Beruflich Dokumente
Kultur Dokumente
A project Report
Submitted for the partial fulfillment of
the degree of
Submitted by:
Manju
Roll No.: 13011114008
I here by declare that the major project work entitled, Job portal submitted for the MCA
is my original work carried out by me under the guidance of Mr. Ajit Singh , Director,
O.D.M. Study Centre, Hisar for the partial fulfillment of the award of the degree of the
Master of Computer Applications. The matter embodied in this report has not been
submitted anywhere else for the award of any other degree/diploma.
Place: Hisar
Date :
CERTIFICATE
This is to certify that Ms. Manju Registration no. 13011114008 has worked under my
supervision to prepare his project report entitled, Job portal. The work embodied in this
report is original and was conducted at ODM Study Centre, Hisar from 05 Jan 2015 to 20
May 2015. This work has not been submitted in part or full to this or any other University
for the award of any other degree or diploma.
Signature of Supervisor :
Name :
Designation :
Director
ACKNOWLEDGEMENT
I feel privileged to express my deep sense of indebtedness and gratitude towards my advisor,
Mr. Ajit Singh (Director, O. D. M. Study Centre, Hisar) for his valuable guidance,
intellectual input, continuous support, generous help, affectionate encouragement, sagacious
advice, scholarly suggestions and continuous inspiration throughout the course of this study
and in preparation of this project. I express my whole hearted thanks to all the people who
have been kind enough to render their help and guidance in the preparation of this project.
I also express my sincere thanks to Mr. Sunil Dutt, for their pertinent suggestions,
wholehearted support and cooperation in completion of the project work successfully.
Really, my heart is filled with gratitude for all those persons who helped me in
accomplishing my job. I express my humble thanks towards all of them.
Place : Hisar
Date :
(Manju)
TABLE OF CONTENTS
1. INTRODUCTION OF THE PROJECT
1.1Overview of the project
1.2Objective of the Proposed System
2. TECHNOLOGY USED
2.1 .NET Framework
2.2 Microsoft SQL Server 2005
3. FEASIBLITY STUDY
3.1 Feasiblity Study Overview
3.2 Operational Feasiblity
3.3 Technical Feasiblity
3.4 Organizational Feasibility
3.5Economical Feasiblity
5. SYSTEM DESIGN
5.1 Database Design
5.2 Use case diagram
6. CODING
7. OUTPUTS
8. SYSTEM TESTING
8.1 Testing Process
8.2 Testing Strategies Followed in Project
8.3 Test Cases
9. IMPLEMENTATION
10. MAINTENANCE
11. SCOPE AND CONCLUSION
11.1 Limitation of Project
11.2 Future Work
12. BIBLIOGRAPHY
Abstract
Development of this project, Job portal is useful application of web development. For
development of this application visual studio-2008 is used as front end tool and SQL server2005 is used as back end tool for database entries. Both visual studio and SQL server are
best options available in the market.
In this application I have developed 40 web forms. Welcome form includes user login,
new user register link and administrative login link. After login we can access the other
information of websites like, applicants detail, placed candidate detail, services etc.
Also, I have developed database with 22 tables that has connectivity with all the web
forms. All the information about applicants, placed candidates and companies is stored in
this database.
This project report serves the purpose of elaborating the analysis and implementation
phases of above mentioned project. All features that have been included in final
implementation have been clearly explained to make project easy to understand. It has been
taken care that this document elicits the system development process in clear and well
documented manner.
Introduction
PROJECT DETAIL
Introduction of ONLINE RECRUITMENT SYSTEM
This document details the requirements of mindscape.com project. The document covers the
functional (business) requirements, technical requirements and acceptance criteria of the
system. The intended users of this document are the project development team members.
Project Leader, Project Manager and the client project coordinator.
2. Through this system, a company employer can post a job for the Jobseeker to fill
recruitment in his company. For this, a company also needs to register himself and then he
can post any job. Posting job includes details like job description, designation, job valid up
to, educational qualification required, salary being offered, industry type etc. After posting
jobs employer can manage job also, where posted jobs are there and one can either edit it or
delete it and can refresh it also to current date and time(as refreshed and
Fresh jobs only comes above in job board). Response of job includes responses of particular
jobs made by different jobseeker and all this response with jobseeker detail is being
available for employer to download in excel sheet also. Employer can update his profile
whenever he need to and can view the request, comments and compliments made by
jobseekers for their company. Searching jobseeker according to certain criteria, which also
include keyword search criteria, which gives resulted Jobseeker.
3. Security Performance and maintenance of project in the future are few major concerns of
this application.
Registration of Candidate and Company Before login every user, whether he is a Candidate
or Company, needs to register first. In this module registration process is being done for
both. Candidate has to go through with 3 phases for registration which includes Login
Account Details, Personal Detail, Experience Details, Upload CV and Company needs 2
phases to complete its registration process which includes Login Account Information,
Recruiter Information, and Contact Details.
is fully work as online using the internet, which is provides facility online such
as- Student Counseling , Managing the student record, Managing the Institute record and
Searching the any other information about Counseling procedure/Institutes, this types of
information easy to search through the websit
TECHNOLOGY USED
I have will be developed this project in .NET 2008 FRAMEWORK with C# 3.5 because
the Microsoft .NET FRAMEWORK version 3.5 extends the ,NET FRAMEWORK version 3.0 with new
features, improve the existing features and enhancement to the documentation.
.Net 2008 with c# 3.5
The Microsoft .NET Framework version 3.5 extends the .NET Framework version 3.0 with
new features, improvements to existing features, and enhancements to the documentation.
This section provides information about some key additions and modifications.
For more information about compatibility and for a list of the public API modifications to
the class library that might affect the compatibility of your application.
Overview of .Net
Before going into the details of .NET features further, we shall see how the concept
of .NET was evolved over the past ten years. The current technology of .NET has gone
through three significant phases of
Development.
OLE technology
COM technology
.NET technology
These developments that took place during the 1990s are illustrated in following figure:
OLE
TECHNOLOGY
COM
TECHNOLOGY
.NET TECHNOLOGY
OLE Technology
OLE (Object Linking and Embedding) technology was developed byMicrosoft in the early
1990s to enable easy interprocess communications.OLE support to achieve the following:
COM Technology
Till the
advent
of
COM technology,
the
monolithic
approach
developing software. But when programs become too largeand complex, the monolithic
approach leads to a number of problems interms of maintainability and testing of
software.
To overcome these problems, Microsoft introduced the component-based model for
developing software programs. In the component-basedapproach, a program is broken into a
number of independent componentswhere each one offers a particular service. Each
component can bedeveloped and tested independently and then integrated it into the main
system. This technology is known as the Component Model (COM) and thesoftware built
using COM is referred to as component ware.COM technology offers a number of benefits to
developers and users.
Enables
distributed
development
across
multiple
Organizations or departments.
.NET Technology
inter-modulecommunication.
This mechanism is
replaced by an
applications enables users to build managed code libraries or easily use unmanaged code libraries
on 64-bit computers.
ADO.NET
New features in ADO.NET include support for user-defined types (UDT), asynchronous
database operations, XML data types, large value types, snapshot isolation, and new
attributes that allow applications to support multiple active result sets (MARS) with SQL
Server 2005.
ASP.NET
The Microsoft .NET Framework 3.5 includes significant enhancements to all areas of
ASP.NET. For Web page development, new controls make it easier to add commonly used
functionality to dynamic Web pages. New data controls make it possible to display and edit
data on an ASP.NET Web page without writing code. An improved code-behind model
makes developing ASP.NET pages easier and more robust. Caching features provide several
new ways to cache pages, including the ability to build cache dependency on tables in a SQL
Server database
You can now customize Web sites and pages in a variety of ways. Profile properties enable
ASP.NET to track property values for individual users automatically. Using Web Parts, you
can create pages that users can customize in the browser. You can add navigation menus
using simple controls.
Improvements to Web site features allow you to create professional Web sites faster and
more easily. Master pages allow you to create a consistent layout for all the pages in a site,
and themes allow you to define a consistent look for controls and static text. To help protect
your sites, you can precompile a Web site to produce executable code from source files (both
code files and the markup in .aspx pages). You can then deploy the resulting output, which
does not include any source information, to a production server. Enhancements to ASP.NET
also include new tools and classes to make Web site management easier for Web site
developers, & server administrators.
.NET Framework
THE .NET framework is one of the tools provided by the .NET Infrastructure
and tools component of the .NET platform.The
.NET
framework
provides
an
environment for building, deploying and running web services and other application.
It consists ofthree distinct technologies as shown in following figure:
1. Common Language Runtime (CLR)
2. Framework base classes
3. User and program interfaces (ASP .NET and Win forms)
.NET FRAMEWORK
ASP.NET
(WEB SERVICES)
WINDOWS
FORMS
(USER
INTERFACE)
The CLR is the core of the .NET framework and is responsible for loading and running C#
programs. Base classes provide basic data types, collection classes and other general
classes for use by C# and other.NET languages.
The top
layer
contains
set
of
classes for developing web services and to deal with the user interface.
THE COMMON LANGUAGE RUNTIME
The common language runtime, popularly known as CLR is heart and soul of the
.NET framework. As the name suggest, CLR is a runtime environment
programs are executed. It also supports cross- language interoperability.
The CLR provides a number of services that include:
1.
2.
3.
4.
5.
6.
in
which
7. Enforcement of security.
8. Interoperability with other systems.
9. Managing exceptions and errors.
10. Support for tasks such as debugging and profiling.
The source code is compiled to IL while the metadata engine creates metadata
information. IL and metadata are linked with other native code if required and the resultant
IL code is saved. During execution, the IL code and any requirement from the base class
library are brought together by the class loader. The combined code is tested for
type-safety and then compiled by the JIT (Just in Time) compiler to produce native machine
code, which is sent to the runtime manager for execution.
.NET Languages
The .NET framework is language neutral. Currently, we can use a number of
languages for developing .NET applications. They include:
Native To .NET
C++
Visual basic
Jscript.
Microsoft has advanced the .NET strategy in order to provide a number of benefits to
developers and users. Some of the major benefits envisaged are:
Fewer bugs.
SQL Server 2005 provides the Microsoft Windows Server System integrated server
software with a database platform for the next generation of connected, scalable, and reliable
enterprise applications. The breadth and depth of innovation in this version is in response to
the needs of customers. This white paper is targeted to database administrators, to give you
an understanding of the new features in and capabilities of SQL Server 2005. From many
enhancements of existing features, to an entirely new security model, database
administration is now more productive and in tune with the needs of the administrator.
At the core of SQL Server 2005 are new infrastructure application capabilities. SQL Service
Broker is a distributed application framework that provides a new form of scalability and
reliability for asynchronous message delivery. Though not new, Microsoft SQL Server
Notification Services, Reporting Services, and SQL Server Mobile Edition (formerly called
SQL Server CE) are all greatly enhanced in SQL Server 2005.
o Failover Clustering
o Database Mirroring
o Database Snapshot
o Replication
o Consistency Checker
o Failure Reporting
o Computer Manager
SELECT * from TABLENAME wild cards can be used to return all fields as in the above
statement.
SELECT COLUMNAME1, COLUMNAME2 FROM TABLENAME here columname1,
columname2 are the name of the column in the table.
WORKING WITH TABLES
Tables are database object that contain in a database. In table data is organized in a row and
column similar to a spreadsheet. Each row represents a unique of a record. When you design
a database you decide what table you need, what kind of data goes in each table.
FEASIBILITY STUDY
The feasibility study is used to determine if the project should get the go-ahead. If the
project is to proceed, the feasibility study will produce a project plan and budget estimates for the
future stages of development.
A feasibility study is conducted to select the best system that meets performance
requirement. This entails an identification description, an evaluation of candidate system and
the selection of best system job. The system required performance is defined by a statement
of constraints, the identification of specific system objective and a description of outputs.
Economical feasibility
It looks at the financial aspects of the project. It determines whether the
management has sufficient resources and budget to invest in the proposed system and the
estimated time for the recovery of cost incurred. It also determines whether it is worthwhile
to invest the money in the proposed project. Economic feasibility is determines by the means
of cost benefit analysis.The proposed system is economically feasible because the cost
involved in purchasing the hardware and the software are within approachable. The personal
cost like salaries of employees hired are also nominal, because working in this system need
not required a highly qualified professional. The operating-environment costs are marginal.
The less time involved also helped in its economical feasibility. It was observed that the
organization has already using computers for other purpose, so that there is no additional
cost to be incurred for adding this system to its computers.
The backend required for storing other details is also the same database that is SQL. The
computers in the organization are highly sophisticated and dont needs extra components to
load the software. Hence the organization can implement the new system without any
additional expenditure. Hence, it is economically feasible.
The result of the feasibility study is a formal proposal. This is simply report, a formal
document detailing the nature and the scope of the proposed solution. The proposals
summarize what is known and what is going to be done. Three key considerations are
involved in the feasibility analysis: economic, technical and operational behavior.
Economic analysis is the most frequently used method for evaluating the effectiveness of a
candidate system. More determine the benefits and the saving that are expressed from a
candidate system and compare them costs. If benefits outweigh costs. Otherwise, further
justification or alterations in the proposed system will have to be made if it is to have a
chance of being approved. This is an ongoing effort that improves in accuracy at each phase
of the system life cycle.
Technical Feasibility
Technical feasibility center around the existing computer system hardware etc. and to
what extent it can support the proposed addition. For example, if the current computer is
operating at 80% capacity - an arbitrary ceiling - then running another application could
over load the system or require additional hardware. This involves financial consideration to
accommodate technical enhancements. If the budget is a serious constraint then the project
is judged not feasible.
This analysis process requires more emphasis on the system configuration given more
important rather that the actual hardware specification. The configuration of the existing
system is : Processor
Hard disk
RAM
Domain Server
OS at client: Windows XP Professional
OS at server: Windows 2003 Server
Printers
Internet: 128 Kbps cable internet
The data will reside at server root directory installed with SQL server7 and IIS. For this
software there are following alternatives:-
Front End
ASP.net with c#
Back End
Editor
Documentation tool
MS-Word
Operational Feasibility
It is common knowledge that computer installations have something to do with
turnover, transfers, retraining and changes in employee job status. Therefore, it is
understandable that the introduction of a candidate system requires special efforts to
educate, sell, and train the staff on new ways of conducting business.
\
System
Analysis
Report
Testing and
Integration
Installation
Operations and
Support
Requirement Analysis
Analysis gathers the requirements for the system. This stage includes a detailed study of the business
needs of the organization. Options for changing the business process may be considered. Design
focuses on high level design like, what programs are needed and how are they going to interact, lowlevel design (how the individual programs are going to work), interface design (what are the
interfaces going to look like) and data design (what data will be required). During these phases, the
software's overall structure is defined. Analysis and Design are very crucial in the whole
development cycle. Any glitch in the design phase could be very expensive to solve in the later stage
of the software development. Much care is taken during this phase. The logical system of the product
is developed in this phase.
Specification
Specification is the task of precisely describing the software to be written, possibly in a rigorous
way. In practice, most successful specifications are written to understand and fine-tune applications
that were already well-developed, although safety-critical software systems are often carefully
specified prior to application development. Specifications are most important for external interfaces
that must remain stable. A good way to determine whether the specifications are sufficiently precise
is to have a third party review the documents making sure that the requirements and Use Cases are
logically sound.
Architecture
Maintenance
Inevitably the system will need maintenance. Software will definitely undergo change once it is
delivered to the customer. There are many reasons for the change. Change could happen because of
some unexpected input values into the system. In addition, the changes in the system could directly
affect the software operations. The software should be developed to accommodate changes that could
happen during the post implementation period.
SDLC Objectives
The specific objectives expected include the following:
To consider system and data requirements throughout the entire life of the system.
To foster realistic expectations of what the systems will and will not provide.
SYSTEM DESIGN
SOFTWARE DESIGN:The purpose of this phase is to plan a solution for the problem specified by the requirement
document. This is first step in moving from the problem domain to solution domain.
Designing activity is divided into two parts.
a) System Design
It aims to identify the modules that should be in the system, the specification of these
modules and how they interact with each other to produce the desired result.
System design goes through two phases of development:
1)
Logical Design
2)
Physical Design
Output design is one of the most important features of the information system. When the
output is not of good quality the users will be averse to use the newly designed system and
may not use the system. There are many types of output, all of which can be either highly
useful or can be critical to the users, depending on the manner and degree to which they are
used.
Outputs from computer system are required primarily to communicate the results of
processing to users. They are also used to provide a permanent hard copy of these results for
later consultation.
Operational outputs, whose use is purely with in the computer department e.g.
Program-listing etc.
Interactive outputs, which involve the user is communicating directly with the
computer, it is particularly important to consider human factor when designing
computer outputs. End user must find outputs easy to use and useful to their jobs,
without quality output, user may find the entire system unnecessary and avoid using
it. The term Output in any information system may apply to either printer or
displayed information. During the designing the output for this system, it was taken
into consideration, whether the information to be presented in the form of query of
report or to create documents etc.
When and how often output and their format is needed. While designing output for
project based Attendance Compilation System, the following aspects of outputs
designing were taken into consideration.
The outputs (i.e., well formatted table outputs in the screen itself) designed are
simple to read and interpret.
Format of each output was another important point taken into consideration. Output
media, for each output appropriate media is decided whether it will be displayed on
screen or will be taken to printer or both.
Other output design related specifications, i.e., how frequently the outputs will be
generated, how many pages or sheets approximately it will keep up, what is its
planned use and output distribution to users are also taken into account.
These were a few major designing issues, which were taken into consideration, while
deciding the output specifications for the system. As direct beneficiary of reports is the user
community, they were consulted constantly at every level. Formats and screen design for
various reports were identified, taking into account the user requirements. Before finalizing
these were given to users for any improvement and suggestions. End users issues taken into
consideration were Readability, Relevance and Acceptability.
Once all the output reports to be generated by ACS system were identified, they were given
to users for their acceptance. For prototyping various outputs, final outputs models were
created with dummy data, before they were finalized.
Output Sources:
Output contents originate from these sources:
Tabular contents.
Graphic format.
Using Icons.
Output Definition:
The output should be defined in terms of:
Types of outputs
Data items
The name given to each data item should be recorded and its characteristics described
clearly in a standard form:
Number of characters.
MODULES
There are three main modules in this Project. They are as follows:
1. Administrator
2. Employer
3. Job Seeker
Module Explanation
1. Administration
1) Confirmation of Employer Registration
a. By Verify
b. By Blocking
2. Job Seeker
1)
2)
3)
4)
5)
6)
7)
8)
9)
MODULES
There are three main modules in this Project. They are as follows:
1. Administrator
2. Employer
3. Job Seeker
Module Explanation
1. Administration
1) Confirmation of Employer Registration
a. By Verify
b. By Blocking
2. Employer
1) register himself
2) After Registered Confirmation mail send into given mail ID.
3) post any job includes:
a. job description
b.designation
c. job valid up to
d.educational qualification
e. salary being offered
f. industry type
4) manage job
5) Download the jobseeker detail in excel sheet
6) update his profile
7) Download the jobseeker Resume in Different format like doc, docx, pdf etc.
8) Security
Graphical representation:
Graphical Representation:
Data flows
A data flow connects the output of an object or process to input of another object or process.
It represents the intermediate data value within a computation. It is represented by an arrow
and labeled with a description of data, usually its name or type.
Graphical Representation:
Actors
An actor is active object that drives the data flow graph by producing or consuming values.
Data store
A data store is a passive object with in a data flow diagram that stores data for later access.
Graphical Representation:
External Entity
A rectangle represents an external entity such as a librarian, a library member.
Graphical Representation:
Output Symbol
Graphical Representation:
B etween process
2.
File to process
3.
4.
5.
Process to file
0 LEVEL D.F.D.
This is the context level D.F.D. of the proposed system the whole system has been depicted in
a single bubble , primary input and output has been carefully noted and depicted in the way
so that information flow continuity
should not be lost in the next level. The proposed system is shown as a whole process and the
Inputs and outputs are shown with incoming and outgoing arrow from the system.
Candidate
System
Process
0 LEVEL D.F.D.
Output
1 LEVEL D.F.D.
At this level of D.F.D. all the process together with all the data stores (tables). It shows the
true data flow i.e. how data is actually flowing in the system .Data is coming from which
table and going into which table is
Clearly shown by this DFD. This DFD is the main reference for the development of the
system. After understanding the whole system, The application developer will fall back upon
this DFD during the development phase.
Job Seeker Master
Job Seeker
details
Employer
details
Employee Master
Post A Job
Posting
Job
Search Job
Job Search
ONLINE
RECRUITM
ENT
SYSTEM
Managing
Jobs
View
Response
Manage A Job
Search Company
Job the
Categorized
Search Job
Seeker
Update Detials
Update Profile
Update Profile
Update details
Manage
Response of Job
Seeker
Manage Response
2 LEVEL D.F.D.
Some processes require further breakdown into sub processes. Those processes will be shown
in second level D.F.D. For example, here 2nd level D.F.D. of the process of CHECK
CANDIDATE is shown.
Employer Master
Employer Master
Managing
Existing
Job
Employer Master
Posting
of Job
Manage
Job
Search
Job &
Apply
Respons
e of Job
Job posting
Job Posting
Response Job
Responses of
Job Seeker with
their id & Job
Id & Employer
Id
System Operator: Wants Accurate and fast entry. Manipulation, Navigation and search of
record should be easy.
Precondition: Operator is identified and authorized.
Post Condition: Applicant Entries are saved and easily accessible.
Main Success scenario (Basic Flow):
1. System Operator logins into the system.
2. Operator performs addition, manipulation, navigation and search.
3. Operator logs out or co
Mobile No.
Phone No.
Qualification
Post Name
Key Skills
Languages
known
Experience
Login
System Operator: Wants Accurate and fast entry. Manipulation, Navigation and search of
record should be easy.
Precondition: Operator is identified and authorized.
Post Condition: Candidate Entries are saved and easily accessible.
Main Success scenario (Basic Flow):
1. System Operator logins into the system.
2. Operator performs addition, manipulation, navigation and search.
3. Operator logs out or continues.
Username
Old Password
New Password
Login
Confirm Password
Database Design
Data Structure:
which consists various types of records. Table of Mindscape database consists attributes,
entities, and tupels for storing and manipulating records.
TABLES :
1. Admin
2. Addresses
3. City
4. Company Master
5. Country
6. Course Master
7. Folder
9. Institute Master
12. JObSeekerMaster
14. P Year
16. Salary
17. Specialization
18. State
20. Technology
END LOCALIZEABLE
---------------
var i,x,a=document.MM_sr;
for(i=0;a&&i<a.length&&(x=a[i])&&x.oSrc;i++) x.src=x.oSrc;
}
function MM_preloadImages() { //v3.0
var d=document; if(d.images){ if(!d.MM_p) d.MM_p=new Array();
var i,j=d.MM_p.length,a=MM_preloadImages.arguments; for(i=0;
i<a.length; i++)
if (a[i].indexOf("#")!=0){ d.MM_p[j]=new Image; d.MM_p[j+
+].src=a[i];}}
}
function MM_findObj(n, d) { //v4.01
var p,i,x; if(!d) d=document;
if((p=n.indexOf("?"))>0&&parent.frames.length) {
d=parent.frames[n.substring(p+1)].document; n=n.substring(0,p);}
if(!(x=d[n])&&d.all) x=d.all[n]; for (i=0;!x&&i<d.forms.length;i++)
x=d.forms[i][n];
for(i=0;!x&&d.layers&&i<d.layers.length;i++)
x=MM_findObj(n,d.layers[i].document);
if(!x && d.getElementById) x=d.getElementById(n); return x;
}
function MM_swapImage() { //v3.0
var i,j=0,x,a=MM_swapImage.arguments; document.MM_sr=new
Array; for(i=0;i<(a.length-2);i+=3)
if ((x=MM_findObj(a[i]))!=null){document.MM_sr[j++]=x; if(!x.oSrc)
x.oSrc=x.src; x.src=a[i+2];}
}
//-->
</script>
<style type="text/css">
<!-.style2 {color: #ECE9D8}
.style3 {
color: #033D49;
font-size: 36px;
font-family: "Times New Roman", Times, serif;
}
.style5 {color: #033D49}
.style6 {font-size: 16px}
.style7 {color: #5C7CC5}
.style9 {
font-size: 14px;
font-weight: bold;
font-family: Georgia, "Times New Roman", Times, serif;
color: #DFDFDF;
}
.style10 {color: #DFDFDF}
.style11 {
color: #DFDFDF;
font-weight: bold;
}
-->
</style>
</head>
<body bgcolor="#dfdfdf"
onload="MM_preloadImages('images/freedom.jpg')">
<span class="style2"></span></span>
<table border="0" cellspacing="0" cellpadding="0">
<tr bgcolor="#dfdfdf">
<td colspan="" rowspan="2"><img src="images\Logo.jpg"
alt="Header image" width="139" height="127" border="0" /></td>
<td height="63" colspan="3" id="logo" valign="bottom"
align="center" nowrap="nowrap"><span class="style3">PROCYON
SOLUTION</span> </td>
<td width="28"> </td>
</tr>
<tr bgcolor="#dfdfdf">
<td height="64" colspan="3" id="tagline" valign="top"
align="center"><span class="style5">A OUTSOURCING
COMPANY</span> </td>
<td width="28"> </td>
</tr>
<tr>
<td colspan="7" bgcolor="#003366"><img src="mm_spacer.gif"
alt="" width="1" height="1" border="0" /></td>
</tr>
<tr bgcolor="#CCFF99">
<td height="25" colspan="7" bgcolor="#306181"
id="dateformat"><span class="style10">
<marquee>
</marquee>
</span> <span class="style10">
<marquee>
</marquee>
</span>
</td>
<td width="7"> </td>
</tr>
<tr>
<td><strong>PASSWORD</strong></td>
<td><form id="form2" name="form2" method="post" action="">
<label>
<input type="password" name="textfield2" />
</label>
</form>
</td>
<td> </td>
</tr>
<tr>
<td> </td>
<td> </td>
<td> </td>
</tr>
<tr>
<td> </td>
<td><form id="form3" name="form3" method="post" action="">
<label>
<input name="Submit" type="submit" class="subHeader"
value="Submit" />
</label>
</form>
</td>
<td> </td>
</tr>
<tr>
<td> </td>
<td> </td>
<td> </td>
</tr>
</table>
</td>
<tr>
<td width="40"><img src="mm_spacer.gif" alt=""
width="40" height="1" border="0" /></td>
<td width="110" id="sidebar"
class="smallText"><br />
<p><img src="\images\BPO.jpg" alt="Image 1"
width="110" height="110" vspace="6" border="0" /><br />
Employee retention matters as organizational
issues...<br />
<a href="javascript:;">Read more ></a></p>
<p><img src="\images\DISH.JPG" alt="Image 2"
width="110" height="110" vspace="6" border="0" /><br />
The BPOs in India face an enormous challenge...<br />
<a href="javascript:;">Read more ></a></p>
<br />
<br />
<br />
</td>
<td width="40"> </td>
</tr>
</table>
</td>
<td width="28"> </td>
</tr>
<tr>
<td width="165"> </td>
<td width="167"><object classid="clsid:D27CDB6E-AE6D-11cf-96B8444553540000"
codebase="http://download.macromedia.com/pub/shockwave/cabs/flash
/swflash.cab#version=5,0,0,0" width="125" height="40" title="home">
<td width="28"> </td>
</tr><tr><td width="=1000"> </td>
</tr>
</table>
</body></html>
END LOCALIZEABLE
---------------
.style3 {
color: #033D49;
font-size: 36px;
font-family: "Times New Roman", Times, serif;
}
.style5 {color: #033D49}
.style6 {font-size: 16px}
.style7 {color: #5C7CC5}
-->
</style>
</head>
<body bgcolor="#dfdfdf" onload="MM_preloadImages('images/IT
outsourcing.gif')">
<span class="style2"></span></span>
<table width="100%" border="0" cellspacing="0" cellpadding="0">
<tr bgcolor="#dfdfdf">
<td width="382" colspan="3" rowspan="2"><img
src="images\Logo.jpg" alt="Header image" width="139" height="127"
border="0" /></td>
<td width="378" height="63" colspan="3" id="logo" valign="bottom"
align="center" nowrap="nowrap"><span class="style3">PROCYON
SOLUTION</span> </td>
<td width="100%"> </td>
</tr>
<tr bgcolor="#dfdfdf">
<td height="64" colspan="3" id="tagline" valign="top"
align="center"><span class="style5">A OUTSOURCING
COMPANY</span> </td>
<td width="100%"> </td>
</tr>
<tr>
<td colspan="7" bgcolor="#003366"><img src="mm_spacer.gif"
alt="" width="1" height="1" border="0" /></td>
</tr>
<tr bgcolor="#CCFF99">
<td height="25" colspan="7" bgcolor="#306181"
id="dateformat">
<script language="JavaScript" type="text/javascript">
document.write(TODAY); </script></td>
</tr>
<tr>
<td colspan="7" bgcolor="#003366"><img src="mm_spacer.gif"
alt="" width="1" height="1" border="0" /></td>
</tr>
<tr>
<td width="165" valign="top" bgcolor="#DFDFDF">
<table width="165" cellpadding="0" cellspacing="0"
id="navigation">
<tr>
<td width="165"> <br />
<br /></td>
</tr>
<tr>
<td width="165"><a href="Home.html"
class="style6">Home</a></td>
</tr>
<tr>
<td width="165"><a href="Services.html"
class="style6">Services</a></td>
</tr>
<tr>
<td width="165"><a href="Article.html"
class="style6">Article</a></td>
</tr>
<tr>
<td width="165"><a href="Career.html"
class="style6">Career</a></td>
</tr>
<tr>
<td width="165"><a href="Contact.html"
class="style6">Contact</a></td>
</tr>
<tr>
<td width="165"><a href="SiteMap.html"
class="style6">Sitemap</a></td>
</tr>
</table>
<br />
<br />
<br />
<br />
</td>
<br />
<br />
<table border="0" cellspacing="0" cellpadding="0" width="306">
<tr>
<td width="306" class="pageName style7">Procyon solution
Services </td>
</tr>
<tr>
<td class="bodyText"><p align="justify"><a href="Home.html"
onmouseout="MM_swapImgRestore()"
onmouseover="MM_swapImage('services','','images/IT
outsourcing.gif',1)"><img src="images/bpo_compaq.JPG" alt="services"
name="services" width="300" height="150" border="0" id="services"
/></a> The BPOs in India face an enormous challenge in reducing
attrition rate and this being a nascent industry needs to draw parallels,
examples from other industry practices as well as develop innovative
Employee Relation Initiatives as highlighted below. This has been
classified into three groups
.
<p>1. The Corporate level</p>
<p>2. Managerial/supervisory level</p>
<p>3. Employee Recognition Initiatives</p>
<p>· To bring stability in business and increase
customer service process.</p>
<p align="justify">· Nasscom has estimated that
the Indian ITES industry will gross over $5.7 billion by 2005 (based on a
conservative year-on-year growth of 65 percent by Nasscom).</p>
</td>
</td>
<td width="40"> </td>
</tr>
</table>
</td>
<td width="100%"> </td>
</tr>
<tr>
<td width="165"> </td>
<td width="50"> </td>
<td width="167"> </td>
<td width="138"> </td>
<td width="50"> </td>
<td width="190"> </td>
<td width="100%"> </td>
</tr>
</table>
</body>
</html>
END LOCALIZEABLE
---------------
<tr bgcolor="#dfdfdf">
<td width="382" colspan="3" rowspan="2"><img
src="images\Logo.jpg" alt="Header image" width="139" height="127"
border="0" /></td>
<td width="378" height="63" colspan="3" id="logo" valign="bottom"
align="center" nowrap="nowrap"><span class="style3">PROCYON
SOLUTION</span> </td>
<td width="100%"> </td>
</tr>
<tr bgcolor="#dfdfdf">
<td height="64" colspan="3" id="tagline" valign="top"
align="center"><span class="style5">A OUTSOURCING
COMPANY</span> </td>
<td width="100%"> </td>
</tr>
<tr>
<td colspan="7" bgcolor="#003366"><img src="mm_spacer.gif"
alt="" width="1" height="1" border="0" /></td>
</tr>
<tr bgcolor="#CCFF99">
<td height="25" colspan="7" bgcolor="#306181"
id="dateformat">
<script language="JavaScript" type="text/javascript">
document.write(TODAY); </script></td>
</tr>
<tr>
</td>
1.
Have
people
from
other
walks
of
life
to
talk
about
their
SYSTEM TESTING
Test Case Design
Testing Methodology:
Software testing is critical element of software quality assurance and represents the ultimate
review of specification, design and coding. It is used to detect errors. Testing is a dynamic
method for verification and validation, where the system to be tested is executed and the
behavior of the system is observed.
Testing Objectives:
1.
2.
A good test case is one that has a high probability of finding an as-yet-undiscovered
error.
3.
4.
The above objectives imply a dramatic change in viewpoint. They move counter to
the commonly held view that a successful test is one in which no errors are found.
Our objective is to design tests that systematically uncover different classes of errors
and do so with a minimum amount of time and effort.
Testing Technique:
The techniques followed throughout the testing of the system are as under
Black-Box Testing:
Black box testing focuses on the functional requirements of the software. That is, Black Box
testing enables the software engineer to derive sets of input conditions that will fully
exercise all functional requirements for a program. Black Box Testing is not an alternative to
white-box techniques. Rather, it is a complementary approach that is likely to uncover a
different class of errors than white-box methods.
Black-Box Testing attempts to find errors in the following categories:
1. Incorrect or missing functions.
2. Interface errors.
3. Errors in data structures or external data base access.
4. Performance errors.
5. Initialization and termination errors.
Unlike White Box Testing, which is performed early in the testing process, Black Box
Testing tends to be applied during later stages of testing. Because Black Box Testing
purposely disregards control structure, attention is focused on the information domain. Tests
are designed to answer the following questions:
1) How is functional validity tested?
2) What classes of input will make good test cases?
3) Is the system particularly sensitive to certain input values?
4) How are the boundaries of a data class isolated?
5) What data rates and data volume can the system tolerate?
6) What effect will specific combinations of data have on system operation?
By applying black box techniques, we derive a set of test cases that satisfy the following
criteria:
Test cases that reduce, by a count that is greater than one, the number of additional test
cases that must be designed to achieve reasonable testing, and
Test cases that tell us something about the presence or absence of classes of errors,
rather than errors associated only with the specific test at hand.
White-Box Testing:
White Box Testing knowing the internal workings of a product tests can be conducted to
ensure that internal operations are performed according to specifications and all internal
components have been adequately exercised.
Using white box testing methods the test cases that can derived are:
(1) All independent paths with in a module have been exercised at least once.
(2) Exercise all logical decisions on their true and false sides.
(3) Execute all loops at their boundaries and within their operational bounds.
(4) Exercise internal data structures to ensure their validity.
Test Execution
1) Condition Testing :
Condition testing is a test case design method that exercises the logical conditions contained
in a program module. If a condition is incorrect then at least one component of the condition
is incorrect. Therefore, types of errors in a condition include the following.
Boolean operator error
Boolean variable error
Boolean parenthesis error
Relational operator error
Arithmetic expression error
2) Loop Testing:
Loops are the corner stone for the vast majority of all algorithms implemented in software.
Loop testing is a white-box testing technique that focuses exclusively on the validity of loop
constructs. Four different classes of loops:
Simple Loops
Nested Loops
Concatenated Loops
Unstructured Loops
3) Dataflow Testing :
The dataflow testing method selects test paths of a program according to the location of
definitions and uses of variables in the program. In this testing approach, assume that each
statement in a program is assigned a unique statement number and that each function does
not modify its parameters or global variables.
It is useful for selecting test paths of a program containing nested if and loop statement. This
approach is effective for error detection. However, the problems of measuring test coverage
and selecting test paths for data flow testing are more difficult than the corresponding
problems for condition testing.
Testing Strategies
A strategy for software testing integrates software test case design methods into a well
planned series of steps that result in the successful construction of software. A software
testing strategy should be flexible enough to promote a customized testing approach.
Unit Testing:
Unit testing focuses verification efforts on the smallest unit of software design. It is white
box oriented. Unit testing is essentially for verification of the code produced during the
coding phase and hence the goal is to test the internal logic of the module. Others consider a
module for integration and use only after it has been unit tested satisfactorily.
(1)
The module interface is tested to ensure that information properly flows in and out of
program.
(2)
Local data structure is examined to ensure that data stored temporarily maintain its
integrity.
(3)
Boundary conditions are tested to ensure that modules operate properly at boundary
limits of processing.
(4)
All independent paths are exercised to ensure all statements in a module have been
executed at least once.
(5)
Integration Testing:
Integration testing focuses on design and construction of the software architecture. For
example: - We followed a systematic technique for constructing the program structure that is
putting them together- interfacing at the same time conducting tests to uncover errors. We
took unit tested components and build a program that has been dictated by design.
Validation Testing:
It is achieved through a series of Black Box tests. An important element of validation
process is configuration review. It is intended for all the elements are properly configured
and cataloged. It is also called AUDIT.
System Testing:
The last high-order testing step falls outside the boundary of software engineering and into
tile broader context of computer system engineering. Software, once validated, must be
combined with other system element (e.g., hardware, people, and database).
System testing verifies that all elements mesh properly and that overall system
function/performance is achieved.
It is a series of different tests whose primary purpose is to fully exercise the computer-based
system. Although each test has a different purpose all work to verify that system elements
have been properly integrated and perform allocated functions.
Validation Checks:
This is the most important section of the software requirement specification. Different
classes of tests are conducted to validate function, performance and constraints. This section
Error Type
Software testing is a critical element of software quality assurance and represents the review
of the specification, design and coding. As errors are very prone and every experienced
programmers makes mistakes from time to time. Error generally encountered in any project
is to be tested in testing phases are: Syntax errors:
A syntax error occurs when the compiler cannot compile the code it is given. Some of the
keywords may be misspelled, some of the variables may not be declared etc.
For example :
If we defined the keywords incorrectly or just missed any of the semicolons etc. then it will
be comes under syntax error.
public interface intcnt
{
Int32 cntcod
{
Get
set;
}
String cntnam
{
get;
set;
}
}
Also here in the above code string and int32 are the keywords and error will occur that non
defined attributes.
If any of the above keyword like cntcod or cntnam is not defined then error will occur as not
defined the variables.or the scope should be either private or public should be defined
carefully.error will be occur like out of scope or variable not defined above.
Run time errors:
Run-time errors occur when the application attempts to perform an operation that is not
allowed. This includes operations that are impossible to carry out, such as division by zero,
and the operation that are not allowed as in the case of security exception. When the run
time error occur, an exception describing the error is thrown.
Logical errors:
Logical errors occur when the application compiles and executes correctly, but does not
produce the expected results. These can be the most difficult type of error to track down
because there is no indication as to the syntax errors..
For example in the above project if the class file is compiled correctly but the object will not
call properly or at the wrong place.
Various testing strategies used while developing this project and these are:Unit Testing
Individual forms are tested and corrected from errors as explained: Designing Test Cases: As a minimal starting point, every line of code must be tested. Thus
if any decision structure are present in your method, you will need to define test cases that
include all of the possibilities presented by that structure. The number of test cases needed to
run every line of code testing of all possible data paths should be considered the absolute
minimum for designing a unit test plan.
ONLINE CAREER COUNSELLING project since we have developed it in ASP.NET
using visual studio 2008 then while writing the line wise coding each and every line
compiled under the build option provided inbuild.if we are misspelled any of the keywords
or scope is not defined properly then while compiling that line error will be shown.
Testing Data: Testing the functionality of all possible data point provides a good stating
point for test plan. But to make application robust, one must test that it can handle different
kind of data. Application must behave normally and give expected results when data within
normal parameters is provided, and it should gracefully and appropriately handle data that is
out side of the specified bounds. Thus , to be complete, one must test application with a
variety of data inputs that are normal and extraordinary.
Test cases
IMPLEMENTATION:Implementation uses the design document to produce code. Demonstration that the
program satisfies its specifications validates the code. Typically, sample runs of the program
demonstrating the behavior for expected data values and boundary values are required. Small
programs are written using the model: Write/Compile/ Test
It may take several iterations of the model to produce a working program. As
programs get more complicated, testing and debugging alone may not be enough to produce
reliable code. Instead, we have to write programs in a manner that will help insure that errors
are caught or avoided.
Top-Down Implementation: Top down implementation begins with the user-invoked module and works toward
the modules that do not call any other modules. The implementation may precede depth-first
or breadth-first.
Bottom-Up Implementation: -
Implementation begins with modules that do not call any other modules and works
toward the main program. Test harness (see below) is used to test individual modules. The
main module constitutes the final test harness.
Stub Programming: Stub programming is the implementation analogue of top-down and stepwise refinement.
It supports incremental program development by allowing for error and improvement. A stub
program is a stripped-down, skeleton version of a final program. It doesn't implement details
of the algorithm or fulfill all the job requirements. However, it does contain rough versions
of all subprograms and their parameter lists. Furthermore, it can be compiled and run.
Extensive use of procedures and parameter are the difference between stub programs and
prototypes. Quick and dirty prototypes should be improved--they should be rewritten. A stub
program helps demonstrates that a program's structure is plausible. Its procedures and
functions are unsophisticated versions of their final forms, but they allow limited use of the
entire program. In particular, it may work for a limited data set. Often the high-level
procedures are ready to call lower-level code, even if the more detailed subprograms haven't
even been written. Such sections of code are commented out. The comment brackets can be
moved, call-by-call, as the underlying procedures are actually written.
Incremental Program Development: As program become more complex, changes have a tendency to introduce
unexpected effects. Incremental programming tries to isolate the effects of changes. We add
new features in preference to adding new functions, and add new function rather than writing
new programs. The program implementation model becomes:
------ Define types/compile/fix;
------ Add load and dump functions/compile/test;
------ Add first processing function/compile/test/fix;
------ Add features/compile/test/fix;
MAINTENANCE
Maintenance means restoring something to its original condition. It covers a wide range of
activities, including correcting coding and design errors, updating documents and test data,
and upgrading user support. I will try, that problems encountered during the postimplementation review will be successfully removed from that system.
Enhancements
Enhancements means adding, modifying, or redeveloping the code to support changes in the
specifications, it is necessary to keep up with the changing user needs and operational
environment. Although there are no changes in the System Requirement Specifications but
the system can be made more efficient by introducing the following new features to it.
The quality and reliability of the software depends on the result of the phases in the system
development. The software quality includes the modularity, good documentation, user
friendliness, maintainability etc. The software reliability depends on the less chances of the
failures and enhancements in the system. As far as this system is concerned, it tries to make
the system user friendly as possible where a user can handle a system very comfortably. The
system was designed in various modules and used menu driven, so it is easy to understand
the system during the use. The goals accomplished in designing / developing of this system
are:
Minimum Effect
Ensures that every effort will be required to start the data entry and the generation, and
modifying the information about various users of the system.
Accuracy
Accuracy is the main concern of the proposed system.
Flexibility
Provide maximum flexibility to the administrator in maintaining and modifying the
information about various users of the system.
Security
Since the information entered is of vital importance to the organization and to be entered
only once, provision will be made to allow only the authorized user to manipulate the data.
REFERENCES
http://msdn.microsoft.com/en-us/library/zw4w595w(VS.71).aspx
http://www.microsoft.com/net/overview.aspx
http://edndoc.esri.com/arcobjects/9.1/ArcGISDevHelp/DevelopmentEnvs/DotNet/Int
roduction
http://msdn.microsoft.com/en-us/library/8bs2ecf4(VS.71).aspx
http://www.slideshare.net/rishikothari/aspnet-overview
http://msdn.microsoft.com/en-us/library/4w3ex9c2.aspx
http://en.wikipedia.org/wiki/ASP.NET
http://www.codeproject.com/kb/aspnet/aspnetintro.aspx
http://talk.thewebhostingdir.com/asp-asp-net/24756-features-clr-asp-net.html
http://www.codeguruindia.com/tutorials/post/CLR-Common-Language-RuntimeFeatures-and-Benefits.aspx
http://www.exforsys.com/tutorials/asp.net-2.0/application-development-in-.net.html
http://www.stardeveloper.com/
http://www.microsoft.com/sqlserver/2005/en/us/top-30-features.aspx
http://www.buzzle.com/articles/new-features-in-sql-server-2005.html
http://en.wikipedia.org/wiki/Feasibility_study
http://www.answers.com/topic/feasibility-study-2
http://webcache.googleusercontent.com/search?q=cache:8fmAO1OsYcJ:www.processimpact.com/process_assets/srs_template.doc+system+require
ments+s pecification&cd=4&hl=en&ct=clnk&gl=in
http://en.wikipedia.org/wiki/Systems_design
http://en.wikipedia.org/wiki/Top-down_and_bottom-up_design
http://publib.boulder.ibm.com/tividd/td/ITIM/SC32-170800/en_US/HTML/im460_plan76.html
http://en.wikipedia.org/wiki/System_testing
The software is become more user friendly by adding some other facilities through
the software.
The software can be improved in the future by implementing some of the addition to
the present software.
This project has been developed keeping in view of the current requirements of the
industries.
Windows and Web based full mouse and keyboard supported forms.
CONCLUSION
The vocational trainings are very useful for the students of engineering. These
trainings help student to set up their mind towards the professional environment. It helps the
students in developing decision making aptitude and also makes them stand in discussions
related to programming, marketing and networking etc.
During this particular training the students can implement practical on all the
theoretical that they have studied.
The well planned, properly executed and evaluated training helps a lot in inculcating
good work culture. It provides linkage between the student and the industry approach to
problem solving based on board understanding of plant, processes and modes of operations
of the industrial organization.
The training has provided me an opportunity to have practical experience that has
increased my sphere of knowledge to a great extent. I have tried my best to put all my
experience and knowledge acquired up till now in the project of Automation of fixed deposit
system in bank. This project is an effort to obtain expected results and fulfill all the
requirements and needs of the user.
BIBLIOGRAPHY
Programming in C#
By E Balagurusamy.
C#
W.Rox
C# 2008 programming
Covers .NET 3.5
Black Book
Microsoft
.NET FRAMEWORK 2.0
Window-Based
Client Development
PL/SQL
By Ivan Bayros
Software Engineering
Pankaj Jalote
Web Site:-
www.google.com
www.ask.com
www.msdn.com