際際滷

際際滷Share a Scribd company logo
Presented to: Prof. Ali Mahmoud
RUDC
PROJECT
01 02
05 06
03 04
07 08
Appreciation
Overview
Our Team Intro
Authentication GUI
Our Mision Functionality Overview
Challenges &
Troubleshooting
Our Team
 Hatem Omran
 Mohmed Khaled
 Mahmoud Abdelrahim
 Khairy Mahjoub
 Mohamed Hassan
 Saleh Yousef
Brief description
Introducction
 This project is a Java Swing
application for creating, reading,
updating, and deleting (CRUD)
contact data. It includes
authentication functionality to
ensure secure access.
Our Mision
Mission Statement:
 "Empowering efficient data management through a secure and
intuitive CRUD application."
01
02
03
Purpose:
 To develop a robust CRUD application that enables users to efficiently
manage contact data.
 To provide a secure platform for storing and accessing sensitive
information.
Key Objectives:
 Streamline data management processes for enhanced productivity.
 Ensure data security and confidentiality through authentication
mechanisms.
 Facilitate seamless interaction with an intuitive graphical user interface.
 Enable efficient CRUD operations for creating, reading, updating, and
deleting contact data.
Functionality Overview
Read
Create
Display all existing contact data.
Add new contact data.
Create Operation
When a new contact is created, its data is
serialized (converted to binary) and
appended to the binary file.
Read Operation
The application reads the binary file,
deserializes the data, and displays it to
the user.
Delete
Remove a contact based on its ID.
Delete Operation
When a contact is deleted, the application
removes its corresponding binary data
from the file.
Search
Find contacts based on search terms (ID,
row values).
Search Operation
The application searches through the
binary file for contacts matching the
search criteria.
RUDC project.pptxl;ml;ml';m;m';m';m;'';m';m';m';
Binary File Connection
Binary File Connection
 File Storage: Contacts are stored in a binary file (data.dat).
 Data Representation: Each contact is represented as a series of
1s and 0s (binary format) within the file.
ID Generation
 Automatic ID Creation: Each contact is assigned a unique ID
automatically upon creation.
 Sequential Generation: IDs are generated sequentially,
ensuring each new contact has a unique identifier.
Imported Packages
javax.swing.* java.awt.* java.awt.event.* java.io.* java.util.ArrayList
 Purpose:
 Importing necessary packages for GUI components (Swing and AWT), event handling,
file I/O, and data structures (ArrayList and List).
 Key Points:
 Provides access to pre-built UI components and event handling mechanisms.
 Enables file input/output operations.
 Facilitates the use of ArrayList and List data structures for managing contact data.
java.util.List
Authentication
Purpose
 Username and
password
authentication.
 Specific users have
access privileges.
Implementation Security Measures
 Hardcoded usernames
and passwords.
 Authentication check
performed upon login
attempt
 Ensure secure access to
the MDBS application.a
Graphical User Interface
(GUI)
 Login Dialog:
 Input fields for username and password.
 OK and Cancel buttons for submission and
cancellation.
 Implementation:
 Utilizes Java Swing for GUI components.
 Responsive and user-friendly design.
Login Dialog 2022 2023
 Issue Encountered:
 Difficulty setting up and managing a local host server for request-
response handling.
 Unexpected behavior when dealing with the binary file (data.dat).
 Challenges Faced:
 Local Host Server:
鐃 Configuration complexities.
鐃 Inconsistent request handling.
 Binary File Handling:
鐃 Unexpected errors during CRUD operations.
鐃 Difficulty in understanding and managing binary data.
 Troubleshooting Efforts:
 Local Host Server:
鐃 Experimentation with different server configurations.
鐃 Debugging server-side code for error identification.
 Binary File Handling:
鐃 Inspection of file read/write operations.
鐃 Review of serialization/deserialization processes.
Challenges &
Troubleshooting
 Testing with Postman:
 CRUD Operations:
 Utilization of Postman for testing Create, Read, Update,
and Delete operations.
 Detection and analysis of errors and inconsistencies.
 Ongoing Investigation:
 Resolution Search:
 Continued research and experimentation to identify
solutions.
 Exploration of alternative approaches for file handling and
server setup.
RUDC project.pptxl;ml;ml';m;m';m';m;'';m';m';m';
Thank's For Watching
RUDC
Thank's For giving us
the chance!

More Related Content

Similar to RUDC project.pptxl;ml;ml';m;m';m';m;'';m';m';m'; (20)

Chinnasamy Manickam
Chinnasamy ManickamChinnasamy Manickam
Chinnasamy Manickam
Chinnasamy Manickam
DOT NET RESUME
DOT NET RESUMEDOT NET RESUME
DOT NET RESUME
Basharat Alam Syed
IDM Resume _ Kiran
IDM Resume _ KiranIDM Resume _ Kiran
IDM Resume _ Kiran
Kiran Kumar
Satheesh.G_IDM
Satheesh.G_IDMSatheesh.G_IDM
Satheesh.G_IDM
satheesh64
Resume-Updated
Resume-Updated Resume-Updated
Resume-Updated
SAKIR HUSSAIN
EXAMPPTGPW.pptx
EXAMPPTGPW.pptxEXAMPPTGPW.pptx
EXAMPPTGPW.pptx
MohammedAqeeb4
KarthikSNOW_CV
KarthikSNOW_CVKarthikSNOW_CV
KarthikSNOW_CV
karthik reddy
Resume_Suresh
Resume_SureshResume_Suresh
Resume_Suresh
Suresh Choudhary
Hari Babu-DBA Resume
Hari Babu-DBA ResumeHari Babu-DBA Resume
Hari Babu-DBA Resume
haribabu pamarthi
Guru iam developer
Guru iam developerGuru iam developer
Guru iam developer
GuruSaiCharanJanagon
Protecting Web Applications The Role of Authentication and Authorization in a...
Protecting Web Applications The Role of Authentication and Authorization in a...Protecting Web Applications The Role of Authentication and Authorization in a...
Protecting Web Applications The Role of Authentication and Authorization in a...
Gargee ExcelR
Community Resource Portal for the Healthcare Sector
Community Resource Portal for the Healthcare SectorCommunity Resource Portal for the Healthcare Sector
Community Resource Portal for the Healthcare Sector
Mike Taylor
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSec
Lalit Kale
BadesahebKBichu
BadesahebKBichuBadesahebKBichu
BadesahebKBichu
Badesaheb Bichu
Resume_Ravichandra Thota
Resume_Ravichandra ThotaResume_Ravichandra Thota
Resume_Ravichandra Thota
Ravichandra Thota
Paradigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementParadigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access Management
Julie Beuselinck
Pooja_resume_5.10
Pooja_resume_5.10Pooja_resume_5.10
Pooja_resume_5.10
Pooja vaishnavi
Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1...
 Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1... Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1...
Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1...
WebStackAcademy
Malli Resume_30 Jun 2012
Malli Resume_30 Jun 2012Malli Resume_30 Jun 2012
Malli Resume_30 Jun 2012
mallikarjun ch
Naga_CV
Naga_CVNaga_CV
Naga_CV
Nagaraju D
IDM Resume _ Kiran
IDM Resume _ KiranIDM Resume _ Kiran
IDM Resume _ Kiran
Kiran Kumar
Satheesh.G_IDM
Satheesh.G_IDMSatheesh.G_IDM
Satheesh.G_IDM
satheesh64
Protecting Web Applications The Role of Authentication and Authorization in a...
Protecting Web Applications The Role of Authentication and Authorization in a...Protecting Web Applications The Role of Authentication and Authorization in a...
Protecting Web Applications The Role of Authentication and Authorization in a...
Gargee ExcelR
Community Resource Portal for the Healthcare Sector
Community Resource Portal for the Healthcare SectorCommunity Resource Portal for the Healthcare Sector
Community Resource Portal for the Healthcare Sector
Mike Taylor
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSec
Lalit Kale
Paradigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementParadigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access Management
Julie Beuselinck
Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1...
 Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1... Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1...
Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1...
WebStackAcademy
Malli Resume_30 Jun 2012
Malli Resume_30 Jun 2012Malli Resume_30 Jun 2012
Malli Resume_30 Jun 2012
mallikarjun ch

More from AliaaTarek5 (11)

Human-Machine-Interface-HMI-Bridging-Humans-and-Technology.pptx
Human-Machine-Interface-HMI-Bridging-Humans-and-Technology.pptxHuman-Machine-Interface-HMI-Bridging-Humans-and-Technology.pptx
Human-Machine-Interface-HMI-Bridging-Humans-and-Technology.pptx
AliaaTarek5
lecture_14_state_space_canonical_forms.pdf
lecture_14_state_space_canonical_forms.pdflecture_14_state_space_canonical_forms.pdf
lecture_14_state_space_canonical_forms.pdf
AliaaTarek5
Design via root locus lead lag compensation
Design via root locus lead lag compensationDesign via root locus lead lag compensation
Design via root locus lead lag compensation
AliaaTarek5
Section 5 Root Locus Analysis lecture 55
Section 5 Root Locus Analysis lecture 55Section 5 Root Locus Analysis lecture 55
Section 5 Root Locus Analysis lecture 55
AliaaTarek5
Introduction-to-Mechanical-Accelerometers.pptx
Introduction-to-Mechanical-Accelerometers.pptxIntroduction-to-Mechanical-Accelerometers.pptx
Introduction-to-Mechanical-Accelerometers.pptx
AliaaTarek5
惠愀惡悋惠 悋惠悋 惆惘悋愕悋惠 悋悴惆 (2).ppt
惠愀惡悋惠 悋惠悋 惆惘悋愕悋惠 悋悴惆  (2).ppt惠愀惡悋惠 悋惠悋 惆惘悋愕悋惠 悋悴惆  (2).ppt
惠愀惡悋惠 悋惠悋 惆惘悋愕悋惠 悋悴惆 (2).ppt
AliaaTarek5
CS1027-Trees-2020 lecture one .pdf
CS1027-Trees-2020 lecture one       .pdfCS1027-Trees-2020 lecture one       .pdf
CS1027-Trees-2020 lecture one .pdf
AliaaTarek5
Chapter-3.pptx
Chapter-3.pptxChapter-3.pptx
Chapter-3.pptx
AliaaTarek5
Chapter 2.pptx
Chapter 2.pptxChapter 2.pptx
Chapter 2.pptx
AliaaTarek5
Chapter 1 digital design.pptx
Chapter 1 digital design.pptxChapter 1 digital design.pptx
Chapter 1 digital design.pptx
AliaaTarek5
Git_tutorial.pdf
Git_tutorial.pdfGit_tutorial.pdf
Git_tutorial.pdf
AliaaTarek5
Human-Machine-Interface-HMI-Bridging-Humans-and-Technology.pptx
Human-Machine-Interface-HMI-Bridging-Humans-and-Technology.pptxHuman-Machine-Interface-HMI-Bridging-Humans-and-Technology.pptx
Human-Machine-Interface-HMI-Bridging-Humans-and-Technology.pptx
AliaaTarek5
lecture_14_state_space_canonical_forms.pdf
lecture_14_state_space_canonical_forms.pdflecture_14_state_space_canonical_forms.pdf
lecture_14_state_space_canonical_forms.pdf
AliaaTarek5
Design via root locus lead lag compensation
Design via root locus lead lag compensationDesign via root locus lead lag compensation
Design via root locus lead lag compensation
AliaaTarek5
Section 5 Root Locus Analysis lecture 55
Section 5 Root Locus Analysis lecture 55Section 5 Root Locus Analysis lecture 55
Section 5 Root Locus Analysis lecture 55
AliaaTarek5
Introduction-to-Mechanical-Accelerometers.pptx
Introduction-to-Mechanical-Accelerometers.pptxIntroduction-to-Mechanical-Accelerometers.pptx
Introduction-to-Mechanical-Accelerometers.pptx
AliaaTarek5
惠愀惡悋惠 悋惠悋 惆惘悋愕悋惠 悋悴惆 (2).ppt
惠愀惡悋惠 悋惠悋 惆惘悋愕悋惠 悋悴惆  (2).ppt惠愀惡悋惠 悋惠悋 惆惘悋愕悋惠 悋悴惆  (2).ppt
惠愀惡悋惠 悋惠悋 惆惘悋愕悋惠 悋悴惆 (2).ppt
AliaaTarek5
CS1027-Trees-2020 lecture one .pdf
CS1027-Trees-2020 lecture one       .pdfCS1027-Trees-2020 lecture one       .pdf
CS1027-Trees-2020 lecture one .pdf
AliaaTarek5
Chapter-3.pptx
Chapter-3.pptxChapter-3.pptx
Chapter-3.pptx
AliaaTarek5
Chapter 2.pptx
Chapter 2.pptxChapter 2.pptx
Chapter 2.pptx
AliaaTarek5
Chapter 1 digital design.pptx
Chapter 1 digital design.pptxChapter 1 digital design.pptx
Chapter 1 digital design.pptx
AliaaTarek5
Git_tutorial.pdf
Git_tutorial.pdfGit_tutorial.pdf
Git_tutorial.pdf
AliaaTarek5

Recently uploaded (20)

Lecture -3 Cold water supply system.pptx
Lecture -3 Cold water supply system.pptxLecture -3 Cold water supply system.pptx
Lecture -3 Cold water supply system.pptx
rabiaatif2
Cloud Computing concepts and technologies
Cloud Computing concepts and technologiesCloud Computing concepts and technologies
Cloud Computing concepts and technologies
ssuser4c9444
Turbocor Product and Technology Review.pdf
Turbocor Product and Technology Review.pdfTurbocor Product and Technology Review.pdf
Turbocor Product and Technology Review.pdf
Totok Sulistiyanto
Mathematics behind machine learning INT255 INT255__Unit 3__PPT-1.pptx
Mathematics behind machine learning INT255 INT255__Unit 3__PPT-1.pptxMathematics behind machine learning INT255 INT255__Unit 3__PPT-1.pptx
Mathematics behind machine learning INT255 INT255__Unit 3__PPT-1.pptx
ppkmurthy2006
Piping-and-pipeline-calculations-manual.pdf
Piping-and-pipeline-calculations-manual.pdfPiping-and-pipeline-calculations-manual.pdf
Piping-and-pipeline-calculations-manual.pdf
OMI0721
US Patented ReGenX Generator, ReGen-X Quatum Motor EV Regenerative Accelerati...
US Patented ReGenX Generator, ReGen-X Quatum Motor EV Regenerative Accelerati...US Patented ReGenX Generator, ReGen-X Quatum Motor EV Regenerative Accelerati...
US Patented ReGenX Generator, ReGen-X Quatum Motor EV Regenerative Accelerati...
Thane Heins NOBEL PRIZE WINNING ENERGY RESEARCHER
Equipment for Gas Metal Arc Welding Process
Equipment for Gas Metal Arc Welding ProcessEquipment for Gas Metal Arc Welding Process
Equipment for Gas Metal Arc Welding Process
AhmadKamil87
Taykon-Kalite belgeleri
Taykon-Kalite belgeleriTaykon-Kalite belgeleri
Taykon-Kalite belgeleri
TAYKON
Best KNow Hydrogen Fuel Production in the World The cost in USD kwh for H2
Best KNow  Hydrogen Fuel Production in the World The cost in USD kwh for H2Best KNow  Hydrogen Fuel Production in the World The cost in USD kwh for H2
Best KNow Hydrogen Fuel Production in the World The cost in USD kwh for H2
Daniel Donatelli
GM Meeting 070225 TO 130225 for 2024.pptx
GM Meeting 070225 TO 130225 for 2024.pptxGM Meeting 070225 TO 130225 for 2024.pptx
GM Meeting 070225 TO 130225 for 2024.pptx
crdslalcomumbai
Cyber Security_ Protecting the Digital World.pptx
Cyber Security_ Protecting the Digital World.pptxCyber Security_ Protecting the Digital World.pptx
Cyber Security_ Protecting the Digital World.pptx
Harshith A S
decarbonization steel industry rev1.pptx
decarbonization steel industry rev1.pptxdecarbonization steel industry rev1.pptx
decarbonization steel industry rev1.pptx
gonzalezolabarriaped
15. Smart Cities Big Data, Civic Hackers, and the Quest for a New Utopia.pdf
15. Smart Cities Big Data, Civic Hackers, and the Quest for a New Utopia.pdf15. Smart Cities Big Data, Civic Hackers, and the Quest for a New Utopia.pdf
15. Smart Cities Big Data, Civic Hackers, and the Quest for a New Utopia.pdf
NgocThang9
Water Industry Process Automation & Control Monthly - March 2025.pdf
Water Industry Process Automation & Control Monthly - March 2025.pdfWater Industry Process Automation & Control Monthly - March 2025.pdf
Water Industry Process Automation & Control Monthly - March 2025.pdf
Water Industry Process Automation & Control
health safety and environment presentation
health safety and environment presentationhealth safety and environment presentation
health safety and environment presentation
ssuserc606c7
GREEN BULIDING PPT FOR THE REFRENACE.PPT
GREEN BULIDING PPT FOR THE REFRENACE.PPTGREEN BULIDING PPT FOR THE REFRENACE.PPT
GREEN BULIDING PPT FOR THE REFRENACE.PPT
kamalkeerthan61
Indian Soil Classification System in Geotechnical Engineering
Indian Soil Classification System in Geotechnical EngineeringIndian Soil Classification System in Geotechnical Engineering
Indian Soil Classification System in Geotechnical Engineering
Rajani Vyawahare
Engineering at Lovely Professional University (LPU).pdf
Engineering at Lovely Professional University (LPU).pdfEngineering at Lovely Professional University (LPU).pdf
Engineering at Lovely Professional University (LPU).pdf
Sona
CFOT Fiber Optics FOA CERTIFICATION.pptx
CFOT Fiber Optics FOA CERTIFICATION.pptxCFOT Fiber Optics FOA CERTIFICATION.pptx
CFOT Fiber Optics FOA CERTIFICATION.pptx
MohamedShabana37
The Golden Gate Bridge a structural marvel inspired by mother nature.pptx
The Golden Gate Bridge a structural marvel inspired by mother nature.pptxThe Golden Gate Bridge a structural marvel inspired by mother nature.pptx
The Golden Gate Bridge a structural marvel inspired by mother nature.pptx
AkankshaRawat75
Lecture -3 Cold water supply system.pptx
Lecture -3 Cold water supply system.pptxLecture -3 Cold water supply system.pptx
Lecture -3 Cold water supply system.pptx
rabiaatif2
Cloud Computing concepts and technologies
Cloud Computing concepts and technologiesCloud Computing concepts and technologies
Cloud Computing concepts and technologies
ssuser4c9444
Turbocor Product and Technology Review.pdf
Turbocor Product and Technology Review.pdfTurbocor Product and Technology Review.pdf
Turbocor Product and Technology Review.pdf
Totok Sulistiyanto
Mathematics behind machine learning INT255 INT255__Unit 3__PPT-1.pptx
Mathematics behind machine learning INT255 INT255__Unit 3__PPT-1.pptxMathematics behind machine learning INT255 INT255__Unit 3__PPT-1.pptx
Mathematics behind machine learning INT255 INT255__Unit 3__PPT-1.pptx
ppkmurthy2006
Piping-and-pipeline-calculations-manual.pdf
Piping-and-pipeline-calculations-manual.pdfPiping-and-pipeline-calculations-manual.pdf
Piping-and-pipeline-calculations-manual.pdf
OMI0721
Equipment for Gas Metal Arc Welding Process
Equipment for Gas Metal Arc Welding ProcessEquipment for Gas Metal Arc Welding Process
Equipment for Gas Metal Arc Welding Process
AhmadKamil87
Taykon-Kalite belgeleri
Taykon-Kalite belgeleriTaykon-Kalite belgeleri
Taykon-Kalite belgeleri
TAYKON
Best KNow Hydrogen Fuel Production in the World The cost in USD kwh for H2
Best KNow  Hydrogen Fuel Production in the World The cost in USD kwh for H2Best KNow  Hydrogen Fuel Production in the World The cost in USD kwh for H2
Best KNow Hydrogen Fuel Production in the World The cost in USD kwh for H2
Daniel Donatelli
GM Meeting 070225 TO 130225 for 2024.pptx
GM Meeting 070225 TO 130225 for 2024.pptxGM Meeting 070225 TO 130225 for 2024.pptx
GM Meeting 070225 TO 130225 for 2024.pptx
crdslalcomumbai
Cyber Security_ Protecting the Digital World.pptx
Cyber Security_ Protecting the Digital World.pptxCyber Security_ Protecting the Digital World.pptx
Cyber Security_ Protecting the Digital World.pptx
Harshith A S
decarbonization steel industry rev1.pptx
decarbonization steel industry rev1.pptxdecarbonization steel industry rev1.pptx
decarbonization steel industry rev1.pptx
gonzalezolabarriaped
15. Smart Cities Big Data, Civic Hackers, and the Quest for a New Utopia.pdf
15. Smart Cities Big Data, Civic Hackers, and the Quest for a New Utopia.pdf15. Smart Cities Big Data, Civic Hackers, and the Quest for a New Utopia.pdf
15. Smart Cities Big Data, Civic Hackers, and the Quest for a New Utopia.pdf
NgocThang9
health safety and environment presentation
health safety and environment presentationhealth safety and environment presentation
health safety and environment presentation
ssuserc606c7
GREEN BULIDING PPT FOR THE REFRENACE.PPT
GREEN BULIDING PPT FOR THE REFRENACE.PPTGREEN BULIDING PPT FOR THE REFRENACE.PPT
GREEN BULIDING PPT FOR THE REFRENACE.PPT
kamalkeerthan61
Indian Soil Classification System in Geotechnical Engineering
Indian Soil Classification System in Geotechnical EngineeringIndian Soil Classification System in Geotechnical Engineering
Indian Soil Classification System in Geotechnical Engineering
Rajani Vyawahare
Engineering at Lovely Professional University (LPU).pdf
Engineering at Lovely Professional University (LPU).pdfEngineering at Lovely Professional University (LPU).pdf
Engineering at Lovely Professional University (LPU).pdf
Sona
CFOT Fiber Optics FOA CERTIFICATION.pptx
CFOT Fiber Optics FOA CERTIFICATION.pptxCFOT Fiber Optics FOA CERTIFICATION.pptx
CFOT Fiber Optics FOA CERTIFICATION.pptx
MohamedShabana37
The Golden Gate Bridge a structural marvel inspired by mother nature.pptx
The Golden Gate Bridge a structural marvel inspired by mother nature.pptxThe Golden Gate Bridge a structural marvel inspired by mother nature.pptx
The Golden Gate Bridge a structural marvel inspired by mother nature.pptx
AkankshaRawat75

RUDC project.pptxl;ml;ml';m;m';m';m;'';m';m';m';

  • 1. Presented to: Prof. Ali Mahmoud RUDC PROJECT
  • 2. 01 02 05 06 03 04 07 08 Appreciation Overview Our Team Intro Authentication GUI Our Mision Functionality Overview Challenges & Troubleshooting
  • 3. Our Team Hatem Omran Mohmed Khaled Mahmoud Abdelrahim Khairy Mahjoub Mohamed Hassan Saleh Yousef
  • 4. Brief description Introducction This project is a Java Swing application for creating, reading, updating, and deleting (CRUD) contact data. It includes authentication functionality to ensure secure access.
  • 5. Our Mision Mission Statement: "Empowering efficient data management through a secure and intuitive CRUD application." 01 02 03 Purpose: To develop a robust CRUD application that enables users to efficiently manage contact data. To provide a secure platform for storing and accessing sensitive information. Key Objectives: Streamline data management processes for enhanced productivity. Ensure data security and confidentiality through authentication mechanisms. Facilitate seamless interaction with an intuitive graphical user interface. Enable efficient CRUD operations for creating, reading, updating, and deleting contact data.
  • 6. Functionality Overview Read Create Display all existing contact data. Add new contact data. Create Operation When a new contact is created, its data is serialized (converted to binary) and appended to the binary file. Read Operation The application reads the binary file, deserializes the data, and displays it to the user. Delete Remove a contact based on its ID. Delete Operation When a contact is deleted, the application removes its corresponding binary data from the file. Search Find contacts based on search terms (ID, row values). Search Operation The application searches through the binary file for contacts matching the search criteria.
  • 8. Binary File Connection Binary File Connection File Storage: Contacts are stored in a binary file (data.dat). Data Representation: Each contact is represented as a series of 1s and 0s (binary format) within the file. ID Generation Automatic ID Creation: Each contact is assigned a unique ID automatically upon creation. Sequential Generation: IDs are generated sequentially, ensuring each new contact has a unique identifier.
  • 9. Imported Packages javax.swing.* java.awt.* java.awt.event.* java.io.* java.util.ArrayList Purpose: Importing necessary packages for GUI components (Swing and AWT), event handling, file I/O, and data structures (ArrayList and List). Key Points: Provides access to pre-built UI components and event handling mechanisms. Enables file input/output operations. Facilitates the use of ArrayList and List data structures for managing contact data. java.util.List
  • 10. Authentication Purpose Username and password authentication. Specific users have access privileges. Implementation Security Measures Hardcoded usernames and passwords. Authentication check performed upon login attempt Ensure secure access to the MDBS application.a
  • 11. Graphical User Interface (GUI) Login Dialog: Input fields for username and password. OK and Cancel buttons for submission and cancellation. Implementation: Utilizes Java Swing for GUI components. Responsive and user-friendly design. Login Dialog 2022 2023
  • 12. Issue Encountered: Difficulty setting up and managing a local host server for request- response handling. Unexpected behavior when dealing with the binary file (data.dat). Challenges Faced: Local Host Server: 鐃 Configuration complexities. 鐃 Inconsistent request handling. Binary File Handling: 鐃 Unexpected errors during CRUD operations. 鐃 Difficulty in understanding and managing binary data. Troubleshooting Efforts: Local Host Server: 鐃 Experimentation with different server configurations. 鐃 Debugging server-side code for error identification. Binary File Handling: 鐃 Inspection of file read/write operations. 鐃 Review of serialization/deserialization processes. Challenges & Troubleshooting
  • 13. Testing with Postman: CRUD Operations: Utilization of Postman for testing Create, Read, Update, and Delete operations. Detection and analysis of errors and inconsistencies. Ongoing Investigation: Resolution Search: Continued research and experimentation to identify solutions. Exploration of alternative approaches for file handling and server setup.
  • 15. Thank's For Watching RUDC Thank's For giving us the chance!