SlideShare una empresa de Scribd logo
1 de 93
ABSTRACT
Crossword puzzles require of the solver both an extensive knowledge of language, history
and popular culture, and a search over possible answers to find a set that fits in the grid. This dual
task, of answering natural language questions requiring shallow, broad knowledge, and of
searching for an optimal set of answers for the grid, makes these puzzles an interesting challenge
for artificial intelligence. A crossword is a word puzzle that normally takes the form of a square or
rectangular grid of black and white squares. Generation of crossword puzzles by hand is a very
tedious task, and automating this task through a computer program is also a complex task. This
complication arises from the fact that most crosswords include not just extensive vocabulary but
also phrases, slang language, abbreviations etc. The goal of this project was to use intelligent
techniques to emulate a crossword setter or constructor and generate or “compile” crossword
puzzles. The word-based approach is based on a simple implementation of the general constraint-
satisfaction framework, namely an assignment of values to a set of variables such that each meets
all the specified constraints. For crossword puzzles, the variables are the words which need to be
filled in, one variable for each of the words in the puzzle solution. The grid also provides the
initial constraints for each word, such as the number of letters, what overlap relationships the word
has with other words in the grid, etc. Finally, a dictionary provides the overall constraint that any
valid value for a variable must be in the dictionary.
CONTENT
Chapter No. Title Page No.
1. Introduction
1.1 About the Project
1.2 Project Description
2. Problem Definition
2.1 Existing System
2.2 Demerits
2.3Proposed System
2.4 Merits
3. System Study
4. System Specification
4.1 Software Requirements
4.2 Hardware Requirements
5. Software Specifications
5.1 Features of .NET
5.2 Features of SQL Server
6. System Design
6.1 Input Design
6.2 Database Design
6.3 Dataflow Diagram
6.4 Architecture Design
6.5 Use Case Diagram
6.6 E-R Diagram
6.7 Activity Diagram
7. System Testing And Maintenance
7.1 Unit Testing
7.2 Integrating Testing
7.3 Validation Testing
7.4 System Testing
7.5 Black Box Testing
8. System Implementation
9. Conclusion
10. Future Enhancement
11. Bibliography
Appendix
Screen Shots
Sample Coding
Reports
1. INRODUCTION
2. 1.1ABOUT THE PROJECT
The Cross puzzle word game is simple models of human behavior by letting people like you
play games with computers. Our goal is to understand what kinds of strategies people use in their
everyday life when they interact with other people. We’ve designed "games" that are similar to
some of situations we ordinarily encounter in life opportunities to cooperate or compete, share or
steal, and reward or punish. Then, we've designed computer programs that behave in different
ways in each of these games. To learn more about these games, click on "The games" link to the
left. One goal is to see how people respond to these computer programs. Which programs are
successful when they interact with real humans, and which programs fail? Another goal is to see
how people respond when they interact with different computer programs.The framework should
provide services to load and store files in this format. Loading and storing may be specialized by
game specific code if necessary. The framework must be able to show the state of the game as a
grid where each hint cell contains a number, a character, a string or an image. The length of strings
and the size of images may be limited by the game. The number of rows and columns does not
change during a game. However, the change of the size of a cell and thus the size of the grid should
be possible, as well as the change of the font size. All cells in the grid are of equal size. · The
framework should make it easy for the user to select the cell to enter the input. The framework
should be able to distinguish initial instruction and hint cells from the input cells and prevent
entering input in the former ones. The player should be able to correct the value she has entered
earlier. It should be possible to extend the processing of input by game specific checks and error
messages. · The player should be able to ask the framework for assistance by revealing the content
of either a random or a selected cell. · The framework must keep record on the time used in filling
the grid and the number of corrections made for each cell. The framework should support
unrestricted undo operation. The framework should be able to check the input against the correct
solution and the rules of the game either cell by cell during the game or once when all the cells
have been filled. It should be possible to attach game specific scoring and reporting of the results
to the checking. Although our models are much more simple than the real world, our hope is
that we can use these models to understand how people behave in different types of social
interactions.
1.2 PROJECT DESCRIPTION
MODULE LIST AND DESCRIPTION
 BOARD PANEL MODULE
 CREATE BOARD MODULE
 SUBSET MODULE
 UPDATE BOARD MODULE
BOARD PANEL MODULE
Implements the Fill and Pick Strategies and Arc-consistency. This is the main module
which is used for implementing the algorithm. The word pattern which allows the longest word is
chosen and is seeded. The database is queried depending on the partial assignment of this pattern.
The word list returned is stored in open List and the closed List is also initialized with the requisite
information. If the grid becomes inconsistent with this assignment, the pattern is filled with the
next word in the open List. If all subsequent words in the open List fail, then the grid is inconsistent
and we backtrack to the last instantiated intersecting pattern. The algorithm runs till we have a
complete consistent assignment for the entire grid.
CREATE BOARD MODULE
This module is used to create the board. To enter cross word details in the board. The
framework should be able to check the input against the correct solution and the rules of the game
either cell by cell during the game or once when all the cells have been filled. It should be possible
to attach game specific scoring and reporting of the results to the checking.
SUBSET MODULE
This module creates tables in the database and inserts records into them. Determine the
priorities of the scenarios according to their importance and ease of implementation. Finally, list
the main architectural risks on the modifiability and re-use of the framework.
UPDATE BOARD MODULE
The Update Board module contains all the methods for dealing with board updating
including resetting the board, filling a word pattern with a word, removing a word and reading the
word filled in a word pattern.
2. PROBLEM DEFINITION
In this project you should design a framework to support the implementation of crossword
puzzles and other grid based games in Java environment. Furthermore you should analyze the re-
usability of your framework. The aim of the framework is to assist the development of games the
basis of which is filling numbers or characters into a grid, crossword puzzles and various
mathematical games. A common feature in these games is the board organized as a grid of columns
and rows. A cell in the grid may contain hint information (numbers, characters, text or image).
There may also be empty cells that accept user input. The player fills in the empty cells one by one
and the game software checks that the rules of the game are followed. The game is over when there
are no more empty cells and the cells have been filled complying with the rules. The rules of the
game determine how the score will be counted. The score may be based, for example, on the time
spent for finding the solution, the number of corrections made, and the number of extra hints used.
2.1 EXISTING SYSTEM
Crossword puzzle generation is an NP-complete problem. It has been used by many
researchers to test intelligent algorithms and heuristic techniques. However with limited
processing power and a small dictionary he was unable to leverage the power of the word-by-word
instantiation approach and was relegated to using the letter-by-letter instantiation approach. Other
researchers followed suit using ever larger dictionaries and higher processing capabilities. The
outcome of this research has been that it is now widely understood that Crossword puzzle
generation is a fine example of a Constraint Satisfaction Problem. The variables consist of the
empty grid positions to be filled up and the values are dictionary words and/or phrases that can be
placed in these positions. The board itself presents constraints in the form of the size of the grid,
the number of empty grid positions to be filled, the length of word patterns and the intersection
between different “across” and “down” word patterns. An important consideration when filling
any empty word pattern is that the word to be filled must be a valid English language word. This
constraint means that a dictionary lookup is necessary.
2.2 DEMERITS
 Constraint Satisfaction Problem.
 Difficult to solve the cross word puzzle.
 No clues to find answers.
2.3 PROPOSED SYSTEM
The aim of the framework is to assist the development of games the basis of which is filling
numbers or characters into a grid, for example, and various mathematical games .A common
feature in these games is the board organized as a grid of columns and rows. A cell in the grid may
contain hint information (numbers, characters, text or image). There may also be empty cells that
accept user input. The player fills in the empty cells one by one and the game software checks that
the rules of the game are followed. The game is over when there are no more empty cells and the
cells have been filled complying with the rules. The rules of the game determine how the score
will be counted. The score may be based, for example, on the time spent for finding the solution,
the number of corrections made, and the number of extra hints used. This approach is based on
another view of the crossword puzzle, and suggests different algorithms. Instead of looking at a
solution as a set of words, it views the grid as a matrix of squares, and a solution, therefore, is an
assignment of characters to grid squares such that each string of characters, read across or down,
is a word in the dictionary. Constraints on the length of words are represented by marking
appropriate squares in the grid with "stop" flags, indicating that no letter goes in that square, and
scanning should stop. This is, obviously, a direct translation of the blackened squares on a
traditional crossword puzzle.
2.4 MERITS
 Easy to solve cross word puzzle via computer.
 Giving clues to solve the cross word puzzle.
 The grid may contain hint information.
3. SYSTEM STUDY
Feasibility Study:
The feasibility of the project is analyzed in this phase and business proposal is put forth
with a very general plan for the project and some cost estimates. During system analysis the
feasibility study of the proposed system is to be carried out. This is to ensure that the proposed
system is not a burden to the company. For feasibility analysis, some understanding of the major
requirements for the system is essential.
Feasibility is a practical extent to which a project can be performed successfully. To
evaluate feasibility, a feasibility study is performed, which determines whether the solution
considered to accomplish the requirements is practical and workable in the software or not. Three
key considerations involved in the feasibility analysis are
 Technical Feasibility
 Operational Feasibility
 Economic Feasibility
Technical Feasibility:
This study is carried out to check the technical feasibility, that is, the technical requirements
of the system. Any system developed must not have a high demand on the available technical
resources. This will lead to high demands on the available technical resources. This will lead to
high demands being placed on the client. The developed system must have a modest requirement,
as only minimal or null changes are required for implementing this system.
In technical feasibility the following issues are taken into consideration. Once the technical
feasibility is established, it is important to consider the monetary factors also. Since it might
happen that developing a particular system may be technically possible but it may require huge
investments and benefits may be less. For evaluating this, economic feasibility of the proposed
system is carried out.
Operational feasibility
The proposed system normally solves the problems and takes advantages of the
opportunities identified during scope definition, it satisfies the requirements identified in the
requirements analysis phase of system development. Since the statistical figures are stored in a
certain format in the computer, it reduces the manual work and enhances the standard of
presentation also.
Operational feasibility assesses the extent to which the required software performs a series
of steps to solve business problems and user requirements. This feasibility is dependent on human
resource and involves visualizing whether or not the software will operate after it is developed,
and be operated once it is installed. This measures how well your company will be able to solve
problems and take advantage of opportunities that are presented during the course of the project.
Economic Feasibility:
This study is carried out to check the economic impact that the system will have on the
organization. The amount of fund that the company can pour into the research and development of
the system is limited. The expenditures must be justified. Thus the developed system as well within
the budget and this was achieved because most of the technologies used are freely available. Only
the customized products had to be purchased.
In economic feasibility, cost benefit analysis is done in which expected costs and benefits
are evaluated. Economic analysis is used for evaluating the effectiveness of the proposed system.
The developed system is economical when compared to the existing system job done manual
system. So the proposed system is so fast that planning can be made easily. The Economic
Feasibility is analyzed using following studies,
 Cost Based Study: In which Development costs and Operating cost are very well managed
then the benefits derivable out of the system.
Time Based Study: The analysis of the time required to achieve a return on investments is also
within the limit
4. SYSTEM SPECIFICATION
4.1 HARDWARE REQUIREMENTS
PROCESSOR : Intel(R) Pentium(R) Dual-Core Processing
RAM : 1GB RAM
HARD DISK : 20 GB
4.2 SOFTWARE REQUIREMENTS
OPERATING SYSTEM : Windows XP, Windows2007 (32Bit Original)
ENVIRONMENT : Visual Studio .NET 2005 or 2008 or 2010
.NET FRAMEWORK : Version 2.0 or Version 3.0 or Version 4.0
LANGUAGE : C#.NET
BACK END : MS-SQL-Server 2000
5. SOFTWARE SPECIFICATION
5.1 Features of .NET
INTRODUCTION TO .NET:
.NET Framework
The Microsoft .NET Framework is a platform for building, deploying, and running Web
Services and applications. It provides a highly productive, standards-based, multi-language
environment for integrating existing investments with next-generation applications and services as
well as the agility to solve the challenges of deployment and operation of Internet-scale
applications. The .NET Framework consists of three main parts: the common language runtime, a
hierarchical set of unified class libraries, and a componentized version of Active Server Pages
called ASP.NET.
.Net Framework Components
Visual Basic
Common lanaguage specification
Web Services User Interface
Data and XML
Base class library
Common language runtime
C++ C# ...
Visual Studio .NET
Framework, Languages and Tools
Figure 1 - An overview of the .net Framework
The .NET Framework has two main components: the common language runtime and the
.NET Framework class library. The common language runtime is the foundation of the .NET
Framework. Visual Basic sits at the top of the framework (along with the other languages in Visual
Studio.net). Below that is the Common Language Specification (CLS).
This specification is a set of rules that govern the minimum language features that must be
supported to ensure that a language will interoperate with other CLS-compliant components and
tools. As long as a language conforms to the CLS, it is guaranteed to work with the CLR. In this
way, when third-party compilers target the .net framework, as long as they conform to the CLS,
the code is guaranteed to work. Visual Basic.net shares the same variable types, arrays, user-
defined types, classes, graphical forms, visual controls and interfaces as these other languages.
Web Services
Web Services provide a Web-enabled user interface with tools that include various HTML
controls and Web controls. Forms creating using Web Services are the same as forms created for
a Windows application. The code behind a Web form is the same as the code behind a Windows
form. The markup language that is used by Web forms is still there, but the Web form applications
generate it for you.
User Interface
At the same level as Web Services is the User Interface. The User Interface is where
Windows forms live. It also provides code for drawing to the screen, printing, rendering text and
displaying images.
Data and XML
Both Web Services and the User Interface sit on top of the Data and XML block. As you
will learn later in this paper, XML (or extensible markup language) plays just as important of a
role as data. XML is used to provide a text view of data that can be shared between services on
the same PC or passed through a firewall to a web server across the country using SOAP (more on
SOAP a little later).
Base Class Library
The base class library (BCL) is underneath the Data and XML block. This area is the origin
for the base class of all .net programs. Everything in Visual Basic.net is an object, and all objects
originate from a class named System. The BCL also provides collections, localization, text objects,
interoperability with non-.net code and ActiveX controls and a variety of other services.
The Common Language Runtime
At the base of the .net framework is the common language runtime (CLR). Much like the
Java Virtual Machine, the CLR is needed to make .net code run on any machine.
Base class library support
Thread support COM marshaler
Type checker
Security engine
Class loader
Common Language Runtime
Exception manager
Debug engine
IL to native
components
Code
manager
Garbage
Collector
Figure 2 - Common Language Runtime services
The CLR is a set of resources that any .net program can take advantage of, from any .net-
supported language. All languages will be more equal in capability than they ever have before.
The CLR includes support for the BCL, where the architecture for controls and forms actually live.
It is also responsible for managing threads and exceptions (replacing the Err object in VB 6).
Garbage collection is also handled by the CLR.
The CLR takes code generated by VB and converts it to the native language of the current
platform. Through this conversion, the magic of multi platform execution is achieved. Now VB
programmers can write code in VB syntax and the CLR is responsible for converting it to any
platform that can run the CLR. The programmer is removed several layers from the hardware and
doesn’t really need to know what platform his/her code is running on.
One additional service of the CLR is handling bad code. You have probably heard stories
of rogue code that overran buffers and trashed a machine, killing all other programs along with it.
By design, this cannot happen with code written in Visual Basic.net.
.NET Framework Class Library
The .NET Framework class library is a collection of reusable types that tightly integrate
with the common language runtime. The class library is object oriented, providing types from
which your own managed code can derive functionality. This not only makes the .NET Framework
types easy to use but also reduces the time associated with learning new features of the .NET
Framework. In addition, third-party components can integrate seamlessly with classes in the .NET
Framework.
For example, the .NET Framework collection classes implement a set of interfaces that you
can use to develop your own collection classes. Your collection classes will blend seamlessly with
the classes in the .NET Framework.
As you would expect from an object-oriented class library, the .NET Framework types
enable you to accomplish a range of common programming tasks, including string management,
data collection, database connectivity, and file access. In addition to these common tasks, the class
library includes types that support a variety of specialized development scenarios. For example,
you can use the .NET Framework to develop the following types of applications and services:
 Console applications
 Windows GUI applications (Windows Forms)
 XML Web services
 Windows services
For example, the Windows Forms classes are a comprehensive set of reusable types that vastly
simplify Windows GUI development
ASP.NET
Microsoft® ASP.NET is the next generation technology for Web application development.
It takes the best from Active Server Pages (ASP) as well as the rich services and features provided
by the Common Language Runtime (CLR) and add many new features. The result is a robust,
scalable, and fast Web development experience that will give you great flexibility with little
coding.
Web Forms are the heart and soul of ASP.NET. Web Forms are the User Interface (UI)
elements that give your Web applications their look and feel. Web Forms are similar to Windows
Forms in that they provide properties, methods, and events for the controls that are placed onto
them. However, these UI elements render themselves in the appropriate markup language required
by the request, e.g. HTML. If you use Microsoft Visual Studio® .NET, you will also get the
familiar drag-and-drop interface used to create your UI for your Web application.
New in ASP.NET
 Better language support
 Programmable controls
 Event-driven programming
 XML-based components
 User authentication, with accounts and roles
 Higher scalability
 Increased performance - Compiled code
 Easier configuration and deployment
 Not fully ASP compatible
Advantages Using ASP.NET
 ASP.NET drastically reduces the amount of code required to build large applications
 ASP.NET makes development simpler and easier to maintain with an event-driven, server-
side programming model
 ASP.NET pages are easy to write and maintain because the source code and HTML are
together
 The source code is executed on the server. The pages have lots of power and flexibility by
this approach
ASP.NET Features
Easy Programming Model
ASP.NET makes building real world Web applications dramatically easier. ASP.NET
server controls enable an HTML-like style of declarative programming that let you build great
pages with far less code than with classic ASP. Displaying data, validating user input, and
uploading files are all amazingly easy. Best of all, ASP.NET pages work in all browsers including
Netscape, Opera, AOL, and Internet Explorer.
Flexible Language Options
ASP.NET lets you leverage your current programming language skills. Unlike classic
ASP, which supports only interpreted VBScript and JScript, ASP.NET now supports more than
25 .NET languages (built-in support for VB.NET, C#, and JScript.NET), giving you
unprecedented flexibility in your choice of language.
Rich Class Framework
Application features that used to be hard to implement, or required a 3rd-party component,
can now be added in just a few lines of code using the .NET Framework. The .NET Framework
offers over 4500 classes that encapsulate rich functionality like XML, data access, file upload,
regular expressions, image generation, performance monitoring and logging, transactions,
message queuing, SMTP mail, and much more. With Improved Performance and Scalability
ASP.NET lets you use serve more users with the same hardware.
Compiled execution
ASP.NET is much faster than classic ASP, while preserving the "just hit save" update
model of ASP. However, no explicit compile step is required. ASP.NET will automatically detect
any changes, dynamically compile the files if needed, and store the compiled results to reuse for
subsequent requests. Dynamic compilation ensures that your application is always up to date, and
compiled execution makes it fast. Most applications migrated from classic ASP see a 3x to 5x
increase in pages served.
Rich output caching
ASP.NET output caching can dramatically improve the performance and scalability of your
application. When output caching is enabled on a page, ASP.NET executes the page just once, and
saves the result in memory in addition to sending it to the user. When another user requests the
same page, ASP.NET serves the cached result from memory without re-executing the page. Output
caching is configurable, and can be used to cache individual regions or an entire page. Output
caching can dramatically improve the performance of data-driven pages by eliminating the need
to query the database on every request.
Accessing Data with ADO.net
Most applications need data access at one point of time making it a crucial component
when working with applications. Data access is making the application interact with a database,
where all the data is stored. Different applications have different requirements for database
access. ASP.NET uses ADO .NET (Active X Data Object) as it's data access and manipulation
protocol which also enables us to work with data on the Internet.
ADO.NET Data Architecture
Data Access in ADO.NET relies on two components: DataSet and Data Provider.
Dataset
The dataset is a disconnected, in-memory representation of data. It can be considered as a
local copy of the relevant portions of the database. The DataSet is persisted in memory and the
data in it can be manipulated and updated independent of the database. When the use of this
DataSet is finished, changes can be made back to the central database for updating
Data Provider
The Data Provider is responsible for providing and maintaining the connection to the database.
A DataProvider is a set of related components that work together to provide data in an efficient
and performance driven manner. Each DataProvider consists of the following component classes:
 The Connection object which provides a connection to the database
 The Command object which is used to execute a command
 The DataReader object which provides a forward-only, read only, connected recordset
 The DataAdapter object which populates a disconnected DataSet with data and performs
update
Data access with ADO.NET can be summarized as follows:
A connection object establishes the connection for the application with the database. The
command object provides direct execution of the command to the database. If the command returns
more than a single value, the command object returns a DataReader to provide the data.
Alternatively, the DataAdapter can be used to fill the Dataset object. The database can be updated
using the command object or the DataAdapter.
Component classes that make up the Data Providers
The Connection Object
The Connection object creates the connection to the database. Microsoft Visual Studio
.NET provides two types of Connection classes: the SqlConnection object, which is designed
specifically to connect to Microsoft SQL Server 7.0 or later, and the OleDbConnection object,
which can provide connections to a wide range of database types like Microsoft Access and Oracle.
The Connection object contains all of the information required to open a connection to the
database.
The Command Object
The Command object is represented by two corresponding classes: SqlCommand and
OleDbCommand. Command objects are used to execute commands to a database across a data
connection. The Command objects can be used to execute stored procedures on the database, SQL
commands, or return complete tables directly. Command objects provide three methods that are
used to execute commands on the database:
 ExecuteNonQuery: Executes commands that have no return values such as INSERT,
UPDATE or DELETE
 ExecuteScalar: Returns a single value from a database query
 ExecuteReader: Returns a result set by way of a DataReader object
The Data Reader Object
The DataReader object provides a forward-only, read-only, connected stream recordset
from a database. Unlike other components of the Data Provider, DataReader objects cannot be
directly instantiated. The DataReader can provide rows of data directly to application logic when
you do not need to keep the data cached in memory. Because only one row is in memory at a time,
the DataReader provides the lowest overhead in terms of system performance but requires the
exclusive use of an open Connection object for the lifetime of the DataReader.
The DataAdapter Object
The DataAdapter is the class at the core of ADO .NET's disconnected data access. It is
essentially the middleman facilitating all communication between the database and a DataSet. The
DataAdapter is used either to fill a DataTable or DataSet with data from the database with it's Fill
method. After the memory-resident data has been manipulated, the DataAdapter can commit the
changes to the database by calling the Update method. The DataAdapter provides four properties
that represent database commands:
 SelectCommand
 InsertCommand
 Delete Command
 Update Command
When the Update method is called, changes in the Dataset are copied back to the database and
the appropriate Insert Command, Delete Command, or Update Command is executed.
VISUAL BASIC.NET
Visual Basic.NET (VB.NET) is an enhanced version of VB designed to work within the
.NET Framework. VB.NET adds important new features to the language, including inheritance,
constructors, and method overloading. It also gains all of the capabilities provided by the .NET
runtime, including multithreading, object serialization, the ability to create Web Forms and Win
Forms, etc. Visual Basic .NET (VB.NET or VB .NET) is a version of Microsoft's Visual Basic
that was designed, as part of the company's .NET product group, to make Web services
applications easier to develop. According to Microsoft, VB .NET was reengineered, rather than
released as VB 6.0 with added features, to facilitate making fundamental changes to the language.
VB.NET is the first fully object-oriented programming (OOP) version of Visual Basic, and as
such, supports OOP concepts such as abstraction, inheritance, polymorphism, and aggregation.
Visual Basic.net Data Types
Before we can get into the Visual Basic.net code, we need to start by exploring the changes
to data types. Hopefully, you are not a programmer that insisted on using the Variant data type
consistently in your code…if you did, you will have a more difficult time adjusting to the new data
types in Visual Basic.net. The Variant data type no longer exists in Visual Basic.net. (Another
data type that did not make the transition is the Currency type.) The primitive data types still exist
(Integer, Boolean, Long, etc.), the main difference now is that these data types are all structure
types in the System namespace and are referred to as Value Types.
Value types are always accessed directly. In fact, you can’t create a reference to a value
type. And unlike reference types, setting a value type to Null is not possible. Value types always
hold a value, even if one hasn’t been assigned yet. When a value type variable is dimensioned,
it’s initialized to a value representative of its type. For example, if you dimension a variable to
Integer, the Visual Basic.net compiler automatically initializes the variable to 0.
Garbage Collection in Visual Basic.net
In VB 6, when you were finished using an object, you simply set it to nothing and the
object would be released. This is no longer the case with Visual Basic.net. In Visual Basic.net,
when a variable loses scope, the CLR destroys the object and removes it from the stack
automatically for you.
Features of Visual Basic.net
Powerful Windows-based Applications
Visual Basic .NET comes with features such as a powerful new forms designer, an in-place
menu editor, and automatic control anchoring and docking. Visual Basic .NET delivers new
productivity features for building more robust applications easily and quickly. With an improved
integrated development environment (IDE) and a significantly reduced startup time, Visual Basic
.NET offers fast, automatic formatting of code as you type, improved IntelliSense, an enhanced
object browser and XML designer, and much more.
Building Web-based Applications
With Visual Basic .NET we can create Web applications using the shared Web Forms
Designer and the familiar "drag and drop" feature. You can double-click and write code to respond
to events. Visual Basic .NET 2003 comes with an enhanced HTML Editor for working with
complex Web pages. We
Simplified Deployment
With Visual Basic .NET we can build applications more rapidly and deploy and maintain
them with efficiency. Visual Basic .NET 2003 and .NET Framework 1.1 makes "DLL Hell" a
thing of the past. Side-by-side versioning enables multiple versions of the same component to live
safely on the same machine so that applications can use a specific version of a component.
Powerful, Flexible, Simplified Data Access
You can tackle any data access scenario easily with ADO.NET and ADO data access. The
flexibility of ADO.NET enables data binding to any database, as well as classes, collections, and
arrays, and provides true XML representation of data. Seamless access to ADO enables simple
data access for connected data binding scenarios. Using ADO.NET,Visual Basic .NET can gain
high-speed access to MS SQL Server, Oracle, DB2, Microsoft Access, and more.
Improved Coding
You can code faster and more effectively. A multitude of enhancements to the code editor,
including enhanced IntelliSense, smart listing of code for greater readability and a background
compiler for real-time notification of syntax errors transforms into a rapid application development
(RAD) coding machine.
Direct Access to the Platform
Visual Basic developers can have full access to the capabilities available in .NET
Framework 1.1. Developers can easily program system services including the event log,
performance counters and file system. The new Windows Service project template enables to build
real Microsoft Windows NT Services. Programming against Windows Services and creating new
Windows Services is not available in Visual Basic .NET Standard, it requires Visual Studio 2003
Professional, or higher.
Full Object-Oriented Constructs
You can create reusable, enterprise-class code using full object-oriented constructs.
Language features include full implementation inheritance, encapsulation, and polymorphism.
Structured exception handling provides a global error handler and eliminates spaghetti code.
Accessing Data with ADO.net
Data access with Visual Basic has come a long way in a relatively short period of time.
After all, Microsoft released three versions of Visual Basic before database access was ever
included. In VB 3, Microsoft introduced DAO (Data Access Objects), which used the Microsoft
Jet Engine to connect to local databases. You could use DAO to connect to databases on a server,
but the performance was poor because DAO was optimized for local access.
Following DAO came RDO (Remote Data Objects) and then finally ADO (ActiveX Data
Objects). These access technologies were designed with client/server in mind, but with the move
away from a client/server to an n-tier approach to system design, something new was needed; enter
ADO.net.
As mentioned earlier, the Recordset object no longer exists in ADO.net. The successor,
the DataSet object now gives us a look at all of the data. It can model data logically or abstractly,
because unlike the RecordSet, the DataSet is not a container that can hold only rows of data. The
DataSet can actually hold multiple tables and the relationships between them.
Let’s say for example you wanted to query data from two tables in a database that are
joined together. In traditional ADO, you would execute a SQL query that placed the results in the
RecordSet object. In ADO.net, using the DataSet object, the two tables themselves are placed in
the data set and you then perform the needed query afterwards. The advantage of this method is
not obvious, but what if there was some bit of detail in one of the tables your query left out? You
would then, possibly, have to create another RecordSet to query the additional information you
needed.
Previous releases of ADO had support for XML, but it was crude at best. If you don’t
know what XML is by now, I suggest you start surfing or buy a good book on XML: it’s here to
stay. For several years now, many businesses have been using XML to exchange data. The
problem has been that both entities had to agree in advance on the format of the XML document,
because there were not any languages that would give you an easy way to access XML data.
Microsoft introduced the use of XML in ADO in version 2.1. The programmer could either save
a recordset to XML and vice-versa; the trouble was that Microsoft defined the format of the XML
and no other platforms had native support for it. Thanks to W3C, there is now a standard XML
schema for recordsets and Microsoft uses this standard in ADO.net. I am not sure if other
companies have yet adopted the standard, but you can be assured they will soon if they haven’t
already.
Figure 4 depicts data flow from a data source to a data consumer using ADO.net. First we
connect to and retrieve tables from a relational database. The tables are each placed in an in-
memory DataSet object using DataSetCommand objects. These DataSetCommand objects specify
the tables (or a subset thereof) that we are interested in. After the DataSet is filled, the connection
to the database is immediately closed. We can then build the relationship between the individual
tables within the DataSet itself and send the data, via XML, to any client application.
Figure 3 - ADO.net data flow
XML in Visual Basic.net
You cannot do anything in Visual Basic.net without XML being involved somewhere. It
may not be on the surface, but it is there in the underlying data. Chances are that if you are only
developing Windows applications for use on a single PC, you will not use XML very often; but if
you want to query or update data from a remote data source (on the Internet or Intranet), you will
need to understand what XML is and what it can do. And you will, of course, use ADO.net as the
mechanism to do this
5.2 Features of SQL Server
In Client Server technology, a server is a program which does all the jobs that is requested
by the client and Client is a program which depends on the Server to accomplish its task. Client is
mainly used to interact with Users and most Server software doesn’t have direct interaction with
Users. A DBMS should have the following functionality – Interaction with users (developers),
Managing Data. Since these two functionalities are entirely different modern DBMS is divided
into two or more parts. Almost all current DBMS has the following module – Server and one or
more clients. A server module is program which manages the data and handles requests from the
client applications. It interprets the SQL queries and returns results back to the clients. A client
program is a program which sends SQL commands to server and gets the result. Client program
does not know the detailed underground structure of the server. SQL Server 2000 runs as a service
in NT based machines.
You have to establish a connection to the server first if you want to do some SQL operation.
SQL Server uses Local or Network IPC (Inter process communication) to communicate with the
clients. See Books Online for more details. The most basic misunderstanding of many junior
developers is considering SQL Enterprise Manager as the SQL server. SQL Enterprise Manager is
a tool used to access the SQL server. SQL Query analyzer is also similar tool used to access the
SQL server. The difference between SQL query analyzer and Enterprise Manager is Query
Analyzer is a light weight process and Enterprise manager is heavy weight processes due to its
Graphical User Interface. Enterprise Manager is a handy tool in the initial stage of a project. It will
save lot more time while designing the database. You can easily create Tables, Triggers,
Relationships, Constraints etc using Enterprise manger easily. I have seen many of developers
don’t have experience in using Enterprise Manager. Never become one of them, use Enterprise
Manager whenever you start creating a database. Query Analyzer is a tool used to Create, Analyze,
Modify and Delete T-SQL queries.
DDL (Data Definition Language)
Data Types
What is data type? – Classification of data into similar groups. Names, Money, Date, Time, etc are
examples for data type. What is the use of classification or data type? – It increases the
performance, reduces the space needed to store the data. I can’t explain how it increases the
performance and how it reduces the space in a single paragraph. However I can direct you to find
the solution – Try writing a C program which should store Employee Name, DateOfBirth, Salary,
EmployeeID into file and provide option to search the records.
The following data types are available in SQL.
TINYINT, SMALLINT, INT, BIGINT
DECIMAL/NUMERIC
FLOAT, REAL
SMALLMONEY, MONEY
BIT
CHAR, NCHAR, VARCHAR, NVARCHAR, TEXT, NTEXT
BINARY, VARBINARY, IMAGE
CURSOR
SQL_VARIANT
TABLE
TIMESTAMP
UNIQUEIDENTIFIER
The main difference between the data type is the capacity of the type. To see the
Capacity of the data type refers “Books Online”. CREATE TABLE, Constraints, Relationships,
All your definitions of the tables, views, stored procedures, functions are stored in system tables.
Books online - The information used by Microsoft® SQL Server 2000 and its components is stored
in special tables known as system tables. You can query the system tables to obtain the inside
structure of your schema. The following system tables are the some of the most used system tables
– sysobjects, syscolumns, systypes, sysusers, sysindexes. Some of the tables are stored only in
master database because they contain contents which are global across the databases – syslogins,
syslockinfo, sysdatabases etc. For example to get list of databases in the connected server, you can
issue – SELECT * FROM sysdatabases The following query will return all the table names in the
connected database. SELECT Table Name = [Name] FROM sysobjects WHERE xtype=’U’ The
following query will return all the column details for a given Table. SELECT * FROM sysobjects
so(NOLOCK)
INNER JOIN syscolumns sc(NOLOCK)
ON so.[id]=sc.[id]
WHERE so.[Name]=’Table Name’
You can query the system tables but you should not add, modify or delete anything directly. To
add, delete and modify system table contents SQL Server provides some stored procedures.
sp_databases – This stored procedure will return all the databases in the connected server.
sp_tables – This will return all the tables in the database.
sp_columns – This stored procedure will return the column details of a given Table.
6. SYSTEM DESIGN
Where best is defined as the shortest distance from the master block to the goal. If several
runs had the same shortest distance to the goal, the parameters from the run where this distance
was reached in the fewest number of positions examined is chosen.
6.1 CBR
The CBR component of the program has a case base containing previously solved
Puzzles. A case consists of the following features
• Estimate (upper bound) of the search space size
• Branching factor
• Block shape niceness - the number of rectangular blocks divided by the total
Number of blocks
• Average block size
• Number of spaces
• Puzzle size (total number of cells in the puzzle area)
In addition, each case stores the parameters used for solving the puzzle. We have chosen
to have numerical values only associated with each feature, represented as a range of floating point
numbers (lower and upper bound). The reason for having a range is to account for uncertainty in
the values. The case base itself will consist of the 15 puzzles that was solved during the
specialization project, along with the parameter sets that solve them. For each puzzle that we
managed to solve with multiple parameter sets, we chose the parameter set that solves the puzzle
with the least search effort, measured in number of positions examined before a solution is found.
6.1.1 Retrieve
When the meta-reasoned is given a new puzzle to solve, the case base is searched for the
cases that are most similar to the given puzzle. The three most similar cases are always retrieved,
in increasing order of similarity. Further cases are also retrieved, if their similarity is less than three
times the similarity of the best case.
6.1.2 Reuse
For each case that is retrieved, the solution for this case is applied to the current puzzle
to solve. The solver is run, which results in either finding a solution, showing
6.2 META-REASONER
That no solution exists with the settings used, or we exceed the limit of how many
positions can examine. This limit is set to 5 million positions.
6.2.1 Revise
If the case wasn’t solved, the meta-control cycle begins. Run the second, third, n-th best
case. Run the cases again, and slightly alter one/some of the parameters. After 25 attempts to run
the solver, a final run will be performed with the best parameters found so far. This run is not
subject to any limitations of number of positions examined. In the first 25 runs, the solver exits
when it exceeds certain number of examined positions.
6.2.2 Retain
Solutions found by the meta-reasoned are not retained. We wish to ensure that each test
case gets equal conditions. Otherwise, the last cases run could have a higher chance of being
solved, since they get the benefit of a larger case base
6.1 INPUT DESIGN
6.2 DATABASE DESIGN
USE [Puzzle]
GO
/****** Object: Table [dbo].[dumptab] Script Date: 02/17/2015 00:12:36
******/
SET ANSI_NULLS ON
GO
SET QUOTED_IDENTIFIER ON
GO
CREATE TABLE [dbo].[dumptab](
[linktext] [nvarchar](50) COLLATE
SQL_Latin1_General_CP1_CI_AS NULL
) ON [PRIMARY]
6.3 DATAFLOW DIAGRAM
LEVEL 0:
LEVEL 1:
User
Cross
word
puzzle
Enter puzzle
answer
Solve Puzzle
Create
Board
Create
Panel
Cell
allocatio
n
Set Clue
Questio
n Frame
User
Puzzle
LEVEL 2:
Solve
Puzzle
Enter
Answer
Compar
e with
original
Using
clue
details
Get
final
answer
User
Puzzle
View
Score
6.4 ARCHITECTURE DESIGN
Cross Word Puzzle
Board Creation Data Base Maintenance
Fill Board Details
Frame Question Details
Get Clue
Verify Answer
Fulfill Puzzle
Store Question
Input data comparison
6.5 USE CASE DAGRAM
CreatePanel & Cell allocation
Enter puzzle answer
Solve Puzzle
Set Clue
QuestionFrames
CompareWithOrginal Value
Using cluedetails
Get final answer & Score
User
6.6 E-R DIAGRAM
Create Panel
Cell allocation
Question Frame
Set clue
Using clue details
Using clue details
Enter Answer
Compare with
original
View Score
Relation
al
USER
PUZZLE
SEQUENCE DIAGRAM
Admin :Create
Puzzles
Puzzle :Panel
Set Question : and Set clue User :Play Puzzle Solve :Puzzle
Puzzle Process
Fullfillpanel
Puzzlpanel
View clue and finalansewer
Use Query
COLLABARATION DIAGRAM
Puzzle : Panel
Admin :Create
Puzzles
Set Question : and Set clue
User : Play Puzzle
Solve : Puzzle
1:
2:
3:
4:
5:
6.7 ACTIVITY DIAGRAM
Puzzle User
Create
Panel
Enter
Answer
Cell
allocation
Compare withoriginal
value
Set clue
View Score
Using clue
details
Using Clue
Details
NewState
Report
7. SYSTEM TESTING AND MAINTENANCE:
Testing is vital to the success of the system. System testing makes a logical assumption
that if all parts of the system are correct, the goal will be successfully achieved. In the testing
process we test the actual system in an organization and gather errors from the new system operates
in full efficiency as stated. System testing is the stage of implementation, which is aimed to
ensuring that the system works accurately and efficiently.
Maintenance plays a vital role. After systems have been verified, tested and implemented,
they must continue to be maintained to ensure that they continue to perform correctly and that they
can adapt to new requirements if needed. Ongoing monitoring or testing of systems may need to
be systematized to ensure that maintenance needs are identified and met when necessary. Where
systems are for extended use, a mechanism can be put in place to monitor feedback from users as
another means to determine the need for maintenance and modification.
7.1 UNIT TESTING:
Where individual system components are independently tested as they are developed to
ensure that each logic path contained within each module performs as expected. Many tests
performed during unit testing can be used for more than one module (error handling, spell checking
of screens and reports, etc.). The procedure level testing is made first. By giving improper inputs,
the errors occurred are noted and eliminated. Then the web form level testing is made.
In the company as well as seeker registration form, the zero length username and password
are given and checked. Also the duplicate username is given and checked. In the job and question
entry, the button will send data to the server only if the client side validations are made. The dates
are entered in wrong manner and checked. Wrong email-id and web site URL (Universal Resource
Locator) is given and checked.
7.2 INTEGRATION TESTING:
Data can be lost across an interface, one module can have an adverse effect on the other
sub function, when combined, may not produce the desired major function. Integrated testing is
systematic testing that can be done with sample data. The need for the integrated test is to find the
overall system performance. Where multiple, related elements of the system are tested together to
validate components of the system, and to ensure that the appropriate edits and controls are
functioning correctly. This testing concludes with the entire system being tested as a whole.
“Bottom up” and/or “top down” testing approaches can be used.
With bottom up testing, the lowest level modules are created and tested first, and successive
layers of functionality are added as they are developed. Top down testing takes the opposite
approach, where the highest-level modules are developed and tested, while lower level stubs” are
created and invoked until the actual modules are available. These stubs are temporary software
modules that are created in order to enable the higher-level routines to be validated, but that do not
yet perform the full set of functions needed by the system. Most testing strategies employ a mix
of both approaches.
7.3 VALIDATION TESTING:
The final step involves Validation testing, which determines whether the software function
as the user expected. The end-user rather than the system developer conduct this test most software
developers as a process called “Alpha and Beta testing” to uncover that only the end user seems
able to find. The compilation of the entire project is based on the full satisfaction of the end users.
In the project, validation testing is made in various forms. In registration form Email id for
the user is verified. Validation is a Quality assurance process of establishing evidence that provides
a high degree of assurance that a product, service, or system accomplishes its intended
requirements. This often involves acceptance of fitness for purpose with end users and other
product stakeholders.
7.4 SYSTEM TESTING:
System testing is usually required before and after a system is put in place. A series of
systematic procedures are referred to while testing is being performed. These procedures tell the
tester how the system should perform and where common mistakes may be found. Testers usually
try to "break the system" by entering data that may cause the system to malfunction or return
incorrect information. For example, a tester may put in a city in a search engine designed to only
accept states, to see how the system will respond to the incorrect input.
System testing is the stage of implementation, which aimed at ensuring that the system
works accurately and efficiently before the live operation commences. Testing is the process of
executing a program with the intent of finding an error. A good test case is one that has a high
probability of finding a yet undiscovered error. A successful test is one that answers a yet
undiscovered error. Where the entire system is linked together and tested to validate that it meets
the operational requirements defined during System Requirements Analysis.
7.5 BLACK BOX TESTING:
Black box testing takes an external perspective of the test object to derive test cases. These
tests can be functional or non-functional, though usually functional. The test designer selects valid
and invalid input and determines the correct output. There is no knowledge of the test object's
internal structure. It is also known as functional testing. For example, in a black box test on
software design the tester only knows the inputs and what the expected outcomes should be and
not how the program arrives at those outputs.
The tester does not ever examine the programming code and does not need any further
knowledge of the program other than its specifications. This method of test design is applicable to
all levels of software testing: unit, integration, functional testing, system and acceptance. The
higher the level, and hence the bigger and more complex the box, the more one is forced to use
black box testing to simplify.
8. SYSTEM IMPLEMENTATION
Implementation is the most crucial stage in achieving a successful system and giving the
user’s confidence that the new system is workable and effective. This type of conversation is
relatively easy to handle, provide there are no major changes in the system. Each program is tested
individually at the time of development using the data and has verified that this program linked
together in the way specified in the programs specification, the computer system and its
environment is tested to the satisfaction of the user.
The system that has been developed is accepted and proved to be satisfactory for the user.
And so the system is going to be implemented very soon. A simple operating procedure is included
so that the user can understand the different functions clearly and quickly. Initially as a first step
the executable form of the application is to be created and loaded in the common server machine
which is accessible to the entire user and the server is to be connected to a network. The final stage
is to document the entire system which provides components and the operating procedures of
the system. Systems implementation is the construction of the new system and the delivery of that
system into production (that is, the day-to-day business or organization operation).
Implementation is the carrying out, execution, or practice of a plan, a method, or any design
for doing something. As such, implementation is the action that must follow any preliminary
thinking in order for something to actually happen. In an information technology context,
implementation encompasses all the processes involved in getting new software or hardware
operating properly in its environment, including installation, configuration, running, testing, and
making necessary changes. The word deployment is sometimes used to mean the same thing.
Generally implementation of the software is considered as the actual creation of the software.
9. CONCLUSION
In this thesis, the goal was to construct a system which solves sliding-block puzzles using
Meta reasoning, and it should be based on the search-based solver program from the specialization
project. The meta-reasoned should automatically find good parameters to call the solver with, with
the purpose of solving a given puzzle. In the specialization project, the parameters had to be found
manually. After studying relevant literature, we decided to go for a CBR approach, where each
case consists of the features describing a puzzle and a set of parameters that solve the puzzle. We
enhanced this approach by adding a meta-control cycle where multiple cases would be retrieved
from the case base. After applying all the promising cases on the problem to solve, a randomized
proximity search would start generating new parameters, close, but not identical to the parameters
already tried. For each such set of parameters, the solver would run with a limit on the allowed
search work. After the meta-control cycle has run for a specified number of iterations, the set of
parameters which managed to move the master block closest to its goal would be run again, this
time with no limit on the allowed search work. We enhanced the solver program with three new
features. We added the ability to store and display each step of the puzzle’s solution. A new
memory-efficient way of representing puzzle configurations was added, based on its permutation
rank when the configuration was seen as a permutation of a multi set. Two new block types, sliders
and disconnected blocks were added, so that we could add more interesting puzzles to our test
suite.
10. FUTURE ENHANCEMENT
Feature enhancement is invoked by calling the solver with a special command, along with
a file name specifying the puzzle from which to extract features. The solver analyzes the puzzle,
writes the features to a temporary text file and returns program control to the meta-reasoned. The
average block size, number of spaces, puzzle size and block shape niceness (number of rectangular
blocks divided by the total number of blocks) are calculated immediately from the starting position
of the puzzle. In order to find the branching factor, a BFS is performed from the starting position.
The BFS is cancelled when the examined positions exceed 1 megabyte in storage, or when the
entire search space has been examined
11. BIBLIOGRAPHY
REFERENCE WEBSITES:
 http://www.dotnetspider.com
 http://www.programmertutorials.com
 http://www.gotdotnet.com
 http://www.w3schools.com
 http://www.windowsitlibrary.com
 http://www.devsource.com
APPENDIX
S.NO AUTHOR
NAME
BOOK TITLE PUBLICATION AND
EDITION
1. Dino Esposito Programming Microsoft
ASP.NET
TATA McGRAW- Hill
2003 Edition
2. Matthew
Macdonald
Beginning ASP.NET in
VB.NET
From Novice To
Professional
Springer Private Limited
Second Edition
3. Roger .S
Pressman
Software Engineering TATA McGRAW- Hill
Fifth Edition
4. Rajesh Naik,
Swapna Kishore
System Analysis and
Business Applications
Wheeler Publication
Second Edition
5. James R.Groff
Paul N.WeinBerg Guide to SQL
TATA McGRAW- Hill
1997 Edition
6. Greg Buczek Instant SQL Server 2000
Applications
TATA McGRAW -Hill
2001 Edition
SCREEN SHOTS
SAMPLE CODING
EASY
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
using System.Data.SqlClient;
using System.Windows.Forms;
public partial class Easy : System.Web.UI.Page
{
protected void Page_Load(object sender, EventArgs e)
{
}
SqlConnection con = new SqlConnection("server=.;database=puzzle;uid=sa");
public void insert()
{
con.Open();
SqlCommand cmm = new SqlCommand("truncate table dumptab", con);
cmm.ExecuteNonQuery();
con.Close();
con.Open();
SqlCommand cmd = new SqlCommand("insert into dumptab values('" +
ltext + "')", con);
cmd.ExecuteNonQuery();
con.Close();
}
protected void LinkButton13_Click(object sender, EventArgs e)
{
Panel3.Visible = false;
Panel2.Visible = true;
Label4.Visible = true ;
Label3.Visible = true ;
TextBox39.Visible = true ;
Button3.Visible = true ;
Button4.Visible = true ;
Label1.Visible = true;
Label3.Visible = true;
Label1.Text = "Across: 1.";
Label3.Text = "Down: 1.";
Label2.Text = "___ is my brother";
Label4.Text = "I ___ a dog when I was young.";
ltext = LinkButton13.Text;
insert();
}
protected void TextBox5_TextChanged(object sender, EventArgs e)
{
}
protected void LinkButton2_Click(object sender, EventArgs e)
{
ltext = LinkButton2.Text;
Panel3.Visible = false;
Panel2.Visible = true;
Label4.Visible = true;
Label3.Visible = true;
TextBox39.Visible = true;
Button3.Visible = true;
Button4.Visible = true;
Label1.Visible = true;
Label3.Visible = true;
Label1.Text = "Across: 2.";
Label3.Text = "Down: 2.";
Label2.Text = "___, it isn't.";
Label4.Text = "I want a ___ camera.";
insert();
}
protected void LinkButton4_Click(object sender, EventArgs e)
{
ltext = LinkButton4.Text;
Panel3.Visible = false;
Panel2.Visible = true;
Label2.Text = "Please come ___ Monday.";
Label4.Visible = false;
Label3.Visible = false;
TextBox39.Visible = false;
Button3.Visible = false;
Button4.Visible = false;
Label3.Visible = false ;
Label1.Visible = true ;
Label1.Text = "Down: 3.";
insert();
}
protected void LinkButton5_Click(object sender, EventArgs e)
{
ltext = LinkButton5.Text;
Panel3.Visible = false;
Panel2.Visible = true;
Label4.Visible = true;
Label3.Visible = true;
TextBox39.Visible = true;
Button3.Visible = true;
Button4.Visible = true;
Button4.Visible = true;
Label1.Visible = true;
Label3.Visible = true;
Label1.Text = "Across: 4.";
Label3.Text = "Down: 4.";
Label2.Text = "I ___ to school yesterday.";
Label4.Text = "I ___ at home yesterday.";
insert();
}
protected void LinkButton6_Click(object sender, EventArgs e)
{
ltext = LinkButton6.Text;
Panel3.Visible = false;
Panel2.Visible = true;
Label2.Text = "The number ___ comes after nine.";
Label4.Visible = false;
Label3.Visible = false;
TextBox39.Visible = false;
Button3.Visible = false;
Button4.Visible = false;
Label3.Visible = false;
Label1.Visible = true;
Label1.Text = "Down: 5.";
insert();
}
protected void LinkButton7_Click(object sender, EventArgs e)
{
ltext = LinkButton7.Text;
Panel3.Visible = false;
Panel2.Visible = true;
Label2.Text = "Can you ___ a picture?";
Label4.Visible = false;
Label3.Visible = false;
TextBox39.Visible = false;
Button3.Visible = false;
Button4.Visible = false;
Label1.Visible = true;
Label3.Visible = false ;
Label1.Text = "Across: 6.";
insert();
}
protected void LinkButton8_Click(object sender, EventArgs e)
{
ltext = LinkButton8.Text;
Panel3.Visible = false;
Panel2.Visible = true;
Label2.Text = "Can you ___ as fast as your dog?";
Label4.Visible = false;
Label3.Visible = false;
TextBox39.Visible = false;
Button3.Visible = false;
Button4.Visible = false;
Label3.Visible = false;
Label1.Visible = true;
Label1.Text = "Down: 7.";
insert();
}
protected void LinkButton9_Click(object sender, EventArgs e)
{
ltext = LinkButton9.Text;
Panel3.Visible = false;
Panel2.Visible = true;
Label2.Text = "Please come with ___.";
Label4.Visible = false;
Label3.Visible = false;
TextBox39.Visible = false;
Button3.Visible = false;
Button4.Visible = false;
Label1.Visible = true;
Label3.Visible = false;
Label1.Text = "Across: 8.";
insert();
}
protected void LinkButton11_Click(object sender, EventArgs e)
{
ltext = LinkButton11.Text;
Panel3.Visible = false;
Panel2.Visible = true;
Label4.Visible = true;
Label3.Visible = true;
TextBox39.Visible = true;
Button3.Visible = true;
Button4.Visible = true;
Label1.Visible = true;
Label3.Visible = true;
Label1.Text = "Across: 9.";
Label3.Text = "Down: 9.";
Label2.Text = "The cat is ___ the house.";
Label4.Text = "___ this your book?";
insert();
}
protected void LinkButton10_Click(object sender, EventArgs e)
{
ltext = LinkButton10.Text;
Panel3.Visible = false;
Panel2.Visible = true;
Label4.Visible = true;
Label3.Visible = true;
TextBox39.Visible = true;
Button3.Visible = true;
Button4.Visible = true;
Label1.Visible = true;
Label3.Visible = true;
Label1.Text = "Across: 10.";
Label3.Text = "Down: 10.";
Label2.Text = "I have ___ apple.";
Label4.Text = "I ___ a good student.";
insert();
}
protected void LinkButton12_Click(object sender, EventArgs e)
{
ltext = LinkButton12.Text;
Panel3.Visible = false;
Panel2.Visible = true;
Label4.Visible = true;
Label3.Visible = true;
TextBox39.Visible = true;
Button3.Visible = true;
Button4.Visible = true;
Label1.Visible = true;
Label3.Visible = true;
Label1.Text = "Across: 11.";
Label3.Text = "Down: 11.";
Label2.Text = "Please come as fast ___ you can.";
Label4.Text = "I got up ___ seven o'clock.";
insert();
}
public string ltext;
protected void TextBox14_TextChanged(object sender, EventArgs e)
{
}
protected void LinkButton1_Click1(object sender, EventArgs e)
{
ltext = LinkButton1.Text;
Panel3.Visible = false;
Panel2.Visible = true;
Label2.Text = "___ is a good book.";
Label4.Visible = false;
Label3.Visible = false;
TextBox39.Visible = false;
Button3.Visible = false;
Button4.Visible = false;
Label1.Visible = true;
Label3.Visible = false;
Label1.Text = "Across: 12.";
insert();
}
protected void Button1_Click(object sender, EventArgs e)
{
con.Open();
SqlDataReader dr;
SqlCommand cnm = new SqlCommand("select linktext from dumptab", con);
dr = cnm.ExecuteReader ();
while (dr.Read())
{
ltext = dr[0].ToString();
}
dr.Close();
con.Close();
string Query;
Query = TextBox38 .Text;
char [] split=new char [10];
split = Query.ToCharArray() ;
string way = Label1.Text;
if (ltext == "1")
{
TextBox4.Text = split[0].ToString();
TextBox2.Text = split[1].ToString();
TextBox38.Text = "";
TextBox39.Text = "";
}
else if (ltext == "2")
{
TextBox5.Text = split[0].ToString();
TextBox6.Text = split[1].ToString();
TextBox38.Text = "";
TextBox39.Text = "";
}
else if (ltext == "4")
{
TextBox14.Text = split[0].ToString();
TextBox15.Text = split[1].ToString();
TextBox16.Text = split[2].ToString();
TextBox17.Text = split[3].ToString();
TextBox38.Text = "";
TextBox39.Text = "";
}
else if (ltext == "6")
{
TextBox9.Text = split[0].ToString();
TextBox18.Text = split[1].ToString();
TextBox19.Text = split[2].ToString();
TextBox20.Text = split[3].ToString();
TextBox38.Text = "";
TextBox39.Text = "";
}
else if (ltext == "8")
{
TextBox23.Text = split[0].ToString();
TextBox24.Text = split[1].ToString();
TextBox38.Text = "";
TextBox39.Text = "";
}
else if (ltext == "9")
{
TextBox26.Text = split[0].ToString();
TextBox27.Text = split[1].ToString();
TextBox38.Text = "";
TextBox39.Text = "";
}
else if (ltext == "10")
{
TextBox11.Text = split[0].ToString();
TextBox28.Text = split[1].ToString();
TextBox38.Text = "";
TextBox39.Text = "";
}
else if (ltext == "11")
{
TextBox30.Text = split[0].ToString();
TextBox31.Text = split[1].ToString();
TextBox38.Text = "";
TextBox39.Text = "";
}
else if (ltext == "12")
{
TextBox35.Text = split[0].ToString();
TextBox34.Text = split[1].ToString();
TextBox38.Text = "";
TextBox39.Text = "";
}
else if (ltext == "3"&&way=="Down: 3.")
{
TextBox6.Text = split[0].ToString();
TextBox16.Text = split[1].ToString();
TextBox38.Text = "";
TextBox39.Text = "";
}
else if (ltext == "5" && way == "Down: 5.")
{
TextBox17.Text = split[0].ToString();
TextBox22.Text = split[1].ToString();
TextBox27.Text = split[2].ToString();
TextBox38.Text = "";
TextBox39.Text = "";
}
else if (ltext == "7" && way == "Down: 7.")
{
TextBox18.Text = split[0].ToString();
TextBox23.Text = split[1].ToString();
TextBox28.Text = split[2].ToString();
TextBox38.Text = "";
TextBox39.Text = "";
}
}
protected void Button2_Click(object sender, EventArgs e)
{
con.Open();
SqlDataReader dr;
SqlCommand cnm = new SqlCommand("select linktext from dumptab", con);
dr = cnm.ExecuteReader();
while (dr.Read())
{
ltext = dr[0].ToString();
}
dr.Close();
con.Close();
string Query;
Query = TextBox38.Text;
char[] split = new char[10];
split = Query.ToCharArray();
string way = Label1.Text;
if (ltext == "1")
{
TextBox4.Text = "H";
}
else if (ltext == "2")
{
TextBox6.Text = "O";
}
else if (ltext == "4")
{
TextBox14.Text = "W";
TextBox15.Text = "E";
}
else if (ltext == "6")
{
TextBox19.Text = "A";
TextBox20.Text = "W";
}
else if (ltext == "8")
{
TextBox23.Text = "U";
}
else if (ltext == "9")
{
TextBox27.Text = "N";
}
else if (ltext == "10")
{
TextBox28.Text = "N";
}
else if (ltext == "11")
{
TextBox31.Text = "S";
}
else if (ltext == "12")
{
TextBox35.Text = "I";
}
}
protected void Button4_Click(object sender, EventArgs e)
{
con.Open();
SqlDataReader dr;
SqlCommand cnm = new SqlCommand("select linktext from dumptab", con);
dr = cnm.ExecuteReader();
while (dr.Read())
{
ltext = dr[0].ToString();
}
dr.Close();
con.Close();
string Query;
Query = TextBox39.Text;
char[] split = new char[10];
split = Query.ToCharArray();
string way = Label3.Text;
if (ltext == "1" && way == "Down: 1.")
{
TextBox4.Text = split[0].ToString();
TextBox8.Text = split[1].ToString();
TextBox9.Text = split[2].ToString();
TextBox38.Text = "";
TextBox39.Text = "";
}
else if (ltext == "2" && way == "Down: 2.")
{
TextBox5.Text = split[0].ToString();
TextBox15.Text = split[1].ToString();
TextBox20.Text = split[2].ToString();
TextBox38.Text = "";
TextBox39.Text = "";
}
else if (ltext == "4" && way == "Down: 4.")
{
TextBox14.Text = split[0].ToString();
TextBox19.Text = split[1].ToString();
TextBox24.Text = split[2].ToString();
TextBox38.Text = "";
TextBox39.Text = "";
}
else if (ltext == "9" && way == "Down: 9.")
{
TextBox26.Text = split[0].ToString();
TextBox31.Text = split[1].ToString();
TextBox38.Text = "";
TextBox39.Text = "";
}
else if (ltext == "10" && way == "Down: 10.")
{
TextBox11.Text = split[0].ToString();
TextBox12.Text = split[1].ToString();
TextBox38.Text = "";
TextBox39.Text = "";
}
else if (ltext == "11" && way == "Down: 11.")
{
TextBox30.Text = split[0].ToString();
TextBox34.Text = split[1].ToString();
TextBox38.Text = "";
TextBox39.Text = "";
}
}
protected void Button3_Click(object sender, EventArgs e)
{
}
protected void TextBox35_TextChanged(object sender, EventArgs e)
{
}
protected void Button6_Click(object sender, EventArgs e)
{
if (TextBox4.Text == "H" && TextBox2.Text == "E" && TextBox5.Text ==
"N" && TextBox6.Text == "O" && TextBox8.Text == "A" && TextBox14.Text == "W"
&& TextBox15.Text == "E" && TextBox16.Text == "N" && TextBox17.Text == "T" &&
TextBox9.Text == "D" && TextBox18.Text == "R" && TextBox19.Text == "A" &&
TextBox20.Text == "W" && TextBox22.Text == "E" && TextBox23.Text == "U" &&
TextBox24.Text == "S" && TextBox26.Text == "I" && TextBox27.Text == "N" &&
TextBox11.Text == "A" && TextBox28.Text == "N" && TextBox30.Text == "A" &&
TextBox31.Text == "S" && TextBox12.Text == "M" && TextBox35.Text == "I" &&
TextBox34.Text == "T")
{
MessageBox.Show("Congratulations You Won The Puzzle", "Cross Word
Puzzle");
}
else
{
MessageBox.Show("Sorry You Misplace Some Word ,Try Again");
}
}
protected void LinkButton3_Click(object sender, EventArgs e)
{
}
protected void TextBox8_TextChanged(object sender, EventArgs e)
{
}
}
MIDDLE
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
using System.Data.SqlClient;
using System.Windows.Forms;
public partial class Middle : System.Web.UI.Page
{
public string ltext;
SqlConnection con = new SqlConnection("server=.;database=puzzle;uid=sa");
protected void Page_Load(object sender, EventArgs e)
{
}
protected void LinkButton3_Click(object sender, EventArgs e)
{
Panel2.Visible = true;
Label2.Text = "It's dark in here. Please turn on the ___.";
Label4.Visible = false;
Label3.Visible = false;
TextBox66.Visible = false;
Button3.Visible = false;
Button4.Visible = false;
Label3.Visible = false;
Label1.Visible = true;
Label1.Text = "Down: 1.";
ltext = LinkButton3.Text;
insert();
}
protected void LinkButton1_Click(object sender, EventArgs e)
{
Panel2.Visible = true;
Label2.Text = "I came here ___ my brother.";
Label4.Visible = false;
Label3.Visible = false;
TextBox66.Visible = false;
Button3.Visible = false;
Button4.Visible = false;
Label3.Visible = false;
Label1.Visible = true;
Label1.Text = "Across: 2.";
ltext = LinkButton1.Text;
insert();
}
protected void LinkButton6_Click(object sender, EventArgs e)
{
Panel2.Visible = true;
Label2.Text = "I ___ potatoes in my garden.";
Label4.Visible = false;
Label3.Visible = false;
TextBox66.Visible = false;
Button3.Visible = false;
Button4.Visible = false;
Label3.Visible = false;
Label1.Visible = true;
Label1.Text = "Across: 5.";
ltext = LinkButton6.Text;
insert();
}
protected void LinkButton5_Click(object sender, EventArgs e)
{
Panel2.Visible = true;
Label2.Text = "I ___ to go home now.";
Label4.Visible = false;
Label3.Visible = false;
TextBox66.Visible = false;
Button3.Visible = false;
Button4.Visible = false;
Label3.Visible = false;
Label1.Visible = true;
Label1.Text = "Down: 6.";
ltext = LinkButton5.Text;
insert();
}
protected void Button5_Click(object sender, EventArgs e)
{
con.Open();
SqlDataReader dr;
SqlCommand cnm = new SqlCommand("select linktext from dumptab", con);
dr = cnm.ExecuteReader();
while (dr.Read())
{
ltext = dr[0].ToString();
}
dr.Close();
con.Close();
string Query;
Query = TextBox65.Text;
char[] split = new char[10];
split = Query.ToCharArray();
string way = Label1.Text;
if (ltext == "2")
{
TextBox5.Text = split[0].ToString();
TextBox6.Text = split[1].ToString();
TextBox7.Text = split[2].ToString();
TextBox38.Text = split[3].ToString();
TextBox65.Text = "";
TextBox66.Text = "";
}
else if (ltext == "5")
{
TextBox9.Text = split[0].ToString();
TextBox18.Text = split[1].ToString();
TextBox19.Text = split[2].ToString();
TextBox20.Text = split[3].ToString();
TextBox65.Text = "";
TextBox66.Text = "";
}
else if (ltext == "7")
{
TextBox24.Text = split[0].ToString();
TextBox25.Text = split[1].ToString();
TextBox26.Text = split[2].ToString();
TextBox27.Text = split[3].ToString();
TextBox65.Text = "";
TextBox66.Text = "";
}
else if (ltext == "8")
{
TextBox11.Text = split[0].ToString();
TextBox28.Text = split[1].ToString();
TextBox29.Text = split[2].ToString();
TextBox30.Text = split[3].ToString();
TextBox65.Text = "";
TextBox66.Text = "";
}
else if (ltext == "9")
{
TextBox34.Text = split[0].ToString();
TextBox36.Text = split[1].ToString();
TextBox37.Text = split[2].ToString();
TextBox51.Text = split[3].ToString();
TextBox65.Text = "";
TextBox66.Text = "";
}
else if (ltext == "14")
{
TextBox41.Text = split[0].ToString();
TextBox59.Text = split[1].ToString();
TextBox60.Text = split[2].ToString();
TextBox61.Text = split[3].ToString();
TextBox62.Text = split[4].ToString();
TextBox65.Text = "";
TextBox66.Text = "";
}
else if (ltext == "1" && way == "Down: 1.")
{
TextBox4.Text = split[0].ToString();
TextBox8.Text = split[1].ToString();
TextBox9.Text = split[2].ToString();
TextBox10.Text = split[3].ToString();
TextBox11.Text = split[4].ToString();
TextBox65.Text = "";
TextBox66.Text = "";
}
else if (ltext == "3" && way == "Down: 3.")
{
TextBox7.Text = split[0].ToString();
TextBox17.Text = split[1].ToString();
TextBox22.Text = split[2].ToString();
TextBox27.Text = split[3].ToString();
TextBox65.Text = "";
TextBox66.Text = "";
}
else if (ltext == "4" && way == "Down: 4.")
{
TextBox14.Text = split[0].ToString();
TextBox19.Text = split[1].ToString();
TextBox24.Text = split[2].ToString();
TextBox29.Text = split[3].ToString();
TextBox65.Text = "";
TextBox66.Text = "";
}
else if (ltext == "6" && way == "Down: 6.")
{
TextBox20.Text = split[0].ToString();
TextBox25.Text = split[1].ToString();
TextBox30.Text = split[2].ToString();
TextBox34.Text = split[3].ToString();
TextBox65.Text = "";
TextBox66.Text = "";
}
else if (ltext == "10" && way == "Down: 10.")
{
TextBox36.Text = split[0].ToString();
TextBox47.Text = split[1].ToString();
TextBox56.Text = split[2].ToString();
TextBox62.Text = split[3].ToString();
TextBox65.Text = "";
TextBox66.Text = "";
}
else if (ltext == "11" && way == "Down: 11.")
{
TextBox51.Text = split[0].ToString();
TextBox52.Text = split[1].ToString();
TextBox58.Text = split[2].ToString();
TextBox64.Text = split[3].ToString();
TextBox65.Text = "";
TextBox66.Text = "";
}
else if (ltext == "12" && way == "Down: 12.")
{
TextBox39.Text = split[0].ToString();
TextBox40.Text = split[1].ToString();
TextBox41.Text = split[2].ToString();
TextBox65.Text = "";
TextBox66.Text = "";
}
else if (ltext == "13" && way == "Down: 13.")
{
TextBox45.Text = split[0].ToString();
TextBox54.Text = split[1].ToString();
TextBox60.Text = split[2].ToString();
TextBox65.Text = "";
TextBox66.Text = "";
}
}
protected void Button2_Click(object sender, EventArgs e)
{
con.Open();
SqlDataReader dr;
SqlCommand cnm = new SqlCommand("select linktext from dumptab", con);
dr = cnm.ExecuteReader();
while (dr.Read())
{
ltext = dr[0].ToString();
}
dr.Close();
con.Close();
string Query;
Query = TextBox65.Text;
char[] split = new char[10];
split = Query.ToCharArray();
string way = Label1.Text;
if (ltext == "1")
{
TextBox4.Text = "L";
}
else if (ltext == "2")
{
TextBox6.Text = "I";
}
else if (ltext == "3")
{
TextBox17.Text = "H";
TextBox22.Text = "E";
}
else if (ltext == "4")
{
TextBox14.Text = "C";
}
else if (ltext == "5")
{
TextBox9.Text = "G";
}
else if (ltext == "6")
{
TextBox20.Text = "W";
}
else if (ltext == "7")
{
TextBox24.Text = "M";
}
else if (ltext == "8")
{
TextBox11.Text = "T";
}
else if (ltext == "9")
{
TextBox34.Text = "T";
}
else if (ltext == "10")
{
TextBox36.Text = "H";
}
else if (ltext == "11")
{
TextBox51.Text = "M";
}
else if (ltext == "12")
{
TextBox39.Text = "F";
}
else if (ltext == "13")
{
TextBox45.Text = "B";
}
else if (ltext == "14")
{
TextBox41.Text = "R";
}
}
protected void Button4_Click(object sender, EventArgs e)
{
}
protected void Button3_Click(object sender, EventArgs e)
{
}
protected void LinkButton19_Click(object sender, EventArgs e)
{
Panel2.Visible = true;
Label2.Text = "___ came with their children.";
Label4.Visible = false;
Label3.Visible = false;
TextBox66.Visible = false;
Button3.Visible = false;
Button4.Visible = false;
Label3.Visible = false;
Label1.Visible = true;
Label1.Text = "Down: 3.";
ltext = LinkButton19.Text;
insert();
}
protected void LinkButton18_Click(object sender, EventArgs e)
{
Panel2.Visible = true;
Label2.Text = "I must go home now, but I will ___ again tomorrow.";
Label4.Visible = false;
Label3.Visible = false;
TextBox66.Visible = false;
Button3.Visible = false;
Button4.Visible = false;
Label3.Visible = false;
Label1.Visible = true;
Label1.Text = "Down: 4.";
ltext = LinkButton18.Text;
insert();
}
protected void LinkButton7_Click(object sender, EventArgs e)
{
Panel2.Visible = true;
Label2.Text = "How ___ people came to your party?";
Label4.Visible = false;
Label3.Visible = false;
TextBox66.Visible = false;
Button3.Visible = false;
Button4.Visible = false;
Label3.Visible = false;
Label1.Visible = true;
Label1.Text = "Across: 7.";
ltext = LinkButton7.Text;
insert();
}
protected void LinkButton11_Click(object sender, EventArgs e)
{
Panel2.Visible = true;
Label2.Text = "This was a small city back ___.";
Label4.Visible = false;
Label3.Visible = false;
TextBox66.Visible = false;
Button3.Visible = false;
Button4.Visible = false;
Label3.Visible = false;
Label1.Visible = true;
Label1.Text = "Across: 8.";
ltext = LinkButton11.Text;
insert();
}
protected void LinkButton12_Click(object sender, EventArgs e)
{
Panel2.Visible = true;
Label2.Text = "I asked ___ to come to the party. They said they would
come.";
Label4.Visible = false;
Label3.Visible = false;
TextBox66.Visible = false;
Button3.Visible = false;
Button4.Visible = false;
Label3.Visible = false;
Label1.Visible = true;
Label1.Text = "Across: 9.";
ltext = LinkButton12.Text;
insert();
}
protected void LinkButton13_Click(object sender, EventArgs e)
{
Panel2.Visible = true;
Label2.Text = "Be careful or you may ___ yourself.";
Label4.Visible = false;
Label3.Visible = false;
TextBox66.Visible = false;
Button3.Visible = false;
Button4.Visible = false;
Label3.Visible = false;
Label1.Visible = true;
Label1.Text = "Down: 10.";
ltext = LinkButton13.Text;
insert();
}
protected void LinkButton14_Click(object sender, EventArgs e)
{
Panel2.Visible = true;
Label2.Text = "How ___ does this cost?";
Label4.Visible = false;
Label3.Visible = false;
TextBox66.Visible = false;
Button3.Visible = false;
Button4.Visible = false;
Label3.Visible = false;
Label1.Visible = true;
Label1.Text = "Down: 11.";
ltext = LinkButton14.Text;
insert();
}
protected void LinkButton15_Click(object sender, EventArgs e)
{
Panel2.Visible = true;
Label2.Text = "He was here ___ two hours.";
Label4.Visible = false;
Label3.Visible = false;
TextBox66.Visible = false;
Button3.Visible = false;
Button4.Visible = false;
Label3.Visible = false;
Label1.Visible = true;
Label1.Text = "Down: 12.";
ltext = LinkButton15.Text;
insert();
}
protected void LinkButton16_Click(object sender, EventArgs e)
{
Panel2.Visible = true;
Label2.Text = "Do you want the ___ one or the little one?";
Label4.Visible = false;
Label3.Visible = false;
TextBox66.Visible = false;
Button3.Visible = false;
Button4.Visible = false;
Label3.Visible = false;
Label1.Visible = true;
Label1.Text = "Down: 13.";
ltext = LinkButton16.Text;
insert();
}
protected void LinkButton17_Click(object sender, EventArgs e)
{
Panel2.Visible = true;
Label2.Text = "Should I turn left or ___?";
Label4.Visible = false;
Label3.Visible = false;
TextBox66.Visible = false;
Button3.Visible = false;
Button4.Visible = false;
Label3.Visible = false;
Label1.Visible = true;
Label1.Text = "Across: 14.";
ltext = LinkButton17.Text;
insert();
}
public void insert()
{
con.Open();
SqlCommand cmm = new SqlCommand("truncate table dumptab", con);
cmm.ExecuteNonQuery();
con.Close();
con.Open();
SqlCommand cmd = new SqlCommand("insert into dumptab values('" +
ltext + "')", con);
cmd.ExecuteNonQuery();
con.Close();
}
protected void Button6_Click(object sender, EventArgs e)
{
if (TextBox4.Text == "L" && TextBox5.Text == "W" && TextBox6.Text ==
"I" && TextBox7.Text == "T" && TextBox38.Text == "H" && TextBox8.Text == "I"
&& TextBox14.Text == "C" && TextBox17.Text == "H" && TextBox9.Text == "G" &&
TextBox18.Text == "R" && TextBox19.Text == "O" && TextBox20.Text == "W" &&
TextBox22.Text == "C" && TextBox10.Text == "H" && TextBox24.Text == "M" &&
TextBox25.Text == "A" && TextBox26.Text == "N" && TextBox27.Text == "Y" &&
TextBox11.Text == "T" && TextBox28.Text == "H" && TextBox29.Text == "E" &&
TextBox30.Text == "N" && TextBox34.Text == "T" && TextBox36.Text == "H" &&
TextBox37.Text == "E" && TextBox51.Text == "M" && TextBox39.Text == "F" &&
TextBox45.Text == "B" && TextBox47.Text == "U" && TextBox52.Text == "U" &&
TextBox40.Text == "O" && TextBox54.Text == "I" && TextBox56.Text == "R" &&
TextBox58.Text == "C" && TextBox41.Text == "R" && TextBox59.Text == "I" &&
TextBox60.Text == "G" && TextBox61.Text == "H" && TextBox62.Text == "T" &&
TextBox64.Text == "H")
{
MessageBox.Show("Congratulations You Won The Puzzle", "Cross Word
Puzzle");
}
else
{
MessageBox.Show("Sorry You Misplace Some Word ,Try Again");
}
}
}
HIGH
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
using System.Data.SqlClient;
using System.Windows.Forms;
public partial class High : System.Web.UI.Page
{
protected void Page_Load(object sender, EventArgs e)
{
}
protected void LinkButton3_Click(object sender, EventArgs e)
{
Panel3.Visible = false;
Panel2.Visible = true;
Label4.Visible = true;
Label3.Visible = true;
TextBox39.Visible = true;
Button3.Visible = true;
Button4.Visible = true;
Label1.Visible = true;
Label3.Visible = true;
Label1.Text = "Across: 1.";
Label3.Text = "Down: 1.";
Label2.Text = "People can run faster than they can ___.";
Label4.Text = "Did you ___ a letter last week?";
ltext = LinkButton3.Text;
insert();
}
protected void LinkButton1_Click(object sender, EventArgs e)
{
Panel3.Visible = false;
Panel2.Visible = true;
Label2.Text = "What's your favorite fruit? I ___ apples.";
Label4.Visible = false;
Label3.Visible = false;
TextBox39.Visible = true ;
Button3.Visible = false;
Button4.Visible = false;
Label3.Visible = false;
Label1.Visible = true;
TextBox70.Visible = false;
Label1.Text = "Down: 2.";
ltext = LinkButton1.Text;
insert();
}
protected void LinkButton2_Click(object sender, EventArgs e)
{
Panel3.Visible = false;
Panel2.Visible = true;
Label4.Visible = true;
Label3.Visible = true;
TextBox39.Visible = true;
Button3.Visible = true;
Button4.Visible = true;
Label1.Visible = true;
Label3.Visible = true;
Label1.Text = "Across: 3.";
Label3.Text = "Down: 3.";
Label2.Text = "They put on ___ shoes.";
Label4.Text = "A tricycle has ___ wheels.";
TextBox70.Visible = true;
ltext = LinkButton2.Text;
insert();
}
protected void LinkButton4_Click(object sender, EventArgs e)
{
Panel3.Visible = false;
Panel2.Visible = true;
Label2.Text = "A spider has ___ legs.";
Label4.Visible = false;
Label3.Visible = false;
TextBox39.Visible = true;
Button3.Visible = false;
Button4.Visible = false;
Label3.Visible = false;
Label1.Visible = true;
TextBox70.Visible = false;
Label1.Text = "Down: 4.";
ltext = LinkButton4.Text;
insert();
}
protected void LinkButton5_Click(object sender, EventArgs e)
{
Panel3.Visible = false;
Panel2.Visible = true;
Label2.Text = "Don't turn left. Turn ___.";
Label4.Visible = false;
Label3.Visible = false;
TextBox39.Visible = true;
Button3.Visible = false;
Button4.Visible = false;
Label1.Visible = true;
Label3.Visible = false;
TextBox70.Visible = false;
Label1.Text = "Across: 5.";
ltext = LinkButton5.Text;
insert();
}
protected void LinkButton7_Click(object sender, EventArgs e)
{
Panel3.Visible = false;
Panel2.Visible = true;
Label2.Text = "Let's ___ a song.";
Label4.Visible = false;
Label3.Visible = false;
TextBox39.Visible = true;
Button3.Visible = false;
Button4.Visible = false;
Label3.Visible = false;
Label1.Visible = true;
TextBox70.Visible = false;
Label1.Text = "Down: 6.";
ltext = LinkButton7.Text;
insert();
}
protected void LinkButton8_Click(object sender, EventArgs e)
{
Panel3.Visible = false;
Panel2.Visible = true;
Label4.Visible = true;
Label3.Visible = true;
TextBox39.Visible = true;
Button3.Visible = true;
Button4.Visible = true;
Label1.Visible = true;
Label3.Visible = true;
TextBox70.Visible = true ;
Label1.Text = "Across: 7.";
Label3.Text = "Down: 7.";
Label2.Text = "He is a good singer, but I'm the ___ singer in our
class.";
Label4.Text = "The American flag is red, white and ___.";
ltext = LinkButton8.Text;
insert();
}
protected void LinkButton6_Click(object sender, EventArgs e)
{
Panel3.Visible = false;
Panel2.Visible = true;
Label2.Text = "He ___ 'I am tired.'";
Label4.Visible = false;
Label3.Visible = false;
TextBox39.Visible = true;
Button3.Visible = false;
Button4.Visible = false;
Label3.Visible = false;
Label1.Visible = true;
TextBox70.Visible = false;
Label1.Text = "Down: 8.";
ltext = LinkButton6.Text;
insert();
}
protected void LinkButton9_Click(object sender, EventArgs e)
{
Panel3.Visible = false;
Panel2.Visible = true;
Label2.Text = "What's your job? I ___ at a department store.";
Label4.Visible = false;
Label3.Visible = false;
TextBox39.Visible = true;
Button3.Visible = false;
Button4.Visible = false;
Label3.Visible = false;
Label1.Visible = true;
TextBox70.Visible = false;
Label1.Text = "Down: 9.";
ltext = LinkButton9.Text;
insert();
}
protected void LinkButton10_Click(object sender, EventArgs e)
{
Panel3.Visible = false;
Panel2.Visible = true;
Label2.Text = "Many people like white sugar, but I prefer ___
sugar.";
Label4.Visible = false;
Label3.Visible = false;
TextBox39.Visible = true;
Button3.Visible = false;
Button4.Visible = false;
Label1.Visible = true;
Label3.Visible = false;
TextBox70.Visible = false;
Label1.Text = "Across: 10.";
ltext = LinkButton10.Text;
insert();
}
protected void LinkButton11_Click(object sender, EventArgs e)
{
Panel3.Visible = false;
Panel2.Visible = true;
Label2.Text = "What would you like to ___? Coffee, please.";
Label4.Visible = false;
Label3.Visible = false;
TextBox39.Visible = true;
Button3.Visible = false;
Button4.Visible = false;
Label1.Visible = true;
Label3.Visible = false;
TextBox70.Visible = false;
Label1.Text = "Across: 11.";
ltext = LinkButton11.Text;
insert();
}
protected void Button5_Click(object sender, EventArgs e)
{
con.Open();
SqlDataReader dr;
SqlCommand cnm = new SqlCommand("select linktext from dumptab", con);
dr = cnm.ExecuteReader();
while (dr.Read())
{
ltext = dr[0].ToString();
}
dr.Close();
con.Close();
string Query;
Query = TextBox67.Text;
char[] split = new char[10];
split = Query.ToCharArray();
string way = Label1.Text;
if (ltext == "1")
{
TextBox7.Text = split[0].ToString();
TextBox38.Text = split[1].ToString();
TextBox65.Text = split[2].ToString();
TextBox66.Text = split[3].ToString();
TextBox67.Text = "";
TextBox70.Text = "";
}
else if (ltext == "3")
{
TextBox13.Text = split[0].ToString();
TextBox14.Text = split[1].ToString();
TextBox15.Text = split[2].ToString();
TextBox16.Text = split[3].ToString();
TextBox17.Text = split[4].ToString();
TextBox67.Text = "";
TextBox70.Text = "";
}
else if (ltext == "5")
{
TextBox23.Text = split[0].ToString();
TextBox24.Text = split[1].ToString();
TextBox25.Text = split[2].ToString();
TextBox26.Text = split[3].ToString();
TextBox27.Text = split[4].ToString();
TextBox67.Text = "";
TextBox70.Text = "";
}
else if (ltext == "7")
{
TextBox12.Text = split[0].ToString();
TextBox33.Text = split[1].ToString();
TextBox35.Text = split[2].ToString();
TextBox34.Text = split[3].ToString();
TextBox67.Text = "";
TextBox70.Text = "";
}
else if (ltext == "10")
{
TextBox47.Text = split[0].ToString();
TextBox48.Text = split[1].ToString();
TextBox52.Text = split[2].ToString();
TextBox83.Text = split[3].ToString();
TextBox84.Text = split[4].ToString();
TextBox67.Text = "";
TextBox70.Text = "";
}
else if (ltext == "11")
{
TextBox60.Text = split[0].ToString();
TextBox61.Text = split[1].ToString();
TextBox62.Text = split[2].ToString();
TextBox63.Text = split[3].ToString();
TextBox64.Text = split[4].ToString();
TextBox67.Text = "";
TextBox70.Text = "";
}
else if (ltext == "10")
{
TextBox11.Text = split[0].ToString();
TextBox28.Text = split[1].ToString();
TextBox67.Text = "";
TextBox70.Text = "";
}
else if (ltext == "11")
{
TextBox30.Text = split[0].ToString();
TextBox31.Text = split[1].ToString();
TextBox67.Text = "";
TextBox70.Text = "";
}
else if (ltext == "12")
{
TextBox35.Text = split[0].ToString();
TextBox34.Text = split[1].ToString();
TextBox67.Text = "";
TextBox70.Text = "";
}
else if (ltext == "2" && way == "Down: 2.")
{
TextBox65.Text = split[0].ToString();
TextBox68.Text = split[1].ToString();
TextBox71.Text = split[2].ToString();
TextBox74.Text = split[3].ToString();
TextBox67.Text = "";
TextBox70.Text = "";
}
else if (ltext == "4" && way == "Down: 4.")
{
TextBox15.Text = split[0].ToString();
TextBox20.Text = split[1].ToString();
TextBox25.Text = split[2].ToString();
TextBox30.Text = split[3].ToString();
TextBox34.Text = split[4].ToString();
TextBox67.Text = "";
TextBox70.Text = "";
}
else if (ltext == "6" && way == "Down: 6.")
{
TextBox78.Text = split[0].ToString();
TextBox81.Text = split[1].ToString();
TextBox84.Text = split[2].ToString();
TextBox87.Text = split[3].ToString();
TextBox67.Text = "";
TextBox70.Text = "";
}
else if (ltext == "8" && way == "Down: 8.")
{
TextBox35.Text = split[0].ToString();
TextBox45.Text = split[1].ToString();
TextBox54.Text = split[2].ToString();
TextBox60.Text = split[3].ToString();
TextBox67.Text = "";
TextBox70.Text = "";
}
else if (ltext == "9" && way == "Down: 9.")
{
TextBox51.Text = split[0].ToString();
TextBox52.Text = split[1].ToString();
TextBox58.Text = split[2].ToString();
TextBox64.Text = split[3].ToString();
TextBox67.Text = "";
TextBox70.Text = "";
}
}
protected void Button2_Click(object sender, EventArgs e)
{
con.Open();
SqlDataReader dr;
SqlCommand cnm = new SqlCommand("select linktext from dumptab", con);
dr = cnm.ExecuteReader();
while (dr.Read())
{
ltext = dr[0].ToString();
}
dr.Close();
con.Close();
string Query;
Query = TextBox67.Text;
char[] split = new char[10];
split = Query.ToCharArray();
string way = Label1.Text;
if (ltext == "1")
{
TextBox4.Text = "H";
}
else if (ltext == "2")
{
TextBox6.Text = "O";
}
else if (ltext == "4")
{
TextBox14.Text = "W";
TextBox15.Text = "E";
}
else if (ltext == "6")
{
TextBox19.Text = "A";
TextBox20.Text = "W";
}
else if (ltext == "8")
{
TextBox23.Text = "U";
}
else if (ltext == "9")
{
TextBox27.Text = "N";
}
else if (ltext == "10")
{
TextBox28.Text = "N";
}
else if (ltext == "11")
{
TextBox31.Text = "S";
}
else if (ltext == "12")
{
TextBox35.Text = "I";
}
}
protected void Button4_Click(object sender, EventArgs e)
{
con.Open();
SqlDataReader dr;
SqlCommand cnm = new SqlCommand("select linktext from dumptab", con);
dr = cnm.ExecuteReader();
while (dr.Read())
{
ltext = dr[0].ToString();
}
dr.Close();
con.Close();
string Query;
Query = TextBox70.Text;
FULL DOCUMENT.docx
FULL DOCUMENT.docx

Más contenido relacionado

Similar a FULL DOCUMENT.docx

CIS 336 Wonderful Education--cis336.com
CIS 336 Wonderful Education--cis336.comCIS 336 Wonderful Education--cis336.com
CIS 336 Wonderful Education--cis336.comJaseetha16
 
Query optimization to improve performance of the code execution
Query optimization to improve performance of the code executionQuery optimization to improve performance of the code execution
Query optimization to improve performance of the code executionAlexander Decker
 
11.query optimization to improve performance of the code execution
11.query optimization to improve performance of the code execution11.query optimization to improve performance of the code execution
11.query optimization to improve performance of the code executionAlexander Decker
 
Explain the concept of two types of network intrusions What devic.docx
Explain the concept of two types of network intrusions What devic.docxExplain the concept of two types of network intrusions What devic.docx
Explain the concept of two types of network intrusions What devic.docxSANSKAR20
 
[Rakuten TechConf2014] [D-2] The Pattern-Matching-Oriented Programming Langua...
[Rakuten TechConf2014] [D-2] The Pattern-Matching-Oriented Programming Langua...[Rakuten TechConf2014] [D-2] The Pattern-Matching-Oriented Programming Langua...
[Rakuten TechConf2014] [D-2] The Pattern-Matching-Oriented Programming Langua...Rakuten Group, Inc.
 
ds 1.pptx
ds 1.pptxds 1.pptx
ds 1.pptxvaru9
 
136 latest dot net interview questions
136  latest dot net interview questions136  latest dot net interview questions
136 latest dot net interview questionssandi4204
 
Game Design as an Intro to Computer Science (Meaningful Play 2014)
Game Design as an Intro to Computer Science (Meaningful Play 2014)Game Design as an Intro to Computer Science (Meaningful Play 2014)
Game Design as an Intro to Computer Science (Meaningful Play 2014)marksuter
 
Hey i have attached the required file for my assignment.and addi
Hey i have attached the required file for my assignment.and addiHey i have attached the required file for my assignment.and addi
Hey i have attached the required file for my assignment.and addisorayan5ywschuit
 
Engine Terminology
Engine Terminology Engine Terminology
Engine Terminology copelandadam
 
IRJET - Deep Learning based Chatbot
IRJET - Deep Learning based ChatbotIRJET - Deep Learning based Chatbot
IRJET - Deep Learning based ChatbotIRJET Journal
 
Smart boards
Smart boardsSmart boards
Smart boardsorenml
 
Mca2020 advanced data structure
Mca2020  advanced data structureMca2020  advanced data structure
Mca2020 advanced data structuresmumbahelp
 
Dynamic pooling and unfolding recursive autoencoders for paraphrase detection
Dynamic pooling and unfolding recursive autoencoders for paraphrase detectionDynamic pooling and unfolding recursive autoencoders for paraphrase detection
Dynamic pooling and unfolding recursive autoencoders for paraphrase detectionKoza Ozawa
 
String Comparison Surprises: Did Postgres lose my data?
String Comparison Surprises: Did Postgres lose my data?String Comparison Surprises: Did Postgres lose my data?
String Comparison Surprises: Did Postgres lose my data?Jeremy Schneider
 
Ggplot2 work
Ggplot2 workGgplot2 work
Ggplot2 workARUN DN
 

Similar a FULL DOCUMENT.docx (20)

Maze Base
Maze BaseMaze Base
Maze Base
 
CIS 336 Wonderful Education--cis336.com
CIS 336 Wonderful Education--cis336.comCIS 336 Wonderful Education--cis336.com
CIS 336 Wonderful Education--cis336.com
 
Query optimization to improve performance of the code execution
Query optimization to improve performance of the code executionQuery optimization to improve performance of the code execution
Query optimization to improve performance of the code execution
 
11.query optimization to improve performance of the code execution
11.query optimization to improve performance of the code execution11.query optimization to improve performance of the code execution
11.query optimization to improve performance of the code execution
 
Explain the concept of two types of network intrusions What devic.docx
Explain the concept of two types of network intrusions What devic.docxExplain the concept of two types of network intrusions What devic.docx
Explain the concept of two types of network intrusions What devic.docx
 
[Rakuten TechConf2014] [D-2] The Pattern-Matching-Oriented Programming Langua...
[Rakuten TechConf2014] [D-2] The Pattern-Matching-Oriented Programming Langua...[Rakuten TechConf2014] [D-2] The Pattern-Matching-Oriented Programming Langua...
[Rakuten TechConf2014] [D-2] The Pattern-Matching-Oriented Programming Langua...
 
ds 1.pptx
ds 1.pptxds 1.pptx
ds 1.pptx
 
136 latest dot net interview questions
136  latest dot net interview questions136  latest dot net interview questions
136 latest dot net interview questions
 
Game Design as an Intro to Computer Science (Meaningful Play 2014)
Game Design as an Intro to Computer Science (Meaningful Play 2014)Game Design as an Intro to Computer Science (Meaningful Play 2014)
Game Design as an Intro to Computer Science (Meaningful Play 2014)
 
Hey i have attached the required file for my assignment.and addi
Hey i have attached the required file for my assignment.and addiHey i have attached the required file for my assignment.and addi
Hey i have attached the required file for my assignment.and addi
 
E3
E3E3
E3
 
Engine Terminology
Engine Terminology Engine Terminology
Engine Terminology
 
IRJET - Deep Learning based Chatbot
IRJET - Deep Learning based ChatbotIRJET - Deep Learning based Chatbot
IRJET - Deep Learning based Chatbot
 
Smart boards
Smart boardsSmart boards
Smart boards
 
Mca2020 advanced data structure
Mca2020  advanced data structureMca2020  advanced data structure
Mca2020 advanced data structure
 
ELAVARASAN.pdf
ELAVARASAN.pdfELAVARASAN.pdf
ELAVARASAN.pdf
 
C3 geetha1 karthikeyan
C3 geetha1 karthikeyanC3 geetha1 karthikeyan
C3 geetha1 karthikeyan
 
Dynamic pooling and unfolding recursive autoencoders for paraphrase detection
Dynamic pooling and unfolding recursive autoencoders for paraphrase detectionDynamic pooling and unfolding recursive autoencoders for paraphrase detection
Dynamic pooling and unfolding recursive autoencoders for paraphrase detection
 
String Comparison Surprises: Did Postgres lose my data?
String Comparison Surprises: Did Postgres lose my data?String Comparison Surprises: Did Postgres lose my data?
String Comparison Surprises: Did Postgres lose my data?
 
Ggplot2 work
Ggplot2 workGgplot2 work
Ggplot2 work
 

Último

Call Girls Ahmedabad +917728919243 call me Independent Escort Service
Call Girls Ahmedabad +917728919243 call me Independent Escort ServiceCall Girls Ahmedabad +917728919243 call me Independent Escort Service
Call Girls Ahmedabad +917728919243 call me Independent Escort Serviceshivanisharma5244
 
Zoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdfZoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdfSumit Kumar yadav
 
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRLKochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRLkantirani197
 
Molecular markers- RFLP, RAPD, AFLP, SNP etc.
Molecular markers- RFLP, RAPD, AFLP, SNP etc.Molecular markers- RFLP, RAPD, AFLP, SNP etc.
Molecular markers- RFLP, RAPD, AFLP, SNP etc.Silpa
 
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticsPulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticssakshisoni2385
 
Digital Dentistry.Digital Dentistryvv.pptx
Digital Dentistry.Digital Dentistryvv.pptxDigital Dentistry.Digital Dentistryvv.pptx
Digital Dentistry.Digital Dentistryvv.pptxMohamedFarag457087
 
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...chandars293
 
module for grade 9 for distance learning
module for grade 9 for distance learningmodule for grade 9 for distance learning
module for grade 9 for distance learninglevieagacer
 
GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)Areesha Ahmad
 
GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)Areesha Ahmad
 
Justdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts Service
Justdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts ServiceJustdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts Service
Justdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts Servicemonikaservice1
 
The Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptxThe Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptxseri bangash
 
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICESAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICEayushi9330
 
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....muralinath2
 
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑Damini Dixit
 
development of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virusdevelopment of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virusNazaninKarimi6
 
Introduction to Viruses
Introduction to VirusesIntroduction to Viruses
Introduction to VirusesAreesha Ahmad
 
FAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical ScienceFAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical ScienceAlex Henderson
 

Último (20)

Call Girls Ahmedabad +917728919243 call me Independent Escort Service
Call Girls Ahmedabad +917728919243 call me Independent Escort ServiceCall Girls Ahmedabad +917728919243 call me Independent Escort Service
Call Girls Ahmedabad +917728919243 call me Independent Escort Service
 
Zoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdfZoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdf
 
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRLKochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Molecular markers- RFLP, RAPD, AFLP, SNP etc.
Molecular markers- RFLP, RAPD, AFLP, SNP etc.Molecular markers- RFLP, RAPD, AFLP, SNP etc.
Molecular markers- RFLP, RAPD, AFLP, SNP etc.
 
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticsPulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
 
Digital Dentistry.Digital Dentistryvv.pptx
Digital Dentistry.Digital Dentistryvv.pptxDigital Dentistry.Digital Dentistryvv.pptx
Digital Dentistry.Digital Dentistryvv.pptx
 
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
 
module for grade 9 for distance learning
module for grade 9 for distance learningmodule for grade 9 for distance learning
module for grade 9 for distance learning
 
GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)
 
Site Acceptance Test .
Site Acceptance Test                    .Site Acceptance Test                    .
Site Acceptance Test .
 
GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)
 
Justdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts Service
Justdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts ServiceJustdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts Service
Justdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts Service
 
The Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptxThe Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptx
 
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICESAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
 
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
 
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
 
development of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virusdevelopment of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virus
 
Introduction to Viruses
Introduction to VirusesIntroduction to Viruses
Introduction to Viruses
 
FAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical ScienceFAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical Science
 

FULL DOCUMENT.docx

  • 1. ABSTRACT Crossword puzzles require of the solver both an extensive knowledge of language, history and popular culture, and a search over possible answers to find a set that fits in the grid. This dual task, of answering natural language questions requiring shallow, broad knowledge, and of searching for an optimal set of answers for the grid, makes these puzzles an interesting challenge for artificial intelligence. A crossword is a word puzzle that normally takes the form of a square or rectangular grid of black and white squares. Generation of crossword puzzles by hand is a very tedious task, and automating this task through a computer program is also a complex task. This complication arises from the fact that most crosswords include not just extensive vocabulary but also phrases, slang language, abbreviations etc. The goal of this project was to use intelligent techniques to emulate a crossword setter or constructor and generate or “compile” crossword puzzles. The word-based approach is based on a simple implementation of the general constraint- satisfaction framework, namely an assignment of values to a set of variables such that each meets all the specified constraints. For crossword puzzles, the variables are the words which need to be filled in, one variable for each of the words in the puzzle solution. The grid also provides the initial constraints for each word, such as the number of letters, what overlap relationships the word has with other words in the grid, etc. Finally, a dictionary provides the overall constraint that any valid value for a variable must be in the dictionary.
  • 2. CONTENT Chapter No. Title Page No. 1. Introduction 1.1 About the Project 1.2 Project Description 2. Problem Definition 2.1 Existing System 2.2 Demerits 2.3Proposed System 2.4 Merits 3. System Study 4. System Specification 4.1 Software Requirements 4.2 Hardware Requirements 5. Software Specifications 5.1 Features of .NET 5.2 Features of SQL Server 6. System Design 6.1 Input Design 6.2 Database Design 6.3 Dataflow Diagram 6.4 Architecture Design 6.5 Use Case Diagram 6.6 E-R Diagram 6.7 Activity Diagram
  • 3. 7. System Testing And Maintenance 7.1 Unit Testing 7.2 Integrating Testing 7.3 Validation Testing 7.4 System Testing 7.5 Black Box Testing 8. System Implementation 9. Conclusion 10. Future Enhancement 11. Bibliography Appendix Screen Shots Sample Coding Reports
  • 4. 1. INRODUCTION 2. 1.1ABOUT THE PROJECT The Cross puzzle word game is simple models of human behavior by letting people like you play games with computers. Our goal is to understand what kinds of strategies people use in their everyday life when they interact with other people. We’ve designed "games" that are similar to some of situations we ordinarily encounter in life opportunities to cooperate or compete, share or steal, and reward or punish. Then, we've designed computer programs that behave in different ways in each of these games. To learn more about these games, click on "The games" link to the left. One goal is to see how people respond to these computer programs. Which programs are successful when they interact with real humans, and which programs fail? Another goal is to see how people respond when they interact with different computer programs.The framework should provide services to load and store files in this format. Loading and storing may be specialized by game specific code if necessary. The framework must be able to show the state of the game as a grid where each hint cell contains a number, a character, a string or an image. The length of strings and the size of images may be limited by the game. The number of rows and columns does not change during a game. However, the change of the size of a cell and thus the size of the grid should be possible, as well as the change of the font size. All cells in the grid are of equal size. · The framework should make it easy for the user to select the cell to enter the input. The framework should be able to distinguish initial instruction and hint cells from the input cells and prevent entering input in the former ones. The player should be able to correct the value she has entered earlier. It should be possible to extend the processing of input by game specific checks and error messages. · The player should be able to ask the framework for assistance by revealing the content of either a random or a selected cell. · The framework must keep record on the time used in filling the grid and the number of corrections made for each cell. The framework should support unrestricted undo operation. The framework should be able to check the input against the correct solution and the rules of the game either cell by cell during the game or once when all the cells have been filled. It should be possible to attach game specific scoring and reporting of the results to the checking. Although our models are much more simple than the real world, our hope is that we can use these models to understand how people behave in different types of social interactions.
  • 5. 1.2 PROJECT DESCRIPTION MODULE LIST AND DESCRIPTION  BOARD PANEL MODULE  CREATE BOARD MODULE  SUBSET MODULE  UPDATE BOARD MODULE BOARD PANEL MODULE Implements the Fill and Pick Strategies and Arc-consistency. This is the main module which is used for implementing the algorithm. The word pattern which allows the longest word is chosen and is seeded. The database is queried depending on the partial assignment of this pattern. The word list returned is stored in open List and the closed List is also initialized with the requisite information. If the grid becomes inconsistent with this assignment, the pattern is filled with the next word in the open List. If all subsequent words in the open List fail, then the grid is inconsistent and we backtrack to the last instantiated intersecting pattern. The algorithm runs till we have a complete consistent assignment for the entire grid. CREATE BOARD MODULE This module is used to create the board. To enter cross word details in the board. The framework should be able to check the input against the correct solution and the rules of the game either cell by cell during the game or once when all the cells have been filled. It should be possible to attach game specific scoring and reporting of the results to the checking. SUBSET MODULE This module creates tables in the database and inserts records into them. Determine the priorities of the scenarios according to their importance and ease of implementation. Finally, list the main architectural risks on the modifiability and re-use of the framework. UPDATE BOARD MODULE The Update Board module contains all the methods for dealing with board updating including resetting the board, filling a word pattern with a word, removing a word and reading the word filled in a word pattern.
  • 6. 2. PROBLEM DEFINITION In this project you should design a framework to support the implementation of crossword puzzles and other grid based games in Java environment. Furthermore you should analyze the re- usability of your framework. The aim of the framework is to assist the development of games the basis of which is filling numbers or characters into a grid, crossword puzzles and various mathematical games. A common feature in these games is the board organized as a grid of columns and rows. A cell in the grid may contain hint information (numbers, characters, text or image). There may also be empty cells that accept user input. The player fills in the empty cells one by one and the game software checks that the rules of the game are followed. The game is over when there are no more empty cells and the cells have been filled complying with the rules. The rules of the game determine how the score will be counted. The score may be based, for example, on the time spent for finding the solution, the number of corrections made, and the number of extra hints used. 2.1 EXISTING SYSTEM
  • 7. Crossword puzzle generation is an NP-complete problem. It has been used by many researchers to test intelligent algorithms and heuristic techniques. However with limited processing power and a small dictionary he was unable to leverage the power of the word-by-word instantiation approach and was relegated to using the letter-by-letter instantiation approach. Other researchers followed suit using ever larger dictionaries and higher processing capabilities. The outcome of this research has been that it is now widely understood that Crossword puzzle generation is a fine example of a Constraint Satisfaction Problem. The variables consist of the empty grid positions to be filled up and the values are dictionary words and/or phrases that can be placed in these positions. The board itself presents constraints in the form of the size of the grid, the number of empty grid positions to be filled, the length of word patterns and the intersection between different “across” and “down” word patterns. An important consideration when filling any empty word pattern is that the word to be filled must be a valid English language word. This constraint means that a dictionary lookup is necessary. 2.2 DEMERITS  Constraint Satisfaction Problem.  Difficult to solve the cross word puzzle.  No clues to find answers.
  • 8. 2.3 PROPOSED SYSTEM The aim of the framework is to assist the development of games the basis of which is filling numbers or characters into a grid, for example, and various mathematical games .A common feature in these games is the board organized as a grid of columns and rows. A cell in the grid may contain hint information (numbers, characters, text or image). There may also be empty cells that accept user input. The player fills in the empty cells one by one and the game software checks that the rules of the game are followed. The game is over when there are no more empty cells and the cells have been filled complying with the rules. The rules of the game determine how the score will be counted. The score may be based, for example, on the time spent for finding the solution, the number of corrections made, and the number of extra hints used. This approach is based on another view of the crossword puzzle, and suggests different algorithms. Instead of looking at a solution as a set of words, it views the grid as a matrix of squares, and a solution, therefore, is an assignment of characters to grid squares such that each string of characters, read across or down, is a word in the dictionary. Constraints on the length of words are represented by marking appropriate squares in the grid with "stop" flags, indicating that no letter goes in that square, and scanning should stop. This is, obviously, a direct translation of the blackened squares on a traditional crossword puzzle. 2.4 MERITS  Easy to solve cross word puzzle via computer.  Giving clues to solve the cross word puzzle.  The grid may contain hint information.
  • 9. 3. SYSTEM STUDY Feasibility Study: The feasibility of the project is analyzed in this phase and business proposal is put forth with a very general plan for the project and some cost estimates. During system analysis the feasibility study of the proposed system is to be carried out. This is to ensure that the proposed system is not a burden to the company. For feasibility analysis, some understanding of the major requirements for the system is essential. Feasibility is a practical extent to which a project can be performed successfully. To evaluate feasibility, a feasibility study is performed, which determines whether the solution considered to accomplish the requirements is practical and workable in the software or not. Three key considerations involved in the feasibility analysis are  Technical Feasibility  Operational Feasibility  Economic Feasibility Technical Feasibility: This study is carried out to check the technical feasibility, that is, the technical requirements of the system. Any system developed must not have a high demand on the available technical resources. This will lead to high demands on the available technical resources. This will lead to high demands being placed on the client. The developed system must have a modest requirement, as only minimal or null changes are required for implementing this system. In technical feasibility the following issues are taken into consideration. Once the technical feasibility is established, it is important to consider the monetary factors also. Since it might happen that developing a particular system may be technically possible but it may require huge investments and benefits may be less. For evaluating this, economic feasibility of the proposed system is carried out.
  • 10. Operational feasibility The proposed system normally solves the problems and takes advantages of the opportunities identified during scope definition, it satisfies the requirements identified in the requirements analysis phase of system development. Since the statistical figures are stored in a certain format in the computer, it reduces the manual work and enhances the standard of presentation also. Operational feasibility assesses the extent to which the required software performs a series of steps to solve business problems and user requirements. This feasibility is dependent on human resource and involves visualizing whether or not the software will operate after it is developed, and be operated once it is installed. This measures how well your company will be able to solve problems and take advantage of opportunities that are presented during the course of the project. Economic Feasibility: This study is carried out to check the economic impact that the system will have on the organization. The amount of fund that the company can pour into the research and development of the system is limited. The expenditures must be justified. Thus the developed system as well within the budget and this was achieved because most of the technologies used are freely available. Only the customized products had to be purchased. In economic feasibility, cost benefit analysis is done in which expected costs and benefits are evaluated. Economic analysis is used for evaluating the effectiveness of the proposed system. The developed system is economical when compared to the existing system job done manual system. So the proposed system is so fast that planning can be made easily. The Economic Feasibility is analyzed using following studies,  Cost Based Study: In which Development costs and Operating cost are very well managed then the benefits derivable out of the system. Time Based Study: The analysis of the time required to achieve a return on investments is also within the limit 4. SYSTEM SPECIFICATION
  • 11. 4.1 HARDWARE REQUIREMENTS PROCESSOR : Intel(R) Pentium(R) Dual-Core Processing RAM : 1GB RAM HARD DISK : 20 GB 4.2 SOFTWARE REQUIREMENTS OPERATING SYSTEM : Windows XP, Windows2007 (32Bit Original) ENVIRONMENT : Visual Studio .NET 2005 or 2008 or 2010 .NET FRAMEWORK : Version 2.0 or Version 3.0 or Version 4.0 LANGUAGE : C#.NET BACK END : MS-SQL-Server 2000 5. SOFTWARE SPECIFICATION
  • 12. 5.1 Features of .NET INTRODUCTION TO .NET: .NET Framework The Microsoft .NET Framework is a platform for building, deploying, and running Web Services and applications. It provides a highly productive, standards-based, multi-language environment for integrating existing investments with next-generation applications and services as well as the agility to solve the challenges of deployment and operation of Internet-scale applications. The .NET Framework consists of three main parts: the common language runtime, a hierarchical set of unified class libraries, and a componentized version of Active Server Pages called ASP.NET. .Net Framework Components Visual Basic Common lanaguage specification Web Services User Interface Data and XML Base class library Common language runtime C++ C# ... Visual Studio .NET Framework, Languages and Tools Figure 1 - An overview of the .net Framework The .NET Framework has two main components: the common language runtime and the .NET Framework class library. The common language runtime is the foundation of the .NET
  • 13. Framework. Visual Basic sits at the top of the framework (along with the other languages in Visual Studio.net). Below that is the Common Language Specification (CLS). This specification is a set of rules that govern the minimum language features that must be supported to ensure that a language will interoperate with other CLS-compliant components and tools. As long as a language conforms to the CLS, it is guaranteed to work with the CLR. In this way, when third-party compilers target the .net framework, as long as they conform to the CLS, the code is guaranteed to work. Visual Basic.net shares the same variable types, arrays, user- defined types, classes, graphical forms, visual controls and interfaces as these other languages. Web Services Web Services provide a Web-enabled user interface with tools that include various HTML controls and Web controls. Forms creating using Web Services are the same as forms created for a Windows application. The code behind a Web form is the same as the code behind a Windows form. The markup language that is used by Web forms is still there, but the Web form applications generate it for you. User Interface At the same level as Web Services is the User Interface. The User Interface is where Windows forms live. It also provides code for drawing to the screen, printing, rendering text and displaying images. Data and XML Both Web Services and the User Interface sit on top of the Data and XML block. As you will learn later in this paper, XML (or extensible markup language) plays just as important of a role as data. XML is used to provide a text view of data that can be shared between services on the same PC or passed through a firewall to a web server across the country using SOAP (more on SOAP a little later). Base Class Library
  • 14. The base class library (BCL) is underneath the Data and XML block. This area is the origin for the base class of all .net programs. Everything in Visual Basic.net is an object, and all objects originate from a class named System. The BCL also provides collections, localization, text objects, interoperability with non-.net code and ActiveX controls and a variety of other services. The Common Language Runtime At the base of the .net framework is the common language runtime (CLR). Much like the Java Virtual Machine, the CLR is needed to make .net code run on any machine. Base class library support Thread support COM marshaler Type checker Security engine Class loader Common Language Runtime Exception manager Debug engine IL to native components Code manager Garbage Collector Figure 2 - Common Language Runtime services The CLR is a set of resources that any .net program can take advantage of, from any .net- supported language. All languages will be more equal in capability than they ever have before. The CLR includes support for the BCL, where the architecture for controls and forms actually live.
  • 15. It is also responsible for managing threads and exceptions (replacing the Err object in VB 6). Garbage collection is also handled by the CLR. The CLR takes code generated by VB and converts it to the native language of the current platform. Through this conversion, the magic of multi platform execution is achieved. Now VB programmers can write code in VB syntax and the CLR is responsible for converting it to any platform that can run the CLR. The programmer is removed several layers from the hardware and doesn’t really need to know what platform his/her code is running on. One additional service of the CLR is handling bad code. You have probably heard stories of rogue code that overran buffers and trashed a machine, killing all other programs along with it. By design, this cannot happen with code written in Visual Basic.net. .NET Framework Class Library The .NET Framework class library is a collection of reusable types that tightly integrate with the common language runtime. The class library is object oriented, providing types from which your own managed code can derive functionality. This not only makes the .NET Framework types easy to use but also reduces the time associated with learning new features of the .NET Framework. In addition, third-party components can integrate seamlessly with classes in the .NET Framework. For example, the .NET Framework collection classes implement a set of interfaces that you can use to develop your own collection classes. Your collection classes will blend seamlessly with the classes in the .NET Framework. As you would expect from an object-oriented class library, the .NET Framework types enable you to accomplish a range of common programming tasks, including string management, data collection, database connectivity, and file access. In addition to these common tasks, the class library includes types that support a variety of specialized development scenarios. For example, you can use the .NET Framework to develop the following types of applications and services:  Console applications  Windows GUI applications (Windows Forms)
  • 16.  XML Web services  Windows services For example, the Windows Forms classes are a comprehensive set of reusable types that vastly simplify Windows GUI development ASP.NET Microsoft® ASP.NET is the next generation technology for Web application development. It takes the best from Active Server Pages (ASP) as well as the rich services and features provided by the Common Language Runtime (CLR) and add many new features. The result is a robust, scalable, and fast Web development experience that will give you great flexibility with little coding. Web Forms are the heart and soul of ASP.NET. Web Forms are the User Interface (UI) elements that give your Web applications their look and feel. Web Forms are similar to Windows Forms in that they provide properties, methods, and events for the controls that are placed onto them. However, these UI elements render themselves in the appropriate markup language required by the request, e.g. HTML. If you use Microsoft Visual Studio® .NET, you will also get the familiar drag-and-drop interface used to create your UI for your Web application. New in ASP.NET  Better language support  Programmable controls  Event-driven programming  XML-based components  User authentication, with accounts and roles  Higher scalability  Increased performance - Compiled code  Easier configuration and deployment  Not fully ASP compatible Advantages Using ASP.NET
  • 17.  ASP.NET drastically reduces the amount of code required to build large applications  ASP.NET makes development simpler and easier to maintain with an event-driven, server- side programming model  ASP.NET pages are easy to write and maintain because the source code and HTML are together  The source code is executed on the server. The pages have lots of power and flexibility by this approach ASP.NET Features Easy Programming Model ASP.NET makes building real world Web applications dramatically easier. ASP.NET server controls enable an HTML-like style of declarative programming that let you build great pages with far less code than with classic ASP. Displaying data, validating user input, and uploading files are all amazingly easy. Best of all, ASP.NET pages work in all browsers including Netscape, Opera, AOL, and Internet Explorer. Flexible Language Options ASP.NET lets you leverage your current programming language skills. Unlike classic ASP, which supports only interpreted VBScript and JScript, ASP.NET now supports more than 25 .NET languages (built-in support for VB.NET, C#, and JScript.NET), giving you unprecedented flexibility in your choice of language. Rich Class Framework Application features that used to be hard to implement, or required a 3rd-party component, can now be added in just a few lines of code using the .NET Framework. The .NET Framework offers over 4500 classes that encapsulate rich functionality like XML, data access, file upload, regular expressions, image generation, performance monitoring and logging, transactions,
  • 18. message queuing, SMTP mail, and much more. With Improved Performance and Scalability ASP.NET lets you use serve more users with the same hardware. Compiled execution ASP.NET is much faster than classic ASP, while preserving the "just hit save" update model of ASP. However, no explicit compile step is required. ASP.NET will automatically detect any changes, dynamically compile the files if needed, and store the compiled results to reuse for subsequent requests. Dynamic compilation ensures that your application is always up to date, and compiled execution makes it fast. Most applications migrated from classic ASP see a 3x to 5x increase in pages served. Rich output caching ASP.NET output caching can dramatically improve the performance and scalability of your application. When output caching is enabled on a page, ASP.NET executes the page just once, and saves the result in memory in addition to sending it to the user. When another user requests the same page, ASP.NET serves the cached result from memory without re-executing the page. Output caching is configurable, and can be used to cache individual regions or an entire page. Output caching can dramatically improve the performance of data-driven pages by eliminating the need to query the database on every request. Accessing Data with ADO.net Most applications need data access at one point of time making it a crucial component when working with applications. Data access is making the application interact with a database, where all the data is stored. Different applications have different requirements for database access. ASP.NET uses ADO .NET (Active X Data Object) as it's data access and manipulation protocol which also enables us to work with data on the Internet. ADO.NET Data Architecture Data Access in ADO.NET relies on two components: DataSet and Data Provider.
  • 19. Dataset The dataset is a disconnected, in-memory representation of data. It can be considered as a local copy of the relevant portions of the database. The DataSet is persisted in memory and the data in it can be manipulated and updated independent of the database. When the use of this DataSet is finished, changes can be made back to the central database for updating Data Provider The Data Provider is responsible for providing and maintaining the connection to the database. A DataProvider is a set of related components that work together to provide data in an efficient and performance driven manner. Each DataProvider consists of the following component classes:  The Connection object which provides a connection to the database  The Command object which is used to execute a command  The DataReader object which provides a forward-only, read only, connected recordset  The DataAdapter object which populates a disconnected DataSet with data and performs update Data access with ADO.NET can be summarized as follows: A connection object establishes the connection for the application with the database. The command object provides direct execution of the command to the database. If the command returns more than a single value, the command object returns a DataReader to provide the data. Alternatively, the DataAdapter can be used to fill the Dataset object. The database can be updated using the command object or the DataAdapter.
  • 20. Component classes that make up the Data Providers The Connection Object The Connection object creates the connection to the database. Microsoft Visual Studio .NET provides two types of Connection classes: the SqlConnection object, which is designed specifically to connect to Microsoft SQL Server 7.0 or later, and the OleDbConnection object, which can provide connections to a wide range of database types like Microsoft Access and Oracle. The Connection object contains all of the information required to open a connection to the database.
  • 21. The Command Object The Command object is represented by two corresponding classes: SqlCommand and OleDbCommand. Command objects are used to execute commands to a database across a data connection. The Command objects can be used to execute stored procedures on the database, SQL commands, or return complete tables directly. Command objects provide three methods that are used to execute commands on the database:  ExecuteNonQuery: Executes commands that have no return values such as INSERT, UPDATE or DELETE  ExecuteScalar: Returns a single value from a database query  ExecuteReader: Returns a result set by way of a DataReader object The Data Reader Object The DataReader object provides a forward-only, read-only, connected stream recordset from a database. Unlike other components of the Data Provider, DataReader objects cannot be directly instantiated. The DataReader can provide rows of data directly to application logic when you do not need to keep the data cached in memory. Because only one row is in memory at a time, the DataReader provides the lowest overhead in terms of system performance but requires the exclusive use of an open Connection object for the lifetime of the DataReader. The DataAdapter Object The DataAdapter is the class at the core of ADO .NET's disconnected data access. It is essentially the middleman facilitating all communication between the database and a DataSet. The DataAdapter is used either to fill a DataTable or DataSet with data from the database with it's Fill method. After the memory-resident data has been manipulated, the DataAdapter can commit the changes to the database by calling the Update method. The DataAdapter provides four properties that represent database commands:  SelectCommand  InsertCommand
  • 22.  Delete Command  Update Command When the Update method is called, changes in the Dataset are copied back to the database and the appropriate Insert Command, Delete Command, or Update Command is executed. VISUAL BASIC.NET Visual Basic.NET (VB.NET) is an enhanced version of VB designed to work within the .NET Framework. VB.NET adds important new features to the language, including inheritance, constructors, and method overloading. It also gains all of the capabilities provided by the .NET runtime, including multithreading, object serialization, the ability to create Web Forms and Win Forms, etc. Visual Basic .NET (VB.NET or VB .NET) is a version of Microsoft's Visual Basic that was designed, as part of the company's .NET product group, to make Web services applications easier to develop. According to Microsoft, VB .NET was reengineered, rather than released as VB 6.0 with added features, to facilitate making fundamental changes to the language. VB.NET is the first fully object-oriented programming (OOP) version of Visual Basic, and as such, supports OOP concepts such as abstraction, inheritance, polymorphism, and aggregation. Visual Basic.net Data Types Before we can get into the Visual Basic.net code, we need to start by exploring the changes to data types. Hopefully, you are not a programmer that insisted on using the Variant data type consistently in your code…if you did, you will have a more difficult time adjusting to the new data types in Visual Basic.net. The Variant data type no longer exists in Visual Basic.net. (Another data type that did not make the transition is the Currency type.) The primitive data types still exist (Integer, Boolean, Long, etc.), the main difference now is that these data types are all structure types in the System namespace and are referred to as Value Types. Value types are always accessed directly. In fact, you can’t create a reference to a value type. And unlike reference types, setting a value type to Null is not possible. Value types always hold a value, even if one hasn’t been assigned yet. When a value type variable is dimensioned, it’s initialized to a value representative of its type. For example, if you dimension a variable to Integer, the Visual Basic.net compiler automatically initializes the variable to 0.
  • 23. Garbage Collection in Visual Basic.net In VB 6, when you were finished using an object, you simply set it to nothing and the object would be released. This is no longer the case with Visual Basic.net. In Visual Basic.net, when a variable loses scope, the CLR destroys the object and removes it from the stack automatically for you. Features of Visual Basic.net Powerful Windows-based Applications Visual Basic .NET comes with features such as a powerful new forms designer, an in-place menu editor, and automatic control anchoring and docking. Visual Basic .NET delivers new productivity features for building more robust applications easily and quickly. With an improved integrated development environment (IDE) and a significantly reduced startup time, Visual Basic .NET offers fast, automatic formatting of code as you type, improved IntelliSense, an enhanced object browser and XML designer, and much more. Building Web-based Applications With Visual Basic .NET we can create Web applications using the shared Web Forms Designer and the familiar "drag and drop" feature. You can double-click and write code to respond to events. Visual Basic .NET 2003 comes with an enhanced HTML Editor for working with complex Web pages. We Simplified Deployment With Visual Basic .NET we can build applications more rapidly and deploy and maintain them with efficiency. Visual Basic .NET 2003 and .NET Framework 1.1 makes "DLL Hell" a thing of the past. Side-by-side versioning enables multiple versions of the same component to live safely on the same machine so that applications can use a specific version of a component. Powerful, Flexible, Simplified Data Access
  • 24. You can tackle any data access scenario easily with ADO.NET and ADO data access. The flexibility of ADO.NET enables data binding to any database, as well as classes, collections, and arrays, and provides true XML representation of data. Seamless access to ADO enables simple data access for connected data binding scenarios. Using ADO.NET,Visual Basic .NET can gain high-speed access to MS SQL Server, Oracle, DB2, Microsoft Access, and more. Improved Coding You can code faster and more effectively. A multitude of enhancements to the code editor, including enhanced IntelliSense, smart listing of code for greater readability and a background compiler for real-time notification of syntax errors transforms into a rapid application development (RAD) coding machine. Direct Access to the Platform Visual Basic developers can have full access to the capabilities available in .NET Framework 1.1. Developers can easily program system services including the event log, performance counters and file system. The new Windows Service project template enables to build real Microsoft Windows NT Services. Programming against Windows Services and creating new Windows Services is not available in Visual Basic .NET Standard, it requires Visual Studio 2003 Professional, or higher. Full Object-Oriented Constructs You can create reusable, enterprise-class code using full object-oriented constructs. Language features include full implementation inheritance, encapsulation, and polymorphism. Structured exception handling provides a global error handler and eliminates spaghetti code. Accessing Data with ADO.net Data access with Visual Basic has come a long way in a relatively short period of time. After all, Microsoft released three versions of Visual Basic before database access was ever included. In VB 3, Microsoft introduced DAO (Data Access Objects), which used the Microsoft
  • 25. Jet Engine to connect to local databases. You could use DAO to connect to databases on a server, but the performance was poor because DAO was optimized for local access. Following DAO came RDO (Remote Data Objects) and then finally ADO (ActiveX Data Objects). These access technologies were designed with client/server in mind, but with the move away from a client/server to an n-tier approach to system design, something new was needed; enter ADO.net. As mentioned earlier, the Recordset object no longer exists in ADO.net. The successor, the DataSet object now gives us a look at all of the data. It can model data logically or abstractly, because unlike the RecordSet, the DataSet is not a container that can hold only rows of data. The DataSet can actually hold multiple tables and the relationships between them. Let’s say for example you wanted to query data from two tables in a database that are joined together. In traditional ADO, you would execute a SQL query that placed the results in the RecordSet object. In ADO.net, using the DataSet object, the two tables themselves are placed in the data set and you then perform the needed query afterwards. The advantage of this method is not obvious, but what if there was some bit of detail in one of the tables your query left out? You would then, possibly, have to create another RecordSet to query the additional information you needed. Previous releases of ADO had support for XML, but it was crude at best. If you don’t know what XML is by now, I suggest you start surfing or buy a good book on XML: it’s here to stay. For several years now, many businesses have been using XML to exchange data. The problem has been that both entities had to agree in advance on the format of the XML document, because there were not any languages that would give you an easy way to access XML data. Microsoft introduced the use of XML in ADO in version 2.1. The programmer could either save a recordset to XML and vice-versa; the trouble was that Microsoft defined the format of the XML and no other platforms had native support for it. Thanks to W3C, there is now a standard XML schema for recordsets and Microsoft uses this standard in ADO.net. I am not sure if other companies have yet adopted the standard, but you can be assured they will soon if they haven’t already.
  • 26. Figure 4 depicts data flow from a data source to a data consumer using ADO.net. First we connect to and retrieve tables from a relational database. The tables are each placed in an in- memory DataSet object using DataSetCommand objects. These DataSetCommand objects specify the tables (or a subset thereof) that we are interested in. After the DataSet is filled, the connection to the database is immediately closed. We can then build the relationship between the individual tables within the DataSet itself and send the data, via XML, to any client application. Figure 3 - ADO.net data flow
  • 27. XML in Visual Basic.net You cannot do anything in Visual Basic.net without XML being involved somewhere. It may not be on the surface, but it is there in the underlying data. Chances are that if you are only developing Windows applications for use on a single PC, you will not use XML very often; but if you want to query or update data from a remote data source (on the Internet or Intranet), you will need to understand what XML is and what it can do. And you will, of course, use ADO.net as the mechanism to do this 5.2 Features of SQL Server In Client Server technology, a server is a program which does all the jobs that is requested by the client and Client is a program which depends on the Server to accomplish its task. Client is mainly used to interact with Users and most Server software doesn’t have direct interaction with Users. A DBMS should have the following functionality – Interaction with users (developers), Managing Data. Since these two functionalities are entirely different modern DBMS is divided into two or more parts. Almost all current DBMS has the following module – Server and one or more clients. A server module is program which manages the data and handles requests from the client applications. It interprets the SQL queries and returns results back to the clients. A client program is a program which sends SQL commands to server and gets the result. Client program does not know the detailed underground structure of the server. SQL Server 2000 runs as a service in NT based machines. You have to establish a connection to the server first if you want to do some SQL operation. SQL Server uses Local or Network IPC (Inter process communication) to communicate with the clients. See Books Online for more details. The most basic misunderstanding of many junior developers is considering SQL Enterprise Manager as the SQL server. SQL Enterprise Manager is a tool used to access the SQL server. SQL Query analyzer is also similar tool used to access the SQL server. The difference between SQL query analyzer and Enterprise Manager is Query Analyzer is a light weight process and Enterprise manager is heavy weight processes due to its Graphical User Interface. Enterprise Manager is a handy tool in the initial stage of a project. It will save lot more time while designing the database. You can easily create Tables, Triggers, Relationships, Constraints etc using Enterprise manger easily. I have seen many of developers don’t have experience in using Enterprise Manager. Never become one of them, use Enterprise
  • 28. Manager whenever you start creating a database. Query Analyzer is a tool used to Create, Analyze, Modify and Delete T-SQL queries. DDL (Data Definition Language) Data Types What is data type? – Classification of data into similar groups. Names, Money, Date, Time, etc are examples for data type. What is the use of classification or data type? – It increases the performance, reduces the space needed to store the data. I can’t explain how it increases the performance and how it reduces the space in a single paragraph. However I can direct you to find the solution – Try writing a C program which should store Employee Name, DateOfBirth, Salary, EmployeeID into file and provide option to search the records. The following data types are available in SQL. TINYINT, SMALLINT, INT, BIGINT DECIMAL/NUMERIC FLOAT, REAL SMALLMONEY, MONEY BIT CHAR, NCHAR, VARCHAR, NVARCHAR, TEXT, NTEXT BINARY, VARBINARY, IMAGE CURSOR SQL_VARIANT TABLE TIMESTAMP UNIQUEIDENTIFIER
  • 29. The main difference between the data type is the capacity of the type. To see the Capacity of the data type refers “Books Online”. CREATE TABLE, Constraints, Relationships, All your definitions of the tables, views, stored procedures, functions are stored in system tables. Books online - The information used by Microsoft® SQL Server 2000 and its components is stored in special tables known as system tables. You can query the system tables to obtain the inside structure of your schema. The following system tables are the some of the most used system tables – sysobjects, syscolumns, systypes, sysusers, sysindexes. Some of the tables are stored only in master database because they contain contents which are global across the databases – syslogins, syslockinfo, sysdatabases etc. For example to get list of databases in the connected server, you can issue – SELECT * FROM sysdatabases The following query will return all the table names in the connected database. SELECT Table Name = [Name] FROM sysobjects WHERE xtype=’U’ The following query will return all the column details for a given Table. SELECT * FROM sysobjects so(NOLOCK) INNER JOIN syscolumns sc(NOLOCK) ON so.[id]=sc.[id] WHERE so.[Name]=’Table Name’ You can query the system tables but you should not add, modify or delete anything directly. To add, delete and modify system table contents SQL Server provides some stored procedures. sp_databases – This stored procedure will return all the databases in the connected server. sp_tables – This will return all the tables in the database. sp_columns – This stored procedure will return the column details of a given Table.
  • 30. 6. SYSTEM DESIGN Where best is defined as the shortest distance from the master block to the goal. If several runs had the same shortest distance to the goal, the parameters from the run where this distance was reached in the fewest number of positions examined is chosen. 6.1 CBR The CBR component of the program has a case base containing previously solved Puzzles. A case consists of the following features • Estimate (upper bound) of the search space size • Branching factor • Block shape niceness - the number of rectangular blocks divided by the total Number of blocks • Average block size • Number of spaces • Puzzle size (total number of cells in the puzzle area) In addition, each case stores the parameters used for solving the puzzle. We have chosen to have numerical values only associated with each feature, represented as a range of floating point numbers (lower and upper bound). The reason for having a range is to account for uncertainty in the values. The case base itself will consist of the 15 puzzles that was solved during the specialization project, along with the parameter sets that solve them. For each puzzle that we managed to solve with multiple parameter sets, we chose the parameter set that solves the puzzle with the least search effort, measured in number of positions examined before a solution is found. 6.1.1 Retrieve When the meta-reasoned is given a new puzzle to solve, the case base is searched for the cases that are most similar to the given puzzle. The three most similar cases are always retrieved, in increasing order of similarity. Further cases are also retrieved, if their similarity is less than three times the similarity of the best case. 6.1.2 Reuse
  • 31. For each case that is retrieved, the solution for this case is applied to the current puzzle to solve. The solver is run, which results in either finding a solution, showing 6.2 META-REASONER That no solution exists with the settings used, or we exceed the limit of how many positions can examine. This limit is set to 5 million positions. 6.2.1 Revise If the case wasn’t solved, the meta-control cycle begins. Run the second, third, n-th best case. Run the cases again, and slightly alter one/some of the parameters. After 25 attempts to run the solver, a final run will be performed with the best parameters found so far. This run is not subject to any limitations of number of positions examined. In the first 25 runs, the solver exits when it exceeds certain number of examined positions. 6.2.2 Retain Solutions found by the meta-reasoned are not retained. We wish to ensure that each test case gets equal conditions. Otherwise, the last cases run could have a higher chance of being solved, since they get the benefit of a larger case base 6.1 INPUT DESIGN
  • 32.
  • 33.
  • 34.
  • 35. 6.2 DATABASE DESIGN USE [Puzzle] GO /****** Object: Table [dbo].[dumptab] Script Date: 02/17/2015 00:12:36 ******/ SET ANSI_NULLS ON GO SET QUOTED_IDENTIFIER ON GO CREATE TABLE [dbo].[dumptab]( [linktext] [nvarchar](50) COLLATE SQL_Latin1_General_CP1_CI_AS NULL ) ON [PRIMARY]
  • 36. 6.3 DATAFLOW DIAGRAM LEVEL 0: LEVEL 1: User Cross word puzzle Enter puzzle answer Solve Puzzle Create Board Create Panel Cell allocatio n Set Clue Questio n Frame User Puzzle
  • 38. 6.4 ARCHITECTURE DESIGN Cross Word Puzzle Board Creation Data Base Maintenance Fill Board Details Frame Question Details Get Clue Verify Answer Fulfill Puzzle Store Question Input data comparison
  • 39. 6.5 USE CASE DAGRAM CreatePanel & Cell allocation Enter puzzle answer Solve Puzzle Set Clue QuestionFrames CompareWithOrginal Value Using cluedetails Get final answer & Score User
  • 40. 6.6 E-R DIAGRAM Create Panel Cell allocation Question Frame Set clue Using clue details Using clue details Enter Answer Compare with original View Score Relation al USER PUZZLE
  • 41. SEQUENCE DIAGRAM Admin :Create Puzzles Puzzle :Panel Set Question : and Set clue User :Play Puzzle Solve :Puzzle Puzzle Process Fullfillpanel Puzzlpanel View clue and finalansewer Use Query
  • 42. COLLABARATION DIAGRAM Puzzle : Panel Admin :Create Puzzles Set Question : and Set clue User : Play Puzzle Solve : Puzzle 1: 2: 3: 4: 5:
  • 43. 6.7 ACTIVITY DIAGRAM Puzzle User Create Panel Enter Answer Cell allocation Compare withoriginal value Set clue View Score Using clue details Using Clue Details NewState Report
  • 44. 7. SYSTEM TESTING AND MAINTENANCE: Testing is vital to the success of the system. System testing makes a logical assumption that if all parts of the system are correct, the goal will be successfully achieved. In the testing process we test the actual system in an organization and gather errors from the new system operates in full efficiency as stated. System testing is the stage of implementation, which is aimed to ensuring that the system works accurately and efficiently. Maintenance plays a vital role. After systems have been verified, tested and implemented, they must continue to be maintained to ensure that they continue to perform correctly and that they can adapt to new requirements if needed. Ongoing monitoring or testing of systems may need to be systematized to ensure that maintenance needs are identified and met when necessary. Where systems are for extended use, a mechanism can be put in place to monitor feedback from users as another means to determine the need for maintenance and modification. 7.1 UNIT TESTING: Where individual system components are independently tested as they are developed to ensure that each logic path contained within each module performs as expected. Many tests performed during unit testing can be used for more than one module (error handling, spell checking of screens and reports, etc.). The procedure level testing is made first. By giving improper inputs, the errors occurred are noted and eliminated. Then the web form level testing is made. In the company as well as seeker registration form, the zero length username and password are given and checked. Also the duplicate username is given and checked. In the job and question entry, the button will send data to the server only if the client side validations are made. The dates are entered in wrong manner and checked. Wrong email-id and web site URL (Universal Resource Locator) is given and checked. 7.2 INTEGRATION TESTING:
  • 45. Data can be lost across an interface, one module can have an adverse effect on the other sub function, when combined, may not produce the desired major function. Integrated testing is systematic testing that can be done with sample data. The need for the integrated test is to find the overall system performance. Where multiple, related elements of the system are tested together to validate components of the system, and to ensure that the appropriate edits and controls are functioning correctly. This testing concludes with the entire system being tested as a whole. “Bottom up” and/or “top down” testing approaches can be used. With bottom up testing, the lowest level modules are created and tested first, and successive layers of functionality are added as they are developed. Top down testing takes the opposite approach, where the highest-level modules are developed and tested, while lower level stubs” are created and invoked until the actual modules are available. These stubs are temporary software modules that are created in order to enable the higher-level routines to be validated, but that do not yet perform the full set of functions needed by the system. Most testing strategies employ a mix of both approaches. 7.3 VALIDATION TESTING: The final step involves Validation testing, which determines whether the software function as the user expected. The end-user rather than the system developer conduct this test most software developers as a process called “Alpha and Beta testing” to uncover that only the end user seems able to find. The compilation of the entire project is based on the full satisfaction of the end users. In the project, validation testing is made in various forms. In registration form Email id for the user is verified. Validation is a Quality assurance process of establishing evidence that provides a high degree of assurance that a product, service, or system accomplishes its intended requirements. This often involves acceptance of fitness for purpose with end users and other product stakeholders. 7.4 SYSTEM TESTING:
  • 46. System testing is usually required before and after a system is put in place. A series of systematic procedures are referred to while testing is being performed. These procedures tell the tester how the system should perform and where common mistakes may be found. Testers usually try to "break the system" by entering data that may cause the system to malfunction or return incorrect information. For example, a tester may put in a city in a search engine designed to only accept states, to see how the system will respond to the incorrect input. System testing is the stage of implementation, which aimed at ensuring that the system works accurately and efficiently before the live operation commences. Testing is the process of executing a program with the intent of finding an error. A good test case is one that has a high probability of finding a yet undiscovered error. A successful test is one that answers a yet undiscovered error. Where the entire system is linked together and tested to validate that it meets the operational requirements defined during System Requirements Analysis. 7.5 BLACK BOX TESTING: Black box testing takes an external perspective of the test object to derive test cases. These tests can be functional or non-functional, though usually functional. The test designer selects valid and invalid input and determines the correct output. There is no knowledge of the test object's internal structure. It is also known as functional testing. For example, in a black box test on software design the tester only knows the inputs and what the expected outcomes should be and not how the program arrives at those outputs. The tester does not ever examine the programming code and does not need any further knowledge of the program other than its specifications. This method of test design is applicable to all levels of software testing: unit, integration, functional testing, system and acceptance. The higher the level, and hence the bigger and more complex the box, the more one is forced to use black box testing to simplify.
  • 47. 8. SYSTEM IMPLEMENTATION Implementation is the most crucial stage in achieving a successful system and giving the user’s confidence that the new system is workable and effective. This type of conversation is relatively easy to handle, provide there are no major changes in the system. Each program is tested individually at the time of development using the data and has verified that this program linked together in the way specified in the programs specification, the computer system and its environment is tested to the satisfaction of the user. The system that has been developed is accepted and proved to be satisfactory for the user. And so the system is going to be implemented very soon. A simple operating procedure is included so that the user can understand the different functions clearly and quickly. Initially as a first step the executable form of the application is to be created and loaded in the common server machine which is accessible to the entire user and the server is to be connected to a network. The final stage is to document the entire system which provides components and the operating procedures of the system. Systems implementation is the construction of the new system and the delivery of that system into production (that is, the day-to-day business or organization operation). Implementation is the carrying out, execution, or practice of a plan, a method, or any design for doing something. As such, implementation is the action that must follow any preliminary thinking in order for something to actually happen. In an information technology context, implementation encompasses all the processes involved in getting new software or hardware operating properly in its environment, including installation, configuration, running, testing, and making necessary changes. The word deployment is sometimes used to mean the same thing. Generally implementation of the software is considered as the actual creation of the software.
  • 48. 9. CONCLUSION In this thesis, the goal was to construct a system which solves sliding-block puzzles using Meta reasoning, and it should be based on the search-based solver program from the specialization project. The meta-reasoned should automatically find good parameters to call the solver with, with the purpose of solving a given puzzle. In the specialization project, the parameters had to be found manually. After studying relevant literature, we decided to go for a CBR approach, where each case consists of the features describing a puzzle and a set of parameters that solve the puzzle. We enhanced this approach by adding a meta-control cycle where multiple cases would be retrieved from the case base. After applying all the promising cases on the problem to solve, a randomized proximity search would start generating new parameters, close, but not identical to the parameters already tried. For each such set of parameters, the solver would run with a limit on the allowed search work. After the meta-control cycle has run for a specified number of iterations, the set of parameters which managed to move the master block closest to its goal would be run again, this time with no limit on the allowed search work. We enhanced the solver program with three new features. We added the ability to store and display each step of the puzzle’s solution. A new memory-efficient way of representing puzzle configurations was added, based on its permutation rank when the configuration was seen as a permutation of a multi set. Two new block types, sliders and disconnected blocks were added, so that we could add more interesting puzzles to our test suite. 10. FUTURE ENHANCEMENT
  • 49. Feature enhancement is invoked by calling the solver with a special command, along with a file name specifying the puzzle from which to extract features. The solver analyzes the puzzle, writes the features to a temporary text file and returns program control to the meta-reasoned. The average block size, number of spaces, puzzle size and block shape niceness (number of rectangular blocks divided by the total number of blocks) are calculated immediately from the starting position of the puzzle. In order to find the branching factor, a BFS is performed from the starting position. The BFS is cancelled when the examined positions exceed 1 megabyte in storage, or when the entire search space has been examined 11. BIBLIOGRAPHY
  • 50. REFERENCE WEBSITES:  http://www.dotnetspider.com  http://www.programmertutorials.com  http://www.gotdotnet.com  http://www.w3schools.com  http://www.windowsitlibrary.com  http://www.devsource.com APPENDIX S.NO AUTHOR NAME BOOK TITLE PUBLICATION AND EDITION 1. Dino Esposito Programming Microsoft ASP.NET TATA McGRAW- Hill 2003 Edition 2. Matthew Macdonald Beginning ASP.NET in VB.NET From Novice To Professional Springer Private Limited Second Edition 3. Roger .S Pressman Software Engineering TATA McGRAW- Hill Fifth Edition 4. Rajesh Naik, Swapna Kishore System Analysis and Business Applications Wheeler Publication Second Edition 5. James R.Groff Paul N.WeinBerg Guide to SQL TATA McGRAW- Hill 1997 Edition 6. Greg Buczek Instant SQL Server 2000 Applications TATA McGRAW -Hill 2001 Edition
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63. SAMPLE CODING EASY using System; using System.Data; using System.Configuration; using System.Collections; using System.Web; using System.Web.Security; using System.Web.UI; using System.Web.UI.WebControls; using System.Web.UI.WebControls.WebParts; using System.Web.UI.HtmlControls; using System.Data.SqlClient; using System.Windows.Forms; public partial class Easy : System.Web.UI.Page { protected void Page_Load(object sender, EventArgs e) { } SqlConnection con = new SqlConnection("server=.;database=puzzle;uid=sa"); public void insert() { con.Open(); SqlCommand cmm = new SqlCommand("truncate table dumptab", con); cmm.ExecuteNonQuery(); con.Close(); con.Open(); SqlCommand cmd = new SqlCommand("insert into dumptab values('" + ltext + "')", con); cmd.ExecuteNonQuery(); con.Close(); } protected void LinkButton13_Click(object sender, EventArgs e) { Panel3.Visible = false; Panel2.Visible = true; Label4.Visible = true ; Label3.Visible = true ; TextBox39.Visible = true ; Button3.Visible = true ; Button4.Visible = true ; Label1.Visible = true; Label3.Visible = true; Label1.Text = "Across: 1."; Label3.Text = "Down: 1."; Label2.Text = "___ is my brother"; Label4.Text = "I ___ a dog when I was young.";
  • 64. ltext = LinkButton13.Text; insert(); } protected void TextBox5_TextChanged(object sender, EventArgs e) { } protected void LinkButton2_Click(object sender, EventArgs e) { ltext = LinkButton2.Text; Panel3.Visible = false; Panel2.Visible = true; Label4.Visible = true; Label3.Visible = true; TextBox39.Visible = true; Button3.Visible = true; Button4.Visible = true; Label1.Visible = true; Label3.Visible = true; Label1.Text = "Across: 2."; Label3.Text = "Down: 2."; Label2.Text = "___, it isn't."; Label4.Text = "I want a ___ camera."; insert(); } protected void LinkButton4_Click(object sender, EventArgs e) { ltext = LinkButton4.Text; Panel3.Visible = false; Panel2.Visible = true; Label2.Text = "Please come ___ Monday."; Label4.Visible = false; Label3.Visible = false; TextBox39.Visible = false; Button3.Visible = false; Button4.Visible = false; Label3.Visible = false ; Label1.Visible = true ; Label1.Text = "Down: 3."; insert(); } protected void LinkButton5_Click(object sender, EventArgs e) { ltext = LinkButton5.Text; Panel3.Visible = false; Panel2.Visible = true; Label4.Visible = true; Label3.Visible = true; TextBox39.Visible = true; Button3.Visible = true; Button4.Visible = true; Button4.Visible = true; Label1.Visible = true;
  • 65. Label3.Visible = true; Label1.Text = "Across: 4."; Label3.Text = "Down: 4."; Label2.Text = "I ___ to school yesterday."; Label4.Text = "I ___ at home yesterday."; insert(); } protected void LinkButton6_Click(object sender, EventArgs e) { ltext = LinkButton6.Text; Panel3.Visible = false; Panel2.Visible = true; Label2.Text = "The number ___ comes after nine."; Label4.Visible = false; Label3.Visible = false; TextBox39.Visible = false; Button3.Visible = false; Button4.Visible = false; Label3.Visible = false; Label1.Visible = true; Label1.Text = "Down: 5."; insert(); } protected void LinkButton7_Click(object sender, EventArgs e) { ltext = LinkButton7.Text; Panel3.Visible = false; Panel2.Visible = true; Label2.Text = "Can you ___ a picture?"; Label4.Visible = false; Label3.Visible = false; TextBox39.Visible = false; Button3.Visible = false; Button4.Visible = false; Label1.Visible = true; Label3.Visible = false ; Label1.Text = "Across: 6."; insert(); } protected void LinkButton8_Click(object sender, EventArgs e) { ltext = LinkButton8.Text; Panel3.Visible = false; Panel2.Visible = true; Label2.Text = "Can you ___ as fast as your dog?"; Label4.Visible = false; Label3.Visible = false; TextBox39.Visible = false; Button3.Visible = false; Button4.Visible = false; Label3.Visible = false; Label1.Visible = true; Label1.Text = "Down: 7."; insert(); } protected void LinkButton9_Click(object sender, EventArgs e)
  • 66. { ltext = LinkButton9.Text; Panel3.Visible = false; Panel2.Visible = true; Label2.Text = "Please come with ___."; Label4.Visible = false; Label3.Visible = false; TextBox39.Visible = false; Button3.Visible = false; Button4.Visible = false; Label1.Visible = true; Label3.Visible = false; Label1.Text = "Across: 8."; insert(); } protected void LinkButton11_Click(object sender, EventArgs e) { ltext = LinkButton11.Text; Panel3.Visible = false; Panel2.Visible = true; Label4.Visible = true; Label3.Visible = true; TextBox39.Visible = true; Button3.Visible = true; Button4.Visible = true; Label1.Visible = true; Label3.Visible = true; Label1.Text = "Across: 9."; Label3.Text = "Down: 9."; Label2.Text = "The cat is ___ the house."; Label4.Text = "___ this your book?"; insert(); } protected void LinkButton10_Click(object sender, EventArgs e) { ltext = LinkButton10.Text; Panel3.Visible = false; Panel2.Visible = true; Label4.Visible = true; Label3.Visible = true; TextBox39.Visible = true; Button3.Visible = true; Button4.Visible = true; Label1.Visible = true; Label3.Visible = true; Label1.Text = "Across: 10."; Label3.Text = "Down: 10."; Label2.Text = "I have ___ apple."; Label4.Text = "I ___ a good student."; insert(); } protected void LinkButton12_Click(object sender, EventArgs e) { ltext = LinkButton12.Text; Panel3.Visible = false; Panel2.Visible = true; Label4.Visible = true;
  • 67. Label3.Visible = true; TextBox39.Visible = true; Button3.Visible = true; Button4.Visible = true; Label1.Visible = true; Label3.Visible = true; Label1.Text = "Across: 11."; Label3.Text = "Down: 11."; Label2.Text = "Please come as fast ___ you can."; Label4.Text = "I got up ___ seven o'clock."; insert(); } public string ltext; protected void TextBox14_TextChanged(object sender, EventArgs e) { } protected void LinkButton1_Click1(object sender, EventArgs e) { ltext = LinkButton1.Text; Panel3.Visible = false; Panel2.Visible = true; Label2.Text = "___ is a good book."; Label4.Visible = false; Label3.Visible = false; TextBox39.Visible = false; Button3.Visible = false; Button4.Visible = false; Label1.Visible = true; Label3.Visible = false; Label1.Text = "Across: 12."; insert(); } protected void Button1_Click(object sender, EventArgs e) { con.Open(); SqlDataReader dr; SqlCommand cnm = new SqlCommand("select linktext from dumptab", con); dr = cnm.ExecuteReader (); while (dr.Read()) { ltext = dr[0].ToString(); } dr.Close(); con.Close(); string Query; Query = TextBox38 .Text; char [] split=new char [10]; split = Query.ToCharArray() ; string way = Label1.Text;
  • 68. if (ltext == "1") { TextBox4.Text = split[0].ToString(); TextBox2.Text = split[1].ToString(); TextBox38.Text = ""; TextBox39.Text = ""; } else if (ltext == "2") { TextBox5.Text = split[0].ToString(); TextBox6.Text = split[1].ToString(); TextBox38.Text = ""; TextBox39.Text = ""; } else if (ltext == "4") { TextBox14.Text = split[0].ToString(); TextBox15.Text = split[1].ToString(); TextBox16.Text = split[2].ToString(); TextBox17.Text = split[3].ToString(); TextBox38.Text = ""; TextBox39.Text = ""; } else if (ltext == "6") { TextBox9.Text = split[0].ToString(); TextBox18.Text = split[1].ToString(); TextBox19.Text = split[2].ToString(); TextBox20.Text = split[3].ToString(); TextBox38.Text = ""; TextBox39.Text = ""; } else if (ltext == "8") { TextBox23.Text = split[0].ToString(); TextBox24.Text = split[1].ToString(); TextBox38.Text = ""; TextBox39.Text = ""; } else if (ltext == "9") { TextBox26.Text = split[0].ToString(); TextBox27.Text = split[1].ToString(); TextBox38.Text = ""; TextBox39.Text = ""; } else if (ltext == "10") { TextBox11.Text = split[0].ToString(); TextBox28.Text = split[1].ToString(); TextBox38.Text = ""; TextBox39.Text = "";
  • 69. } else if (ltext == "11") { TextBox30.Text = split[0].ToString(); TextBox31.Text = split[1].ToString(); TextBox38.Text = ""; TextBox39.Text = ""; } else if (ltext == "12") { TextBox35.Text = split[0].ToString(); TextBox34.Text = split[1].ToString(); TextBox38.Text = ""; TextBox39.Text = ""; } else if (ltext == "3"&&way=="Down: 3.") { TextBox6.Text = split[0].ToString(); TextBox16.Text = split[1].ToString(); TextBox38.Text = ""; TextBox39.Text = ""; } else if (ltext == "5" && way == "Down: 5.") { TextBox17.Text = split[0].ToString(); TextBox22.Text = split[1].ToString(); TextBox27.Text = split[2].ToString(); TextBox38.Text = ""; TextBox39.Text = ""; } else if (ltext == "7" && way == "Down: 7.") { TextBox18.Text = split[0].ToString(); TextBox23.Text = split[1].ToString(); TextBox28.Text = split[2].ToString(); TextBox38.Text = ""; TextBox39.Text = ""; } } protected void Button2_Click(object sender, EventArgs e) { con.Open(); SqlDataReader dr; SqlCommand cnm = new SqlCommand("select linktext from dumptab", con); dr = cnm.ExecuteReader(); while (dr.Read()) { ltext = dr[0].ToString();
  • 70. } dr.Close(); con.Close(); string Query; Query = TextBox38.Text; char[] split = new char[10]; split = Query.ToCharArray(); string way = Label1.Text; if (ltext == "1") { TextBox4.Text = "H"; } else if (ltext == "2") { TextBox6.Text = "O"; } else if (ltext == "4") { TextBox14.Text = "W"; TextBox15.Text = "E"; } else if (ltext == "6") { TextBox19.Text = "A"; TextBox20.Text = "W"; } else if (ltext == "8") { TextBox23.Text = "U"; } else if (ltext == "9") { TextBox27.Text = "N"; } else if (ltext == "10") { TextBox28.Text = "N";
  • 71. } else if (ltext == "11") { TextBox31.Text = "S"; } else if (ltext == "12") { TextBox35.Text = "I"; } } protected void Button4_Click(object sender, EventArgs e) { con.Open(); SqlDataReader dr; SqlCommand cnm = new SqlCommand("select linktext from dumptab", con); dr = cnm.ExecuteReader(); while (dr.Read()) { ltext = dr[0].ToString(); } dr.Close(); con.Close(); string Query; Query = TextBox39.Text; char[] split = new char[10]; split = Query.ToCharArray(); string way = Label3.Text; if (ltext == "1" && way == "Down: 1.") { TextBox4.Text = split[0].ToString(); TextBox8.Text = split[1].ToString(); TextBox9.Text = split[2].ToString(); TextBox38.Text = ""; TextBox39.Text = ""; } else if (ltext == "2" && way == "Down: 2.") { TextBox5.Text = split[0].ToString(); TextBox15.Text = split[1].ToString(); TextBox20.Text = split[2].ToString(); TextBox38.Text = ""; TextBox39.Text = "";
  • 72. } else if (ltext == "4" && way == "Down: 4.") { TextBox14.Text = split[0].ToString(); TextBox19.Text = split[1].ToString(); TextBox24.Text = split[2].ToString(); TextBox38.Text = ""; TextBox39.Text = ""; } else if (ltext == "9" && way == "Down: 9.") { TextBox26.Text = split[0].ToString(); TextBox31.Text = split[1].ToString(); TextBox38.Text = ""; TextBox39.Text = ""; } else if (ltext == "10" && way == "Down: 10.") { TextBox11.Text = split[0].ToString(); TextBox12.Text = split[1].ToString(); TextBox38.Text = ""; TextBox39.Text = ""; } else if (ltext == "11" && way == "Down: 11.") { TextBox30.Text = split[0].ToString(); TextBox34.Text = split[1].ToString(); TextBox38.Text = ""; TextBox39.Text = ""; } } protected void Button3_Click(object sender, EventArgs e) { } protected void TextBox35_TextChanged(object sender, EventArgs e) { } protected void Button6_Click(object sender, EventArgs e) { if (TextBox4.Text == "H" && TextBox2.Text == "E" && TextBox5.Text == "N" && TextBox6.Text == "O" && TextBox8.Text == "A" && TextBox14.Text == "W" && TextBox15.Text == "E" && TextBox16.Text == "N" && TextBox17.Text == "T" && TextBox9.Text == "D" && TextBox18.Text == "R" && TextBox19.Text == "A" && TextBox20.Text == "W" && TextBox22.Text == "E" && TextBox23.Text == "U" && TextBox24.Text == "S" && TextBox26.Text == "I" && TextBox27.Text == "N" && TextBox11.Text == "A" && TextBox28.Text == "N" && TextBox30.Text == "A" && TextBox31.Text == "S" && TextBox12.Text == "M" && TextBox35.Text == "I" && TextBox34.Text == "T") { MessageBox.Show("Congratulations You Won The Puzzle", "Cross Word Puzzle"); }
  • 73. else { MessageBox.Show("Sorry You Misplace Some Word ,Try Again"); } } protected void LinkButton3_Click(object sender, EventArgs e) { } protected void TextBox8_TextChanged(object sender, EventArgs e) { } } MIDDLE using System; using System.Data; using System.Configuration; using System.Collections; using System.Web; using System.Web.Security; using System.Web.UI; using System.Web.UI.WebControls; using System.Web.UI.WebControls.WebParts; using System.Web.UI.HtmlControls; using System.Data.SqlClient; using System.Windows.Forms; public partial class Middle : System.Web.UI.Page { public string ltext; SqlConnection con = new SqlConnection("server=.;database=puzzle;uid=sa"); protected void Page_Load(object sender, EventArgs e) { } protected void LinkButton3_Click(object sender, EventArgs e) { Panel2.Visible = true; Label2.Text = "It's dark in here. Please turn on the ___."; Label4.Visible = false; Label3.Visible = false; TextBox66.Visible = false; Button3.Visible = false; Button4.Visible = false; Label3.Visible = false; Label1.Visible = true; Label1.Text = "Down: 1."; ltext = LinkButton3.Text; insert();
  • 74. } protected void LinkButton1_Click(object sender, EventArgs e) { Panel2.Visible = true; Label2.Text = "I came here ___ my brother."; Label4.Visible = false; Label3.Visible = false; TextBox66.Visible = false; Button3.Visible = false; Button4.Visible = false; Label3.Visible = false; Label1.Visible = true; Label1.Text = "Across: 2."; ltext = LinkButton1.Text; insert(); } protected void LinkButton6_Click(object sender, EventArgs e) { Panel2.Visible = true; Label2.Text = "I ___ potatoes in my garden."; Label4.Visible = false; Label3.Visible = false; TextBox66.Visible = false; Button3.Visible = false; Button4.Visible = false; Label3.Visible = false; Label1.Visible = true; Label1.Text = "Across: 5."; ltext = LinkButton6.Text; insert(); } protected void LinkButton5_Click(object sender, EventArgs e) { Panel2.Visible = true; Label2.Text = "I ___ to go home now."; Label4.Visible = false; Label3.Visible = false; TextBox66.Visible = false; Button3.Visible = false; Button4.Visible = false; Label3.Visible = false; Label1.Visible = true; Label1.Text = "Down: 6."; ltext = LinkButton5.Text; insert(); } protected void Button5_Click(object sender, EventArgs e) { con.Open(); SqlDataReader dr; SqlCommand cnm = new SqlCommand("select linktext from dumptab", con); dr = cnm.ExecuteReader();
  • 75. while (dr.Read()) { ltext = dr[0].ToString(); } dr.Close(); con.Close(); string Query; Query = TextBox65.Text; char[] split = new char[10]; split = Query.ToCharArray(); string way = Label1.Text; if (ltext == "2") { TextBox5.Text = split[0].ToString(); TextBox6.Text = split[1].ToString(); TextBox7.Text = split[2].ToString(); TextBox38.Text = split[3].ToString(); TextBox65.Text = ""; TextBox66.Text = ""; } else if (ltext == "5") { TextBox9.Text = split[0].ToString(); TextBox18.Text = split[1].ToString(); TextBox19.Text = split[2].ToString(); TextBox20.Text = split[3].ToString(); TextBox65.Text = ""; TextBox66.Text = ""; } else if (ltext == "7") { TextBox24.Text = split[0].ToString(); TextBox25.Text = split[1].ToString(); TextBox26.Text = split[2].ToString(); TextBox27.Text = split[3].ToString(); TextBox65.Text = ""; TextBox66.Text = ""; } else if (ltext == "8") { TextBox11.Text = split[0].ToString(); TextBox28.Text = split[1].ToString(); TextBox29.Text = split[2].ToString(); TextBox30.Text = split[3].ToString(); TextBox65.Text = ""; TextBox66.Text = ""; } else if (ltext == "9") { TextBox34.Text = split[0].ToString(); TextBox36.Text = split[1].ToString(); TextBox37.Text = split[2].ToString(); TextBox51.Text = split[3].ToString();
  • 76. TextBox65.Text = ""; TextBox66.Text = ""; } else if (ltext == "14") { TextBox41.Text = split[0].ToString(); TextBox59.Text = split[1].ToString(); TextBox60.Text = split[2].ToString(); TextBox61.Text = split[3].ToString(); TextBox62.Text = split[4].ToString(); TextBox65.Text = ""; TextBox66.Text = ""; } else if (ltext == "1" && way == "Down: 1.") { TextBox4.Text = split[0].ToString(); TextBox8.Text = split[1].ToString(); TextBox9.Text = split[2].ToString(); TextBox10.Text = split[3].ToString(); TextBox11.Text = split[4].ToString(); TextBox65.Text = ""; TextBox66.Text = ""; } else if (ltext == "3" && way == "Down: 3.") { TextBox7.Text = split[0].ToString(); TextBox17.Text = split[1].ToString(); TextBox22.Text = split[2].ToString(); TextBox27.Text = split[3].ToString(); TextBox65.Text = ""; TextBox66.Text = ""; } else if (ltext == "4" && way == "Down: 4.") { TextBox14.Text = split[0].ToString(); TextBox19.Text = split[1].ToString(); TextBox24.Text = split[2].ToString(); TextBox29.Text = split[3].ToString(); TextBox65.Text = ""; TextBox66.Text = ""; } else if (ltext == "6" && way == "Down: 6.") { TextBox20.Text = split[0].ToString(); TextBox25.Text = split[1].ToString(); TextBox30.Text = split[2].ToString(); TextBox34.Text = split[3].ToString(); TextBox65.Text = ""; TextBox66.Text = ""; }
  • 77. else if (ltext == "10" && way == "Down: 10.") { TextBox36.Text = split[0].ToString(); TextBox47.Text = split[1].ToString(); TextBox56.Text = split[2].ToString(); TextBox62.Text = split[3].ToString(); TextBox65.Text = ""; TextBox66.Text = ""; } else if (ltext == "11" && way == "Down: 11.") { TextBox51.Text = split[0].ToString(); TextBox52.Text = split[1].ToString(); TextBox58.Text = split[2].ToString(); TextBox64.Text = split[3].ToString(); TextBox65.Text = ""; TextBox66.Text = ""; } else if (ltext == "12" && way == "Down: 12.") { TextBox39.Text = split[0].ToString(); TextBox40.Text = split[1].ToString(); TextBox41.Text = split[2].ToString(); TextBox65.Text = ""; TextBox66.Text = ""; } else if (ltext == "13" && way == "Down: 13.") { TextBox45.Text = split[0].ToString(); TextBox54.Text = split[1].ToString(); TextBox60.Text = split[2].ToString(); TextBox65.Text = ""; TextBox66.Text = ""; } } protected void Button2_Click(object sender, EventArgs e) { con.Open(); SqlDataReader dr; SqlCommand cnm = new SqlCommand("select linktext from dumptab", con); dr = cnm.ExecuteReader(); while (dr.Read()) { ltext = dr[0].ToString(); } dr.Close(); con.Close(); string Query; Query = TextBox65.Text; char[] split = new char[10];
  • 78. split = Query.ToCharArray(); string way = Label1.Text; if (ltext == "1") { TextBox4.Text = "L"; } else if (ltext == "2") { TextBox6.Text = "I"; } else if (ltext == "3") { TextBox17.Text = "H"; TextBox22.Text = "E"; } else if (ltext == "4") { TextBox14.Text = "C"; } else if (ltext == "5") { TextBox9.Text = "G"; } else if (ltext == "6") { TextBox20.Text = "W"; } else if (ltext == "7") { TextBox24.Text = "M"; } else if (ltext == "8") { TextBox11.Text = "T"; } else if (ltext == "9") {
  • 79. TextBox34.Text = "T"; } else if (ltext == "10") { TextBox36.Text = "H"; } else if (ltext == "11") { TextBox51.Text = "M"; } else if (ltext == "12") { TextBox39.Text = "F"; } else if (ltext == "13") { TextBox45.Text = "B"; } else if (ltext == "14") { TextBox41.Text = "R"; } } protected void Button4_Click(object sender, EventArgs e) { } protected void Button3_Click(object sender, EventArgs e) { } protected void LinkButton19_Click(object sender, EventArgs e) { Panel2.Visible = true; Label2.Text = "___ came with their children.";
  • 80. Label4.Visible = false; Label3.Visible = false; TextBox66.Visible = false; Button3.Visible = false; Button4.Visible = false; Label3.Visible = false; Label1.Visible = true; Label1.Text = "Down: 3."; ltext = LinkButton19.Text; insert(); } protected void LinkButton18_Click(object sender, EventArgs e) { Panel2.Visible = true; Label2.Text = "I must go home now, but I will ___ again tomorrow."; Label4.Visible = false; Label3.Visible = false; TextBox66.Visible = false; Button3.Visible = false; Button4.Visible = false; Label3.Visible = false; Label1.Visible = true; Label1.Text = "Down: 4."; ltext = LinkButton18.Text; insert(); } protected void LinkButton7_Click(object sender, EventArgs e) { Panel2.Visible = true; Label2.Text = "How ___ people came to your party?"; Label4.Visible = false; Label3.Visible = false; TextBox66.Visible = false; Button3.Visible = false; Button4.Visible = false; Label3.Visible = false; Label1.Visible = true; Label1.Text = "Across: 7."; ltext = LinkButton7.Text; insert(); } protected void LinkButton11_Click(object sender, EventArgs e) { Panel2.Visible = true; Label2.Text = "This was a small city back ___."; Label4.Visible = false; Label3.Visible = false; TextBox66.Visible = false; Button3.Visible = false; Button4.Visible = false; Label3.Visible = false; Label1.Visible = true; Label1.Text = "Across: 8.";
  • 81. ltext = LinkButton11.Text; insert(); } protected void LinkButton12_Click(object sender, EventArgs e) { Panel2.Visible = true; Label2.Text = "I asked ___ to come to the party. They said they would come."; Label4.Visible = false; Label3.Visible = false; TextBox66.Visible = false; Button3.Visible = false; Button4.Visible = false; Label3.Visible = false; Label1.Visible = true; Label1.Text = "Across: 9."; ltext = LinkButton12.Text; insert(); } protected void LinkButton13_Click(object sender, EventArgs e) { Panel2.Visible = true; Label2.Text = "Be careful or you may ___ yourself."; Label4.Visible = false; Label3.Visible = false; TextBox66.Visible = false; Button3.Visible = false; Button4.Visible = false; Label3.Visible = false; Label1.Visible = true; Label1.Text = "Down: 10."; ltext = LinkButton13.Text; insert(); } protected void LinkButton14_Click(object sender, EventArgs e) { Panel2.Visible = true; Label2.Text = "How ___ does this cost?"; Label4.Visible = false; Label3.Visible = false; TextBox66.Visible = false; Button3.Visible = false; Button4.Visible = false; Label3.Visible = false; Label1.Visible = true; Label1.Text = "Down: 11."; ltext = LinkButton14.Text; insert(); } protected void LinkButton15_Click(object sender, EventArgs e) {
  • 82. Panel2.Visible = true; Label2.Text = "He was here ___ two hours."; Label4.Visible = false; Label3.Visible = false; TextBox66.Visible = false; Button3.Visible = false; Button4.Visible = false; Label3.Visible = false; Label1.Visible = true; Label1.Text = "Down: 12."; ltext = LinkButton15.Text; insert(); } protected void LinkButton16_Click(object sender, EventArgs e) { Panel2.Visible = true; Label2.Text = "Do you want the ___ one or the little one?"; Label4.Visible = false; Label3.Visible = false; TextBox66.Visible = false; Button3.Visible = false; Button4.Visible = false; Label3.Visible = false; Label1.Visible = true; Label1.Text = "Down: 13."; ltext = LinkButton16.Text; insert(); } protected void LinkButton17_Click(object sender, EventArgs e) { Panel2.Visible = true; Label2.Text = "Should I turn left or ___?"; Label4.Visible = false; Label3.Visible = false; TextBox66.Visible = false; Button3.Visible = false; Button4.Visible = false; Label3.Visible = false; Label1.Visible = true; Label1.Text = "Across: 14."; ltext = LinkButton17.Text; insert(); } public void insert() { con.Open(); SqlCommand cmm = new SqlCommand("truncate table dumptab", con); cmm.ExecuteNonQuery(); con.Close(); con.Open(); SqlCommand cmd = new SqlCommand("insert into dumptab values('" + ltext + "')", con); cmd.ExecuteNonQuery(); con.Close();
  • 83. } protected void Button6_Click(object sender, EventArgs e) { if (TextBox4.Text == "L" && TextBox5.Text == "W" && TextBox6.Text == "I" && TextBox7.Text == "T" && TextBox38.Text == "H" && TextBox8.Text == "I" && TextBox14.Text == "C" && TextBox17.Text == "H" && TextBox9.Text == "G" && TextBox18.Text == "R" && TextBox19.Text == "O" && TextBox20.Text == "W" && TextBox22.Text == "C" && TextBox10.Text == "H" && TextBox24.Text == "M" && TextBox25.Text == "A" && TextBox26.Text == "N" && TextBox27.Text == "Y" && TextBox11.Text == "T" && TextBox28.Text == "H" && TextBox29.Text == "E" && TextBox30.Text == "N" && TextBox34.Text == "T" && TextBox36.Text == "H" && TextBox37.Text == "E" && TextBox51.Text == "M" && TextBox39.Text == "F" && TextBox45.Text == "B" && TextBox47.Text == "U" && TextBox52.Text == "U" && TextBox40.Text == "O" && TextBox54.Text == "I" && TextBox56.Text == "R" && TextBox58.Text == "C" && TextBox41.Text == "R" && TextBox59.Text == "I" && TextBox60.Text == "G" && TextBox61.Text == "H" && TextBox62.Text == "T" && TextBox64.Text == "H") { MessageBox.Show("Congratulations You Won The Puzzle", "Cross Word Puzzle"); } else { MessageBox.Show("Sorry You Misplace Some Word ,Try Again"); } } } HIGH using System; using System.Data; using System.Configuration; using System.Collections; using System.Web; using System.Web.Security; using System.Web.UI; using System.Web.UI.WebControls; using System.Web.UI.WebControls.WebParts; using System.Web.UI.HtmlControls; using System.Data.SqlClient; using System.Windows.Forms; public partial class High : System.Web.UI.Page { protected void Page_Load(object sender, EventArgs e) { } protected void LinkButton3_Click(object sender, EventArgs e)
  • 84. { Panel3.Visible = false; Panel2.Visible = true; Label4.Visible = true; Label3.Visible = true; TextBox39.Visible = true; Button3.Visible = true; Button4.Visible = true; Label1.Visible = true; Label3.Visible = true; Label1.Text = "Across: 1."; Label3.Text = "Down: 1."; Label2.Text = "People can run faster than they can ___."; Label4.Text = "Did you ___ a letter last week?"; ltext = LinkButton3.Text; insert(); } protected void LinkButton1_Click(object sender, EventArgs e) { Panel3.Visible = false; Panel2.Visible = true; Label2.Text = "What's your favorite fruit? I ___ apples."; Label4.Visible = false; Label3.Visible = false; TextBox39.Visible = true ; Button3.Visible = false; Button4.Visible = false; Label3.Visible = false; Label1.Visible = true; TextBox70.Visible = false; Label1.Text = "Down: 2."; ltext = LinkButton1.Text; insert(); } protected void LinkButton2_Click(object sender, EventArgs e) { Panel3.Visible = false; Panel2.Visible = true; Label4.Visible = true; Label3.Visible = true; TextBox39.Visible = true; Button3.Visible = true; Button4.Visible = true; Label1.Visible = true; Label3.Visible = true; Label1.Text = "Across: 3."; Label3.Text = "Down: 3."; Label2.Text = "They put on ___ shoes."; Label4.Text = "A tricycle has ___ wheels."; TextBox70.Visible = true; ltext = LinkButton2.Text; insert(); }
  • 85. protected void LinkButton4_Click(object sender, EventArgs e) { Panel3.Visible = false; Panel2.Visible = true; Label2.Text = "A spider has ___ legs."; Label4.Visible = false; Label3.Visible = false; TextBox39.Visible = true; Button3.Visible = false; Button4.Visible = false; Label3.Visible = false; Label1.Visible = true; TextBox70.Visible = false; Label1.Text = "Down: 4."; ltext = LinkButton4.Text; insert(); } protected void LinkButton5_Click(object sender, EventArgs e) { Panel3.Visible = false; Panel2.Visible = true; Label2.Text = "Don't turn left. Turn ___."; Label4.Visible = false; Label3.Visible = false; TextBox39.Visible = true; Button3.Visible = false; Button4.Visible = false; Label1.Visible = true; Label3.Visible = false; TextBox70.Visible = false; Label1.Text = "Across: 5."; ltext = LinkButton5.Text; insert(); } protected void LinkButton7_Click(object sender, EventArgs e) { Panel3.Visible = false; Panel2.Visible = true; Label2.Text = "Let's ___ a song."; Label4.Visible = false; Label3.Visible = false; TextBox39.Visible = true; Button3.Visible = false; Button4.Visible = false; Label3.Visible = false; Label1.Visible = true; TextBox70.Visible = false; Label1.Text = "Down: 6."; ltext = LinkButton7.Text; insert(); } protected void LinkButton8_Click(object sender, EventArgs e) { Panel3.Visible = false; Panel2.Visible = true; Label4.Visible = true; Label3.Visible = true;
  • 86. TextBox39.Visible = true; Button3.Visible = true; Button4.Visible = true; Label1.Visible = true; Label3.Visible = true; TextBox70.Visible = true ; Label1.Text = "Across: 7."; Label3.Text = "Down: 7."; Label2.Text = "He is a good singer, but I'm the ___ singer in our class."; Label4.Text = "The American flag is red, white and ___."; ltext = LinkButton8.Text; insert(); } protected void LinkButton6_Click(object sender, EventArgs e) { Panel3.Visible = false; Panel2.Visible = true; Label2.Text = "He ___ 'I am tired.'"; Label4.Visible = false; Label3.Visible = false; TextBox39.Visible = true; Button3.Visible = false; Button4.Visible = false; Label3.Visible = false; Label1.Visible = true; TextBox70.Visible = false; Label1.Text = "Down: 8."; ltext = LinkButton6.Text; insert(); } protected void LinkButton9_Click(object sender, EventArgs e) { Panel3.Visible = false; Panel2.Visible = true; Label2.Text = "What's your job? I ___ at a department store."; Label4.Visible = false; Label3.Visible = false; TextBox39.Visible = true; Button3.Visible = false; Button4.Visible = false; Label3.Visible = false; Label1.Visible = true; TextBox70.Visible = false; Label1.Text = "Down: 9."; ltext = LinkButton9.Text; insert(); } protected void LinkButton10_Click(object sender, EventArgs e) { Panel3.Visible = false; Panel2.Visible = true; Label2.Text = "Many people like white sugar, but I prefer ___ sugar."; Label4.Visible = false; Label3.Visible = false; TextBox39.Visible = true;
  • 87. Button3.Visible = false; Button4.Visible = false; Label1.Visible = true; Label3.Visible = false; TextBox70.Visible = false; Label1.Text = "Across: 10."; ltext = LinkButton10.Text; insert(); } protected void LinkButton11_Click(object sender, EventArgs e) { Panel3.Visible = false; Panel2.Visible = true; Label2.Text = "What would you like to ___? Coffee, please."; Label4.Visible = false; Label3.Visible = false; TextBox39.Visible = true; Button3.Visible = false; Button4.Visible = false; Label1.Visible = true; Label3.Visible = false; TextBox70.Visible = false; Label1.Text = "Across: 11."; ltext = LinkButton11.Text; insert(); } protected void Button5_Click(object sender, EventArgs e) { con.Open(); SqlDataReader dr; SqlCommand cnm = new SqlCommand("select linktext from dumptab", con); dr = cnm.ExecuteReader(); while (dr.Read()) { ltext = dr[0].ToString(); } dr.Close(); con.Close(); string Query; Query = TextBox67.Text; char[] split = new char[10]; split = Query.ToCharArray(); string way = Label1.Text; if (ltext == "1") { TextBox7.Text = split[0].ToString(); TextBox38.Text = split[1].ToString(); TextBox65.Text = split[2].ToString(); TextBox66.Text = split[3].ToString(); TextBox67.Text = ""; TextBox70.Text = ""; }
  • 88. else if (ltext == "3") { TextBox13.Text = split[0].ToString(); TextBox14.Text = split[1].ToString(); TextBox15.Text = split[2].ToString(); TextBox16.Text = split[3].ToString(); TextBox17.Text = split[4].ToString(); TextBox67.Text = ""; TextBox70.Text = ""; } else if (ltext == "5") { TextBox23.Text = split[0].ToString(); TextBox24.Text = split[1].ToString(); TextBox25.Text = split[2].ToString(); TextBox26.Text = split[3].ToString(); TextBox27.Text = split[4].ToString(); TextBox67.Text = ""; TextBox70.Text = ""; } else if (ltext == "7") { TextBox12.Text = split[0].ToString(); TextBox33.Text = split[1].ToString(); TextBox35.Text = split[2].ToString(); TextBox34.Text = split[3].ToString(); TextBox67.Text = ""; TextBox70.Text = ""; } else if (ltext == "10") { TextBox47.Text = split[0].ToString(); TextBox48.Text = split[1].ToString(); TextBox52.Text = split[2].ToString(); TextBox83.Text = split[3].ToString(); TextBox84.Text = split[4].ToString(); TextBox67.Text = ""; TextBox70.Text = ""; } else if (ltext == "11") { TextBox60.Text = split[0].ToString(); TextBox61.Text = split[1].ToString(); TextBox62.Text = split[2].ToString(); TextBox63.Text = split[3].ToString(); TextBox64.Text = split[4].ToString(); TextBox67.Text = ""; TextBox70.Text = ""; } else if (ltext == "10") { TextBox11.Text = split[0].ToString(); TextBox28.Text = split[1].ToString();
  • 89. TextBox67.Text = ""; TextBox70.Text = ""; } else if (ltext == "11") { TextBox30.Text = split[0].ToString(); TextBox31.Text = split[1].ToString(); TextBox67.Text = ""; TextBox70.Text = ""; } else if (ltext == "12") { TextBox35.Text = split[0].ToString(); TextBox34.Text = split[1].ToString(); TextBox67.Text = ""; TextBox70.Text = ""; } else if (ltext == "2" && way == "Down: 2.") { TextBox65.Text = split[0].ToString(); TextBox68.Text = split[1].ToString(); TextBox71.Text = split[2].ToString(); TextBox74.Text = split[3].ToString(); TextBox67.Text = ""; TextBox70.Text = ""; } else if (ltext == "4" && way == "Down: 4.") { TextBox15.Text = split[0].ToString(); TextBox20.Text = split[1].ToString(); TextBox25.Text = split[2].ToString(); TextBox30.Text = split[3].ToString(); TextBox34.Text = split[4].ToString(); TextBox67.Text = ""; TextBox70.Text = ""; } else if (ltext == "6" && way == "Down: 6.") { TextBox78.Text = split[0].ToString(); TextBox81.Text = split[1].ToString(); TextBox84.Text = split[2].ToString(); TextBox87.Text = split[3].ToString(); TextBox67.Text = ""; TextBox70.Text = ""; } else if (ltext == "8" && way == "Down: 8.") { TextBox35.Text = split[0].ToString(); TextBox45.Text = split[1].ToString(); TextBox54.Text = split[2].ToString();
  • 90. TextBox60.Text = split[3].ToString(); TextBox67.Text = ""; TextBox70.Text = ""; } else if (ltext == "9" && way == "Down: 9.") { TextBox51.Text = split[0].ToString(); TextBox52.Text = split[1].ToString(); TextBox58.Text = split[2].ToString(); TextBox64.Text = split[3].ToString(); TextBox67.Text = ""; TextBox70.Text = ""; } } protected void Button2_Click(object sender, EventArgs e) { con.Open(); SqlDataReader dr; SqlCommand cnm = new SqlCommand("select linktext from dumptab", con); dr = cnm.ExecuteReader(); while (dr.Read()) { ltext = dr[0].ToString(); } dr.Close(); con.Close(); string Query; Query = TextBox67.Text; char[] split = new char[10]; split = Query.ToCharArray(); string way = Label1.Text; if (ltext == "1") { TextBox4.Text = "H"; } else if (ltext == "2") { TextBox6.Text = "O"; } else if (ltext == "4") { TextBox14.Text = "W"; TextBox15.Text = "E"; } else if (ltext == "6") { TextBox19.Text = "A"; TextBox20.Text = "W";
  • 91. } else if (ltext == "8") { TextBox23.Text = "U"; } else if (ltext == "9") { TextBox27.Text = "N"; } else if (ltext == "10") { TextBox28.Text = "N"; } else if (ltext == "11") { TextBox31.Text = "S"; } else if (ltext == "12") { TextBox35.Text = "I"; } } protected void Button4_Click(object sender, EventArgs e) { con.Open(); SqlDataReader dr; SqlCommand cnm = new SqlCommand("select linktext from dumptab", con); dr = cnm.ExecuteReader(); while (dr.Read()) { ltext = dr[0].ToString(); } dr.Close(); con.Close(); string Query; Query = TextBox70.Text;