Beruflich Dokumente
Kultur Dokumente
Introduction
System requirement analysis
Preliminary Design
Detailed Design
Module Description
Preliminary Testing
Detailed Testing
Concluding Remarks
References
INTRODUCTION
In the present scenario every one uses computer.
Todays busy life, people have no time waiting response. This project
investment.com is very customized and user-friendly project customer. It
has been designed to easily manage, and look after the over all processing of
even very large market. In this project capable of managing enquiry such as
company name, company share It also provide help for managing the record
a of sell and buy share . Shares are the best investment available over a long
period of time. The growth of share prices comfortably out-paces inflation
most years because the best share prices represent the growth in earnings of
the best companies. Although the stock market is seen as "high risk" this
depends very much on timing and the sort of shares you invest in. It is very
useful for the customer.
IDENTIFICATION OF FICATION:
Identification of need for this step of SDLC for software development needs
are generally generated from the customer , managerial staff , competition
employees and agent. in our case and user are person , who are requesting
for a change , honors need is to make various types of reports about
student and other transaction ,which are required for taking any action ,if
report are present then it provides the supporting information to make any
rigid action based on quantitative details.
PRELIMINARY INVESTIGATION:
Preliminary investigation for the candidate is the second step of SDLC for
software development. Here needs are evaluate at are at this step our
intention is to find out what is actual problem. In this phase we are not
dealing with the solution domain. For evaluate of needs we are not first
collecting the details about the system, working process of the system is
studied and information gathered according to the problem. For
SYSTEM REQUIREMENT
SOFTWARE REQUIREMENT:
Operating system-window XP
Front-end Netbean editor
Back end as MY SQL server
Querying language SQL query
HARDWARE REQUIREMENT:
Ram :512 MB Ram for memory access
Hard Disk 2GB Hard Disk
Processor Intel dual or Higher processor
FRONT END
well
as
some World-Wide
Web servers
and
other
systems
WHAT IS JSP
Java Server Pages (JSP) is a server-side programming
technology that enables the creation of dynamic web pages and applications.
This is accomplished by embedding Java code into HTML, XML, DHTML,
or other document types. When a client such as a web browser makes a
request to the Java application container, which is typically a web server, the
static page is converted behind the scenes, and displayed as dynamic content
to the viewer. It has been speculated that JSP was released to compete with
PHP, a commonly used open-source programming language. While JSP is
sometimes associated with Active Server Pages (ASP), these are actually
two different technologies. The biggest difference is that ASP is developed
by Microsoft, and largely considered as a framework. This is due to its
With NetBeans you can develop applications for use via the desktop or on
the web. You can also develop software for use with mobile devices. The
applications can be developed with NetBeans using a variety of coding
languages including Java, Ruby (with support for Rails), and C/C++. The
feature rich software gives you great options and visual abilities that allow
you to not only create the applications that you want but to view them and
perform testing to work out all of the kinks and bugs in your software.
BACK END
My SQL SERVER:
Modern day web sites seem to be relying more and more
on complex database systems. These systems store all of their critical data,
and allow for easy maintenance in some cases. The Structured Query
Language (SQL) is a very popular database language, and its standardization
makes it quite easy to store, update and access data. One of the most
powerful SQL servers out there is called MySQL and surprisingly enough,
its free. Some of the features of MySQL Include: Handles large databases, in
the area of 50,000,000+ records. No memory leaks. Tested with a
commercial memory leakage detector (purify). A privilege and password
system which is very flexible and secure, and which allows host-based
verification. Passwords are secure since all password traffic when
connecting to a server is encrypted.
The aim of backend software is to maintain the data base
used to store the records for customer so the SQL server has distinguished
and select for this job. If lets us to group multiple list together and related
to each other creating a type of data base called relational data base each
list is stored in a different table every data base begins with a problem or
need that can be solved by creating a systematic data tracking system.
My SQL is a powerful relational data base management system
(RDMS) which are will used to learn principals of data base and data
manipulation using structured query language statements. SQL is a data base
language this is used to access, insert, deleted and update stored data
10
PRELIMINARY DESIGN
Software actually starts from the requirement analysis. The requirement gathering
process is intensified & focused specially on software. To understand the actual
nature of the program to be built the software engineer must understand the
information domain for the software. As well as the required function behavior
performance & interface. Requirement for both software & system are
documented & reviewed with customer. Software Requirement analysis is
software engineering task that bridges the gap between system level requirement
engineering & software design. In problem recognition we have some regular
meeting with the customer & classified the customer requirements into three
categories.
11
- Normal Requirements: These include the objectives & the goals that are started
for a product. If these requirements are there the customer is satisfied.
- Expected Requirements: These requirements are implicit to the product or the
system & are so fundamental that customer does not explicitly state them but their
absence may cause considerable dissatisfaction to the customer.
- Exciting Requirements: These features go beyond the customers expectation &
prove to be very satisfying when present.
1.Database Tables
Database tables which have been created in the project
Investment.com are as follow:1. customer_master
2. Feed back
3. buyller
4. Seller
5. CB_balance
12
Column Name
Data Type
Allow null
Cid
Integer
Unchecked
Name
Nvarchar(50)
Unchecked
1 Database
Address
Nvarchar(50)
checked
Design:-
Phone_R
Nvarchar(50)
Unchecked
Phone_M
Nvarchar(50)
Unchecked
Phone_O
Nvarchar(50)
Unchecked
Fax
Nvarchar(50)
Unchecked
City
Nvarchar(50)
Unchecked
State
Nvarchar(50)
Unchecked
DOB
Date
Unchecked
Pincode
Integer
Unchecked
Email Id
Nvarchar(30)
Unchecked
Occupation
Nvarchar(30)
Unchecked
Income
Nvarchar(20)
Unchecked
Loginname
Nvarchar2(20)
Password
Nvarchar2(20)
Longname
Nvarchar2(30)
13
Unchecked
Unchecked
Unchecked
Customer_master
Table primary key:
Cid
CB_balance table
Column Name
Data Type
Allow null
Cid
Integer
Unchecked
Balance
Integer
Unchecked
Mode_of_pay
Varchar210)
Unchecked
Card_type
Varchar2(10)
Unchecked
Card_no
Integer
Unchecked
Card_holdername Varchar2(20)
unchecked
Expiry_date
Date
Unchecked
Cheque_no
Integer
Unchecked
Cheque_date
Date
Unchecked
Bank_drawn
Varchar2(20)
Unchecked
Location
Varchar2(20)
Unchecked
14
Data Type
Allow null
Cid
Company name
No_of_shares
Rate_per_share
Type_share
Integer
Varchar2(10)
Integer
Integer
Varchar2(20)
Unchecked
Unchecked
Unchecked
Unchecked
Unchecked
Date
Date
Unchecked
Flg_B
Varchar2(10) unchecked
Data Type
Allow null
Cid
Company name
No_of_shares
Rate_per_share
Type_share
Integer
Varchar2(10)
Integer
Integer
Varchar2(20)
Unchecked
Unchecked
Unchecked
Unchecked
Unchecked
Date
Date
Unchecked
Flg_S
Varchar2(10) unchecked
15
Data Type
Allow null
Sno
Name
Email
Comments
Integer
Varchar2(10)
Varchar2(10)
Varchar2(30)
Unchecked
Unchecked
Unchecked
Unchecked
DETAILED DESIGEN
1. E-R Diagram
The overall logical structure of database can be expressed graphically by an E-R
diagram. It consist a set of basic objects called entities and of relationships among
these objects.An entity is represented by a set of attributes. Attributes are
descriptive
16
17
2.Data flow diagram:A data flow diagram (DFD) is a graphical technique that depicts information flow
and transforms that are applied as data moves from input to output.The DFD is
also known as data flow graph or bubble chart.
Named circles show the processes in DFD or named arrows entering or
leaving the bubble represent bubbles and data flow. A rectangle represents a source
or sinks and is a net originator or consumer of data .
3.Data Dictionary:The data dictionary is a repository that contains description of the entire data
object consumed or produced by the software . The associated data dictionary
states precisely the structure of each data flow in the DFD.Components in the
structure of a data flow may also be specified in the data dictionary, as well as the
structure of file shown in the DFD. In other words, it shows:
What goes in
How it is changed
18
User
Registration
&
searching
Server
Database
User
19
LOGIN
PAGE
USER
AUTHENTCATIO
N
LOGIN
ERROR
Search
AUTHENTICATION
View all
applicant
Select
applicant
profile
2.Appllic
ant Login:-
Login
Page
Applicant Registration
admin information
Admin
Sign Up
error
Admin DB
confirmation
ROLES
Admin Login
3.Registration:-
20
Applicant Registration
Login
Page
User information
User registration
Registration
DB
Db
confirmation
ROLES
Return msg
page
Registration
error page
4.Result:Login
Page
Request result
Book DB
Fetching
Result
Result information
Display
Result
information
3)UML DIAGRAM:
USE CASE DIAGRAM
A Use Case is a named capability of a structural entity in a model. Use Case define
a System-Level capability without revealing or implying any particular
implementation of that capability. Use Cases are implemented by collaboration of
classes.
User
Admin
Registration
21
Login
Sell
buy
Update
Logout
22
Passwor
d
User
Email id
UserI
d
Login
23
MODULE DESCRIPTION
Project Will contain following modules:We separate modules into two categories:
Admin Part:In this site Admin is person which is responsible for maintaining a website(s). The
duties of the webmaster may include generating and revising web pages, replying
to user comment, and examination traffic through the site.
1. Registration
2. Home
3. Login
4. Add new company name
5. check the user information
.
24
25
PRELIMINARY TESTING
When we have completed the coding part then the important work is to test them.
Before that we should know what is Testing and what are its types, which are
described as under:
1.TESTING OBJECTIVES:There are number of rules that can serve well as testing objectives.
1.) Testing is a process of executing a program with the intent of finding an
error.
2.) A good test case is one that has a high probability of finding an as yet
Undiscovered error.
3.) A successful test is one that uncovers an as yet undiscovered error.
26
These objectives implies that a successful test is one in which no errors are found.
Our objective is to design tests that systematically uncover different classes of
errors and do so with minimum amount of time and effort.
If testing is conducted successfully it will uncover errors in software.
The secondary benefit, testing demonstrates that software functions are working
according to specification and requirement appears to have been met.
2. TESTING PRINCIPLES:Before applying methods to design effective test cases a software engineer must
understand the basic principles that guide, software testing.
* All tests should be traceable to customer requirements.
* Test should be planned long before testing begins.
* There is one principle that implies, that 80% of all errors uncovered during
testing, will likely be traceable to 20% of all program modules.
* The testing should focus on individual program modules. Then testing
should progress towards "in the large" that is progresses should go
towards the final errors in entire system.
* Exhaustive testing is not possible.
* To be most effective, testing should be conducted by an independent third
party.
3. TYPES OF TESTING
WHITE BOX TESTING
White Box Testing, sometimes called Glass Box Testing or Structured Testing is a
test case design method that uses the control structure of the procedural design to
derive test cases. The tester can analyze the code and use knowledge about the
structure of a component to derive test data. "Knowing the internal working of a
27
product, test can be conducted to ensure that internal operation performs according
to specification and all internal components have been adequately exercised", is
called White Box Testing.
White Box Testing of software is predicted on close
examination of procedure detail. Logical paths of the white software are tested by
providing test cases that exercise specific sets of condition or loops.
Using White Box Testing methods, the software engineer can derive test cases
that:1.) All independent paths within a module have been exercised at least once.
2.) Exercise all logical decisions and their true and false sides.
3.) Execute all loops at their boundaries and within their operational bounds.
4.) Exercise internal data structure to ensure their validity.
The advantage of White Box Testing is that an analysis of the code can be used to
find how many test cases are needed to guarantee a given level of test coverage.
28
By applying Black Box techniques we derive a set of test cases that satisfy the
following criteria:
1.) Test cases that reduce, by a count that is greater than one, the number of
additional test cases that must be designed to achieve reasonable testing.
2.) Test cases that tell us something about the presence or absence of classes
of errors, rather than errors associated only with the specific test at hand.
29
ALPHA TESTING
The alpha test is conducted at the developers site by a customer. The software is
used in a natural setting with the developer looking over the shoulder of the user
and recording errors and usage problems. Alpha tests are conducted in a controlled
environment.
BETA TESTING
The beta test is conducted at one or more customer sites by the end user(s) of the
software. Unlike alpha testing, the developer is generally not present. Therefore,
the beta test is a live application of the software in an environment that cannot
be controlled by the developer. The customer records all problems that are
encountered during beta testing and reports these to the developer at regular
intervals. As a result of problems reported during beta test, the software developer
30
makes modifications and then prepares for release of the software product to the
entire customer base.
While performing testing following errors were encountered which
are handled properly and prompts where required
31
DETAILED TESTING
TESTING
INTRODUCTION TO SOFTWARE TESTING:Testing is a process used to help identify the correctness, completeness and quality
of developed computer software. With that in mind, testing can never completely
establish the correctness of computer software.
There are many approaches to software testing, but effective testing of complex
products is essentially a process of investigation, not merely a matter of creating
and following rote procedure. One definition of testing is "the process of
questioning a product in order to evaluate it", where the "questions" are things the
tester tries to do with the product, and the product answers with its behavior in
reaction to the probing of the tester. Although most of the intellectual processes of
testing are nearly identical to that of review or inspection, the word testing is
connoted to mean the dynamic analysis of the productputting the product
through its paces.
The quality of the application can and normally does vary widely from system to
system but some of the common quality attributes include reliability, stability,
portability, maintainability and usability. Refer to the ISO standard ISO 9126 for a
more complete list of attributes and criteria.
Testing helps is verifying and Validating if the Software is working as it is
intended to be working. Thins involves using Static and Dynamic methodologies
to Test the application.
32
Because of the fallibility of its human designers and its own abstract, complex
nature, software development must be accompanied by quality assurance
activities. It is not unusual for developers to spend 40% of the total project time on
testing. For life-critical software (e.g. flight control, reactor monitoring), testing
can cost 3 to 5 times as much as all other activities combined. The destructive
nature of testing requires that the developer discard preconceived notions of the
correctness of his/her developed software.
SOFTWARE TESTING FUNDAMENTALS:1. Testing is a process of executing a program with the intent of finding an error.
2. A good test case is one that has a high probability of finding an as yet
undiscovered error.
3. A successful test is one that uncovers an as yet undiscovered error.
Testing should systematically uncover different classes of errors in a minimum
amount of time and with a minimum amount of effort. A secondary benefit of
testing is that it demonstrates that the software appears to be working as stated
in the specifications. The data collected through testing can also provide an
indication of the software's reliability and quality. But, testing cannot show the
absence of defect -- it can only show that software defects are present.
33
TEST PLAN:We want to product to be bug free. We want also want this document describes the
plan for testing for Hospital Management software and basic modules like check
in module, checkout module, main form module, and view module.
In this module we will perform two levels of testing Unit Testing and system
testing. Because the system is small, it is felt that there is no need for elaborate
integration testing. The basic unit to be tested given below:-Feature to be tested:
All the functional features specified in the requirement document are tested.
34
TESTING STOP PROCESS:The Software Assurance Technology Center (SATC) in the Systems Reliability
and Safety Office at Goddard Space Flight Center (GSFC) is investigating the use
of software error data as an indicator of testing status. Items of interest for
determining the status of testing include projections of the number of errors
remaining in the software and the expected amount of time to find some
percentage of the remaining errors.
To project the number of errors remaining in software, one needs an estimate of
the total number of errors in the software at the start of testing and a count of the
errors found and corrected throughout testing. There are a number of models that
reasonably fit the rate at which errors are found in software, the most commonly
used is referred to in this paper as the Muse model. This model is not easily
applicable at GSFC, however, due to the availability and the quality of the error
data.
At GSFC, useful error data is not easy to obtain for projects not in the Software
Engineering Laboratory. Of the projects studied by the SATC, only a few had an
organized accounting scheme for tracking errors, but they often did not have a
consistent format for recording errors. Some projects record errors that were found
but did not record any information about resources applied to testing. The error
data frequently contained the date of entry of the error data rather than the actual
date of error discovery. In order to use traditional models such as the Musa model
for estimating the cumulative number of errors, one needs fairly precise data on
the Time of discovery of errors and the level of resources applied to testing. Real
world software projects are generally not very accommodating when it comes to
35
either accuracy or completeness of error data. The models developed by the SATC
to perform trending and prediction on error data attempt to compensate for these
shortcomings in the quantity and availability of project data.
In order to compensate for the quality of the error data, the SATC developed a
software error trending models using two techniques, each based on the basic
Musa model, but with the constant in the exponential term replaced by a function
of time that describes the 'intensity' of the testing effort. The shape and the
parameters for this function can be estimated using measures such as CPU time or
staff hours devoted to testing. The first technique involves fitting cumulative error
data to the modified Musa model using a least squares fit that is based on gradient
methods. This technique requires data on errors found and the number of staff
hours devoted to testing each week of the testing activity. The second technique
uses a Kalman filter to estimate both the total number of errors in the software and
the level of testing being performed. This technique requires error data and initial
estimates of the total number of errors and the initial amount of effort applied to
testing.
36
TESTING STRATEGY
Testing is a set of activities that can be planned in advance and conducted
systematically. For this reason a template for software testing a set of steps into
Which we can place specific test case design methods should be defined for the
software engineering process.
There are a number of software testing strategies, all of which have following
general characteristics:
1. Testing begins at the module level and works outwards the integration of
the entire computer based system.
2. Different testing techniques are appropriate at different points in time.
3. Testing and debugging are different activities, but debugging must be
accommodated in any testing strategy.
LEVEL OF TESTING
1.
2.
37
38
Conclusion remark
In the world of Market and industry today ,in order to survive and business
Beat the completion business needs to manage the future. Managing the
future means managing the information .the real success of orgnization
depends upon resolving gaps in the communication of this information This
project is based on making web based system of Online share trading Any
user easily search the company name. This projectInvestment.com
customized and user-friendly project for college. It has been designed to
easily manage, and look after the over all processing of even very large. In
this project capable of managing enquiry such as customer name, company
name. It also provides help for managing the information about the share.
While working in the terms and by the friends help we also learnt many
technical and non technical thing thus ,improve our skills.
REFERENCES
39
References books
Herbert Schlitz The complete reference-Java
Software Engineering: Pressman
Operating System:-Gallvin , William stalling
Data Base:-Korth for (database design and ER-Diagram and DFD)
Bill Kennedy.HTML Guide
References Sites
http//www.GOOGLE.COM (search engine)
http//www.wikipedia.Org
40
41
42
43