java application projects

Upload: iraniya-pandiyan

Post on 03-Jun-2018

230 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/12/2019 Java Application Projects

    1/39

    JAVA APPLICATION PROJECS

    ADVANCED SECURED SYSTEM

    Abstract:

    ADVANCED SECURED SYSTEM deals with the Server based Information

    and Maintenance of the Server. This system is used to reduce the workload of the

    server. It provides mail services, chat services between the clients and it also

    response to the client requests. This system is designed as a middleman between

    the client and the server. This system provides all kinds of services to the clients

    like file transfer, mail, chat etc... This system is cost-effective and provides a

    security like firewall to the server. Though there are any software available in the

    market there is no popular server in terms of cost and providing services.

    eveloped in !ava platform will be an advantage to this software. This can be used

    in various platforms.

    The main ob!ective of this software is to

    Speed up the data transfer

    "heck for virus file

    #rovide mail, chat services

    Strong authentication

    Sharing resources

    $le%ibility

  • 8/12/2019 Java Application Projects

    2/39

    Bug Track!g S"st#$

    Abstract&

    This pro!ect is shaped with design and development of 'elibers technologies.',

    which involved the evelopment, Testing and Maintains, the process of software

    development, Test case and efect tracking for both development document and

    also reports are included. It(s prepared in )indows(*# +nvironment by sing

    Simplest, $le%ible and compact ++ with MSS/0 Server111.

    This system provides all details about the Testing, 2ug tracking and

    3eports. That is first we receive the requirement from customers or 4ew "lients,

    this is entered into the #rocess Instruction, then it is divided into many operations

    for processing the Testing 3eports.

    O!%!# J&b P&rta%'R#su$# Track!g S"st#$(

    Abstract

    3esume Tracking System is helps human resource professional5s,freshers

    and !ob seekers for searching !ob. It helps save time and make the recruitment

    process mare efficient.3esume Tracking System offer widest variety of searches

    fund in any database program. This search include full-te%t, fu66y wildcard,

    2oolean, pro%imity, data and numeric. If the user information is strutted 7like

    names and address8, users can take advantage of its freeform database capabilities.

    "reate an entry form for user data. +very time user can add a data to their

    database, call up the entry form and fill in the field. nlike traditional database,

    3esume Tracking System does not require pre-defined field lengths or field types.

    $ields e%pand as enter information(s they never need to worry about running out

    of room

  • 8/12/2019 Java Application Projects

    3/39

    C%#!t C&!tr&%

    Abstract:

    This pro!ect CLICONdesignated on accessing a remote resource, as its

    name specifies. 9ere the resource we mean is the desktop screen of a remote

    system which is connected to the network.

    Multiple desktop resources visuali6ed in a single Server host, so that live

    perspective of !obs on each "lient systems could be conquered without knowing to

    the client. This empowers scrutini6ing of all "lient systems, for their idleness and

    unnecessary !obs, in a firm with diverse employees as "lients.

    The idle workers should be controlled for an effective !ob environment: this

    could be achieved by sending Instance message, chatting with the employees for

    warning and forced shutdown of "lient system.

    2y understanding the value of time, this pro!ect deputi6es to control and

    organi6e proper functioning of employees;students in firms;institutions

    respectively.

    Dss#rtat&! I!tr&)uct&!

    Abstract:

    This report describes progress to date in the implementation of a program to

    play Te%as 9old 5+m poker. It e%plains a variety of things starting with the

    motivation behind choosing the topic. The rules of poker and the layout of the

    game then follow.

  • 8/12/2019 Java Application Projects

    4/39

    E*Ba!k!g

    Abstract:

    )ith rapid advances in telecommunication systems and digital technology,

    it is difficult to predict how Internet banking will improve and e%pand in coming

    years. 2ut with the number of computers increasing every year, the electronic

    delivery of services is becoming popular in the banking sector. The Indian

    e%perience of + = banking is gradually merging with its international counterparts.

    )hile the private sector and multi-national banks have been first and fast in

    adopting internet technology in client servicing, there is a gradual trend for the

    ma!or public sectors and numerous co-operative units to move in the same

    direction. < mi% of policy support and security assurance should propel further + =

    banking adoption in India.

    +%# Track!g S"st#$

    Abstract:

    $ile Tracking System is used to track the progress of each activity in the software

    development life cycle, from the inception of a pro!ect until it is discarded. It

    consists of modules like ata "onversion >perators, ata Management,

  • 8/12/2019 Java Application Projects

    5/39

    +IRE,ALL

    Abstract:$irewalls are core elements in network security. < firewall is a network

    element that controls the traversal of packets across the boundaries of a secured

    network based on a specific security policy. < firewall security policy is a list of

    ordered filtering rules that define the actions performed on matching packets.

    $irewall filtering rules have to be carefully written and organi6ed in order to

    correctly im??plement the security policy. Therefore, inserting or modifying

    filtering rules in any firewall requires thorough intra- and inter-firewall analysis to

    determine the proper rule placement and ordering in the firewalls. In this paper all

    anomalies that could e%ist in a single- or multi-firewall environment are identified.

    < set of techniques and algorithms to automatically discover policy anomalies in

    centrali6ed and distributed legacy firewalls is also implemented. This technique is

    implemented using ava programming and simplifies the management of filtering

    rules and maintains the security of ne%t-generation firewalls.

    I!t#%%g#!c# -!&.%#)g# Bas#) R#t&rt#r

    Abstract:

    The #ro!ect @Intelligence Anowledge 2ased 3etorterB is to implement

    effective communication between software professionals in a software company.

    3etorter means a variable that is used to keep track of anything that must be

    counted. The programming language determines the number of counters

    7variables8 that are available to a programmer.

  • 8/12/2019 Java Application Projects

    6/39

    In software company interaction between #ro!ect managers, pro!ect leaders, team

    leaders and programmers are very essential for successful completion of a pro!ect.

    This pro!ect enables an effective interaction between them.

    +very software company maintains the standard code. If a person new to thecompany, he ; she cannot be able to write code for that company standard. This

    pro!ect provides the feature of intelligence knowledge based reply of standard

    code for trainees. So minimum training is enough. This system is implemented

    with

  • 8/12/2019 Java Application Projects

    7/39

    #repare audit report

    3eview audit file

    Track implementation

    APPLICATION DEVELOPER

    Abstract:

    This pro!ect JAD7

  • 8/12/2019 Java Application Projects

    8/39

    O!%!# s0ar# tra)!g s"st#$

    Abstract:

    O!%!# s0ar# tra)!g s"st#$ is developed for the share brokerage firm in the

    process of their activities to automate their operations. The system is dealing with

    the selling and buying the shares. >nline brokers allow one to buy and sell shares

    via Internet.

    The O!%!# s0ar# tra)!g s"st#$includes several modules. They are

    described below as follows.

    Stock +%change Module

    "ustomer Information Module

    Investment Information Module

    2ank Transaction Module

    Trade Management Module

    2rokerage Module

  • 8/12/2019 Java Application Projects

    9/39

    PERSONAL Bus!#ss I!t#%%g#!c# OR1ANI2ER

    Abstract:

    This pro!ect titled PERSONAL Bus!#ss I!t#%%g#!c# OR1ANI2ERwas

    developed for a software development company. This pro!ect keeps an account of

    the number of pro!ects handled by the company and their status. Its main ob!ective

    is the need for monitoring system, which can store the day-to-day activities of the

    developers and administrators. The system enables to maintain a record and to

    monitor the progress of the work carried within the organi6ation on daily basis.

    This pro!ect is developed for the administrative purpose in a software

    company. The administrator has the full control on the pro!ect status being

    handled by the company. The administrator monitors the every day report of each

    pro!ect handled by the company. They can monitor progress of each developer and

    the current status of each pro!ect individually. The main ob!ective of this pro!ect is

    to monitor the everyday status of each pro!ect and the developer(s contribution

    towards it.

    The following are the modules involved in #ro!ect Monitoring System

    +mployee etail Module

    "ustomer etail Module

    #ro!ect etail Module

    #ro!ect Scheduling Module

    +mployee Scheduling Module

  • 8/12/2019 Java Application Projects

    10/39

    3eport Deneration Module

    St#ga!&gra30"

    Abstract:

    Steganography - derived from the Dreek words meaning @covered

    )ritingB, is the art of hiding information in ways that prevent its detection. It is a

    method akin to convert channels, and invisible links, which add another step in

    security. < message in cipher te%t may arouse suspicion while an invisible

    message will not.

    igital steganograpy uses a host data or message, known as a @containerB or

    @coverB to hide another data or message in it. The conventional way to protecting

    information was to use a standard symmetric or asymmetric key system in

    encryption. Steganography can also be used to place a hidden @ TrademarkB in

    images, music, and software, a technique referred to as watermarking.

    Steganography, if however used along with cryptography, for e%ample, if a

    message is encrypted using triple +S 7++8 which requires a EE bit key then

    the message has become quite secure as far as cryptanalytic attack are concerned.

    4ow, if this cipher te%t is embedded in an image, video, voice, etc., it is even more

    secure. If an encrypted message is intercepted, the interceptor may not know the

    ob!ect contains message.

    )hen performing data hiding on audio, one must e%ploit the weaknesses of the

    9uman

  • 8/12/2019 Java Application Projects

    11/39

    Vrtua% 3r/at# !#t.&rk

    Abstract:

    < virtual private network 7C#48 provides end users with a way to privately

    access information on their network 7e%ample an intranet8 over a public network

    infrastructure such as internet.

    < C#4 is a connection that has the appearance and many of the advantages

    of a dedicated link but occurs over a shared network. sing a technique called

    @TunnelingB, data packets are transmitted across a public routed network, such as

    internet or other commercially available network in a private @TunnelB, that

    simulates a point-to-point connection. This approach enables network traffic from

    many sources to travel via separate tunnels across the same infrastructure.

    C#4 solutions can be built using multiple devices like routers, firewalls ,

    and bandwidth managers or they can be implemented on an integrated C#4 router

    that provides on board firewall and band width management capabilities .

    Integrating all C#4 functions on a router reduces network comple%ity and total

    cost of ownership of the C#4 solution.

    The advantage of a C#4 are less e%pensive to operate than private networks from

    management, band width and capital perspectives. "onsequently, the payback

    period for C#4 equipment is generally measured in months instead of years.

    #erhaps the most important benefit of all, however is that C#4 enables enterprises

    to focus on their core business ob!ectives instead of running the corporate network

  • 8/12/2019 Java Application Projects

    12/39

    O!%!# J&b P&rta% 'R#su$# Track!g S"st#$(Abstract:

    3esume Tracking System is helps human resource professional5s,freshers

    and !ob seekers for searching !ob. It helps save time and make the recruitment

    process mare efficient.3esume Tracking System offer widest variety of searches

    fund in any database program. This search include full-te%t, fu66y wildcard,

    2oolean, pro%imity, data and numeric. If the user information is strutted 7like

    names and address8, users can take advantage of its freeform database capabilities.

    "reate an entry form for user data. +very time user can add a data to their

    database, call up the entry form and fill in the field. nlike traditional database,

    3esume Tracking System does not require pre-defined field lengths or field types.

    $ields e%pand as enter information(s they never need to worry about running out

    of room.

  • 8/12/2019 Java Application Projects

    13/39

    CATALO1 MANA1EMENT SYNOPSIS

    Abstract:

    >ur #ro!ect = 2< Transaction facility deals with a manufacturing firm, basically

    into the manufacture of cosmetics and supplying to it(s clients.

    4ow, as of today, the company would require a lot of manual work to be done

    regarding generation of enquiries, receipt of quotation, generation of purchase

    order, confirmation etcF.

  • 8/12/2019 Java Application Projects

    14/39

    The power of Internet is such that it integrates together 0

  • 8/12/2019 Java Application Projects

    15/39

    machine-style messages for users who arenHt online, and instant messages can be

    sent to those who are. nline banking or e-banking can be defined as online systems which allow

    customers to plug into a host of banking services from a personal computer by

    connecting with the bank(s computer over telephone wires. Technology continues

    to make online banking easier for average consumers. 2anks use a variety of

    names for online banking services, such as #" banking, home banking, electronic

    banking or Internet banking. 3egardless of the name, these systems offer certain

    advantages over traditional banking methods.

    This application is designed to implement the banking solution on the web

    to enable the customers to transact, sitting at their #", making their account

  • 8/12/2019 Java Application Projects

    16/39

    available to them ? hours a day. )hile the customer has all the options of

    transactions online, the administrative functions are still limited to the bank

    officials.

    The system should allow the customers to perform the following tasks

    online&

    Ciew nline

    Transfers between account

    "heque book issue request

    Issue request

    "hange the personal details

    The system should also allow the bank officials to do the following operations&

    >pen a new account and create a new user

    Service the cheque book issue request

    Service the issue request

    $ree6e ; unfree6e an account.

  • 8/12/2019 Java Application Projects

    17/39

    EPAR

    Abstract:

    +#

  • 8/12/2019 Java Application Projects

    18/39

    Multiple views on one file. +valuation of *#ath e%pressions. This is useful for

    searching nodes, but also as an *#ath learning and e%perimenting tool.

    "ustomi6ability through *M0 parsers.

    Schema support, from T through *M0. +#

  • 8/12/2019 Java Application Projects

    19/39

    E,4EEL2 SYNOPSIS

    Abstract:

    ourney became part and parcel of a human being(s life. )ithout moving

    around, people cannot communicate and share the moments with others. In this

    busy world, especially when more and more population is seen in the developing

    nations, it is highly essential to have a comfortable and safe !ourney. )hen a

    passenger wants to go on a !ourney, he wants to first reserve some seat in a bus

    and for the intended date. This becomes easy with e)heel software which helps

    in obtaining reservations of seats in a bus well before and take the tickets also

    online by staying at home.

    )hen a passenger wants to book a ticket in a bus, he need to visit this portal and

    selects the source and destination points along with the date and type of bus he

    wants. These details are processed and accordingly bus details are displayed. The

    passenger should select a bus and then the available seats information is displayed.

    The passenger can select the seats whatever he likes. In the ne%t screen, he can

    provide his details along with the credit card number. The amount is calculated

    and deducted from his account. Then a ticket is generated on the console and the

    passenger can take a printout of it. The same ticket can be presented at the time of

    !ourney.

    >n the other hand, the administrator of this system will be able to add new routes,

    add pick up points for the e%isting routes and cancel e%isting routes.

  • 8/12/2019 Java Application Projects

    20/39

    add new travel, add bus details for the travels and can remove an e%isting travel

    company(s name from the list.

    e)heel software is a globally deployable, integrated, workflow based end-to-endsystem starting from searching bus routes to book them online. This is a complete

    application for travelers as well as venders. Cendors provide the information like,

    available routes, timings, price, etc. "ustomers can book a ticket which is a five

    step process that includes Search 2us, Select 2us, Select Seats, #rovide "ustomer

    Information and Make #ayment. This application also provides facility to cancel a

    booked ticket online. There is also scope to measure the user satisfaction regarding

    the entire booking process. 9e can e%press his views or grievances through

    testimonial option in the application so that it reflects the goodwill of the travel

    company and helps other users to have trust in the company.

    1ENCO SYNOPSIS

    Abstract:

    The 2asic purpose of this pro!ect is to generate D+4"> 0ibrary using ava

    application, by implementing different type of algorithm. It supports number of

    barcode formats and this application can be use and enhanced for whatever reason

    you like. These barcodes contain encoded authenticated information, which gives

    a unique identity to any product, and provide a security labels.

  • 8/12/2019 Java Application Projects

    21/39

    4#a%t0 Car# S"st#$

    Abstract:

    "omplete reference guide of Medical #rofessions, 9ospitals, and the

    #harmacy across the nation that offer the online discussion 7through phone8, and

    >nline

  • 8/12/2019 Java Application Projects

    22/39

    INSPECTION TOOL SYNOPSIS

    Abstract:

    The pro!ect deals with automation of some of the steps involved ininspection process.

  • 8/12/2019 Java Application Projects

    23/39

    >rgani6ation wishing to optimi6e their inspection processes should consider this

    type of estimation tool. Inspections are still the most cost effective way to detect

    defects in software.

  • 8/12/2019 Java Application Projects

    24/39

    INTE1RATED DEVELOPMENT ENVIRONMENT SYNOPSIS

    Abstract:

    This application @$ront +ditor $orJAVA @is developed using

  • 8/12/2019 Java Application Projects

    25/39

    MOBILE BAN-IN1

    Abstract:

    The improvement in technologies, lot of traditional works are been done using

    internet. The systems like reservations, banking and other things wear done usinginternet.

    The main advantage of this was person need not be present at the place and was

    done quickly which saved the time. The main draw back of this was, it

    compulsorily required the costly pc.

    4ow the things had changed, the scenario is changing i.e. using of simple and

    cheaper hardware such as mobiles and handheld devices. )hich provides much

    better mobility than #"s. Technology is moving towards mobiles which has wide

    spread usage and acceptability. 0ot of protocols and software(s are been

    developed to server the concept. 9ere we !ust are trying to be with the scenario.

    )e are connecting the mobile to bank database using wml scripts and !ava

    technology.

    In today(s age of new opportunism and emerging technologies, there is a new

    communications infrastructure on offer to transform the way business is done.

    This opportunity is mobile commerce, and it will drive new levels of intense

    competition in the finance industry. Mobile commerce achieves this by removing

    the traditional restrictions of geographical location and high entry costs. This time

    the assault on the finance industry will be led by a new weapon, the mobile

    phone.

    )e are providing a wise range of mobile banking for individual clients, including

    balance checking, amount transfer, stop payment, request check book, mini

    statement, etc.

  • 8/12/2019 Java Application Projects

    26/39

    "heck 2alance& users may check the balance of account and the latest

    transactions. Transfer $unds& ser may transfer the amount to the required

    customer of his choice. Stop #ayment& user is allowed to stop payment ofcheques based on his request. 3equest "heque 2ook& user may request the

    cheque books according to his requirements 7E1 leaves, K1 leaves, E11 leaves8.

    Mini statement& user is also allowed to view the transactions made. "onfiguration&

    ser configures the functions concerning account payment and code. +tc.

    >ne report also suggested that this trend might grow as the number of mobile

    device users continues to grow, and also those users show more wiling to consider

    using new applications such as mobile cash and payments.

  • 8/12/2019 Java Application Projects

    27/39

    PASS,ORD PROTECTOR SYNOPSIS

    Abstract:

    #assword #rotector is the tool which is used to protect the folders 1r files bysetting the password so that un authori6ed users should not hake the files and the

    folders. The folders are protecting by setting the password and the files are

    protecting by encrypting and decrypting. This pro!ect is developed by ava E.K

    version.

  • 8/12/2019 Java Application Projects

    28/39

    PROJECT TRAC-IN1 SYSTEM SYNOPSIS

    Abstract:

    The #ro!ect Tracking System was initially developed to document, prioriti6e

    and track the progress of internal 3emedy pro!ects by setting milestones and

    establishing deliverables required to complete a pro!ect.

  • 8/12/2019 Java Application Projects

    29/39

    PROJISTICS SYNOPSIS

    Abstract:

    >ne of the key points is that somebody needs to take responsibility for a

    thread. $or any non-trivial si6ed pro!ect, it is impossible that a pro!ect managertakes on this responsibility all by himself. #art of this is to make sure that the state

    of a thread is accurately known at any time to all people that have a reasonable

    interest in it. < central repository that is maintained by all people involved in a

    pro!ect and not !ust by some pro!ect managers greatly supports this kind of model.

    This technique has been used with good success for several years in software

    defect tracking and change management, but can and should be employed as well

    in tracking any thread that is part of a pro!ect.

    To support the method of managing pro!ects as a bunch of threads the #ro!istics

    system was designed. < tool of this kind is as essential to pro!ect management as

    is a word processor to a secretary. The #ro!isticssystem has been developed with

    the help of many pro!ect managers and team members, testing it on real pro!ects

    in several organi6ations. The wide acceptance of this system comes not at last

    from its simplicity and focus. In particular,

  • 8/12/2019 Java Application Projects

    30/39

    8UERY COM SYNOPSIS

    Abstract:

    /+3 ">M is a graphical ava program that will allow you to view thestructure of a 2" compliant database, browse the data in tables, issue S/0

    commands etc. ou need to be running recommended that you ava E.? .There are

    two pieces of information you need to supply to connect to a database: the driver

    definition and the alias. The driver definition specifies the 2" driver to use and

    the alias specifies the connection parameters.

    < number of default driver definitions ship with /+3 ">M. These are added

    to the rivers 0ist window 7View Driversoption on the Windowsmenu8 when

    you first start up /+3 ">M.

  • 8/12/2019 Java Application Projects

    31/39

    8uck Ma% SYNOPSIS

    Abstract:ThereHs a new appliance on the hori6on that is going to change how we

    view networking and networked applications, and thatHs mail-enabled

    applications. /uick mail 7Mail-enabled application8 delivers a new type of

    network appliance and new level of functionality. Mail will evolve from

    messaging to a complete communications medium.

    Ma%*#!ab%#) A33%cat&!s will deliver the infrastructure for e-mail management

    applications, chatting, search engine, entertaining games, address book and a help.

    9ere I am trying to implement an application through which it is easy to send or

    receiving messages between "lient;Server

  • 8/12/2019 Java Application Projects

    32/39

    using chat software that supports I3"7Internet 3elay "hat8. This is a protocol that

    is the original means of chatting through the actual Internet. "hatting is very easy

    to do once youHve logged onto a server and !oined a channel. There are tens of

    thousands of active channels on I3" at any given time, so, you know there(s awide variety of a topic to choose from.

    My /uick mail S#arc0 #!g!#supports several advanced operators, which are

    query words that have special meaning. Typically these operators modify the

    search in some way, or even do a totally different type of search. $or instance,

    'link&' is a special operator, and the query doesnHt do a normal search but instead

    finds all web pages that have links to that page. To see a definition for a word or

    phrase, simply type the word 'define,' then a space, and then the word7s8 you

    want defined. If /uick mail has seen a definition for the word or phrase on the

    database server, it will retrieve that information and display it at the top of your

    search results

    DATA RECOVERY MANA1EMENT

    Abstract:

    In today(s Internet driven world, every application is being ported to web

    so as to allow the users to connect with the system and access the respective

    data;information online ?;P. It has thus been a catalytic force that has reali6ed

    the removal of barriers of time and distance. Industries;personnel operating in

    general commercial arena including 2anking, Insurance, etc., 7being the main

    financial backbone of any economy8 have also followed suit to keep themselves

    up-to-date in the latest of trends and to reap the benefits offered by internet.

  • 8/12/2019 Java Application Projects

    33/39

    $or most of such Internet-driven applications, standard database systems from

    the default repository mechanism. "onsidering run-time load for these

    applications, additional support;tools that provide application reliability and

    graceful

  • 8/12/2019 Java Application Projects

    34/39

  • 8/12/2019 Java Application Projects

    35/39

    SIDBI

    Abstract:

    The system mainly deals with the automation of the activities performed at

    Small Industries evelopment 2ank of India 7SI2I8, which issued various kindsof loans to their "ustomers and accepts monthly installments from them.

  • 8/12/2019 Java Application Projects

    36/39

    S8L ,EBSERVER SYNOPSIS

    Abstract:

    S/0 worksheet O111 application is a ava web application. This means it is meant

    to run on ava-based web server 7like& Tomcat, 3esin, >rion, 3un, etc8. It was

    designed to allow anyone with hopefully any recent browser access ; maintain any

    S/0-compliant database that has a valid type ? 2" driver. >ut of the bo%, it

    supports& >racle L.1, S/0Server N.K, Informi% 7not sure of version 8, and

    MyS/0 O.O 7U I think8. Diven time, IHd like to add built-in support for other

    >pen Source atabases or "ommercial atabases that have free 2" drivers.

    The S/0 )orksheet allows you to enter, edit, and e%ecute S/0 and #0;S/0

    code. ou can also e%ecute the Server Manager 2< commands. ItHs a )eb

  • 8/12/2019 Java Application Projects

    37/39

    TEND SYNOPSIS

    Abstract:

    This @$SecurityB is developed to provide security at file content level. It uses"ryptosystems, highly technical systems that provide privacy through secret

    encoding, have been an important part of the electronic information world for

    many years. These systems are the foundation for all electronic information

    e%change. $or e%ample, financial institutions and banks rely upon cryptography to

    securely transmit critical and private information over the Internet. +specially

    now, during the e-commerce e%plosion, secure and reliable e%change systems are

    vital for the world(s economy.

    These cryptosystems protect data by using hardware and software in a process

    that protects data by performing mathematical operations;algorithms on it. The

    result is data rendered unintelligible, which is called cipher te%t. This cipher te%t

    is then transmitted over insecure phone lines or networks such as the Internet. If

    someone intercepts this cipher te%t, it is indecipherable and meaningless to him or

    her. )hen the cipher te%t reaches its final destination, it can be decrypted into the

    original state of the data.

    The most widely used encryption algorithm is the ata +ncryption Standard

    7+S8. #roposed in EJPK, +S was adopted by the S government as the

    standard for all 'unclassified computer data'. +S is a symmetric key block

    cipher. This means that data to be secured is encrypted with a 'private key' in

    sections, or blocks, of N?-bits.

  • 8/12/2019 Java Application Projects

    38/39

    Vrtua% O99c# Ma!ag#$#!t S"!&3ss

    Abstract:

    The >ffice Management #rogram will prepare students formid-management positions that will enable them to lead people in attaining the

    ob!ectives of the organi6ation. #lanning, organi6ing, and controlling the

    information processing activities of an organi6ation is a ma!or focus of this

    curriculum. The program will prepare graduates to take advantage of higher level

    office positions that are beyond the traditional role of secretary or clerk. Specific

    courses will be offered in business communications, business organi6ation,

    information processing, computer software applications, office information

    systems, supervision and administrative support systems, records and information

    management, and human relations. Training will be conducted on computers and

    related office equipment.$or students desiring on-the-!ob e%perience prior to

    graduation, an internship course may be available.Draduates of the program will

    be prepared to assume positions as office managers, administrative services

    coordinators or assistants, office supervisors, records and information supervisors,

    personnel administrators, administrative assistants, or administrative support

    secretaries.Students may transfer to a four-year institution to pursue a bachelor(s

    degree in business administration, business education, human resources,

    advertising, or public relations.

  • 8/12/2019 Java Application Projects

    39/39

    JAVA MAIL SERVER

    Abstract:

    esigning is done using 9TM0 .