KEMBAR78
File Utility 0test Data | PDF | Computer File | Encryption
0% found this document useful (0 votes)
40 views33 pages

File Utility 0test Data

The document presents a project titled 'File Utility' developed by Miss Rachana Ramesh Pawar as part of her Master of Computer Application program. It outlines the system's functionalities, including file encryption/decryption, splitting/merging, and comparison, aimed at enhancing data security and efficient data transfer. The project includes acknowledgments, a certificate of completion, and detailed sections on analysis, design, user requirements, limitations, and proposed enhancements.

Uploaded by

RAM Ramesh 4th c
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views33 pages

File Utility 0test Data

The document presents a project titled 'File Utility' developed by Miss Rachana Ramesh Pawar as part of her Master of Computer Application program. It outlines the system's functionalities, including file encryption/decryption, splitting/merging, and comparison, aimed at enhancing data security and efficient data transfer. The project includes acknowledgments, a certificate of completion, and detailed sections on analysis, design, user requirements, limitations, and proposed enhancements.

Uploaded by

RAM Ramesh 4th c
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 33

K.B.H.S.S.

T’S
Dr.B.V.Hiray Collage of Mangement and Research
Center,Malegaon(MCA)

ON

“FILE UTILITY”
Submitted By:

Miss. Rachana Ramesh Pawar


Under the Guidance of:

Prof.Mithun Patil Sir

[Academic Year:2019-2020]

A Practical Fulfillment of the Requirement of the Award of the


Master of computer application
Acknowledgement

It is said that "No one knows what he can do until he tries". Likewise every
member has done efforts to forward the completion of project named

“FILE UTILITY”

I would like to, sincerely thanks of prof.Mithun Patil (K.B.H.S.S.T'S


Dr. B.V.Hiray College of Management& Research Center , Malegaon.),
for giving me valuable encouragement and moral support for making
this project successful.
I would like to thanks to all my teachers of M.C.A. Department
who guided me in this project and made many valuable recommendation
and suggestion that results in completion of successful project.
Finally, I should like to thanks to all my M.C.A. Friends, without
their critism assistance, this project was very tough. I would like to state
my friends that directly or indirectly co-operate me to complete my
project successfully.
Thanks You,

Project Associate

Rachana Ramesh Pawar.


K.B.H.S.S.T’S
Dr. B. V. Hiray College of Management
& Research Center, Malegaon

Certificate
This to Certify that the
“ File Utility”
Has Been Successfully Completed By
Miss. Rachana Ramesh Pawar
As a Part of Syllabus For
Final Year MCA (SEM-V)
During the Academic Year 2019-20

Director Internal Examiner

Dr. S.J.Jadhav Prof. Mithun Patil


I N D E X 
Sr.No.  Topics  Page No. 
1.  INTRODUCTION  7 

  1.1  Introduction   

  1.2  Existing System and Need of System   

  1.3  Scope of Work   

  1.4  Operating Environment­Hardware and Software   

  1.5  Details Description of Technology Used   
2.  PROPOSED SYSTEM  10 

  2.1  Proposed System   

  2.2  Object of System   
  2.3  User Requirements   
3.  ANALYSIS & DESIGN  14 

  3.1  E­R Diagram   

  3.2  DFD Diagram   
  3.3  Use­case Diagram   
  3.4  Activity Diagram   
  3.5  Sequence Diagram   
  3.6  Class Diagram   
  3.7  Component Diagram   
  3.8  Deploment Diagram   
  3.9  Table Design   

  3.10  Test Procedure and Implementation   

  3.11  Screens   

4.  USER MANUAL  27 

5.  LIMITATIONS OF PROJECT  28 


6.  PROPOSED ENHANCEMENT  29 
7.  CONCLUSION  30 
8.  BIBILIOGRAPHY  31 
INTRODUCTION

Overview of the system :-

As the present world is very much dependant on Computers, the job of


the programmers is increased. The programmers deals with
handling of files, performs various operations on files to store &
retrieve the data. Normally every programmer deals with transferring
of files. So the problems they might face is hacking of data , a time
delay due to transmission of data , copy of garbled data, etc.
Our system provides a set of great utilities to the users. The security issues like
Encryption, Decryption etc are provided, so that data is safely transferred without
the fear of information leaking. Transmission of huge data files may engage
network for a long time resulting the starvation of other clients. To avoid this
inconsistency, the Split & Join utilities are provided in the system.

The system provides various utilities :

o File Encryption/Decryption
o File Splitter/Merger
o File Comparison
Existing System and Need of System
Existing systems: - Now a days How to handle and transfer big data is challenging.
And various system are deals with data transfer thorough internet. But they are
not providing data safety features.

Need of System : - Following reasons are boldly explain Why system is needed.

1) Data safety :- Now a days data is more expensive than Gold. Therefore security
of data is very important. To achieve High end data security we need File Utility
System.

2) Efficient data transfer and optimum use of internet connectivity :- Transfer of


big data through internet is more complex but with the help of split and join utility
we can solve that problem and avoid waste of internet connectivity.

3) To avoid duplicate data :- Duplicate data is occupy too much space in our
storage devices and its very time consuming to identify exact duplicate data but
with help of File Compare Utility we can solve that problem and save our Valuable
time.
SCOPE OF THE SYSTEM

As per the time limits , the system provides following features-

• Two files can be compared & report will be generated as per result.

• Fixed as well as random memory size can be chosen by the user for splitting
the specified file.

• Files can be encrypted or decrypted for the security purpose.


Operating Environment-Hardware and
Software
We are using Java Programming language because of JAVA language features we
can be say program can run any Operating System.
Hardware requirement:

1. Pentium 166 MHz.


2. Intel / IBM CPU that support windows.
3. 16 MB RAM.
4. 14” color monitor for better visualization.
5. 80 GB Hard Disk.

Software requirements:

1. Operating system: Windows ,Linux


2. Java : JDK1.4 or JCreator
PROPOSED SYSTEM
There are various reasons for developing the system.
As the present world is very much dependant on Computers, the job of
the programmers is became increased. The programmers deals with
handling of files, performs various operations on files to store &
retrieve the data. Normally every programmer deals with transferring
of files. So the problems they might face is hacking of data , a time
delay due to transmission of data , copy of garbled data, etc.
Our system provides a set of great file utilities like Split & Join, Encryption &
Decryption, Comparison of files etc.
Split utility splits the large sized file into small fix sized files. The transmission
of the large file on the network results in starvation of the other clients. Split & Join
utility solves this problem as splitted small files takes little time for transmission and
splitted files are combined at the destination using the Join utility.
The data on the network can acquired using the Hacking etc. Also, there is a
possibility of information leaking. To prevent confidential data from these
possibilities, data is encrypted using Encryption utility and transmitted safely. At the
destination, the encrypted data decrypted using the Decryption utility to get back
in the original form.
Object of System
Split utility splits the large sized file into small fix sized files. The transmission
of the large file on the network results in starvation of the other clients. Split & Join
utility solves this problem as splitted small files takes little time for transmission and
splitted files are combined at the destination using the Join utility.
The data on the network can acquired using the Hacking etc. Also, there is a
possibility of information leaking. To prevent confidential data from these
possibilities, data is encrypted using Encryption utility and transmitted safely. At the
destination, the encrypted data decrypted using the Decryption utility to get back
in the original form.
User Requirements
Hardware requirement:

1. Pentium 166 MHz.


2. Intel / IBM CPU that support windows.
3. 16 MB RAM.
4. 14” color monitor for better visualization.
5. 80 GB Hard Disk.

Software requirements:

1. Operating system: Windows ,Linux


2. Java : JDK1.4 or JCreator
ANALYSIS & DESIGN
E-R Diagram
In file Utility project we are not using any table or database connection so E-R
diagram is not used and it is not required in this project.

DFD Diagram
No database is required and used in this project.
Use-case Diagram

Choose appropriate
option
File utility
system

User Encrypt/Decrypt
file

Compare
files

Split/Merge
file
Activity Diagram

Choose appropriate
option from menu

Open the file

Select destination

Instruct for processing

Save

Want
Yes
to

No
Sequence Diagram

: file manipulation : file


: User
system system

Request for open the file Searches in file system

Provide file to the user Fetches required file

Request for splitting

Returns splitted file


Searches in file system
Request file for merging

Fetches required file


Returns merged file

Searches in file system


Request for encrypted file

Fetches required file


Returns encrypted file
Searches in file system
Request decryptedfile

Returns decrypted Fetches required file


file

Request for Searches in file system


Compare files
Fetches required file
Returns Compared
file result
Class Diagram
FileUtility

flag:int

FileManipulation()
Compare()

Enc_dec Compare
FileManipulation
f1:File
f:File f2:File
attri:int array flag:intt
name:String
size:int array ch:int
lsize:int
Encrypt()
no:int Cmp()
Decrypt()
Change()
getAttribute()
change()
split()
merge()
encrypt decrypt
getName()
f1:File f1:File
f2:File f2:File
Change() Change()
Filter() Filter()
decr()
Component Diagram

User

FileUtility
system

File system
Deploment Diagram

Table Design
No database and tables are used.
Test Procedure and Implementation
State diagram

Display the option Select an Open the required


appropriate option
File

Save Wait for processing Choose the


destination

Stop
Screens
USER MANUAL

Step 1:- Open File utility class file.


Step 2:- Select any one options from list.
Step 3:- Click ok.
Step 4:- Click on cancel to exit.
LIMITATIONS OF PROJECT
This system can be used to merge the files that are splited using the
same system. We cannot merge some other small files.
We cannot merge some files from split files. All the splited files have to
be selected for merging.
Only GIF files can be encrypted and decrypted.
PROPOSED ENHANCEMENT

• Currently the system does not


provide Folder
Splitting , Encryption ,
Comparison .

• Multiple Levels Of Encryption is


Not implemented
CONCLUSION

While developing the system, a lot of efforts have been taken. From this system
we came to know several facts.
The logical schema of the system should be designed properly. The analysis of the
system should be independent of it’s implementation. The system should be
thoroughly examined before developing it. The sound knowledge of the
developing environment is must. Analysis of the system plays a vital role.
Bibliography

1) BOOKS :-

Java 2 Programming Black Book


Steven Holzner

Java the complete reference


Patrick Naughhton
Herbert Schildt
How to program in java

2) WEBSITES:-

1.www.Google.com
2.www.Sunjava.com
Filename: INTRODUCTION.docx
Directory: C:\Users\hiray\Documents
Template: C:\Users\hiray\AppData\Roaming\Microsoft\Templates\Normal.dotm
Title:
Subject:
Author: hiray
Keywords:
Comments:
Creation Date: 17/11/2019 2:12:00 PM
Change Number: 143
Last Saved On: 17/11/2019 6:09:00 PM
Last Saved By: hiray
Total Editing Time: 154 Minutes
Last Printed On: 17/11/2019 6:09:00 PM
As of Last Complete Printing
Number of Pages: 32
Number of Words: 1,743 (approx.)
Number of Characters: 9,940 (approx.)

You might also like