Sie sind auf Seite 1von 65

Page 1

Executive Summary



The main objective of Job Consultancy is to make easy for job seekers for
searching jobs and recruiting for companies. It acts as a mediator between the jobseekers
and companies. Companies ask required number of candidates and consultancy for wad
the list of candidates to the company. It also sends a list of companies to jobseekers to
which are recruiting.
For a new user or general user there are various modules helping him for entering
into consultancy. For a new user he has to enter their details according to the registration
form. He has to select is own registration number through which he has to login.
There are several modules that work once when the user is logged in with his registration
number and password. The user can choose any of the components displayed and can
avail the services according to his need.
Username and password is given for each user so that the system
recognizes them as authorised user. Multiple logins with same identity is not allowed.

The major prospect of this project is to make .net enabled applications which is
administrative based to provide the complete information of the Job consultancys that
the job seeker can be made easy in searching jobs and recruiting for companies. Net
enabled consultancy has changed the world in the age of information technology
therefore in the arena of post globalization.


Every citizen of the world should have access to the authorities. Using this
application, individual users can then place their own requirements and hence can
retrieve the information needed sitting at their place. Multiple logins with same identity is
not allowed.

In the past Jobseekers had to search for the jobs in newspaper articles and then had
to visit to the company office and then used to get them registered or visit to the
Page 2

consultancy office for any of the jobs available with them from any company. The
companies used to give the advertisements by any of the media or they used to post
the jobs with the consultancy office. Now with this system none of the user need to
actually visit to the consultancy for the Jobs.

The project entitled Online Job Consultancy can be easily accessed through web
from any remote location thus reducing the extra efforts required for the recruitment
process.

In the current situation of recession in every sector of the economy, there is a need of
such a reliable system which can reduce the efforts of the recruitment process. Some
of the elements of the society are also taking benefits of the situation and trying to
make fool people by giving information about the fake companies and by conducting
interviews for the fake names, so there is a requirement for a system which is
reliable in this context.














Page 3



Problem Definition

MAJOR PROSPECT
Proposed System:
The major prospect of this project is to make ASP.NET enabled applications
which is administrative based to make searching jobs easier for job seekers and
also recruiting for companies. The system contains all services for Jobseekers and
Employers, by which they can get best out of it with less time and efforts.

Benefits Of Proposed System:
.NET enabled consultancy has changed the world in the age of information
technology therefore in the arena of post globalization.
Every citizen of the world should have access to the authorities. Using this
application, individual users can then place their own requirements and hence can
retrieve the information needed sitting at their place. Multiple logins with same
identity is not allowed.
Page 4

FEATURES
Online Job Consultancy is intentionally built with a minimal feature set.
Registered company can post any number of the jobs with the system.
Registered jobseeker can apply to any number of the jobs with the system.
Authentication mechanisms are provided to ensure that data is kept secure from
unauthorized access. Objects can be made private or public, and rights can be
granted to specific users.
Uses standards-based REST and SOAP interfaces designed to work with any
Internet-development toolkit.
Built to be flexible so that protocol or functional layers can easily be added.
Default download protocol is HTTP. A BitTorrent protocol interface is
provided to lower costs for high-scale distribution. Additional interfaces will be
added in the future.
Reliability backed with the Online Job Consultancy service Level Agreement.
Page 5

PRODUCT FUNCTION
First of all, users, both the company and jobseeker need to get registered to get all
the benefits of the system and its free of cost and easy. As user has to request for
the registration form and has to fill the form and submit it to the system and then
all his details will get stored in the system, database and he is given a unique
U_Id. After registration process users are authorized for all the facilities of their
respective domain.

The main and initial function of the system is to allow companies to post jobs and
let the registered user search and apply to the jobs available with the system. It
manages proper authorization, so as none of the user can access other users
domain. Thus the system proves to be highly reliable and secure.

It provides an effective way to login into the system and to avail the services of
the system. This system is perfectly secure because of a secure database that is
used in the backhand of the system. This database can only be accessed by the
administrator of the website.




Page 6

OBJECTIVE


The objective of this software is to completely automate the following processes:
Online Job Consultancy system is based on the idea of reducing the time and
efforts required for the recruitment process. As the company which wants to
recruit people has to search for the people with the required professional skills
through various advertisements and articles, with this system the company can
post the job with all its descriptions about the requirements from any remote
location and need not to worry about getting the right people. As this system
keeps record of all the registered Jobseekers, so what this system does it matches
the qualification of the candidates and the requirements of the job from various
companies and then sends the details to both the users.
Jobseekers are also benefited by the system as after registration they can search
for jobs according to their qualification, location and Functional area from any
remote location. The system will then forward all the details to both the parties,
recruiting company and applying user.
As the system is available on the web so none of the user needs to visit the
consultancy office for accessing the system, it can be easily accessed from any
remote location.
Page 7

Provide an innovative, cost efficient and effective recruitment system.
Increase the quality and quantity of applicants applying for vacancies.
Offer immediate cost savings on recruitment with substantial long term saving
over a prolong period.
Dramatically reduce paper work and administrative work.
Streamline the recruitment process and reduce the corporates overall
recruitment cycle.

Since the system has been generated by using Object Oriented programming
there are chances of reusability of code in other environment even on
different platforms. Also its present features can be enhanced by some
simple modification in the codes so as to reuse it in the changing scenario.
The enhancement can be done when ever it require in the system without
disturbing the ongoing working on the system. As the user tells his/her new
requirements in the system, those changes can be done in the system by
making some changes in the web pages of the site of the system.
Before making any changes in the system, we just need to analyze the cost
and benefits. If we find it affordable and beneficial, we may upgrade our
system with those enhancements.







Page 8

TOOLS/PLATFORM USED:
SYSTEM IMPLEMENTATION
System will be installed on the Internet server with its backhand i.e. database.
That server will be the only system that will be responsible to save the
records of each and every individual user. This system will manage the
dataflow through the database about the companies and the jobseekers
registered with the system. The companies will post jobs and the jobseekers
will apply to it, Admin will actually manage the dataflow to both the parties
by accessing the database so as to make the system free from unauthorized
access and thus giving high reliability to the users of the system.
Technologies to be used:
Server-side requirements:
IIS/.NET Platform: For providing the basic framework of the server
component in this model.
Client-side requirements:
WEB Browser & internet /intranet connectivity: The client or the end-
user only requires Internet Browser to be installed on their machine with a
dedicated connection.
Page 9

DETAILS OF HARDWARE USED
These are the minimal requirements of the hardware that are needed in the
system to deploy the Online Job Consultancy..


Processor:

RAM:

Hard Disk Space:
Pentium IV (1.8 GHz)

512 MB

1.5 GB
Page 10

DETAILS OF SOFTWARE USED

Operating System:
Web browser:

Windows NT/200/XP
Internet Explorer 7.0, Mozilla Firefox, etc.
Front End:

Designing language:

Graphics design tools:




ASP.NET 3.5, ADO.NET, C#

Macromedia Flash,
Adobe Photoshop 7.0
Back End:

DBMS


Other Databases



Editor


Micro Soft SQL Server 2005 (Enterprise
Edition)

Micro Soft Word,
Micro Soft Access,
Micro Soft Excel

Notepad,
WordPad





Page 11

Dependencies

I It t d do oe es sn n t t m ma at tt te er r h ho ow w e ef ff fi ic ci ie en nt tl ly y t th he e a ap pp pl li ic ca at ti io on n w wo or rk ks s, , i if f t th he e b ba an nd dw wi id dt th h
i is s n no ot t s su uf ff fi ic ci ie en nt t t th he e t tr ra an ns sa ac ct ti io on n w wi il ll l t ta ak ke e m mo or re e t ti im me e t th he en n e ex xp pe ec ct te ed d. .
. .N Ne et t F Fr ra am me ew wo or rk k f fo or r e ex xe ec cu ut ti io on n e en nv vi ir ro on nm me en nt t a an nd d A Ad do o. .N Ne et t P Pr ro ov vi id de es s f fo or r
d da at ta ab ba as se e c co on nn ne ec ct ti iv vi it ty y. .
I II IS S s se er rv ve er r i is s r re eq qu ui ir re ed d f fo or r t th he e a ap pp pl li ic ca at ti io on n. .
A Al lt th ho ou ug gh h t th hi is s s so of ft tw wa ar re e i is s a ar rc ch hi it te ec ct tu ur ra al ll ly y i in nd de ep pe en nd de en nt t b bu ut t f fo ol ll lo ow wi in ng g
h ha ar rd dw wa ar re e r re es so ou ur rc ce es s a ar re e r re eq qu ui ir re ed d. . F Fo or r i i. .e e. . a an ny y I IB BM M c co om mp pa at ti ib bl le e P PC C o or r a an ny y
o ot th he er r w wo or rk ks st ta at ti io on n w wi it th h m mo ou us se e s su up pp po or rt t a an nd d r re el le ev va an nt t s so of ft tw wa ar re e































Page 12

LIST OF TABLES















































Serial No. Table Name
1 LOGIN
2 GENERAL
3 EDUCATIONAL
4 EXPERIENCE
5 COMPANY INFORMATION
6 ADD EMPLOYEE
7 COMPANY LOGIN
8 COMPANY REQUIREMENTS
9 FILTER
10 COMPANY
11 EMPLOYEE
12 COMPANY FILTER
13 CONSULTANCY LOGIN
14 SELECTED CANDIDATES
Page 13


List of Figures



Figure1


Context Diagram


Figure2


Registration

Figure3

Data Dictionary


Figure 4


Job seeker data flow


Figure 5


Consultancy data flow diagram


Figure 6


Company data flow diagram



























Page 14

Introduction/Problem Definition

1 1. .1 1 U Us se er r R Re eq qu ui ir re em me en nt ts s


1 1. .1 1. .1 1 I In np pu ut t r re eq qu ui ir re em me en nt ts s


A legal citizen of India can Login on this site by entering his/her name as the username
and his/her password


1 1. .1 1. .2 2 O Ou ut tp pu ut t r re eq qu ui ir re em me en nt ts s

Person should have a Email id For Login.
There must be a net connection and browser to view the web pages of respective
site.

1 1. .1 1. .3 3 F Fu un nc ct ti io on na al l R Re eq qu ui ir re em me en nt ts s

Person should have a Email ID in any domain server.
There must be a net connection and browser to view the web pages of respective site


1 1. .1 1. .4 4 E Ex xt te er rn na al l I In nt te er rf fa ac ce e R Re eq qu ui ir re em me en nt ts s

The user interface of software is responsible for all the interactions with the user. Almost
every software has a user interface. Many users often judge a software product based on
its user interface. An interface that is difficult to use leads to higher level of user errors
and ultimately leads to user dissatisfaction. Users become particularly irritated when a
system behaves in unexpected ways i.e. issued commands do not carry out actions
according to the intuitive expectations of the user. Therefore, sufficient care and attention
should be paid to the design of the user interface of any software product. Development
of a good user interface usually takes significant portion of the total system development
effort.
This software is developed keeping in mind the basic characteristics of a good user
interface. Some features of this software can be stated as:-




Page 15

It is very easy to learn. It does not require its users to memorize
commands. Neither the users are asked to remember information from one
screen to another while performing various tasks using the interface.

The time and user effort necessary to initiate and execute different
commands is minimal.

It is very attractive to use. It catches user attention and fancy. It is a
Graphical-based user interface.

The users can seek guidance and online help when they are unaware of
some features of the software.


1.2 SCOPE OF THE FURTHER ENHANCMENT
The system maintenance is the inevitable process. System requirements always
change and so a system must evolve if it is to remain useful.
The object-oriented systems are easier to maintain, as the objects are independent.
They may be understood and modified as stand-alone entities. Changing the
implementation of an object or adding other services should not affect other
system objects. This improves the understandability of the design.









Page 16

1.2.4 Data Required & Data Collection Method
Data is completely based on the SRS given by the client,requirements do come during all
the phases of the process.
Methods of Data collection:
1. Client Interaction over audio conference calls,
2. VPN connection established so that the client can take a look on the
developing software.
3. Via e-mails.
4. After the demonstration of the partial build each time, client used to
give the feed back, so that necessary changes/ modifications could be
done.
5. Looked for different sites working in this domain.




















Page 17

Systems Requirement Analysis

This project is developed for job aspirants who are in search of suitable job. This
project will be helpful for fresher as well as experienced professionals. It keeps track of
strong reputation for a systematic and hands-on approach to Human Resources
Consulting. It also undertakes to manage the needs for organizations particularly
small/medium and start-up companies on an outstanding basis.
Job consultancy acts like a mediator between job seekers and company.

This project contains seven modules.

1. Job seekers Registration Form
2. Employee Registration Form
3. Company placing job requirements on the site
4. Consultancy checking with their database
5. Consultancy after conducting first round of interview, short listed candidate
details will be send to company.
6. Company after conducting rounds of interviews, selected candidates list will be
send to consultancy.
7. Job seekers deletion process.



















Page 18

MODULE DESCRIPTIOIN

1.Job seekers Registration Form

In this module we describe the job seekers details. Consultancy will place registration
form on the site. In this job seekers interact with the consultancy. Job seekers will take
registration form from the site and fill those forms and send to the consultancy.
Consultancy will store these registration forms in their database.

2.Employee Registration Form:

In this module we describe the company details. Employees are interact with the
consultancy. Consultancy will provide registration form to the company. Company will
fill those form with their details and send to the consultancy and these details will be
stored in consultancy database.

3.Company placing job requirements on the site:

In this module company will interact with consultancy. Consultancy will place the form
on the site. This form is taken by the company. Company will fill those form according to
their requirements and this form will be sent back to the consultancy.
Consultancy will store it in their database.

4.Consultancy checking with their database:

In this module consultancy will check both the job seekers form and company
Requirement form. If they match the job seekers names will be short listed. This short
listed candidates details will be stored in consultancy database. Consultancy will inform
to the short listed candidates.
5.Consultancy after conducting first round of interview, short listed candidates details
will be send to the company:

In this module consultancy will conduct the interview to the job seekers. Based on
Page 19

their interview performance consultancy will short list the job seekers and those short
listed job seekers names will be send to the company and also stored in the consultancy
database.

6.Company after conducting rounds of interviews, selected candidates details will send
to the consultancy:

In this module company will conduct the interview to the short listed job seekers. If they
select in the interview that selected job seekers details will be send to the
Consultancy and consultancy will store this information in their database.

7. Job seekers deletion process:

In this module consultancy delete the job seekers details who are not interact with
consultancy in particular period.













Page 20

Systems Design
Physical Design
Dfds
I N T R O D U C T I O N

The DFD also known as the Bubble Chart is a simple graphical formalism that
can be used to represent a system in terms of the input data to the system. Various
processing carried out on these data, and the output data generated by the system. The
main reason why the DFD technique is so popular is probably because of the fact that
DFD is a very simple formalism-it is simple to understand and use. A DFD uses a very
limited number of primitive symbols to represent the functions performed by a system
and the data flow among these functions. Starting with a set of high-level functions that a
system performs, a DFD model hierarchically represents various sub functions. The five
different types of primitive symbols used for constructing DFDs are:

SYMBOLS USED:

PROCESS:






A function is represented using a circle. This symbol is called a process or a bubble.
Bubbles are annotated with the names of the corresponding functions.

EXTERNAL ENTITY:





An external entity such as a librarian, a library member, etc. is represented by a
rectangle. The external entities are essentially those physical entities external to the
Page 21

software system that interact with the system by inputting data to the system or by
consuming the data produced by the system. In addition to the human users, the external
entity symbols can be used to represent external hardware and software such as
application software.

DATA FLOW:


A directed arc or an arrow is used as a data flow symbol. A data flow symbol
represents the data flow occurring between two processes, or between an external entity
and a process, in the direction of the data flow arrow. Data flow symbols are usually
annotated with the corresponding data names.

DATA STORE:



A data store represents a logical file. It is represented using two parallel lines. A logical
file can represent either a data store symbol, which can represent either a data structure,
or a physical file on disk. Each data store is connected to a process by means of a data
flow symbol. The direction of the data flow arrow shows whether data is being read from
or written into a data store. A arrow flowing in or out of a data store implicitly represents
the entire data of the data store and hence connecting to a data store need not be
annotated with the name of the corresponding data items.


OUTPUT SYMBOL:



The output symbol is used when a hard copy is produced and the user of the copies
cannot be clearly specified or there are several users of the output
Page 22





VALIDATES









APPOIN
TS
REGIS INFO





SETS

UNDERTAKES

DECL
ARES










DATA






REGISTR
ATION

TEST

RESULT
CANDIDATE
ADMINISTRATO
R
OPERATOR
COMPANY
Page 23

figure 1



LIST







GETS PROVIDES











ISSUES
ARE STORED






ED




SELECTED
CANDIDATES




CANDIDAT
ES -LIST

SPECIFICATIO
NS

OFFER
LETTERS


COMPANY
Page 24

Figure 2
























Figure 3: Data Dictionary






















Taking both the forms
Request for registration form
Search and apply jobs
Post resume
Online Job
Consultanc
y
Services

Send registration form
Get registration form
Get confirmation mail
Co
mpa
nies



Request for emp reg form
Receiving emp reg form
Submit the req form
Sending shortlist details
Sending selected candidate details
details
Job
Cons-
ultancy
Placing jobseekers & emp reg form


Job
seeker
Post jobs
Submit the shortlist details
Page 25

Figure4: JobSeeker Data Flow


Job seeker

1
V Va al li id da at ti io o
n np pr ro oc ce es ss s
2
Validating
constraints



3
Checking
status

User table db
Uname/pswd
Login

Forward
resume
Db user
table
Db constraint
Page 26

Db Company
consultancy
1
Validati
onproces
s


2
Checking
Resumes



Login,usr,pwd
filteration
Db companies
Db consultancy

3
Short
listing

4
Candidates
details sent to
company

Figure 5:Consultancy Data Flow Diagram
Page 27

Login,uname,pwd
Company

1
Validatio
n
Process
2
Company
placing jobs

Db consultancy

Db company table
3
Short listed
candidates
Db Company
4
selected
candidates details
Db Consultancy
Figure 6:Company Data Flow
Page 28


Introduction

2.1 Description of the system


2.2 Indianfresher.com SPECIFICATION:
The system specification is the final work produced by the system and
requirements engineer. It serves as the foundation for hardware engineering,
software engineering, database engineering and human engineering.

Once requirements have been gathered explore each requirements in
relationship to others, examine requirements for consistency, omissions and
ambiguity.


2.21 Hardware Specification

It is recommended that the minimum configuration for clients is as appended
below:-
Suggested Configuration of Windows clients:-

Microprocessor : Pentium-2 class processor, 450 megahertz MHz)
Ram : 128 MB of RAM
Hard Disk : 2.5 gigabytes (GB) on installation drive, which
Includes 500 MB on system drive.

CD ROM Drive : 52 X CD ROM Drive

2.22 Software Specifications

Operating System : Windows 2000XP/Windows 2000 NT
RDBMS : Sql Server 2000
Front End : Microsoft Visual Studio.NET






Page 29

2.3 DEPENDENCIES

I It t d do oe es sn n t t m ma at tt te er r h ho ow w e ef ff fi ic ci ie en nt tl ly y t th he e a ap pp pl li ic ca at ti io on n w wo or rk ks s, , i if f t th he e
b ba an nd dw wi id dt th h i is s n no ot t s su uf ff fi ic ci ie en nt t t th he e t tr ra an ns sa ac ct ti io on n w wi il ll l t ta ak ke e m mo or re e t ti im me e t th he en n
e ex xp pe ec ct te ed d. .
. .N Ne et t F Fr ra am me ew wo or rk k f fo or r e ex xe ec cu ut ti io on n e en nv vi ir ro on nm me en nt t a an nd d A Ad do o. .N Ne et t P Pr ro ov vi id de es s
f fo or r d da at ta ab ba as se e c co on nn ne ec ct ti iv vi it ty y. .
I II IS S s se er rv ve er r i is s r re eq qu ui ir re ed d f fo or r t th he e a ap pp pl li ic ca at ti io on n. .
A Al lt th ho ou ug gh h t th hi is s s so of ft tw wa ar re e i is s a ar rc ch hi it te ec ct tu ur ra al ll ly y i in nd de ep pe en nd de en nt t b bu ut t f fo ol ll lo ow wi in ng g
h ha ar rd dw wa ar re e r re es so ou ur rc ce es s a ar re e r re eq qu ui ir re ed d. . F Fo or r i i. .e e. . a an ny y I IB BM M c co om mp pa at ti ib bl le e P PC C
o or r a an ny y o ot th he er r w wo or rk ks st ta at ti io on n w wi it th h m mo ou us se e s su up pp po or rt t a an nd d r re el le ev va an nt t
s so of ft tw wa ar re e


3 3. .U Us se er r R Re eq qu ui ir re em me en nt ts s


3 3. .1 1 I In np pu ut t r re eq qu ui ir re em me en nt ts s


A legal citizen of India can Login on this site by entering his/her name as the
username and his/her password


3 3. .2 2 O Ou ut tp pu ut t r re eq qu ui ir re em me en nt ts s

Person should have a Email id For Login.
There must be a net connection and browser to view the web pages of respective
site.

3 3. .3 3 F Fu un nc ct ti io on na al l R Re eq qu ui ir re em me en nt ts s

Person should have a Email ID in any domain server.
There must be a net connection and browser to view the web pages of respective site


3 3. .4 4 E Ex xt te er rn na al l I In nt te er rf fa ac ce e R Re eq qu ui ir re em me en nt ts s

The user interface of software is responsible for all the interactions with the user.
Almost every software has a user interface. Many users often judge a software
product based on its user interface. An interface that is difficult to use leads to
higher level of user errors and ultimately leads to user dissatisfaction. Users
become particularly irritated when a system behaves in unexpected ways i.e.
issued commands do not carry out actions according to the intuitive expectations
of the user. Therefore, sufficient care and attention should be paid to the design
Page 30

of the user interface of any software product. Development of a good user
interface usually takes significant portion of the total system development effort.
This software is developed keeping in mind the basic characteristics of a
good user interface. Some features of this software can be stated as:-

It is very easy to learn. It does not require its users to memorize
commands. Neither the users are asked to remember information
from one screen to another while performing various tasks using
the interface.

The time and user effort necessary to initiate and execute different
commands is minimal.

It is very attractive to use. It catches user attention and fancy. It is a
Graphical-based user interface.

The users can seek guidance and online help when they are
unaware of some features of the software.

4. Establish the Need of the New System:


NEED OF THE SOFTWARE:
This software is developed keeping in mind the above-mentioned problems. The
needs and requirements of the end users are also kept in mind while designing
this software. All the information can be easily accessed and shared among the
people.

Thus, indianfresher.com is developed in order to facilitate it users to establish
network between one to many persons..








Page 31

4.2 Security

The indianfresher.com provides two levels of security. The 1
st
level of security,
which is provided by ASP.NET named as FormBasedSecurity checks for
authentication and authorization and prevent to enter anonymous users. The 2nd
level of security provided by the database which is being used.

4.31 FRONT END SECURITY

This security level is developed or designed by the s/w developer or designer.
S/he provides her/his s/w the security for the system, by considering many
factors regarding to the particular s/w.
In this software following are used to provide security.


LOGIN CHECKING
There are two logins are provided in this software one for
user and another for admin. In order to avail the services of user have to provide
a valid id and password and only after entering correct id and password user will
get entry otherwise they will be blocked from accessing any services of this site.
Similarly a login check is provided for admin that check credentials for admin
which can do any admin job. In this way, security has been provided for both
user section and admin section. There is also provision to change the password
in case password is known by other. Password recover section provides users to
recover their password whenever they have forgotten their password.

4.32 BACK END SECURITY
In this particular software our back end used is Sql-Server. So all the inbuilt
security aspects provided by the Sql-Server database is used as it is. It will
provide the strong feature of security so that it will be difficult to change, modify
any personal or university data. Information is vital to success, but when
damaged or in the wrong hands, it can threaten success. Sql-Server provides
extensive security features to safe guard your information from both unauthorized
viewing and intentional or inadvertent damage. This security is provided by
granting or revoking privileges on a person- by- person and privilege-by-privilege
basis.


6.1 Methodology


Page 32

7.1 Data Required & Data Collection Method
Data is completely based on the SRS given by the client,requirements do come during all
the phases of the process.
Methods of Data collection:
6. Client Interaction over audio conference calls,
7. VPN connection established so that the client can take a look on the
developing software.
8. Via e-mails.
9. After the demonstration of the partial build each time, client used to
give the feed back, so that necessary changes/ modifications could be
done.
10. Looked for different sites working in this domain.
11. The client gathered some dummy data from various resorts in the US.













Page 33

SNAPSHOTS
Home Page


Page 34

JobSeeker Registration1


Page 35

JobSeeker Registration2


Page 36

JobSeeker Registration3


Page 37

Welcome page






















Page 38

Search Jobs















Page 39


Change Password




Page 40

Forgot Password



Page 41


Employee Login



















Page 42

Employee Registration





















Page 43

Site Map




Page 44

About Us

Page 45

Tables

DATA DICTIONARY

TABLE NAME: LOGIN

Name Type
----------------------------------------- -------- ----------------------------
REGNO VARCHAR2(20)
PWD VARCHAR2(10)
DOR DATE
DLA DATE
STATUS VARCHAR2(10)

When ever a new user registers with the Consultancy Register Number
and password are stored in login table

TABLE: GENERAL

Name Type
----------------------------------------- -------- ----------------------------
REGNO VARCHAR2(20)
NAME VARCHAR2(10)
FNAME VARCHAR2(10)
DOB DATE
AGE NUMBER(10)
HNO NUMBER(20)
STREET VARCHAR2(20)
CITY VARCHAR2(20)
STATE VARCHAR2(20)
COUNTRY VARCHAR2(20)
PIN NUMBER(10)
GENDER VARCHAR2(10)
QUAL VARCHAR2(20)
BRANCH VARCHAR2(10)
YOP NUMBER(20)
PERCENTAGE NUMBER(20)
EXP VARCHAR2(20)
EXPY NUMBER(10)
PHONE NUMBER(20)
EMAIL VARCHAR2(20)
The personal details of the candidates are stored genral table.
Page 46

TABLE NAME: EDUCATIONAL

SSC DataBase


Name Type
----------------------------------------- -------- ---------------------------
REGNO VARCHAR2(20)
SNAME VARCHAR2(20)
PER NUMBER(20)
YOP NUMBER(10)

The ssc details of the candidate will be stored in Educational table
Board Of Intermediate DataBase

Name Type
----------------------------------------- -------- ---------------------------
REGNO VARCHAR2(20)
INAME VARCHAR2(20)
BRANCH VARCHAR2(20)
IPER NUMBER(10)
IYOP NUMBER(20)

The Intermediate details of the candidate will be stored in Educational
table
Under Graduation DataBase

Name Type
----------------------------------------- -------- ---------------------------
REGNO VARCHAR2(20)
UNAME VARCHAR2(20)
COURSE VARCHAR2(20)
UBRANCH VARCHAR2(20)
UPER NUMBER(20)
UYOP NUMBER(20)

The Under Graduation details of the candidate will be stored in
Educational table



Page 47

Post Graduate DataBase

Name Type
----------------------------------------- -------- ---------------------------
-
REGNO VARCHAR2(20)
PNAME VARCHAR2(20)
PCOURSE VARCHAR2(20)
PBRANCH VARCHAR2(20)
PPER NUMBER(20)
PYOP NUMBER(20)

The Post Graduation details of the candidate will be stored in
Educational table
TABLE NAME: EXPERIANCE

Name Type
----------------------------------------- -------- ---------------------------
-
CNAME VARCHAR2(20)
DESG VARCHAR2(20)
JDATE DATE
EDATE DATE
TOTE NUMBER(20)
KSKILL VARCHAR2(20)
REGNO NUMBER(20)
The Experiance details of the candidate will be stored in Experiance
table









Page 48

TABLE NAME: COMPANY INFORMATION


Name Type
----------------------------------------- -------- ---------------------------
REGNO VARCHAR2(7)
CNAME VARCHAR2(20)
PADD VARCHAR2(20)
STRADD VARCHAR2(20)
LOCATION VARCHAR2(20)
CITY VARCHAR2(20)
COUNTRY VARCHAR2(20)
PINNO NUMBER(20)
PHONE NUMBER(20)
EMAIL VARCHAR2(20)
GRADE VARCHAR2(10)
STATE VARCHAR2(20)
CCODE NUMBER(10)

The Company information details of the candidate will be stored in
Company Information table

TABLE NAME: COMPANY LOGIN

Name Type
----------------------------------------- -------- ---------------------------
-
REGNO VARCHAR2(7)
PWD VARCHAR2(10)

When ever a new Company registers with the Consultancy Register
Number and password are stored in Company login table









Page 49

TABLE NAME: ADD EMPLOYEE


Name Type
----------------------------------------- -------- ---------------------------
-
REGNO VARCHAR2(10)
ENAME VARCHAR2(20)
DESG VARCHAR2(20)
DEPT VARCHAR2(20)
PHONE NUMBER(20)
EMAIL VARCHAR2(20)
ECODE VARCHAR2(10)
PWD VARCHAR2(10)


The Employee details of the Company will be stored in this table

TABLE NAME: COMPANY REQUIREMENTS

Name Type
----------------------------------------- -------- ---------------------------
COMPNAME VARCHAR2(20)
JCODE VARCHAR2(20)
QUAL VARCHAR2(20)
CEXP VARCHAR2(20)
CEXPY NUMBER(20)
SALARY NUMBER(20)
IDATE VARCHAR2(20)
SKILL VARCHAR2(20)
ECODE VARCHAR2(10)
Company Requirements will be stored in Company Requirements
table










Page 50

TABLE NAME: COMPANY

Name Type
----------------------------------------- -------- ---------------------------
-
CNAME VARCHAR2(20)
LOC VARCHAR2(20)
CITY VARCHAR2(20)
STATE VARCHAR2(20)
COUNTRY VARCHAR2(20)
PHONE NUMBER(10)
EMAIL VARCHAR2(20)
CGRADE VARCHAR2(20)


Company Details will be stored in this table
TABLE NAME: EMPLOYEE


Name Type
----------------------------------------- -------- ---------------------------
-
ENO NUMBER(10)
ENAME VARCHAR2(20)
DES VARCHAR2(20)
DEP VARCHAR2(20)
PHONE NUMBER(10)
EMAIL VARCHAR2(20)


Employee Details will be stored in this table












Page 51

TABLE NAME: FILTER

Name Type
----------------------------------------- -------- ---------------------------
REGNO VARCHAR2(20)
NAME VARCHAR2(20)
QUA VARCHAR2(20)
EXP VARCHAR2(20)
SKILL VARCHAR2(20)

Filtered Candidates Details will be stored in Filter table

TABLE NAME: COMPANY FILTER

Name Type
----------------------------------------- -------- ---------------------------
CCODE VARCHAR2(20)
CNAME VARCHAR2(20)
SADD VARCHAR2(20)
LOC VARCHAR2(20)
CITY VARCHAR2(20)
STATE VARCHAR2(20)
COUNTRY VARCHAR2(20)
PINNO NUMBER(20)
EMAIL VARCHAR2(20)
CGRADE VARCHAR2(20)

List of filtered Candidates details by Company will be stored in this
table
TABLE NAME: CONSULTANCY LOGIN

Name Type
----------------------------------------- -------- ---------------------------
REGNO VARCHAR2(20)
PASSWORD VARCHAR2(20)

Consultancy Register Number and password are stored in login table





Page 52

TABLE NAME: SELECTED CANDIDATES


Name Type
----------------------------------------- -------- ---------------------------
-
REGNO VARCHAR2(20)
COMNAME VARCHAR2(20)
JOBTITLE VARCHAR2(20)
DESG VARCHAR2(20)
SALARY NUMBER(20)
REQ DATE



Selected Candidates Details will be stored in this table


























Page 53

Systems Development


language or package used

INTRODUCTION TO ASP.NET

ASP.NET offers a novel programming model and infrastructure that facilitates a powerful
new class of applications. ASP.NET is a compiled. NET-based environment, so one can
author applications in any .NET compatible language, including Visual Basic, C# and
Jscript.NET. Developers can effortlessly access the advantage of these technologies,
which consist of a managed Common Language Runtime environment, type safety,
inheritance, and so on. With the aid of Microsoft Visual Studio.NET Web development
become easier.
Web Forms permits us to build powerful forms-based Web pages. When building these
pages, we can use Web Forms controls to create common UI elements and program them
for common tasks. These controls permit us to rapidly build up a WebForm.
Web services enable the exchange of data in client-server or server-server scenarios,
using standards like HTTP, SOAP (Simple Object Access Protocol) and XML messaging
to move data across firewalls. XML provides meaning to data, and SOAP is the protocol
that allows web services to communicate easily with one another. Web services are not
tied to a particular component technology or object-calling convention. As a result,
programs written in any language, using any component model, and running on any
operating system can access Web services.










Page 54

Advantage of asp .Net

ASP.NET is Part of the .NET Framework:
The .NET Framework comprises over 3,400 classes that we can employ in our ASP.NET
applications. We can use the classes in the .NET Framework to develop any type of
applications. Since ASP.NET is part of the .NET Framework, we can do all these things
from within an ASP.NET page. While ASP Classic pages are formed with scripting
languages such as VBScript and JavaScript. ASP.NET pages are formed with full-blown
programming languages such as Visual Basic and C#. And whereas there are five

standard objects accessible in the ASP Classic Framework (the Request, Response,
Application, Session, and Server objects), there are over 3,400 standard objects in the
.NET Framework that we can use in an ASP.NET page.
ASP.NET Pages are compiled
When an ASP.NET page is first requested, it is compiled and cached on the server. This
means that an ASP.NET page performs very rapidly. All ASP.NET code is compiled
rather than interpreted, which permits early binding, strong typing, and just-in-time (JIT)
compiling to native code.
XML-Based
ASP.NET configuration settings are stored in XML-based files, which are human
readable and writable. Each one of our applications can have a different configuration file
and we can extend the configuration scheme according to our necessities.
Code-Behind logic
The main problem with ASP Classic pages is that an *.asp page does not yield
modularized code. Both HTML and Script are present in a single page. But Microsoft's
ASP.NET implementation contains a new-fangled method to break up business logic
code from presentation code. Each ASPX created in Visual Studio has an equivalent class
written in a .NET compliant language such as C#. This class consists of event handlers,
initialization code and other supporting code for the user interface in the ASPX file. The
Page 55

C# file that hold this class is called the code-behind file and affords the ASPX file's
programmatic implementation.
ASP.NET Pages are built with Server Controls
We can easily build complex Web pages by bring together the pages out of ASP.NET
server controls. For example, by adding validation controls to a page, we can easily
validate form data.
Introduction of Database Management System

A database is a collection of interrelated data. The collection of data must be logically
coherent with some inherent meaning. A database is designed and built for a specific
purpose, keeping in mind the needs of the applications that are going to use it and end
users of those applications. It is managed by a software package known a database
management system (DBMS).
A DBMS is a software system that enables users to record and maintain database. It
provides an environment where in data can be stored and retrieved from database easily
and must efficiently. The data can be any thing that is deemed to be of significant to the
organization, the system is serving.
What is .net?.NET is set of common services which can be used from a number of
languages and have the following specialties:
i. These services are executed in the form of intermediate code that is
independent of the underlying architecture.
ii. They operate in the runtime (Common Language Runtime), which manages
resources and monitors applications execution.
Page 56

The .NET frameworks are a multi-language environment for building, deploying, and
running web services and applications. The Microsoft .NET platform provides .NET
infrastructure and tools to build and operate a new generation of services.
Sql-Server 2005
In recent years, Database Management System (DBMS) have established themselves as
primary means of data storage for information system ranging from large commercial
transaction to PC desktop application. At the heart of todays most of the information
system is Relational Database System (RDBMS).
Have been the workhouse for data management operation for over a decade and
continue to evolve and mature, providing sophisticated storage, retrieval and distribution
function to enterprise wide data processing and management system compared to the
file system, RDBMS provides organization with capability to easily integrate and
leverage the massive amount of operational data into meaningful data.
The evolution of high-powered database engine such as SQL Server 2005 has
faster the development of advance enabling technology including client/server ,data
warehousing and online processing ,all of which comprise the core todays state of art
information system. A database is an organized collection of related information. Any
meaningful data is called information. A database management system is a collection of
interrelated data a set of programs to access that data.
The SQL Server architecture in this section is generic architecture that applies all
platforms on which SQL run. These may be different platform, but the fundamentals are
same. Physically in its simplest form, an SQL database is nothing more than a set of files
on the disk. The physical relation of these files is irrelevant to the function of the
database. Logically the database is divided into a set of user account, each of which is
identified by username and password unique to the database. Tables and objects are
owned one by one of these. SQL Server maintains its own list of authorized user and their
associated privileged, manages memory cache paging; control locking for concurrent
resource usage; dispatch and schedules users request ; manages space usage within its
table space structure.

Page 57

Sql-Server 2005 Architecture
SQL Files
There are major three sets of files on the disk that compose database:
1) Database File 2) Control File 3) Redo Files
The most common is the database files where the data resides. The control and the redo
logs support the functioning of the architecture itself. All of these sets of files be present,
open and available to SQL Server for any data on database to be usable all these files are
binary files.
Memory
SQL Server uses the memory of the system to turn the user process and to
cache data objects. There are major areas used by SQL Server : memory that is shared by
all process against the data and the database memory that is local to each individual user
process.
System Memory
SQL Server database wide system memory is known as the SGA (System
Global SQL Shared Area). The data and control structures in SGA are sharable and all
SQL Server background process uses them.
Testing & Debugging:





Page 58

Testing Methodology
There are many strategies that can be used to test software. An extreme would be a
software team could wait until the system is fully constructed and then conduct test on
overall system in hopes of finding errors. This approach, although appealing, simply does
not work. It will result in buggy software that disappoints the customer and end-user. At
the other extreme, a software engineer could conduct tests on a daily basis, whenever any
part of the system is conducted. This approach, although less appealing to many, can be
very effective.
A testing strategy that is chosen by most software teams falls between the two extremes.
It takes an incremental view of testing, beginning with the testing of individual program
units, moving to tests designed to facilitate the integration of the units, and culminating
with tests that exercise the constructed system.
Levels of Testing
In order to uncover the errors present in different phases, we have the concept of levels of
testing. The basic levels of testing are
Client Needs Acceptance Testing

Requirements System Testing

Design Integration Testing

Code Unit Testing
Page 59

Unit Testing
A Unit is the small testable piece of software that can be compiled for example
functions, procedures, classes, interface. It is generally written by the programmer and is
done after coding Rigorous use of unit tests helps catch defects prior to customer testing
and minimises the cost of correcting defects by identifying them when they are the
cheapest to fix. In computer programming, a unit test is a procedure used to validate that
a particular module of source code is working properly. The procedure is to write test
cases for all functions and methods so that whenever a change causes a regression, it can
be quickly identified and fixed

Unit testing focuses verification effort on the smallest unit of software design-the
software component or module. Using the component-level design description as a guide,
important control paths are tested to uncover errors within the boundary of the module.
The relative complexity of tests and the errors those tests uncover is limited by
constrained scope established for unit testing. The unit test focuses on the internal
processing logic and data structures within the boundaries of a component. This type of
testing can be conducted in parallel for multiple components.
It is the testing phase, in which each facade class written in j2EE will be tested
individually for the correct functionality. If working fine, then it will be integrated
together for the purpose of creation of the whole Project.
Objective:
To validate each distinct module of the application is implemented as per the technical
and functional specification of the story at the unit level.
Page 60

Scope
The testing would be done on developers machine, and the test cases would be
maintained in a separate hierarchy in configuration management repository. The database
server used for testing would be installed locally on developers/ testers team.
Approach and activities:
Implementation follows Test Driven Development (TDD) approach where we
write unit test for the components prior to writing code.
Unit tests created before the implementation starts.
Unit tests are created test case template and test case scenarios
Hence the development is kicked off to ensure that the story specifications are
implemented
For every method, test cases are written based upon boundary partitioning.
Test cases need to provide statement (& decision if applicable) coverage
All critical and complex algorithm methods are covered by test cases found using
decision coverage.
Thus, the unit testing starts on the first day of the iteration implementation and
continues in parallel with development activities. This not only improves the
quality but also helps in early detection and resolution of bugs.





Page 61

Integration Testing
It is a systematic technique for constructing the software architecture while at the same
time conducting tests to uncover errors interfacing. The objective is to take unit tested
components and build a program structure that has been dictated by design.
It is the testing phase, in which whole project developed in J2EE will be tested with
integrating it with the various modules for the correct functionality. If working fine, then
it will be integrated together with the other modules for purpose of creation of the whole
System.
Objective: Integration testing of the application is done to validate that, different
components / modules of the applications are linked correctly and are functionally
operational as an integrated unit.
Approach and activities:
All the modules of the modules, designed in the track, are integrated together
and tested to find bugs
All the bugs, find during the integration testing, will be fixed
Based on the story specifications, the testing team identifies the functional
test scenarios covering different navigation paths and erroneous user
behaviour in order to test the application in different user situations
System Testing
It is a series of different tests whose primary purpose is to fully exercise the computer-
based system. Although each test has a different purpose, all work to verify that system
elements have been properly integrated and performed allocated functions.
Page 62

It is the type of testing in which all the modules are integrated together to form
the whole system, then this whole system is tested against various efficiency
based tests, that also test the accuracy of the system, working as a whole.
Approach and activities:
The entire range of modules are integrated into the final system and tested to
find bugs
Any bugs found at this stage mean that the systems success is based on
correcting the found bugs.
Black Box and White Box Testing
Black Box Testing, also called behavioral testing focuses on the functional
requirements of the software. That is, it enables the software engineer to derived sets
of input conditions that will fully exercise all functional requirements for a program.
Black Box Testing is a testing strategy, which does not need any knowledge of internal
design or code etc. As the name "black box" suggests, no knowledge of internal logic or
code structure is required. The types of testing under this strategy are totally
based/focused on the testing for requirements and functionality of the work
product/software application. It attempts to find errors in the following categories:
- Incorrect or missing functions
- Interface errors
- Errors in data structures or external data base access
- Behavior or performance errors

Page 63

White Box Testing, also called glass-box testing, is a test case design philosophy that
uses the control structure described as part of component level design to derive test cases.
White box testing strategy deals with the internal logic and structure of the code. White
box testing is also called as glass, structural, open box or clear box testing. The tests
written based on the white box testing strategy incorporate coverage of the code written,
branches, paths, statements and internal logic of the code etc.

In order to implement white box testing, the tester has to deal with the code and hence is
needed to possess knowledge of coding and logic i.e. internal working of the code. White
box test also needs the tester to look into the code and find out which
unit/statement/chunk of the code is malfunctioning. Using white-box testing methods,
one can derive test cases that:
- Guarantee that all independent paths within a module have been exercised
at least once.
- Exercise all logical decisions on their true and false sides
- Execute all loops at their boundaries and within their operational bounds
- Exercise internal data structures to ensure their validity.
Acceptance Testing
This testing is performed with realistic data of the user to demonstrate that the software is
working satisfactory. Testing here focuses on the external behavior of the system, the
internal logic of the program is not emphasized.


Page 64

The objective of Acceptance Testing is to give confidence that the software being
developed, or changed, satisfies the specified requirements, meets customer/user
expectations and is fit for business purpose (validation). Unlike the other test phases, an
objective of acceptance testing is not to actively look for faults. Clear entry criteria may
need to be put in place to ensure that the expectation of a system being production ready
has been met. This is an opportunity to review the effectiveness, completeness and
outcome of previous test phases and to declare any known problems that remain prior to
acceptance test commencing following information are defined
Customer responsibilities: Describe the activities the customer is responsible for
and what others are responsible for customer is responsible for all aspects of the
or the entire teams may assist in the various activities.
Acceptance criteria: Before the begin the acceptance test, what criteria is used to
decide whether the system is acceptable or not. But the acceptance criteria should
define how the decision will be made. The customer may accept a system with
certain minor types of errors remaining. But there may be other levels of errors
that will render the system unacceptable
Acceptance Test Work plan: Here, the activities associated with the acceptance
test are defined , when they will begin and end, who is responsible, and so on. In
other words the work plan for the test.



Page 65

Test Data and Test Cases
A test case is a set of conditions or variables and inputs that are developed for a particular
goal or objective to be achieved on a certain application to judge its
capabilities or features.
It might take more than one test case to determine the true functionality of the application
being tested. Every requirement or objective to be achieved needs at least
one test case.
The primary objective for test case design is to derive a set of tests that have the highest
likelihood of uncovering errors in software. The test case specification is the major
activity in the testing process.
Careful selection of test cases that satisfy the criterion on approach specified is essential
for proper testing. Various characteristic of test cases that are required for portal are:
1. A good test has a high probability of finding an error.
2. A good test is not redundant.
3. A good test should be Best of Breed.
4. A good test should be neither too simple not too complex.
Test Plan Document
A test plan is a general document for the entire project which defines the scope, approach
to be taken, and the schedule for testing, as well as identifying the test items for entire
testing process, and the personnel responsible for the different activities of testing. The
test plan can be done well before the actual testing commences and can be done in
parallel with the coding and design phases.

Das könnte Ihnen auch gefallen