Charity
Charity
Charity
OF COMPUTER SCIENCE
TABLE OF CONTENTS
1.Introduction 4
1.1.Project Profile 4
1.2.Modules 4
1.3. overview of project 5
1.4. Organization Overview 5
2. System Specification 6
2.1. About The Hardware 6
2.2. About The Software 6
3.Languages 7
3.1.Java 7
3.1.1. Java Platforms 7
3.1.2Main Use Of Java 8
3.3. Css 9
3.4. Html 9
4.Database 10
4.1 MySQL 10
5.Operating System 11
5.1.Windows 11
6.Webserve 12
6.1. Apache 12
7.1. NetBeans 12
1
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
8.System Analysis 13
9. System Design 18
11.Table Structure 26
2
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
13.System Security 34
16. Conclusion 38
17. Bibliography 39
18. Appendix 40
18.2. Code 46
3
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
1. INTRODUCTION
1 .1.Project Profile
Charity is an act of kindness, where a person who has financially more than enough
of what he or she needs contributes a part of his or her surplus income for the fullfilment of
the needs of those who are less capable. The majority of NGOs has experienced difficulties in
getting funds or other required things. Getting donor is a very hard task, and sometime dealing
with some donor‟s conditions can be a big challenge for NGOs to fullfil it. This E charity
manager will help NGOs to find donors easily. This system has three modules namely,
Admin, NGO and Donor. Admin can login using credentials and manage the request raised by
NGO by approving or rejecting it. Approval will be done after verifying the NGO documents
uploaded by NGO. Admin will get the report of NGOs who get donations. NGOs can register
and raise request by uploading NGO documents. Once admin gets the approval, they can login
using credentials. NGO can raise request in need to the various registered donor. They can
view the previous events list and donation report. Donor can simply register and login using
credentials. They will get the notification of the request raised by NGOs for donation. They
need to fill the details regarding donation on approval of request. Donor will get the date of
donation. They can also view Donation history
1.2 Modules
• Admin
• Charity Foundation
• User
4
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
Financial figures (e.g. tax refund, revenue from fundraising, revenue from sale of
goods and services or revenue from investment) are indicators to assess the financial
sustainability of a charity, especially to charity evaluators. This information can impact a
charity's reputation with donors and societies, and thus the charity's financial gains.Charitable
organizations often depend partly on donations from businesses. Such donations to charitable
organizations represent a major form of corporate philanthropy.
In order to meet the exempt organizational test requirements, a charity has to be exclusively
organized and operated. In order to receive and pass the exemption test, a charitable
organization must follow the public interest and all exempt income should be for the public
interest. For example, in many countries of the Commonwealth, charitable organizations must
demonstrate that they provide a public benefit.
5
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
2. SYSTEM SPECIFICATION
2.1. About The Hardware
Memory : 4GB
Database : MySQL
IDE : NetBeans
6
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
3. LANGUAGES
3.1.Java
Java is a widely used programming language expressly designed for use in the distributed
environment of the internet. ... Java can be used to create complete applications that may run
on a single computer or be distributed among servers and clients in a network.
Java was designed to have the look and feel of the c++ programming language, but is simpler
to use and enforces an oop model. Java can be used to create complete applications that may
run on a single computer or be distributed among servers and clients in a network. It can also
be used to build a small application module or applet for use as part of a webpage.
3.1.1Java platforms
The three key platforms upon which programmers can develop Java applications are:
Java SE- Simple, stand-alone applications are developed using Java Standard Edition.
Formerly known as J2SE, Java SE provides all of the APIs needed to develop
traditional desktop applications.
Java EE- The Java Enterprise Edition, formerly known as J2EE, provides the ability to
create server-side components that can respond to a web-based request-response cycle.
This arrangement allows the creation of Java programs that can interact with Internet-
based clients, including web browsers, CORBA-based clients and even REST-
and SOAP-based web services.
Java ME- Java also provides a lightweight platform for mobile development known as
Java Micro Edition, formerly known as J2ME. Java ME has proved a prevalent
platform for embedded device development, but it struggled to gain traction in the
smartphone development arena.
7
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
It is easy for developers to write programs which employ popular software design
patterns and best practices using the various components found in Java EE. For
example, frameworks such as Struts and JavaServer Faces all use a Java servlet to
implement the front controller design pattern for centralizing requests.
A big part of the Java ecosystem is the large variety of open source and community
built projects, software platforms and APIs. For example, the Apache
Foundation hosts a variety of projects written using Java, including simple logging
frameworks for Java (SLF4J), both Yarn and Hadoop processing
frameworks, Microservices development platforms and integration platforms.
Java EE environments can be used in the cloud as well. Developers can build, deploy,
debug and monitor Java applications on Google Cloud at a scalable level.
Although Java is widely used, it still has fair criticisms. Java syntax is often criticized
for being too verbose. In response, several peripheral languages have emerged to
address these issues, including Groovy. Due to the way Java references objects
internally, complex and concurrent list-based operations slow the JVM.
The Scala language addresses many of the shortcomings of the Java language that
reduce its ability to scale
8
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
3.3.CSS
Cascading style sheets (CSS) is a simple mechanism for adding style (e g: fonts ,
colors , spacing) to web documents. These pages contain information on how to learn and use
CSS and on available software. They also contain news from the CSS working group.
3.4.HTML
Web browsers receive HTML documents from a web server or from local storage and
render the documents into multimedia web pages. HTML describes the structure of a
webpage semantically and originally included cues for the appearance of the document.
HTML elements are the building blocks of HTML pages. With HTML constructs ,
images and other object such as interactive forms may be embedded into the rendered
page.HTML provides a means to create structured documents bye denoting structural
semantics for text such as headings , paragraphs, list, links , quotes and other items.
HTML can embed programs written in a scripting language such as java script , which
affects the behavior and content of webpages inclusion of CSS defines the look and layout of
content. The world wide web consortium, former maintainer of the CSS standards, has
encouraged the use of CSS over explicit presentational HTML since 1997.
9
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
4. DATABASE
4.1 .Mysql
MySQL, the most popular Open Source SQL database management system, is
developed, distributed, and supported by Oracle Corporation.If that is what you are looking
for, you should give it a try. MySQL Server can run comfortably on a desktop or laptop,
alongside your other applications, web servers, and so on, requiring little or no attention. If
you dedicate an entire machine to MySQL, you can adjust the settings to take advantage of all
the memory, CPU power, and I/O capacity available. MySQL can also scale up to clusters of
machines, networked together.MySQL Server was originally developed to handle large
databases much faster than existing solutions and has been successfully used in highly
demanding production environments for several years. Although under constant development,
MySQL Server today offers a rich and useful set of functions. Its connectivity, speed, and
security make MySQL Server highly suited for accessing databases on the Internet.
MySQL is released under an open-source license. So you have nothing to pay to use
it.
MySQL is a very powerful program in its own right. It handles a large subset of the
functionality of the most expensive and powerful database packages.
MySQL works on many operating systems and with many languages including PHP,
PERL, C, C++, JAVA, etc.
MySQL works very quickly and works well even with large data sets.
MySQL is very friendly to PHP, the most appreciated language for web
development.MySQL supports large databases, up to 50 million rows or more in a
table. The default file size limit for a table is 4GB, but you can increase this (if your
operating system can handle it) to a theoretical limit of 8 million terabytes (TB).
10
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
5. OPERATING SYSTEM
5.1. Windows
Windows 10 is a series of personal computer operating system produced by
Microsoft as part of its Windows NT family of operating systems. It is the successor to
Windows 8.1, and was released to s on July 15, 2015. Windows 10 receives new builds on an
ongoing basis, which are available at no additional cost to users, in addition to additional
test builds of windows 10 which are available to windows insiders. The latest stable build of
Windows 10 is version 1903(may 2019 update).Device in enterprise environments can receive
these updates at a slower pace ,or use long-term support milestones that only receive critical
updates ,such as security patches, over their ten-year.
Life span of extended support One of windows 10‟s most notable features is its support of
universal apps, an expansion of the Metro-style apps first introduced in windows 8 .
Universal apps can be designed to run across multiple Microsoft product families with nearly
identical code-including PCs , tablets , smartphones and Mixed Reality. The windows user
interface was revised to handle transitions between a mouse-oriented interface and a
touchscreen optimized interface based on available input devices-particularly on 2-in-1 PCs,
both interfaces include an updated start menu which incorporates elements of windows 7‟s
traditional start menu with tiles of windows 8.
11
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
6. WEB SERVER
6.1. Apache
The Apache HTTP Server, colloquially called Apache, is free and open-source
cross-platform web server software, released under the terms of Apache License 2.0. Apache
is developed and maintained by an open community of developers under the auspices of the
Apache Software Foundation.
The vast majority of Apache HTTP Server instances run on a Linux distribution, but current
versions also run on Microsoft Windows and a wide variety oUnixlike systems. Past versions
also ran on OpenVMS, NetWare, OS/2 and other operating systems, including ports to
mainframes.
7.1. NetBeans
NetBeans IDE lets you quickly and easily develop Java desktop, mobile, and web
applications, as well as HTML5 applications with HTML, JavaScript, and CSS.NetBeans IDE
8.2 provides out-of-the-box code analyzers and editors for working with the latest Java 8
technologies--Java SE 8, Java SE Embedded 8, and Java ME Embedded 8. The IDE also has a
range of new tools for HTML5/JavaScript, in particular for Node.js, KnockoutJS, and
AngularJS; enhancements that further improve its support for Maven and Java EE with
PrimeFaces; and improvements to PHP and C/C++ support. NetBeans IDE 8.2 is available in
English, Brazilian Portuguese, Japanese, Russian, and Simplified Chinese.
12
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
8. SYSTEM ANALYSIS
System analysis is concerned with studying the existing system, identifying
the problems and the creation of the requirement specification. To launch the system analysis,
we need a master plan detailing the steps to be taken. Major steps are defining requirements,
studying the present system to verify the problems, defining the performance expected by the
proposed system.
13
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
8.3.Feasibility Study
A feasibility study is needed to determine if a project or end result of charity
management system is feasible and beneficial. The main objective of feasibility study is to test
the technical, social and economic feasibility of developing a new computer system. “Charity
Management System” had undergone the feasibility study so that the proposed system is
possible for development deployment in insurance company. Investigating the existing
system in the areas under investigation and generating ideas about a new system does this.
The key considerations involved in the feasibility analysis are the following:
Economic feasibility
Technical feasibility
Operational feasibility.
14
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
Charity Management System also uses the minimum technologies for the creation
of the web based application. The existing system has also required minimum technical
requirements. So the proposed system is said to be technically feasible.
The proposed system Charity Management System does not produce any problem
to existing customers, organization etc. It reduces the drawback of existing system. All these
reasons make the new system operationally feasible.
15
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
8.4.Proposed System
The main objective of propose system is to meet the demands of the organization
and to overcome the drawbacks of the existing system. The major objectives of implementing
the system are the following
One main objective of the system is to decrease the cost. Due to the
implementation of the system the cost for maintaining the transaction section will be
decreased. Manual system keeps so many records for transaction. At the time we implement
the proposed system; all the files are appended automatically during the transaction tie. In
such a way we can decrease the cost.
By automating the system we can increase the speed of the overall system. Then
the speed increases the transaction is carried out quickly .Existing system is manual one and
because of the number of errors also increases. The proposed system can avoid the possibility
of errors. We have included a number of special features to our project for the proper
functioning of the system. We have designed the system as a user friendly system as even a
very little knowledge a user can operate by the system.
Security is an important feature of the system. The most important feature is data.
We have provided enough measures to prevent unauthorized data handling. Password
technique is used for the security of data. Searching technique has been enhanced a lot during
the proposed system.
To debug the existing system, remove procedures those cause data redundancy, make
navigational sequence proper. To provide information about audits on different level and also
to reflect the current work status depending on organization/auditor or date. Password
mechanism is used.
16
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
17
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
9. SYSTEM DESIGN
System design sits at the technical kernel of the software engineering and is applied regardless
of the software process model that is used. Beginning once software requirements have been
analyzed and specified, software design is design first technical activity that is used to build
and verify the software. Each activity (designing, coding and testing) transform information in
a manner that ultimately results in validated computer software.
Input design is a part of overall system design, which requires very careful
attention. Generally, software is prone to error if the user operating on it is not aware of
constraints. Usual procedures for eliminating errors are carried out in the application program
itself. However, there are cases where the data redundancy and consistency are violated. The
goal of designing input data entry is easy, logical and free from errors as possible. In entering
data, operators need to know the following.
When we approach input data design, we design the source documents that
capture the data and then select the media used to enter them into computer or the system.
While entering the data the application program checks for errors. All the input screens used
have strict validation for null checking and the data type wherever necessary.
The main input forms that are used in this system include:
Login
By using the username and password user can login into the system.
18
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
Outputs from computer system are required primarily to communicate the result
of processing to users. Computer output is the most important and direct source of information
to the user. Efficient, intelligible output should improve the system‟s relationship with the
user and help in decision making. The output devices to consider depend on factors as
compatibility of the device with the system, response time requirements, expected print
quality, number of copies needed etc.
In the case of Insurance Management System the output is designed in such a way
that the user gets maximum benefit from the same. The user is displayed every single data in
the system.
user details
19
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
To start the system design, something analogue to the architecture blue print as a starting
point to design is required. It is a way to focus on functions rather than physical
implementation. One such tool is a DFD.
Structured analysis is a set of techniques and graphical tools that help the analyst
to develop a new kind of system specification that are easily understandable to the user.
DFD‟s show the major decompositions of the system functions and their interfaces. The DFD
is graphic and presents a picture of what is being specified and is conceptually easy to
understand presentation of the application.
One important feature of DFD‟s is that it is logical rather than physical. The
elements of the system do not depend on vendor or hardware. They specify in precise, concise
manner the working of the system and how it hangs together.
DFD is the graphic representation of data movement process, and files used in
support of an information system. There are several rules of thumb used in drawing DFDs.
The four main symbols used for developing a DFD are shown below:
20
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
Double Square
The square represents the source and destination of the system.
Circle
A Circle represents a process that transforms incoming data flows into outgoing data flows.
Arrows
An arrow is used to represent data flows- data in motion
Open Rectangle
An open rectangle is a data store at rest, or a temporary repository of data.
21
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
22
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
LEVEL 1 ADMIN
23
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
24
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
LEVEL 1 USER
25
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
11.TABLE STRUCTURE
1. Login Table
Primary key:Lid
2.User Table
26
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
3.Charity Table
4.Members Table
27
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
5.Event Table
Primary Key: Ev_id
Name Data type Constrains Description
Ev_id Int(10) primarykey Id of the event
cid Int(10) Foreign key Charity id
Description Varchar(200) null Description about the
evnt
Time Time null time
Date Date null date
Image Varchar(100) null images
6.Donation Table
Primary Key: D_id
28
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
7.Allocation Table
29
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
This section discusses about the business, technical or resource related constraint
that may keep us from performing all tests necessary. Time schedule is a major constraint
when we talk about testing at the site. Testing the security of the software is one major
constraint so we have to rely on our own knowledge and have to trust the software for the
security.
Unit Testing
Integration Testing
Validation Testing
Output Testing
User Acceptance Testing
Alpha Testing
Beta Testing
30
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
Unit testing focuses verification efforts on the smallest unit of software design,
the module. This is also known as module testing. The modules are tested separately. These
testing are carried out during programming stage itself.
In our web based application Charity Management System we tested each forms
and corrected the errors. Registration forms of users forms are carefully tested for unique
providers email id, users email id .If user gives the already existing providers email id, users
email id proper message is provided by the application.
31
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
Beta testing comes after alpha testing and can be considered a form of
external user acceptance testing Versions of the software, known as beta versions, are released
to a limited audience outside of the programming team. The software is released to groups of
people so that further testing can ensure the product has few faults or bugs. Sometimes, beta
versions are made available to the open public to increase the feedback field to a maximal
number of future users.
32
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
A test case is a set of conditions or variables under which a tester will determine
whether a system under test satisfies requirements or works correctly. The process of
developing test cases can also help find problems in the requirements or design of an
applicate.
33
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
The security and integrity of data is ensured in proposed system. The access
to data is restricted to those who register with the system. While registering with the system,
the users are provided with a username and password. Only the registered person can login
into to the system. The username and password determine which user is login.
34
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
Implementation of E Charity Manager is the final stage and it‟s an important phase.
It involves the individual programming; system testing, user training and the operational
running of developed proposed system that constitutes the application subsystems. One major
task of preparing for implementation is education of users, which should really have been
taken place much earlier in the project when they were being involved in the investigation
and design work. During the implementation phase system actually takes physical shape. In
order to develop a system implemented, planning is very essential. The implementation phase
of the software development is concerned with translating design specifications in to source
code.
35
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
Even when the new system has gone live there may be need for some system
design activity. This will see from changes that are necessitated by the dynamic nature of the
system and its environment. Changes may be required to correct faults or to bring about
improvements, and may arise as part of normal running of the system or as a result of a
review of the system performance. Changes or amendments and documentations and perhaps
handled by specialist group of maintenance staff.
36
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
The database and the information can be updated to the latest coming versions.
There are also possibilities for enhancing and further developing the project with the latest
information and needs of the portal.
37
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
15. CONCLUSION
. The E Charity Manager project was successfully completed within the time span
allotted .The drawbacks of the existing system as listed before are fully evacuated. All the
existing inconsistencies are fully solved as this system is implemented. This reduced the
burden of the administration of the system. All the modules are tested separately and put
together to form the main system. Finally the system is tested with real data and it worked
successfully. Thus the system has fulfilled the entire objective defined.
The system has been developed in an interactive manner; the reports generated by
the system are clear. The system is flexible, user friendly and has its own full data security
and all data recovery facility. The developed system has mainly three modules admin ,charity
foundation and user.
38
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
16. BIBLIOGRAPHY
System analysis and design – Marvin Gore & John Stub.
Introduction to DataBase Management System – RamesElmasri & Shamkant
.B.Navathe.
www.google.co.in
http://java.sun.com/docs/books/tutorial/getStarted/index.html
http://www.ibiblio.org/javafaq/javatutorial.html
http://www.tutorialized.com/tutorials/Java
http://www.google.com
http://www.wikipedia.org
http://www.microsoft.com//windows10
39
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
17.APPENDIX
17.1 Screenshots
1.Home Page
40
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
41
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
42
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
43
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
44
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
9.Loginpage
45
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
17.2.Coding
46
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
login
<!--
Author: W3layouts
-->
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<!--webfonts-->
<!--<link
href='http://fonts.googleapis.com/css?family=Open+Sans:600italic,400,300,600,700'
rel='stylesheet' type='text/css'>-->
<!--//webfonts-->
</head>
<body>
<!-----start-main---->
<div class="main">
47
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
<div class="login-form">
<h1>Member Login</h1>
<div class="head">
<img src="entrar_shadow-pack/entrar_shadow-
pack/images/user.png" alt=""/>
</div>
<form action="login_action.jsp">
<div class="submit">
<input type="submit"
onclick="myFunction()" value="LOGIN" >
</div>
<p><a href="organization/organization.jsp"
style="color:#21A957;">Organization Registration</a></p><br>
<p><a href="SCHOOL/school_reg.jsp"
style="color:#21A957;">School Registration</a></p>
</form>
</div>
<!--//End-login-form-->
<!-----start-copyright---->
<div class="copy-right">
<p>Template by <a
href="http://w3layouts.com">w3layouts</a></p>
48
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
</div>
<!-----//end-copyright---->
</div>
<!-----//end-main---->
</body>
</html>
view users
<script type="text/javascript">
var request;
function getRequest()
if (window.XMLHttpRequest)
else if (winodw.ActiveXObject)
else
return null;
function doProcessing()
request = getRequest();
49
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
request.onreadystatechange = function()
document.getElementById("tbl").innerHTML = request.responseText;
request.send(null);
</script>
<form name="searchForm">
<tr>
<td>Organization</td>
<option value="0">-----select----</option>
<%
ResultSet res1=cn.select(org);
while(res1.next()){
%>
50
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
<option
value="<%=res1.getString("orgid")%>"><%=res1.getString("orgname")%></option>
<%
%>
</select></td>
</tr>
<div id="tbl">
<thead>
<tr>
<th>UserType</th>
<th>Organization</th>
<th>Name</th>
<th>age</th>
<th>gender</th>
<th>Qualification</th>
<th>Email</th>
<th>Photo</th>
<th>IFSC</th>
<th>Account Number</th>
</tr>
</thead>
<tbody>
51
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
<%
ResultSet res=cn.select(qry);
while(res.next())
%>
<tr>
<td><%=res.getString("usertname")%></td>
<td><%=res.getString("orgname")%></td>
<td><%=res.getString("cuname")%></td>
<td><%=res.getString("age")%></td>
<td><%=res.getString("gender")%></td>
<td><%=res.getString("qual")%></td>
<td><%=res.getString("email")%></td>
<td><%=res.getString("ifsc")%></td>
<td><%=res.getString("accountno")%></td>
</tr>
<% }%>
</tbody>
</table>
</div>
</form>
52
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
</div>
<%@include file="footer.jsp"
view councillor
<html lang="en">
<head>
<head>
<link href="https://cdnjs.cloudflare.com/ajax/libs/sweetalert/1.1.3/sweetalert.css"
rel="stylesheet" />
<script
src="https://cdnjs.cloudflare.com/ajax/libs/sweetalert/1.1.3/sweetalert.min.js"></script>
</head>
<body>
<h2>Approve Counsellor</h2>
<thead>
<tr>
<th>Counsellor Name</th>
<th>Address</th>
<th>Place</th>
<th>Contact No:</th>
<th>Email ID</th>
53
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
<th>Photo</th>
<th>Approve</th>
</tr>
</thead>
<tbody>
<%
String qry="select
cn.counsid,cn.counsname,cn.counsaddr,cn.plid,cn.counsphno,cn.email,cn.photo from
tbl_councellor cn where cn.status=0";
ResultSet res=cn.select(qry);
while(res.next())
%>
<tr>
<td><%=res.getString("counsname")%></td>
<td><%=res.getString("counsaddr")%></td>
<td><%=res.getString("plid")%></td>
<td><%=res.getString("counsphno")%></td>
<td><%=res.getString("email")%></td>
<td><img src="../COUNCELLOR/photo/<%=res.getString("photo")%>"
width="150px" height="150px"/></td>
<td><a
href="action/counsellor_action.jsp?id=<%=res.getString("counsid")%>&type=app">APPRO
VAL</a></td>
</tr>
<%
54
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
}%>
</tbody>
</table>
</div>
<br>
<br>
<h2>Approved Counsellor</h2>
<thead>
<tr>
<th>Counsellor Name</th>
<th>Address</th>
<th>Place</th>
<th>Contact No:</th>
<th>Email ID</th>
<th>Photo</th>
<th>Reject</th>
</tr>
</thead>
<tbody>
55
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
<%
String qry1="select
cn.counsid,cn.counsname,cn.counsaddr,cn.plid,cn.counsphno,cn.email,cn.photo from
tbl_councellor cn where cn.status=1";
ResultSet res1=cn.select(qry1);
while(res1.next())
%>
<tr>
<td><%=res1.getString("counsname")%></td>
<td><%=res1.getString("counsaddr")%></td>
<td><%=res1.getString("plid")%></td>
<td><%=res1.getString("counsphno")%></td>
<td><%=res1.getString("email")%></td>
<td><img src="../COUNCELLOR/photo/<%=res1.getString("photo")%>"
width="150px" height="150px"/></td>
<td><a href="javascript:void(0);"
onclick="myFunction('<%=res1.getString("counsid")%>','rej');">Reject</a></td>
</tr>
<%
}%>
</tbody>
</table>
</div>
<script>
56
SNGCAS PAINGOTTOOR CHARITY MANAGER DEPT.OF COMPUTER SCIENCE
function myFunction(id,typ){
swal({
title: "Reason!",
type: "input",
showCancelButton: true,
closeOnConfirm: false,
}, function (inputValue) {
return false
window.location.href =
'action/counsellor_action.jsp?val='+inputValue+"&id="+id+"&type="+typ;
});}
</script>
57