components.
This section provides an overview of the ASP.NET
infrastructure and subsystem relationships, as they relate to the subject of
security. The following illustration shows the relationships among the security
systems in ASP.NET.
Fig 1.1: ASP .NET Architecture
As the illustration shows, all Web clients communicate with
ASP.NET applications through IIS. IIS deciphers and optionally authenticates
the request. If Allow Anonymous
is turned on, no authentication occurs. IIS also finds the requested resource
(such as an ASP.NET application), and, if the client is authorized, returns the
appropriate resource.
Integrating with
IIS:
This release of ASP.NET uses IIS 5.0 as the primary host
environment. When considering ASP.NET authentication, you should understand the
interaction with IIS authentication services. IIS always assumes that a set of
credentials maps to a Windows NT account and uses them to authenticate a user.
There are three different kinds of authentication available in IIS 5.0: basic,
digest, and Integrated Windows Authentication (NTLM
or Kerberos). You can select the type of authentication to use in the IIS
administrative services.
ADVANTAGES:
¨ Support for programming languages
¨ Language-independence
¨ Support for separation of code and content
¨ Simplified development
¨ Client platform independence
¨ Web services
¨ Support for .NET framework
¨ Backward compatibility
ASP.NET ELEMENTS:
Web Forms:
Web forms give the developer the ability to drag and drop
ASP.NET server controls onto the form and easily program the events that are
raised by the control. User controls, mobile controls and other third-party
controls can be added to extend web forms.
Server Controls:
A server control is a control that is programmable by
writing server-side code. Server controls automatically maintain their state
between calls to the server. Two types of server controls; HTML and web server
controls.
When a web form is rendered to the browser, a hidden HTML
input tag is dynamically created, called view state. This input contains
base64-encoded data that can be used by any object that inherits from system.
SCOPE OF THE CONTROLS OF ASP.NET:
WEBSERVER CONTROLS:
Label:
Label is used to display that the user cannot change.
Textbox:
It is used
to assign a value to a text box or read a value that a user has entered into
it. Multiline property is assigned the value Multi Line, a text area is
displayed.
Button control:
It renders the same form submit button as rendered by the
normal HTML tag.
Image button:
It is used to display an image.
Radio button list:
It
represents a group of mutually exclusive options. Each radio button can be
either checked or unchecked. No more than one radio button in a group can be
checked at the same time.
Dropdown list control:
It is similar to radio button list control. It can
represent a set of mutually exclusive options. Its options are displayed in a
single-line pick list widget.
List box control:
It enables a user to select only one option at a time, or
create a multiselect list box.
Hyperlink control:
It can display either text or an image as a link.
VALIDATION CONTROLS:
Requiredfieldvalidator control:
It is used to check whether a control has a value. This
control used in a textbox control. Other input controls such as radiobuttonlist
are also used this validator.
Regularexpressionvalidator control:
It is used to match the value entered into a form field to
a regular expression. This control to check whether a user has entered, for
example, a valid e-mail address, telephone number, or username or password.
Comparevalidator control:
It performs comparisons between the data entered into a
form field and another value. The other value can be fixed value, such as a particular
number, or a value entered into another control.
Rangevalidator control:
It is used to check whether the value of a form field falls
between a minimum and maximum value. The minimum and maximum values can be
dates, numbers, currency amounts, or strings.
Validationsummary control:
It is used to summarize the control with the validation
controls. This control to summarize all the errors all the top of a page or
wherever else we wish.
ADVANCED CONTROLS:
Panel control:
Instead of setting the visible property for controls one by
one, we can use the panel control to hide controls as a group.
AdRotator control:
It is used to display banner advertisements randomly. The
advertisements with this control that contains a list of the properties of
banner advertisements to display.
Datagrid control:
It is used to display the records without using templates.
We can simply bind a data source to the data grid, and it automatically
displays the records. We can create columns to control how records are formatted
or to display links for editing records.
ADO.NET:
It contains several namespaces with dozens of classes
devoted to database access. The System.Data.Sqlclient namespace includes the
following three classes:
¨
SqlConnection
¨
SqlCommand
¨
SqlDataReader
SqlConnection:
This sqlconnection need to create and open a database
connection. We create the connection in different ways depending on the type of
database that we want to access.
SqlCommand:
It is used to create a database command that represents the
SQL select statement to execute.
SqlDataReader:
It
represents a forward-only stream of database records. This means that the data
reader represents only a single record at a time. To fetch next record in the
stream we must call the read () method. To display all the records returned
from a query, we must call the read () method repeatedly until we reach the end
of the stream.
DATASET:
A dataset can contain one or more Data Tables that
represent database tables. Relationships between the tables can be defined
using DataRelation classes.
DATAADAPTER:
It represents the bridge between a Dataset and the data
source it represents. We use a DataAdapter to populate a DataSet from an
existing database table. We can also use a DataAdapter to update and existing database
table with changes made to a DataSet.
Open:
Opens a specified database for the application.
3.3.2Microsoft SQL Server 2000
Microsoft SQL Server 2000 extends the
performance, reliability, quality, and ease-of-use of Microsoft SQL Server
version 7.0. Microsoft SQL Server 2000 includes several new features that make
it an excellent database platform for large-scale online transactional
processing (OLTP), data warehousing, and e-commerce applications.
The OLAP Services feature available in
SQL Server version 7.0 is now called SQL Server 2000 Analysis Services. The
term OLAP Services has been replaced with the term Analysis Services. Analysis
Services also includes a new data-mining component.
Features
of SQL Server 2000
- Internet Integration
The SQL
Server 2000 database engine includes integrated XML support. It also has the
scalability, availability, and security features required to operate as the
data storage component of the largest Web sites. The SQL Server 2000
programming model is integrated with the Windows DNA architecture for
developing Web applications, and SQL Server 2000 supports features such as
English Query and the Microsoft Search Service to incorporate user-friendly
queries and powerful search capabilities in Web applications.
- Scalability and Availability
The same
database engine can be used across platforms ranging from laptop computers
running Microsoft Windows® 98 through large, multiprocessor servers running
Microsoft Windows 2000 Data Center Edition. SQL Server 2000 Enterprise Edition
supports features such as federated servers, indexed views, and large memory
support that allow it to scale to the performance levels required by the
largest Web sites.
- Enterprise-Level Database Features
The SQL
Server 2000 relational database engine supports the features required to
support demanding data processing environments. The database engine protects
data integrity while minimizing the overhead of managing thousands of users
concurrently modifying the database. SQL Server 2000 distributed queries allow
you to reference data from multiple sources as if it were a part of a SQL
Server 2000 database, while at the same time, the distributed transaction
support protects the integrity of any updates of the distributed data. Replication
allows you to also maintain multiple copies of data, while ensuring that the
separate copies remain synchronized. You can replicate a set of data to
multiple, mobile, disconnected users, have them work autonomously, and then
merge their modifications back to the publisher.
- Ease of installation, deployment, and use
SQL
Server 2000 includes a set of administrative and development tools that improve
upon the process of installing, deploying, managing, and using SQL Server
across several sites. SQL Server 2000 also supports a standards-based
programming model integrated with the Windows DNA, making the use of SQL Server
databases and data warehouses a seamless part of building powerful and scalable
systems. These features allow you to rapidly deliver SQL Server applications
that customers can implement with a minimum of installation and administrative
overhead.
- Data warehousing.
SQL
Server 2000 includes tools for extracting and analyzing summary data for online
analytical processing. SQL Server also includes tools for visually designing
databases and analyzing data using English-based questions.
Databases
A
database in Microsoft SQL Server 2000 consists of a collection of tables that
contain data and other objects, such as views, indexes and stored procedures
defined to support activities performed with the data. The data stored in a
database is usually related to a particular subject or process, such as
inventory information for a manufacturing warehouse.
Views:
Views are defined using a SELECT
statement and are analogous to an object that contains the result set of this
statement.
Index:
Indexes can also enforce uniqueness on the rows in a table.
SQL Server supports clustered and no clustered indexes. The primary key of a
table is automatically indexed.
Stored Procedure:
SQL Server supplies stored procedures for managing SQL
Server and displaying information about databases and users. SQL
Server-supplied stored procedures are called system-stored procedures.
An Overview
Html
HTML, an
initialism of Hypertext Markup Language, is the predominant markup language for
web pages. It provides a means to describe the structure of text-based
information in a document — by denoting certain text as headings, paragraphs,
lists, and so on — and to supplement that text with interactive forms, embedded
images, and other objects. HTML is written in the form of labels (known as
tags), surrounded by angle brackets. HTML can also describe, to some degree,
the appearance and semantics of a document, and can include embedded scripting
language code which can affect the behavior of web browsers and other HTML
processors.
HTML is
also often used to refer to content of the MIME type text/html or even more
broadly as a generic term for HTML whether in its XML-descended form (such as
XHTML 1.0 and later) or its form descended directly from SGML
Hypertext Markup Language (HTML),
the languages of the World Wide Web (WWW), allows users to produces Web pages
that include text, graphics and pointer to other Web pages (Hyperlinks).
HTML is not a programming language
but it is an application of ISO Standard 8879, SGML (Standard Generalized
Markup Language), but specialized to hypertext and adapted to the Web. The idea
behind Hypertext is that instead of reading text in rigid linear structure, we
can easily jump from one point to another point. We can navigate through the
information based on our interest and preference. A markup language is simply a
series of elements, each delimited with special characters that define how text
or other items enclosed within the elements should be displayed. Hyperlinks are
underlined or emphasized works that load to other documents or some portions of
the same document.
HTML can be used to display any type
of document on the host computer, which can be geographically at a different
location. It is a versatile language and can be used on any platform or
desktop.
HTML provides tags (special codes)
to make the document look attractive. HTML tags are not case-sensitive. Using
graphics, fonts, different sizes, color, etc., can enhance the presentation of
the document. Anything that is not a tag is part of the document itself.
Basic HTML Tags:
<! -- --> specifies
comments
<A>……….</A> Creates
hypertext links
<B>……….</B> Formats
text as bold
<BIG>……….</BIG> Formats
text in large font.
<BODY>…</BODY> Contains
all tags and text in the HTML document
<CENTER>...</CENTER> Creates
text
<DD>…</DD> Definition
of a term
<DL>...</DL> Creates
definition list
<FONT>…</FONT> Formats
text with a particular font
<FORM>...</FORM> Encloses a fill-out form
<FRAME>...</FRAME> Defines
a particular frame in a set of frames
<H#>…</H#> Creates
heading of different levels(1 – 6)
<HEAD>...</HEAD> Contains
tags that specify information about a document
<HR>...</HR> Creates
a horizontal rule
<HTML>…</HTML> Contains
all other HTML tags
<META>...</META > Provides
meta-information about a document
<SCRIPT>…</SCRIPT> Contains client-side or
server-side script
<TABLE>…</TABLE> Creates
a table
<TD>…</TD> Indicates
table data in a table
<TR>…</TR> Designates
a table row
<TH>…</TH> Creates
a heading in a table
Attributes
The
attributes of an element are name-value pairs, separated by "=", and
written within the start label of an element, after the element's name. The
value should be enclosed in single or double quotes, although values consisting
of certain characters can be left unquoted in HTML (but not XHTML).Leaving
attribute values unquoted is considered unsafe.
Most
elements take any of several common attributes: id, class, style and title.
Most also take language-related attributes: lang and dir.
The id
attribute provides a document-wide unique identifier for an element. This can
be used by stylesheets to provide presentational properties, by browsers to
focus attention on the specific element or by scripts to alter the contents or
presentation of an element. The class attribute provides a way of classifying
similar elements for presentation purposes. For example, an HTML document (or a
set of documents) may use the designation class="notation" to
indicate that all elements with this class value are all subordinate to the
main text of the document (or documents). Such notation classes of elements
might be gathered together and presented as footnotes on a page, rather than
appearing in the place where they appear in the source HTML.
An author
may use the style non-attributal codes presentational properties to a
particular element. It is considered better practice to use an element’s son-
id page and select the element with a style sheet, though sometimes this can be
too cumbersome for a simple ad hoc application of styled properties. The title
is used to attach sub textual explanation to an element. In most browsers this
title attribute is displayed as what is often referred to as a tool tip. The
generic inline span element can be used to demonstrate these various
non-attributes.
The
preceding displays as HTML (pointing the cursor at the abbreviation should
display the title text in most browsers).
Advantages
- A HTML document is small and hence easy to send over
the net.
- It is small because it does not include formatted
information.
- HTML is platform independent.
- HTML tags are not case-sensitive.
3.4CLIENT REQUEIREMENT
Internet
Explorer 5.0 or higher / Netscape Navigator / any compatible browser A Network
that is connected to all the computers of an organization.
4.1 Study of current
System
Purpose
A new and
novel way of Advertisement on Internet which will benefit both the
advertisement company and web site owner.
Here the concept is WIN – WIN method, that is both the parties are
mutually benefited.
Advertisement
is cost oriented work and some time very costlier advertisement also doesn’t
work out. Now-a-days placing the advertisement in web site becomes popular and
getting more response than any other advertisement which is practicing in
earlier.
Scope of the project:
v
Ad Sense has a huge
database of advertisers that are looking for space. Because of this huge base
of advertisers, Ad Sense can provide you with a steady stream of advertisers.
v
This helps to both
provide local advertisement opportunities to companies, as well as provide your
site with relevant content.
v
In addition to these
benefits you also are able to control what kinds of ads that you want displayed
on your website. You can filter out ads from specific company genres.
v
Here both the
advertisement company and web site owner get benefited. Here the concept is WIN
– WIN method that is both the parties are mutually benefited.
4.2Problem And weakness Of current system
The objectives of this project are:
·
To develop an application that enables the user to
create his own webpage, customize it according to his needs.
·
Each user will be provided a unique user id and
password which he can use to edit and update his page.
·
User can use his web page to advertise his own
products and also place links for other advertisements. Revenue can be earned
by linking it with Google Ad Sense.
Benefits of the project
- Allow the users to
receive orders and sell his products.
- The user can
advertise his products on his web page.
·
Enable user to create and maintain his web page.
FEASIBILITY
STUDY
Feasibility is the
determination of whether or not a project is worth doing. The process followed
in making this determination is called feasibility Study. This type of study if
a project can and should be taken. In the conduct of the feasibility study, the
analyst will usually consider seven distinct, but inter-related types of
feasibility.
Technical Feasibility
This is considered
with specifying equipment and software that will successful satisfy the user
requirement the technical needs of the system may vary considerably but might
include
v
The facility to
produce outputs in a given time.
v
Response time under certain conditions.
v Ability to process a
certain column of transaction at a particular speed.
Economic
Feasibility
Economic analysis is the most
frequently used technique for evaluating the effectiveness of a proposed
system. More commonly known as cost / benefit analysis. The procedure is to
determine the benefits and savings are expected form a proposed system and a
compare them with costs. It benefits outweigh costs; a decision is taken to
design and implement the system will have to be made if it is to have a chance
of being approved. There is an ongoing effort that improves in accuracy at each
phase of the system life cycle.
Operational
Feasibility
It is mainly
related to human organization and political aspects. These points are
considered are
v
What changes will be brought with the system?
v
What organizational structures are distributed?
v
What new skills will be required?
v
Do the existing
system staff members have these skills?
v
If not, can they be trained in the course of time?
SYSTEM
DESIGN
The most
creative and challenging face of the system development is System Design. It
provides the understanding and procedural details necessary for implementing
the system recommended in the feasibility study. Design goes through the
logical and physical stages of development.
In
designing a new system, the system analyst must have a clear understanding of
the objectives, which the design is aiming to fulfill. The first step is to
determine how the output is to be produced and in what format. Second, input
data and master files have to be designed to meet the requirements of the
proposed output. The operational phases are handled through program
construction and testing.
Design of
a system can be defined as a process of applying various techniques and
principles for the purpose of defining a device, a process or a system in sufficient
detail to permit its physical realization. Thus system design is a solution to
“how to” approach to the creation of a new system. Thus important phase
provides the understanding and the procedural details necessary for
implementing the system recommended in the feasibility study. The design step
provides a data design, architectural design, and a procedural design.
OUTPUT DESIGN
In the
output design, the emphasis is on producing a hard copy of the information
requested or displaying the output on the CRT screen in a predetermined format.
Two of the most output media today are printers and the screen. Most users now
access their reports from a hard copy or screen display. Computer’s output is
the most important and direct source of information to the user, efficient,
logical, output design should improve the systems relations with the user and
help in decision-making.
As the
outputs are the most important source of information to the user, better design
should improve the system’s relation and also should help in decision-making.
The output
device’s capability, print capability, print capability, response time
requirements etc should also be considered form design elaborates the way
output is presented and layout available for capturing information. It’s very
helpful to produce the clear, accurate and speedy information for end users.
INPUT
DESIGN
In the
input design, user-oriented inputs are converted into a computer based system
format. It also includes determining the record media, method of input, speed
of capture and entry on to the screen. Online data entry accepts commands and
data through a keyboard. The major approach to input design is the menu and the
prompt design. In each alternative, the user’s options are predefined. The data
flow diagram indicates logical data flow, data stores, source and destination.
Input data are collected and organized into a group of similar data. Once
identified input media are selected for processing.
In this
software, importance is given to develop Graphical User Interface (GUI), which
is an important factor in developing efficient and user-friendly software. For
inputting user data, attractive forms are designed. User can also select
desired options from the menu, which provides all possible facilities.
Also the
important input format is designed in such a way that accidental errors are
avoided. The user has to input only just the minimum data required, which also
helps in avoiding the errors that the users may make. Accurate designing of the
input format is very important in developing efficient software. The goal or
input design is to make entry as easy, logical and free from errors.
LOGICAL DESIGN
Logical
data design is about the logically implied data. Each and every data in the
form can be designed in such a manner to understand the meaning. Logical data
designing should give a clear understanding and idea about the related data
used to construct a form.
DATA
FLOW DIAGRAM
A Data
Flow Diagram (DFD) is a diagram that describes the flow of data and the
processes that change data throughout a system. It’s a structured analysis and
design tool that can be used for flowcharting in place of or in association
with information. Oriented and process oriented system flowcharts. When
analysts prepare the Data Flow Diagram, they specify the user needs at a level
of detail that virtually determines the information flow into and out of the
system and the required data resources. This network is constructed by using a
set of symbols that do not imply physical implementations. The Data Flow
Diagram reviews the current physical system, prepares input and output
specification, specifies the implementation plan etc.
Four basic
symbols are used to construct data flow diagrams. They are symbols that
represent data source, data flows, and data transformations and data storage.
The points at which data are transformed are represented by enclosed figures,
usually circles, which are called nodes.
DataBase Table
Table Name: M_Admin
|
Characteristic
|
||||
Datatype
(Width)
|
NULL
(Y/N)
|
Constraint
|
Auto Inc. (Y/N)
|
||
Column Name
|
Admin_Id
|
Char(20)
|
N
|
Primary Key
|
N
|
Admin_pwd
|
char(15)
|
N
|
|
N
|
|
Admin_DOC
|
Date
|
Y
|
|
N
|
|
Admin_name
|
varchar(50)
|
Y
|
|
N
|
Table Name: M_Member
|
Characteristic
|
||||
Datatype
(Width)
|
NULL
(Y/N)
|
Constraint
|
Auto Inc. (Y/N)
|
||
Column Name
|
Mem_No
|
int(10) unsigned
|
N
|
Primary
Key
|
Y
|
Mem_User_id (Acts as Login Id)
|
varchar(50)
|
N
|
|
N
|
|
Mem_pwd
|
varchar(20)
|
N
|
|
N
|
|
Mem_Rep_Name
|
varchar(30)
|
N
|
|
N
|
|
Mem_Company_Name
|
varchar(50)
|
N
|
|
N
|
|
Mem_Points
|
int(10) unsigned
|
Y
|
|
N
|
|
Phone
|
varchar(15)
|
N
|
|
N
|
|
Email
|
varchar(50)
|
N
|
|
N
|
|
Cat_no
|
int(10)
|
N
|
Foreign
Key
|
N
|
|
Page_Name
|
Varchar(100)
|
N
|
|
N
|
|
Pass_question
|
Varchar(300)
|
Y
|
|
N
|
|
Pass_answer
|
Varchar(50)
|
Y
|
|
N
|
|
Mem_DOC
|
Date
|
N
|
|
N
|
|
Mem_Exp_date
|
Date
|
N
|
|
N
|
|
Mem_status
|
Char(10)
|
Y
|
Active,
Hold, Expired
|
N
|
Table Name: M_Product
|
Characteristic
|
||||
Datatype
(Width)
|
NULL
(Y/N)
|
Constraint
|
Auto Inc. (Y/N)
|
||
Column Name
|
Mem_No
|
int(10) unsigned
|
N
|
Foreign Key
|
N
|
Product_no
|
Int(10)
|
N
|
Primary Key
|
Y
|
|
Product_name
|
varchar(200)
|
N
|
|
N
|
|
Product_desc
|
varchar(600)
|
N
|
|
N
|
|
Product_image
|
varchar(300)
|
N
|
|
N
|
Table Name: T_ads
|
Characteristic
|
||||
Datatype
(Width)
|
NULL
(Y/N)
|
Constraint
|
Auto Inc. (Y/N)
|
||
Column Name
|
T_ad_no
|
int(10) unsigned
|
N
|
Primary Key
|
Y
|
Ad_no
|
int(10) unsigned
|
N
|
Foreign Key
|
N
|
|
Mem_User_id (Acts as Login Id)
|
varchar(50)
|
N
|
|
N
|
|
T_ad_start_date
|
Date
|
N
|
|
N
|
|
T_ad_exp_date
|
Date
|
N
|
|
N
|
|
T_ad_status
|
Char(10)
|
Y
|
Active, Hold, Expired
|
N
|
Table Name: M_Mem_Cat
|
Characteristic
|
||||
Datatype
(Width)
|
NULL
(Y/N)
|
Constraint
|
Auto Inc. (Y/N)
|
||
Column Name
|
Cat_no
|
int(5) unsigned
|
N
|
Primary Key
|
Y
|
Cat_name
|
Varchar(200)
|
N
|
|
N
|
|
Cat_Desc
|
varchar(200)
|
N
|
|
N
|
SYSTEM IMPLEMENTATION
System Implementation is the process
of making the newly designed system fully operational. The system is
implemented after careful testing.
IMPLEMENTATION PLANNING
Initially
a primary implementation plan is prepared to schedule and manage different
actives that must be completed for a successful system implementation. The
preliminary plan serves as a basic for checking the availability of resources
for implementation activities. A complete implementation plan includes the
following items
Ø
System training plan
Ø
System test plan
Ø
System conversion plan
Ø
Overall implementation
plan
USER TRAINING
The
training should include everyone associated with the implementation, use operation or maintenance of a new system.
Hands on training to a lab staff are essential to make the comfortable with the
system.
POST
IMPLEMENTATON REVIEW
When
computer based systems are built therefore we must develop mechanism for
evaluating controlling and making modifications, maintenance issued to improve
the case with which the changes can be accommodated and reduce the amount of
expended on its maintenance activity occurs because it is unreasonable to
assume that software testing will uncover all latest errors in a large software
system. The final event in the post implementation flow is review that
revalidates all elements of the system configuration and ensures correctness,
after the software maintenance, software reviews is being conducted for future
maintenance effort and provides feedback, which is important to effectively
management of software organization.
CODING
First phase of implementation is coding. Coding can be done
in two ways. One by automatic program code and other by programmer’s manually
written code. A code generator is a suite of programs that matches the input to
an appropriate code template and from these produces modules of code. The code
is made simple in such a way that another programmer can easily understand and
work on that in future. The crucial phase in the system development life cycle
is the successful implementation of the new system design. The process of
converting as new or revised system into an operational one is known as system
implementation. This includes all those activities that take place to convert
from an old system to a new system. The system can be implemented only after a
through testing is done and if it is found to work according to the
specifications. The most crucial stage in achieving a new successful system and
giving confident on the new system for the users is that it will work
effectively and efficiently. If involves careful planning,investigation of the
current system and its constraints on implementation, design of methods to achieve
the change over.
Introduction
to System Analysis
System
A system
is an orderly group of interdependent components linked together according to a
plan to achieve a specific objective. Its main characteristics are
organization, interaction, interdependence, integration and a central
objective.
System Analysis
System
analysis and design are the application of the system approach to problem
solving generally using computers. To reconstruct a system the analyst must
consider its elements output and inputs, processors, controls, feedback and
environment.
Analysis
Analysis is a detailed study of the various
operations performed by a system and their relationships within and outside of
the system. One aspect of analysis is defining the boundaries of the system and
determining whether or not a candidate system should consider other related
systems.
During
analysis data are collected on the available files decision points and
transactions handled by the present system. This involves gathering information
and using structured tools for analysis.
Existing System
Advertising
is carried out through different media such as print, online and broadcasting.
In the online advertising system, companies have to pay huge amounts to
advertise their products on a popular website.
Disadvantages of
Existing System
- In this system, advertising
is a costly affair.
- Advertising cost does not
substantiate responses received by the ads.
- Maximum viewership of the ads
is not achieved.
Proposed System
- This is a content-targeted
advertising program
- It delivers relevant text and
image advertisement that are precisely targeted to the website
- Earnings are according to the
number of links displayed on the website and on the number of clicks on
these links.
- Businesses can specify the
limits for display of ads.
Advantages of the
Proposed System
- Cost involved in advertising
is relatively low.
- Smaller and mid-sized
companies can make use of this system effectively
- The website owner also earns
based on the clicks made on the sponsored links. Thus the advertising
company as well as the website owner is benefited.
- Unwanted ads are not
displayed on the website
- This mode of advertising is
more effective and popular than any other modes of advertising.
- Adsense increases visibility
of the company’s business and increases traffic to the website.
Implementation
Procedure
Technology
Front End
: ASP.Net with C #
GUI :
Visual Studio 2005 / Framework 2.0
Back End : MS-SQL
2000 Server
SQL
Server User ID : sa
SQL Server Password :
sqlserver
Developed by:
Installation Guide
- Restore the Database
(Start->Program->Enterprice Manager->Open->Data Base->Right
Click->Alltask->RestoreDatabase)
- Open the Source code directory and click on .sln file
- Run the Project
IIS Server
If u run this project to two or more system Means:
1. Install IIS Server in ur PC.
2. Go to Run->inetmgr->Website->Default
Website->Right click->New -
Virtual Directory->next->Alais
Name->next->choice Directory->click
next- >select all check boxs->click
next->finish.
3. Open
->Internet Explorer->Type->http://local/cms/login.aspx
Local->ur system Name.
cms->alais Name.
Login.aspx->project start page.
Waterfall Model
Top to bottom approach
It will be executing
one by one of the SDLC process
The design Starts
after completing the requirements analysis coding begins after design …
Advantages
Implementation cost is very less
Execute the SDLC one by one in the
sequential manner
Disadvantages
Once implemented it is impossible
change the requirements
Want to change the requirement ,
have to take the revert back it will take too much of time .
Time consuming
Unit Testing
Unit-smallest testable
piece of software.
A Unit Can be compiled
/assembled/linked/loaded.
Integration Testing
Testing needed as the
elements of a system are being combined.
Regression Testing
To ensure that the
code changes have not had an adverse affect to the other modules or an existing
functions.
Retesting after fix
the bug (or) after the modification in the application.
Regression test is
done after fix the bug , it is done when new enhancements (or) changes are done
in the application.
Stress /Volume Testing
To test the weakness
of the system with respect handling of large amounts of data during the short
time periods.
Usability Testing.
Usability means that
systems are easy and fast to learn,efficient to use ,easy to remember.
Users can achieve
their goal in the particular environment.
Complete Project Code
Admin Login Page
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Data.SqlClient;
using System.Web.SessionState;
using System.IO;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
public partial class A_Login : System.Web.UI.Page
{
SqlConnection con =
new SqlConnection(ConfigurationSettings.AppSettings["ConnectionString"]);
SqlDataAdapter adp;
DataSet ds;
protected void
Page_Load(object sender, EventArgs e)
{
if
(!this.IsPostBack)
{
}
}
protected void
Button1_Click(object sender, EventArgs e)
{
adp = new
SqlDataAdapter("select * from M_Admin where Admin_name='" +
TextBox1.Text + "' and Admin_pwd='" + TextBox2.Text + "'",
con);
ds = new
DataSet();
adp.Fill(ds);
if
(ds.Tables[0].Rows.Count != 0)
{
Session["Admin_id"] =
ds.Tables[0].Rows[0].ItemArray[1].ToString();
Session["Admin_name"] =
ds.Tables[0].Rows[0].ItemArray[2].ToString();
Session["Admin_pwd"] =
ds.Tables[0].Rows[0].ItemArray[3].ToString();
Session["Admin_fname"] =
ds.Tables[0].Rows[0].ItemArray[4].ToString();
Response.Redirect("A_Home.aspx");
}
else
{
Label21.Visible = true;
Label21.Text = "Invalid User
name & Password";
TextBox1.Text = "";
TextBox2.Text = "";
}
}
}
User Details code
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.ComponentModel;
using System.Web;
using System.Web.Security;
using System.Data.SqlClient;
using System.IO;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
public partial class A_UserDetails : System.Web.UI.Page
{
SqlConnection con =
new SqlConnection(ConfigurationSettings.AppSettings["ConnectionString"]);
//SqlCommand cmd;
//DataSet ds;
protected void
Page_Load(object sender, EventArgs e)
{
Label3.Text =
Session["Admin_fname"].ToString();
if
(!this.IsPostBack)
{
bind();
}
}
private void bind()
{
SqlDataAdapter
sda = new SqlDataAdapter("select Admin_id,Admin_fname, left(Admin_DOC,11)
As Admin_DOC from M_Admin", con);
DataSet ds =
new DataSet();
sda.Fill(ds);
GridView1.DataSource = ds;
GridView1.DataBind();
}
protected void
GridView1_RowDeleting(object
sender,System.Web.UI.WebControls.GridViewDeleteEventArgs e)
{
con.Open();
GridViewRow r =
GridView1.Rows[e.RowIndex];
string c0 =
r.Cells[0].Text;
string d =
"delete from M_Admin where Admin_id='" + c0 + "'";
SqlCommand cmd
= new SqlCommand(d, con);
cmd.ExecuteNonQuery();
bind();
con.Close();
}
protected void
LinkButton1_Click(object sender, EventArgs e)
{
Session["Admin_id"] = "";
Session["Admin_name"] = "";
Session["Admin_pwd"] = "";
Response.Redirect("A_Login.aspx");
}
}
Testing and Result
Introduction for Testing
Definition
Unit
testing is a development procedure where programmers create tests as they
develop software. The tests are simple short tests that test functionally of a
particular unit or module of their code, such as a class or function.
Using open
source libraries like cunit, oppunit and nun it (for C, C++ and C#) these tests
can be automatically run and any problems found quickly. As the tests are
developed in parallel with the source unit test demonstrates its correctness.
Software
testing identifies errors at an early stage if included at each stage. A
planned testing identifies the difference between the expected results and the
actual results.This helps to make software more rugged and reliable. Testing is
applied at different levels in the software development life cycle, but the
testing done is different in nature and has different objectives at each label.
Testing
plays a very critical role in determining the reliability and efficiency of the
software and hence is very important stage in software development. Tests are
to be conducted on the software to evaluate its performance under a number of
conditions. Ideally we should do so at the level of each module and also when
all of them are integrated to form the complete system.
TYPES OF TESTING
The two main types of testing are:
1. WHITE BOX TESTING (OR STRUCTURAL TESTING)
The
white box testing focused on the structural requirements of the software. Here
the test cases are decided based on the logic of the modules to be tested. This
testing is used for testing lower levels.
2. BLACK BOX TESTING (OR FUNCTIONAL TESTING)
The
black box testing focused on the functional requirements of the software. That
is for a designer the black box testing will give the desired results for what
it is meant for, it means that he has to exercise all functional requirements
of a program. The black box testing is done after the software is developed.
Validation and
System Testing
Validation
testing is a concern which
overlaps with integration testing. Ensuring that the application fulfils its
specification is a major criterion for the construction of an integration test.
Validation testing also overlaps to a large extent with System Testing, where the
application is tested with respect to its typical working environment.
Consequently for many processes no clear division between validation and system
testing can be made. Specific tests which can be performed in either or both
stages include the following.
- Regression Testing: Where this version of the software is
tested with the automated test harness used with previous versions to
ensure that the required features of the previous version are skill
working in the new version.
- Recovery Testing: Where the software is deliberately interrupted
in a number of ways off, to ensure that the appropriate techniques for
restoring any lost data will function.
- Security Testing: Where unauthorized attempts to operate the
software, or parts of it, attempted it might also include attempts to
obtain access the data, or harm the software installation or even the
system software. As with all types of security determined will be able to
obtain unauthorized access and the best that can be achieved is to make
this process as difficult as possible.
- Stress Testing: Where abnormal demands are made upon the
software by increasing the rate at which it is asked to accept, or the
rate t which it is asked to produce information. More complex tests may
attempt to crate very large data sets or cause the soft wares to make
excessive demands on the operating system.
- Performance testing: Where the performance requirements, if
any, are checked. These may include the size of the software when
installed, type amount of main memory and/or secondary storage it requires
and the demands made of the operating when running with normal limits or
the response time.
- Usability Testing: The process of usability measurement was
introduced in the previous chapter. Even if usability prototypes have been
tested whilst the application was constructed, a validation test of the
finished product will always be required.
- Alpha and beta testing: This is where the software is released
to the actual end users. An initial release, the alpha release, might be
made to selected users who be expected to report bugs and other detailed
observations back to the production team. Once the application changes
necessitated by the alpha phase can be made to larger more representative
set users, before the final release is made to all users.
The final process should be a Software audit where the complete software project is checked to
ensure that it meets production management requirements. This ensures that all
required documentation has been produced, is in the correct format and is of
acceptable quality. The purpose of this review is: firstly to assure the
quality of the production process and by implication construction phase
commences. A formal hand over from the development team at the end of the audit
will mark the transition between the two phases.
- Integration Testing:
Integration Testing can proceed in a number of different
ways, which can be broadly characterized as top down or bottom up. In top down
integration testing the high level control routines are tested first, possibly
with the middle level control structures present only as stubs. Subprogram
stubs were presented in section2 as incomplete subprograms which are only
present to allow the higher. Level control routines to be tested.
Top down testing can proceed in a depth-first or a breadth-first
manner. For depth-first integration each module is tested in increasing detail,
replacing more and more levels of detail with actual code rather than stubs.
Alternatively breadth-first would processed by refining all the modules at the
same level of control throughout the application .in practice a combination of
the two techniques would be used. At the initial stages all the modules might
be only partly functional, possibly being implemented only to deal with
non-erroneous data. These would be tested in breadth-first manner, but over a
period of time each would be replaced with successive refinements which were
closer to the full functionality. This allows depth-first testing of a module
to be performed simultaneously with breadth-first testing of all the modules.
The other major category of integration testing is Bottom
Up Integration Testing where an individual module is tested form a test
harness. Once a set of individual module have been tested they are then
combined into a collection of modules ,known as builds, which are then tested
by a second test harness. This process can continue until the build consists of
the entire application. In practice a combination of top down and bottom-up
testing would be used. In a large software project being developed by a number
of sub-teams, or a smaller project where different modules were built by
individuals. The sub teams or individuals would conduct bottom-up testing of
the modules which they were constructing before releasing them to an
integration team which would assemble them together for top-down testing.
- Unit Testing:
Unit testing deals with testing a unit as a whole. This would test the
interaction of many functions but confine the test within one unit. The exact
scope of a unit is left to interpretation. Supporting test code, sometimes
called Scaffolding, may be necessary to support an individual test.
This type of testing is driven by the architecture and implementation teams.
This focus is also called black-box testing because only the details of the
interface are visible to the test. Limits that are global to a unit are tested
here.
In the construction industry, scaffolding is a temporary,
easy to assemble and disassemble, frame placed around a building to facilitate
the construction of the building. The construction workers first build the
scaffolding and then the building. Later the scaffolding is removed, exposing
the completed building.similarly, in software testing, one particular test may
need some supporting software. This software establishes can a correct
evaluation of the test take place. The scaffolding software may establish state
and values for data structures as well as providing dummy external functions
for the test. Different scaffolding software may be needed form one test to
another test. Scaffolding software rarely is considered part of the system.
Some times the scaffolding software becomes larger than the
system software being tested. Usually the scaffolding software is not of the
same quality as the system software and frequently is quite fragile. A small
change in test may lead to much larger changes in the scaffolding.
Internal and unit testing can be automated with the help of
coverage tools. Analyzes the source code and generated a test that will execute
every alternative thread of execution.
Typically, the coverage tool is used in a slightly different way. First
the coverage tool is used to augment the source by placing information prints
after each line of code. Then the testing suite is executed generating an audit
trail. This audit trail is analyzed and reports the percent of the total system
code executed during the test suite. If the coverage is high and the untested
source lines are of low impact to the system’s overall quality, then no more
additional tests are required.
Conclusion
Adsense –
Online Advertisement System is completely based on the Win-Win-Win concept as
all the three will be profited. The admin will be profited by the amount paid
by the clients who are allocated space in his website for advertising. Secondly
the clients will be profited as the End user visits his sponsored links. Lastly
the user is profited by viewing the valuable information that is present in the
various advertised links.
By this we
can conclude that this project satisfies the desire and essentiality of all the
three, who are involved in this scenario.
Bibliography
REFERENCES
& .NET
Programmer’s Reference
By:
Sussman
&
Professional
SQL Server 2000 DTS (Data Transformation Services)
By:
Chaffin
& Introduction to Algorithms, 2nd edition. MIT
Press, McGraw-Hill.
RELATED LINKS
Ø
.NET Documentation http://www.wrox.com/
en.wikipedia.org/wiki/piracy protection
Future Enhancement
\The objectives of this
project are:
·
To develop an application that enables the user to
create his own webpage, customize it according to his needs.
·
Each user will be provided a unique user id and
password which he can use to edit and update his page.
·
User can use his web page to advertise his own
products and also place links for other advertisements. Revenue can be earned
by linking it with Google Ad Sense.
Benefits of the project
- Allow the users to receive orders and sell his products.
- The user can advertise his products on his web page.
·
Enable user to create and maintain his web page.
Comments
Post a Comment