Beruflich Dokumente
Kultur Dokumente
BE Semester –VIII
Prepared at
ISO 9001:2008
ISO 27001:2005
Gandhinagar
Prepared By
Sidsar Campus,
Sidsar Road, Bhavnagar-364060
CERTIFICATE
This is to certify that the project report compiled by Gajera
Jimesh G., Patel Pritesh R., Der Vipul L. students of 8th Semester B.
E. (IT) from Shantilal Shah Engineering College, have completed
their final semester project satisfactorily. To the best of our knowledge
this is an original and bonafide work done by them. They have worked
on web-based application “Job Portal”, starting from January 1st ,2010
to April 13th,2010.
The project would help in effective and systematic record keeping that is storing
and retrieving of useful data. Project will be able to give the report so that
management can make decisions on the basis of those reports.
2. SCOPE OF STUDY:-
Today Internet is the fast way of transferring Data and Information over
wide area, hence I have used internet as a way for exchanging information.
It has the features of providing all the information online (through the net)
about our site.
• The site also includes the electronic mail facility for the users who have
registered themselves.
• The site acts as a middle-ware for the Job Seeker and Job Provider.
• The site has the facility to inform the Seeker and Company about the job and
candidate.
1. BACKGROUND:-
Since its foundation, the Institute has experienced extensive growth in the spheres
of space technology and geo-informatics. The objective with which BISAG was
established is manifested in the extent of services its renders to almost all
departments of the State. Year after year the institute has been endeavoring to
increase its outreach to disseminate the use of geo-informatics up to grassroots
level. In this span of eleven years, BISAG has assumed multi-dimensional roles
and achieved several milestones to become an integral part of the development
process of the Gujarat State.
2. PROFILE:-
BISAG’s Roles
Capacity Building
Service Provider
Academic Activities
Technology
Development
SATCOM Facility
Research &
Development in Geo-
informatics Transfer of
Applications Technology
Further reinforcing its functions, BISAG has achieved ISO 9001:2008 and ISO
27001:2005 certifications for quality management and security management
services respectively. This has led to an organized and systematic development of
its services and outputs.
3. ACTIVITIES OF BISAG:-
BISAG’s activities are multi-fold and have expanded in a big way and focused on
the following:
4. UNITS OF BISAG:-
BISAG initially set up to carry out Space Technology applications, has evolved
into an Academic Institute, a Centre for Research and Technology
Innovations, a Facility Provider, a Technology Developer and a Facilitator for
transferring technology to the grass root level. BISAG is the first such State
Centre having such multifarious activities with ISO certification. BISAG has
gradually progressed over the years and has grown into several units. Each unit
focuses on specific functions and objectives to ensure efficiency in over all
activities of the institute.
SATCOM
SATCOM
ACADEMY
ACADEMY OF
OF CENTRE
CENTRE FOR
FOR
GEO-
GEO- GEO-
GEO-
INFORMATICS
INFORMATICS BISAG INFORMATICS
INFORMATICS
SCHOOL
SCHOOL OF
OF DISASTER
DISASTER
SUSTAINABLE
SUSTAINABLE MANAGEMENT
MANAGEMENT
DEVELOPMENT
DEVELOPMENT INFORMATION
INFORMATION
STUDIES
STUDIES CELL
CELL
SOFTWARE
SOFTWARE
DEVELOPMENT
DEVELOPMENT
5. INFRASTRUCTURE DEVELOPMENT:-
The growth and progress of any institute is gauged by the infrastructure it
develops and possesses. BISAG has a sound infrastructure setup that has
developed in tandem with the growth of the institute. Having started with one
building, there are now dedicated facilities for different units.
The laboratories are equipped with state-of the art technology with latest
Hardware and Software required for executing its activities. BISAG also has
a rich satellite data archive, which includes Satellite data of different spatial,
spectral and temporal resolutions.
COLLABORATORS OF BISAG
GOVERNMENT
DEPARTMENTS
PUBLIC
SECTOR
7. INSTITUTIONAL STRENGTHENING:-
BISAG has achieved institutional strengthening through:
PROJECT PROFILE
Project Title: Job Portal
Project Aim: To allow Employee to check client and Call the client
for interview.
SYSTEM REQUIREMENT
1. HARDWARE CONFIGURATION:-
Memory
Mouse : Quantum
Memory:
RAM : 64 MB
Hard Disk : 4 GB
SOFTWARE CONFIGURATION:-
SYSTEM ANALYSIS
1. EXISTING SYSTEM:-
When the requirement of this system is putted before the team they was
willing to know that how the employee of the company is working. Then the
study is done it gives the result that all the work is done manually and there is
nothing that help the employee to save the time and do the work with the system.
All the documentation is done by the employee of the company. A lot of works
have to be done before the candidates are placed in an organization.
All that the company needs to store about the job seekers must be written
on the paper. Some times it is very difficult to know about some special
highlights of the job seeker, because the information is stored on the paper and it
is not clear that due to human error or by some other means this paper is lost and
the information is now not in the hands of the company.
At the time of hiring the companies policy says that the only those
companies can hire who are registered with SEEKJOB. So it is critical task to
find out the registered employer, when the company has so many employers.
The current system have all the problems which generally in count in the
manual system such as wastage of time, wastage of money, more efforts to work
etc. if the responsible person wants the full information of the total sale of
various models of the vehicles at various center at the evening then he/she can
not get it. Because the current system work manually and it is very slow same as
if he/she wants the total production then it take time. The current system can not
give the fast response as needed. It also does not keep records of grievances of
the faults in the vehicles in various parts of the country. If he/she wants the
information regarding the total stock at various warehouses at his\her office then
using current system he\she can not get it.
He\she can not get the full information on time. It may be late and this
process is time consuming and generally the administrators receive the relevant
information next day which is the major limitation of existing system.
3. PROPOSED SYSTEM:-
2.Improve-service-level benefits
Proposed system improves the system’s performance because the current
system is based on manual processing while the proposed system is based on
computer processing.
3.Improve-information-level benefits
It provides better information in the stipulated space and time for decision-
making.
4.Time-saving-benefits
It saves lots of time and provides the same result in a far lesser period of
time.
6. BEHAVIORAL FEASIBILITY:-
• Registration module
• Job Employer section
• Job Administration section
Module 1:
Module 2:
Module 3:
sections: -
DFD1:-
DFD2:-
DFD3:-
2. BASIC COMPONENTS OF USE CASE DIAGRAM:-
Actor – Symbol
Actor1
UseCase 1
Associations are used to link actors with Use cases, and indicate that an
actor Participates in the use case in some form. Associations are depicted by a
line connecting The actor and the use case.
INSERT
DATA
UPDATE
DATA
CALL THE
INTERVIEW
ER
CALL IN THE
COMPANY
SNAPSHOTS
HOME PAGE:-
SIGNUP PAGE:-
FORGOT PASSWORD PAGE:-
FORGOT PASSWORD 1 PAGE:
PROFILE PAGE:
YESTERDAY’S FOLLOW UP PAGE:
DETAILS PAGE:
NEW DETAILS PAGE:
ADMIN FEEDBACK PAGE:
EMPLOYEE FEEDBACK PAGE:
DATABASE DESIGN:-
In our data flow diagram, we give names to data flows, processes and data stores.
Although the names are descriptive of data, they do not dive details .So following
DFD, our interest is to build some details of the contents of data flows, processes
and data store. A data dictionary is a structured repository of data about data .It is
a set of rigorous definitions of all DFD data elements and data structures .The
data dictionary for the current system has been given as under:
The implementation of the web based or LAN base network project has
some extra steps at the time of implementation. We need to configure the system
according the requirement of the software.
• Training Personnel
• Conversion Procedures
Training:-
Even well designed and technically elegant systems can succeed or fail
because of the way they are used. Therefore the quality of the training received
by the personnel involved with the stem in various ways helps or hinders, and
may event prevent, the successful implementation of an information system.
Since
MAINTENANCE
Software maintenance is the last phase in the software
Engineering process that eliminates errors in the working system
during its work span and to tune the system to any variations in
its working environment. The system requires maintenance as
there may be changes and requirements in the organizational
needs, government policies, hardware and software
environment etc. often small system deficiencies are found as a
system is brought into operation and changes are made to
remove them. System requirements may be revised as a result
of system usage or changing operational needs. Perhaps
oversight that occurred during the development process needs
to be corrected. Often the maintenance need arises to capture
additional data for storage in a database or in transaction files or
perhaps it may be necessary to add error detection features to
prevent system users from in adversely taking an unwanted
action.
Maintenance of the system after it is installed is concerned
with an additional factor in hardware. Once the system is
delivered and installed there is a brief warranty period during
which time the vendor is responsible for maintenance. This is a
typically a 90 day period after that time the purchaser has the
option of acquiring maintenance from various sources.
Maintenance source excepting vendor is also available from
companies specializing in providing the service, called third
party maintenance companies.
When the system is installed, it is generally used for long
period. The average life of system is 4-6 years, with the eldest
applications often is used for over 10 years. The need for
debugging and correcting errors or failure on an emergency
basic is comparatively low: less than 20% of the task of
correction. System and organization are in constant state of flux;
therefore the maintenance of the system also involved
adoptions for earlier version of software.
Approximately 20% of all maintenance work is performed
to accommodate changes in report, files and database. The
greatest amount of maintenance work is for user enhancement,
improved documentation and recording system components or
greater efficiency. About 60% of all maintenance is for this
purposed.
Following table summarized the broad classes of
maintenance found in development of sekkjob.com
CATEGORY ACTIVITY
Corrective Emergency fixes, routine debugging.
Adaptive Accommodation of changes to data and to hardware
and software, Changes in the external environment.
Pre effective User enhancement, improved documentation
recording of computational efficiency, user
recommendations for new capabilities.
Preventive Routine service of cleaning and adjusting the
equipment to prevent breakdowns, future
maintainability reliability enhancement, recovering
design information to improve the overall quality.
Maintainable Design
The points to reduce the needs for maintenance are:
Who gave a lot of good programming skills and so many company related skills
that will help me in the future?
Since, every system has some limitations so our proposed system is also not
untouchable in this regard. Although it includes every kind of features but it can’t
be used in a huge organization where number of networks are very large, because
the data base used in this system is an average one. Also it doesn’t have different
kind of access feature for different users.
SOFTWARE SCOPE
• Reusability:
• Extensibility:
This software is extended in ways that its original developers may not
expect. The following principles enhance extensibility like Hide data structure,
avoid traversing multiple links or methods, Avoid case statements on object type
and distinguish public and private operations.
• Robustness:
Its method is robust if it does not fail even if it receives improper
parameters. There are some facilities like Protect against errors, Optimize after
the program runs, validating arguments and Avoid predefined limits.
• Understandability:
A method is understandable if someone other than the creator of
the method can understand the code (as well as the creator after a time lapse). We
use the method, which small and coherent helps to accomplish this.
• Cost-effectiveness:
Its cost is under the budget and make within given time
period. It is desirable to aim for a system with a minimum cost subject to the
condition that it must satisfy all the requirements.
Scope of this document is to put down the requirements, clearly identifying the
information needed by the user, the source of the information and outputs
expected from the system.
BIBLIOGRAPHY
SITES REFERRED:
1. www.codeproject.com
2. www.c#dotnet.com
3. www.c#corner.com
4. www.codeproject.com
5. www.msdn.microsoft.com
6. www.csharp.com
7. www.gotdotnet.com
8. www.aspnextgen.com
9. www.andymcm.com/dotnetfaq.htm
10. www.pacestar.com
11. www.123aspx.com
12. www.411asp.net
13. www.dotnetwire.com
14. www.ibuyspy.com
BOOKS:
1) Software Engineering-R.P.Ppress.
2) Information System Analysis & Design-Penn
APPENDIX-B
MICROSOFT.NET FRAMEWORK
objectives:
The .NET Framework has two main components: the common language
runtime and the .NET Framework class library. The common language runtime
is the foundation of the .NET Framework. You can think of the runtime as an
agent that manages code at execution time, providing core services such as
memory management, thread management, and remoting, while also enforcing
strict type safety and other forms of code accuracy that ensure security and
robustness. In fact, the concept of code management is a fundamental principle of
the runtime. Code that targets the runtime is known as managed code, while code
that does not target the runtime is known as unmanaged code. The class library,
the other main component of the .NET Framework, is a comprehensive, object-
oriented collection of reusable types that you can use to develop applications
ranging from traditional command-line or graphical user interface (GUI)
applications to applications based on the latest innovations provided by
ASP.NET, such as Web Forms and XML Web services.
The .NET Framework can be hosted by unmanaged components that load
the common language runtime into their processes and initiate the execution of
managed code, thereby creating a software environment that can exploit both
managed and unmanaged features. The .NET Framework not only provides
several runtime hosts, but also supports the development of third-party runtime
hosts.
The runtime enforces code access security. For example, users can trust
that an executable embedded in a Web page can play an animation on screen or
sing a song, but cannot access their personal data, file system, or network. The
security features of the runtime thus enable legitimate Internet-deployed software
to be exceptionally feature rich.
Generate managed code that conforms to the CTS. This means that
managed code can consume other managed types and instances, while strictly
enforcing type fidelity and type safety.
While the runtime is designed for the software of the future, it also
supports software of today and yesterday. Interoperability between managed and
unmanaged code enables developers to continue to use necessary COM
components and DLLs.
A feature called just-in time (JIT) compiling enables all managed code to
run in the native machine language of the system on which it is executing.
Meanwhile, the memory manager removes the possibilities of fragmented
memory and increases memory locality-of-reference to further increase
performance.
• Console applications.
• Windows GUI applications (Windows Forms).
• ASP.NET applications.
• XML Web services.
• Windows services.