Job Site Documentation 32(ank)

  • November 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Job Site Documentation 32(ank) as PDF for free.

More details

  • Words: 10,740
  • Pages: 96
COMPANY PROFILE

The

Metric

Soft

is

a

true

21st

century

company

offering superior services from a global staff of 117, dedicated to making every client and every project our top priority. From our humble beginnings as an IT consulting firm we have always maintained our staff as our greatest feature. For us a project is not only measured by end results, but also by the relationship created along the way. We make each project our own, not only keeping landmarks but also gaining a greater understanding of our clients during the course of the journey. How we work is as important to us as what we accomplish. From our site project managers to our satellite office logistics personnel, our people are the very heart of our enterprise. While many firms offer a transitional staff assembled on a per-project basis, we maintain a substantial list of employees and long-term contractor relationships enabling us to guarantee a higher degree of excellence and competence for our clients. All of this means that The Metric Soft has the talent, support and resolves to make even the most unusual project into a viable success. The Metric Soft began business in 1996 as an Information Technology Outsourcing (ITO) services provider.

SERVICES OVERVIEW: The right combination of expertise, affordability, responsiveness and quality. The Metric soft solutions reflect outsourcing at it best.

METRIC SOFT ADVANTAGE: From day one, Metric Soft greatest advantage has been our “beyond possible” philosophy. It's an approach that drives everything we do.

1

RESEARCH & DEVELOPMENT: Metric Soft has the expertise and experience in managing extended teams with highly complex research groups. 1. Increasing Business Value 2. Reliable Global Partner

Increasing Business Values: The Metric Soft is an established IT consulting and services company offering a wide range of Software solutions that help deliver superior business value. We conceptualize and develop industry-specific technology solutions that are tailored to our customers’ requirements. We have successfully undertaken and completed IT engagements for global corporations including Fortune 500 companies in 58 countries. We help our customers remain competitive by providing cost-effective and customized solutions in application development and maintenance, enterprise resource planning SAP and Oracle. Our domain expertise in focus areas including BFSI, Telecom, Manufacturing, ISVs and International Organizations enables us to offer business relevant

Solutions. Complementing this domain expertise is our focus on quality. We are committed to providing consistently high quality delivery.

Reliable Global Partner Proven Track Record Focus on Customer Relationships Flexible Engagement Models Seasoned Team

2

Established Software Processes Knowledge Building

SERVICES: SAP IMPLEMENTETION SERVICES: Software development and integration are central to most information systems projects. We specialize in consulting services for any software development life cycle environment. Our consultant's focus is on delivering effective software systems to businesses that are committed to any designing and developing tools. We will also provide support for the end users of the software. Millennium offers a complete line of object-oriented development services and technology advantages for windows-centric solutions including project management, development, testing and software support. We take care of the development process right from Problem definition through testing to implementation and support. We will envision your new ideas to a quality business solution. Our software development strategy has helped our clients achieve higher ROI, lower maintenance cost and greater competitiveness in business.

APPLICATION MANAGEMENT: We will partner with your Information Technology division to ensure all your application maintenance needs are met. We will work with you as an extension of your division and we have the high quality process and the expertise to take the challenge and responsibility of maintaining your existing portfolio.

DATABASE DEVELOPMENT: Stores of data and information can be the most important assets of an enterprise. Our highly skilled professionals have extensive experiences in system design and

3

development using SQL Server, Sybase, DB2, Oracle, and Informix. We increase the value of large-scale databases through our expertise in data modeling, database and data warehouse design and implementation, and database administration. We undertake software projects as a fully managed end-to-end service and deliver them within schedules and budgets agreed upon with the client. The application development services provided by us span the entire project life cycle from requirements analysis, design, development, testing, integration, delivery, and implementation to after-sales support. We offer the complete suite of traditional SAP implementation /services for SAP R3 and my SAP Business Suite solutions including: Business Blueprint Implementation Configuration Integration Ongoing Support Project Management

Rapid SAP Implementation: Fast implementations of SAP All In One with industry templates and minimal customization and integration.

Rapid Enterprise Portal: Fixed price, fixed scope SAP Enterprise portal deployments including role definition, directory integration, employee Self-service functions and views.

SAP Upgrades: For customers considering SAP upgrades to Enterprise or other dictions.

4

SAP Support on Demand: Zero entry cost SAP functional and technical support services, delivered via our technical experts.

SAP TOTAL SUPPORT: Full application life cycle management services, backed by contracted Service Level Agreements (SLAs).

SAP Archiving: Clean up your SAP database with our Archiving services to deliver vastly improved performance.

SAP Hosting: Infrastructure management for demanding 24x7 mission-critical SAP systems.

EMBEDED System Information Embedded System: A Special-purpose System in Which the Computer Is Completely encapsulated by the Device It Controls.

Embedding: One Instance Of Some Mathematical Object Contained Within Another Instance.

Distributed Generation: Also Known As Embedded enervation Or Decentralized Generation.

CLIENTS: •

Panasonic



Fidelity



Pratt & Whitney



Nike



Walmart

5



Pfizer



Alcon Laboratories, Inc.



Apex Foot Health Industries, Inc.



Barco View



LLC Cybernet Systems Corp.



Everest & Jennings



Mexico Hyperbaric Technologies, Inc.



Monroe, Inc.



Postin Technologies, Inc.



Fukuda Denshi Co., Ltd.



Silgreen Inc.



IBC Asia Ltd.



Oriental System Technology Inc.



Wilson Glove Co.

6

7

ABSTRACT What contribution would the Project make: The project would help in effective and systematic record keeping that is storing and retrieving of useful data. Project will be able to give the report so that management can make decisions on the basis of those reports. Scope of the study: The main Scope of study: 1. It should contain all the information of Company and Vacancy which is registered in this site. 2. It should contain all the information of Job Seeker like Personal Detail, Professional Detail, and Educational Detail etc. 3. It should process and evaluate jobs registered by companies. 4. It should contain information related to Job expiry or re registration. 5. It should inform both Job Seeker and Job Provider when the appropriate person is found for a job. 6. It should maintain proper financial records. 7. It should have Administrator for scheduling administrative work of site. Objective of the project: Computerized on Line Job Search System is developed to facilitate the General administration system to manage the various information of the Job Seeker and Job Provider and the processes involved in a placement company. So, that

8

organization can access accurate information quickly and easily as and when required, thereby improving its operational efficiency & effectiveness In today’s competitive environment, where Everybody wants to be on the top, Information plays very crucial role. As fast as information is accessed and processed, it can give good results. Today Internet is the fast way of transferring Data and Information over wide area, hence I have used internet as a way for exchanging information. Computerized system helps to fulfill these goals. Computerization of the official works will help in doing lot of manual work quickly. It will help in easy storage and access of all information, in short period of time.

Specific Objective of the site: Objective of doing this project is to enhance my knowledge in the field of E-com technology using java (j2ee) as a language. Some of the client requirement and objectives of this site is as under:•

To increase the business of Client.



To make it Global.



To facilitate job search.



To facilitate company so that it can search for best candidates available.



To help candidates to fetch a right job.



To act as a middle men connecting Job seeker and Provider



User can search for different options available.



User can do on-line resume posting etc.



User can use search engine to look for different vacancies, facilities available etc.



User can do apply for job on-line.



User can download different forms etc.

So these are some of the objectives which we have to accomplish. Features of the site: 9

It has the features of providing all the information online (through the net). About the Vacancy and About the Job seeker.



The Job site is a special purpose web site as discussed above it is not a Portal.



The site includes the search engine and advance search engine which gives the user easy way to find the Vacancy and eligible candidate for a post.



The site also includes the electronic mail facility for the users who have registered themselves.



The site acts as a middle-ware for the Job Seeker and Job Provider.



The site has the facility to inform the Seeker and Company about the job and candidate.

10

11

Modules of project: The project can be divided in to four main modules. •

Registration module



Job Seeker Administration section



Job Provider Administration section



Test your skills

Module 1: Registration module, which is further sub-divided into:•

Job Seeker Registration.



Job Provider Registration.



Change Password Job Seeker.



Change Password Job Provider.



Forget Password Job Seeker.



Forget Password Job Provider.



Login for both Job Seeker and Job Provider.

Module 2: Job Seeker Administration section, which is further sub-divided into •

Resume Registration under Vacancy Category.



Resume Updating



Search for Job according to his skill set.

12



Expert Guidance.



Application Status.

Module 3: Job Provider Administration section, which is further sub-divided into four subsections: •

Register Vacancy.



Update Vacancy.



Search for eligible candidate.



Check Job Status.

Module 4: Check skills section which is further sub-divided into two sub-sections: •

Beginners



Intermediate



Expert

Site Working :Case A Job Seeker Administration:•

Job Seeker has to register him self with the site.



This is a free site for Job Seeker. 13



After success full Log in Job Seeker can register his resume.



Job Seeker Register his Bio Data in a particular Vacancy Category.



He can also update his resume.



He can search for Vacancy according to his skill set and can apply for a job.



He can check his Job Status i.e. from where does he get a response.

Case B Job Provider Administration:•

Company has to register it self.



After success full Login Company can register Vacancy.



Registration for Vacancy will generate Vacancy Id.



Company can update a Vacancy.



Company can search for skill full candidate to fill up Job.

14

15

Existing System When the requirement of this system is putted before the team they was willing to know that how the employee of the company is working. Then the study is done it gives the result that all the work is done manually and there is nothing that help the employee to save the time and do the work with the system. All the documentation is done by the employee of the company. A lot of works have to be done before the candidates are placed in an organization. All that the company needs to store about the job seekers must be written on the paper. Some times it is very difficult to know about some special highlights of the job seeker, because the information is stored on the paper and it is not clear that due to human error or by some other means this paper is lost and the information is now not in the hands of the company. At the time of hiring the companies policy says that the only those companies can hire who are registered with SEEKJOB. So it is critical task to find out the registered employer, when the company has so many employers. There is extra requirement of employee who have to check that the requesting person is an registered employer. This seams a critical task Limitations The current system have all the problems which generally in count in the manual system such as wastage of time, wastage of money, more efforts to work etc. if the responsible person wants the full information of the total sale of various models of the vehicles at various center at the evening then he/she can not get it. Because the current system work manually and it is very slow same as if he/she wants the total 16

production then it take time. The current system can not give the fast response as needed. It also does not keep records of grievances of the faults in the vehicles in various parts of the country. If he/she wants the information regarding the total stock at various warehouses at his\her office then using current system he\she can not get it. He\she can not get the full information on time. It may be late and this process is time consuming and generally the administrators receive the relevant information next day which is the major limitation of existing system. Proposed system: This site is an attempt to make the task of administrator as well as jobseekers easier. This project ensures the consistency by enabling the jobseekers to register themselves and to find the desired information of jobs, get them involved with the jobsite and can access the different services provided by the jobsite. The administrator has the right to know everything. He has the right to know the details of the jobseekers, has the right to change any service that the jobsite is currently providing or can add services which are not being provided currently. Even the customer’s passwords and hidden details are accessible by the administrator. Now jobseekers are able to apply online also. Through this system all works are done through computer so it results in fast service provider. The jobseekers can also contact the company officials through email or his contact numbers but first they have to register themselves as a member by filling up a registration form which can be filled online. Once registered, jobseekers can access this jobsite and register for any services being provided by seekjob.com, that too online by sitting at home within a fraction of a second by a flick of a button. Aim of this project is to provide an environment helpful for administrator and jobseekers as well, so that, they find it easy to implement it without any harassment for the jobseekers also. This project is developed after a

17

Through study of the existing manual system & the jobseekers requirements. Requirement analysis is concerned with identifying the basic function of software component in a hardware & software system.

Features of proposed system: •

The features of the proposed system are as follows.



Provide the full information of employees/employer at various places at one site.



Provide the full information of total vacancies at various regions at one site .



Provide the full information of total vacancies of various industries/companies at one site.



Helps the management to find out the current trend in industries as well as current manpower pool.

18

19

Feasibility Study : A feasibility study is conducted to select the best system that meets performance requirement. This entails an identification description, an evaluation of candidate system and the selection of best system for he job. The system required performance is defined by a statement of constraints, the identification of specific system objective and a description of outputs. The key consideration in feasibility analysis are : Economic feasibility The proposed system is economically feasible because the cost involved in purchasing the hardware and the software are within approachable. The personal cost like salaries of employees hired are also nominal, because working in this system need not required a highly qualified professional. The operating-environment costs are marginal. The less time involved also helped in its economical feasibility. The benefits of this project include four types: Cost – saving benefits This project reduces the administrative and operational cost. Because of the reduction in the use of paper, use of labors the cost also reduces. Improve-service-level benefits

20

Proposed system improves the system’s performance because the current system is based on manual processing while the proposed system is based on computer processing. Improve-information-level benefits It provides better information in the stipulated space and time for decision-making. Time-saving-benefits It saves lots of time and provides the same result in a far lesser period of time. Te c hn ic a l Fe a s ib ilit y

HARDWARE & SOFTWARE REQUIREMENT SPECIFICATIONS Hardware requirement for development Hardware Configuration 

Processor



Memory

: Intel Pentium 4 CPU, 2.66GHz

 RAM

:

256 MB DDR

 Hard Disk

:

40 GB SATA



Mouse

: Quantum



Keyboard

: Samsung (Multimedia Supported)



Drive

: CD-RW, Floppy drive



Printer

: HP-Laser printer

Hardware requirement for Implementation

21



Processor:  Minimum



:

568 MHz Pentium Processor

Memory:  RAM

:

64 MB

 Hard Disk

:

4 GB



Display

:

1024 * 768, True Type Color-32 Bit



Mouse

:

Any Normal Mouse.



Keyboard

:

Any window Supported Keyboard.

Software requirement for development Software Configuration 

Operating System

:

Windows XP Professional



Front End Dream weaver

:

Java, Java Server Pages, HTML,



Back End

:

Oracle 8i/MS-Access

Behavioral Feasibility Employees of the company are habitual of working with manual system and don’t have the knowledge of working in a computer application based environment that is used in their intranet and are generally resistant to make changes in their working attitude. People are inherently resistant to change and computers have been known to facilitate changes. An estimate should be made of how strong a reaction the staffs are likely to have towards the development of an online computerized system because now this may lead to expulsion of some of the staffs from their jobs. So a system has to be chosen which will provide them much more facilities and less mental disturbance to check weather correct entry is entered and that too at 22

its right place. The System will provide them automatic reporting and checks on entries while storing as well as entering. So the front end has been made user friendly for both the jobseekers and the employees.

23

Symbols Used :In order to create DFD’s we used following symbols:Input/Output Data Processing

Flow of data 1. One way data flow. 2. Two way data flow. Data store

24

Database

25

EMPLOYEE/CONSULTANT

JOBSEEKER/USER

Give

Give details

Give job Opening

Give applicant details

Get vacancy detail Get emp. details

Get vacancy Details JOBSEEKER MANAGEMENT

Report of selected applicants

Selection process status Resume status

0-Level Data Flow Diagram

26

User ID

User ID Logi n

Location

If valid

User

If New Passwor d

Password New User

New User

Password

27

User

Id & password

Valid Id & password

Seeker login Process

Job Section

Registration details

New Job seeker

Job details

Search job & news New Employer login

EMPLOYER

Registrati on details

Id & Passwor d

Employer Login process

Employer

User

Seeker details Get details

News letter

Com info.

Job search

Job details Jobs

2-Level data Flow Diagram

28

Job seeker

29

E-R DIAGRAM Emp_i Qualificatio Job location

Password

LName Experience

Fname

Skills

High Speci.

Job loc.

Email id

Job cat.

Maintain Username

Com.

Jobseeker

Has

Check User

Job Seek Control

Registration

Job Exp

Jobs

Username

Name Email Jobseeker Manageme nt

News letter Password Userna

Site login

Registration Employer 30

Site map login

Emil Company name

Reference_no

Location

Remark

User name Passwor

Employer Check

31

Emp control

DATABASE DESIGN In our data flow diagram, we give names to data flows, processes and data stores. Although the names are descriptive of data, they do not dive details .So following DFD, our interest is to build some details of the contents of data flows, processes and data store. A data dictionary is a structured repository of data about data .It is a set of rigorous definitions of all DFD data elements and data structures .The data dictionary for the current system has been given as under:

Tables for Project: Employer: This table maintains details of Employer Field Name

Data Type

User name Password company-name company-location company email

Text Text Text Text Text

Jobs: This table maintains details of Jobs Field name

Data type

username Job company Job category Job location Job_exp Job email

Text) Text Text Text Text Text 32

emp_phone emp_email

Text Text

Vacancy: This table maintains detail of jobs for which vacancies are open Field Name

Data Type

User name Password fname lname email jobloc prfjobloc exp jcat key skills highest degree specialization

Text Text Text Text Text Text Text Text Text Text Text Text

Newsletter: This table stores and maintains status news Field Name

Data Type

Name email

Text Text

Site admin: This table stores and maintains status site admin Field Name

Data Type

Username Password

Text Text

33

34

Main Form

35

Jobseeker login

36

New Jobseeker Signup

37

Employer login

38

New Employer Signup

39

Site administrator login

40

Tips

41

Interview Tips for Professionals

42

Resume Tips for Professionals

43

Job Fair List

44

Contact us

45

Newsletter Subscription

46

Hot Vacancies

47

IT JOBS Openings

48

New JOBS This Week

49

SeekJOBs.com success stories

50

JOBS For Disabled people

51

Job Fair list

52

53

Testing Testing plays a critical role in quality assurance for software .Due to the limitation of the verification method for the previous phases, design and requirement fault also appear in the code. Testing is used to detect these errors, in edition to the error introduced during coding phase. Testing is a dynamic method for verification and validation, where the system is to be tested is executed and behavior of the system is observed. Due to this testing the failure of the system can be observed, from which the presence of fault can be deduced. However, separate activities have to be performed to identify the faults. There are two method of testing: functional and structural. In functional testing, the internal logic of the system under testing is not considered and the test cases are decided from the specification or the requirements. It is often called “Black Box Testing”. Equivalence class partitioning, boundary analysis, and cause effect graphing are examples of methods for selecting test cases for functional testing. In structural testing, the test cases are decided entirely on the internal logic of the program or module being tested. As the goal of testing is to detect any errors in the programs different flavor of testing are often used. Unit testing are used to test a module or a small collection of modules and the focus is on detecting coding errors in modules. During integration testing modules are combined into sub-system, which are then tested. The goal here is to test the system design. In system testing and acceptance testing, the entire System is tested. The goal here is to test the requirement themselves. Structural 54

testing can be used for unit testing while at higher level mostly functional testing is used. In the project Monthly Materialization Report System we used the unit testing and functional testing. System testing is a critical phase in systems implementation. Testing of a system involves hardware device testing and debugging of computer programs and testing information processing procedures. Testing can be done with test data, which attempts to simulate all possible conditions that may arise during processing. The plane for testing are prepared and then implemented. The testing methods adopted in the testing of the system were Independent Unit Testing and System Testing Independent Unit Test (IUT) IUT focuses first on the modules, independently of one another, to locate errors. This enables the tester to detect errors in coding and logic that are contained within that module alone. Those resulting from the interaction between modules are initially avoided. IUT is generally white box oriented which is predicted on the close examination of procedural detail. It exercises all the logical decisions on their true and false side, executes all loops at their boundaries and within their operational bounds and checks whether the required validations have been met. White box testing exercises internal data structure to assure their validity.

SYSTEM TESTING Here the system testing involved is the most widely used testing process consists of five stages as shown in the figure. In general, the sequence of testing activities is component testing, integration testing then user testing. However, as defects are discovered at any one stage, they required program modifications to correct them and this may required other stages in the testing process to be repeated.

55

Unit testing Module testing Subsystem testing System testing

Acceptanc e testing

(Component testing)

(Integration testing)

56

(User testing)

Testing is the process of detecting errors. Testing performs a very critical role for quality assurance and for ensuring the reliability of the software. The results of testing are used later on during maintenance also. Testing is vital to the success of the system. System testing makes a logical assumption that if the parts of the system are correct, the goal will be successfully achieved. In adequate testing or non-testing leads to errors that may not appear until months or even years later (Remember the New York three day power failure due to a misplaced ‘Break’ statement). This creates two problems: 1. The time lag between the cause and the appearance of the problem. 2. The time interval effect of the system errors on files and the records on the system. A small error can conceivably explode into a much larger problem. Effective testing early in the process translates directly into long term cost savings from a reduced number of errors. Another reason for system testing is its utility as a user oriented vehicle before implementation. The best program is worthless if it does not meet the user requirements. Unfortunately, the user’s demands are often compromised by efforts to facilitate program or design efficiency in terms of processing time or design efficiency.

57

Thus in this phase we went to test the code we wrote. We needed to know if the code compiled with the design or not? Whether the code gave the desired outputs on given inputs? Whether it was ready to be installed on the user’s computer or some more modifications were needed? Through the web applications are characteristically different from there software counterparts but the basic approach for testing these web applications is quite similar. These basic steps of testing have been picked from software engineering practices. The following are the steps, we undertook: 1. The content of the Intranet site is reviewed to uncover Content errors. Content Errors covers the typographical errors, grammatical errors, errors in content consistency, graphical representation and cross referencing errors 2. The design model of the web application is reviewed to uncover the navigation errors. Use cases, derived as a part of the analysis activity allows a web designer to exercise each usage scenario against the architectural and navigational design. In essence these non-executable tests help to uncover the errors in navigation. 3. When web applications are considered the concept of unit changes. Each web page encapsulates content navigation links, content and processing elements (Forms, Scripts, JSP’s as in our case). It is not always possible to test each of these individually. Thus is the base of the web applications the unit to be considered is the web page. Unlike the testing of the algorithmic details of a module the data that flows across the module interface, page level testing for web applications is driven by content, processing and links encapsulating the web page.

58

4. The Assembled web application is tested for overall functionality and content delivery. The various user cases are used that test the system for errors and mistakes. 5. The Web application is tested for a variety of environmental settings and is tested for various configurations and upon various platforms. The modules are integrated and integration test are conducted. 1. Thread based testing is done to monitor the regression tests so that the site does not become very slow is a lot of users are simultaneously logged on. 2. A controlled and monitored population of end users tests Intranet application, this all comprises of the User Acceptance Testing. Because web application evolves continuously, the testing process is an ongoing activity, conducted by web support staff in our case the Organization’s IS people who will finally update and manage the application. PSYCHOLOGY OF TESTING The aim of testing is often to demonstrate that a program works by showing that it has no errors. The basic purpose of testing phase is to detect the errors that may be present in the program. Hence one should not start testing with the intent of showing that a program works, but the intent should be to show that a program doesn’t work. Testing is the process of executing a program with the intent of finding errors. TESTING OBJECTIVES:

59

The main objective of testing is to uncover a host of errors, systematically and with minimum effort and time. Stating formally, we can say, 1. Testing is a process of executing a program with the intent of finding an error. 2. A successful test is one that uncovers an as yet undiscovered error. 3. A good test case is one that has a high probability of finding error, if it exists. 4. The tests are inadequate to detect possibly present errors. 5. The software more or less confirms to the quality and reliable standards. LEVELS OF TESTING In order to uncover the errors present in different phases, we have the concept of levels of testing. The basic levels of testing are Client Needs

Acceptance Testing

Requirements

System Testing

Design

Integration Testing

Code

Unit Testing

Unit testing Unit testing focuses verification effort on the smallest unit of software i.e. the module. Using the detailed design and the process specifications, testing is done to

60

uncover errors within the boundary of the module. All modules must be successful in the unit test before the start of the integration testing begins. In this project each service can be thought of a module. There are so many modules like Login, HR Department, Interviewer Section, etc. Each module has been tested by giving different sets of inputs. When developing the module as well as finishing the development, the module works without any error. The inputs are validated when accepting them from the user. Integration Testing After unit testing, we have to perform integration testing. The goal here is to see if modules can be integrated properly, the emphasis being on testing interfaces between modules. This testing activity can be considered as testing the design and hence the emphasis on testing module interactions. In this project the main system is formed by integrating all the modules. When integrating all the modules I have checked whether the integration effects working of any of the services by giving different combinations of inputs with which the two services run perfectly before Integration. SYSTEM TESTING Here the entire software system is tested. The reference document for this process is the requirements document, and the goal is to see if software meets its requirements. Here entire ‘HRRP’ has been tested against requirements of project and it is checked whether all requirements of project have been satisfied or not. ACCEPTANCE TESTING

61

Acceptance Testing is performed with realistic data of the client to demonstrate that the software is working satisfactorily. Testing here is focused on external behavior of the system; the internal logic of program is not emphasized. Test cases should be selected so that the largest number of attributes of an equivalence class is exercised at once. The testing phase is an important part of software development. It is the process of finding errors and missing operations and also a complete verification to determine whether the objectives are met and the user requirements are satisfied. WHITE BOX TESTING This is a unit testing method, where a unit will be taken at a time and tested thoroughly at a statement level to find the maximum possible errors. I tested step wise every piece of code, taking care that every statement in the code is executed at least once. The white box testing is also called Glass Box Testing. I have generated a list of test cases, sample data, which is used to check all possible combinations of execution paths through the code at every module level. White-box test focuses on the program control structure. Test cases are derived to ensure that all statement in the program control structure. Test cases are derived to ensure that all statement in the program control structure. Test cases are derived to ensure that all statement in the program has been executed at least once during testing and that all logical conditions have been exercised. Basis path testing, a white box technique, makes use of program graphs (or graph matrices) to derive the set of linearly independent test that will ensure coverage. Condition and data flow testing further exercising degrees of complexity. BLACK BOX TESTING

62

This testing method considers a module as a single unit and checks the unit at interface and communication with other modules rather getting into details at statement level. Here the module will be treated as a block that will take some input and generate output. Output for a given set of input combinations are forwarded to other modules. Black-box test are designed to uncover errors functional requirement without regard to the internal workings of a program. Black-box testing techniques focus on the information domain of the software, deriving test cases by partitioning the input and output domain of a program in manner that provides through test coverage. The black-box test is used to demonstrate that software functions are operational, that input is properly produced, and that the integrity of external information are maintained. A black-box test examines some fundamental aspect of a system with little or no regard for the integral logical structure of the software. Graph based testing methods explore the relationship between and behavior of program objects. Equivalence partitioning divides the input classes of data are likely to exercise specific software function. Boundary values analysis probes the program’s ability to handle data at the limits of acceptability.

TEST INFORMATION FLOW A strategy for software testing may also be viewed in the context of the spiral. Unit testing begins at the vortex of the spiral and, concentrates on each unit, component of the software as implemented in source code. Testing progresses moving outward along the spiral to integration testing, where the focus is on designed the construction of the software architecture. Taking another turn outward on spiral, we encounter validation testing, where requirements established as part of software requirements analysis are validated against the software that has been constructed. Finally, we arrive at system testing, where the software and other system elements are tested as a whole. To test computer software, we spiral out along stream lines that broaden the scope of testing with each turn. 63

Considering the process from a procedural point of view, testing within the context of software engineering is actually a series of four steps that are implemented sequentially. The steps are shown in Figure. Initially, tests focus on each component individually, ensuring that it functions properly as unit. Hence, the name unit testing. Unit testing makes heavy use of white-box testing techniques, exercising specific paths in module’s control structure to ensure complete coverage and maximum error detection.

System Testing Validation Testing Integration Testing

Validation testing Code

Design

System Security System Engineering

SYSTEM SECURITY

64

There are basically two types of security associated with this system:1. Physical security:Damage due to natural causes like earth tremor, flooding, water logging, fire hazards, atmospheric or environmental conditions etc.For overcoming these difficulties the replica of the data are automatically stored at various networks and for environmental conditions Air conditioning environment is created. 2. Data security:There are basically two problems associated with data security:1. Data not being available to the authorized person at the time of need. 2. Data becoming available to the unauthorized person. To overcome these difficulties the following access facilities has been provided:i) Identification:Unique Ids for the different users have been provided. ii) Authentication:System checks the password under the particular user identification. The computer permits the various resources to the authorized person. iii) Authorization:The access control mechanism to prevent unauthorized logging to the system.

65

66

IMPLEMENTATION System implementation is the stage when the user has thoroughly tested the system and approves all the features provided by the system. The various tests are performed and the system is approved only after all the requirements are met and the user is satisfied. The new system may be totally new; replacing an existing manual or automated system, or it may a major modification to an existing system. In the either case, proper implementation is essential to provide a reliable system to meet organization requirements .successful implementation may not guarantee improvement in the organization using the new system (that is a design question) ,but improper will prevent it. Implementation is the process of having systems personal cheek out and put new equipment to use, train users, install the new application and construct any files of data needed to use it. This phase is less creative than system design. Depending on the size of the organization that will be involve in using the application and the risk involved in its use, system developer may choose to test the operation in only one area of the firm with only one or two persons. Some times, they will run both old and new system in parallel way to compare the results. In steel other situations, system developers stop using the old systems one day and start using the new one the next. The implementation of the web based or LAN base network project has some extra steps at the time of implementation. We need to configure the system according the requirement of the software.

67

For the project we need to install and configure weblogicserver8.1, database server and deployment directory for the project.

Aspects of implementation:The two aspects of implementation are: •

Training Personnel



Conversion Procedures

Training:Even well designed and technically elegant systems can succeed or fail because of the way they are used. Therefore the quality of the training received by the personnel involved with the stem in various ways helps or hinders, and may event prevent, the successful implementation of an information system. Since

68

69

MAINTENANCE Software maintenance is the last phase in the software Engineering process that eliminates errors in the working system during its work span and to tune the system to any variations in its working environment. The system requires maintenance as there may be changes and requirements in the organizational needs, government policies, hardware and software environment etc. often small system deficiencies are found as a system is brought into operation and changes are made to remove them. System requirements may be revised as a result of system usage or changing operational needs. Perhaps oversight that occurred during the development process needs to be corrected. Often the maintenance need arises to capture additional data for storage in a database or in transaction files or perhaps it may be necessary to add error detection features to prevent system users from in adversely taking an unwanted action. Maintenance of the system after it is installed is concerned with an additional factor in hardware. Once the system is delivered and installed there is a brief warranty period during which time the vendor is responsible for maintenance. This is a typically a 90 day period after that time the purchaser has the option of acquiring maintenance from various sources. Maintenance source excepting vendor is also available from companies specializing in providing the service, called third party maintenance companies. When the system is installed, it is generally used for long period. The average life of system is 4-6 years, with the eldest applications often is used for over 10 years. The need for debugging and correcting errors or failure on an emergency basic is comparatively low: less than 20% of the task of correction. System and organization are in constant state of flux; therefore the maintenance of the system also involved adoptions for earlier version of software. 70

Approximately 20% of all maintenance work is performed to accommodate changes in report, files and database. The greatest amount of maintenance work is for user enhancement, improved documentation and recording system components or greater efficiency. About 60% of all maintenance is for this purposed. Following table summarized the broad classes of maintenance found in development of sekkjob.com

CATEGORY

ACTIVITY

 Corrective

Emergency fixes, routine debugging.

 Adaptive

Accommodation of changes to data and to hardware

and software, Changes in the external environment.  Pre effective

User enhancement, improved documentation

recording of

computational efficiency, user recommendations for new capabilities.  Preventive

Routine service of cleaning

and adjusting the equipment to prevent breakdowns, future maintainability reliability enhancement, recovering design information to improve the overall quality. Maintainable Design The points to reduce the needs for maintenance are:  More accurately defining the user’s requirements during the system development assembling better system documentation.

 Using more effective methods for designing process logic and communicating it to project team members.  Making better use of existing tools and techniques.  Managing the system engineering process effectively.

71

The maintenance for Integrated Advertising System was performed with the abovementioned points as the underlying principles and according to the demands of the users.

72

CONCLUSION This is a well defined job of our team that has taken six weeks to analyze the situation in which this project will work and the environment of the company that will use this project. It was a good experience for us to work in a company that has a very friendly environment and learning atmosphere. I am very thankful to Mr. Mohd Gurfan khan. Who gave a lot of good programming skills and so many company related skills that will help me in the future? I am also thankful to all my friends and team members.

73

FUTURE SCOPE OF THIS PROJECT •

In future this project can be treated as product according to specification and needs of any organization.



Since Jobseeker plays key role in any organization; thus, success over a long period of time and reliance of organization over recruitment is going to be one of the most considered topic for any organization. Therefore Jobs seeker Process will be of great help in carrying out recruitment process smoothly and effectively.



At present days every organization is using web technology for their proper functioning, so this web based project is all in all important from market aspects.



Furthermore if this project will be uploaded, it can be used as Jobs site and any organization can register their self on the site to carry out their recruitment process making this site as Jobs seeker.

74

LIMITATIONS Since, every system has some limitations so our proposed system is also not untouchable in this regard. Although it includes every kind of features but it can’t be used in a huge organization where number of networks are very large, because the data base used in this system is an average one. Also it doesn’t have different kind of access feature for different users.

SOFTWARE SCOPE •

Reusability: Reusability is possible as and when we require in this application. We

can update it next version. Reusable software reduces design, coding and testing cost by amortizing effort over several designs. Reducing the amount of code also simplifies understanding, which increases the likelihood that the code is correct. We follow up both types of reusability: Sharing of newly written code within a project and reuse of previously written code on new projects. •

Extensibility: This software is extended in ways that its original developers may not

expect. The following principles enhance extensibility like Hide data structure, avoid

75

traversing multiple links or methods, Avoid case statements on object type and distinguish public and private operations. •

Robustness: Its method is robust if it does not fail even if it receives improper

parameters. There are some facilities like Protect against errors, Optimize after the program runs, validating arguments and Avoid predefined limits.



Understandability: A method is understandable if someone other than the creator of the

method can understand the code (as well as the creator after a time lapse). We use the method, which small and coherent helps to accomplish this. •

Cost-effectiveness: Its cost is under the budget and make within given time

period. It is desirable to aim for a system with a minimum cost subject to the condition that it must satisfy all the requirements. Scope of this document is to put down the requirements, clearly identifying the information needed by the user, the source of the information and outputs expected from the system.

76

77

SITES REFERRED: 1. http://www.sun.com 2. http://www.coreservlets.com 3. http://www.serverside.com 4. http://www.w3schools.com 5. http://www.google.com 6. http://www.webopedia.com 7. http://www.ddj.com

BOOKS:  J2EE by GARRY CORNELL.  J2EE by Allamaraju & Buest (Apress Publications).  JSP & Servlets by Marty Hall (SUN Microsystems)  SYSTEM ANALYSIS AND DESIGN by ELIAS M AWAD.  SOFTWARE ENGINEERING by IAN SOMMEVILLE.

78

79

APPENDIX-A Backend remains on server side and has two components i.e. 1. Server side program 2. Data Base. Data base is the most important thing in this universe as data base gives identity to a thing without data base existence of a thing is impossible while working on a project first step is to design a database. What is data base? Data Base is a collection of tables and table is a collection of records in a tabular form i.e. in row and columns. Data Base can be divided into two parts:1. RDBMS. 2. DBMS. We will be using RDBMS (Relational Database Management System) in our project i.e. oracle 8i Enterprise edition. Why we are using Oracle (RDBMS)? Some of the merits of using Oracle (RDBMS) are as under:•

Centralization of database.



Client Server Technology.

80



Security.



Normalization of Data Base.



Relationship.



Transaction Processor.



It gives some internet related features.

Hence because of these features we are using Oracle as a back end technology. ABOUT ORACLE 8i Oracle 8i contains all the features of previous version. It also supports some new features & enhancement to some existing features. Oracle servers provide deficient & effective solution for the major features.

• Large Database & Space Management Control •

Many Concurrent Database Performances



High Transaction Processing Performance



High Availability



Controlled Availability



Industry Accepted Standards



Manageable Security

• Database Enforced Integrity •

Distributed Database System



Portability



Compatibility



Connectivity

81

NEW FEATURES OF ORACLE 8i •

Improved Scalability



Improved Security



Improved Performance Via Partition



Enhanced Support for Database Replication



Capability To Handle a Much Larger Number Of Concurrent Users



New & Improved Data Types

APPENDIX-B What is Middle Ware? Middle Ware is a concept, Middle Ware provides centralization of business logic i.e. instead of putting logic on each and every client machine we put logic on a centralized server hence middle ware is nothing but a server side program where all your business logic and

business methods reside. It remains on server side and it

has all the logical building. Middle ware provides:1. Multiple Client access. 2. Centralized business logic in case of distributed application. Because we are working on Distributed Application Based Project we need platform independent Language:Technology Used

82

Introduction to Java Java is a high level, third-generation programming language, like C, Fortran, Perl and many others. It is a platform for distributed computing – a development and runtime environment that contains built-in support for the World Wide Web. History of Java Java development began at Sun Microsystems in 1991, the same year the World Wide Web was conceived. Java’s creator, James Gosling did not design java for the Internet. His Objective was to create a common development environment for consumer electronic devices which was easily portable from one device to another. This effort evolved into a language , code named Oak and later renamed Java that retains much of the syntax and power of c++ , but is simpler and more platform independent. Java Features Some of the important features of Java are as follows: •

Simplicity



Orientation



Platform Independence



Security



High Performance



Multi Threading



Dynamic linking.



Garbage Collection.

One of the most important features of Java is Platform Independence which makes it famous and suitable language for World Wide Web. Why java is Platform Independent? Java is Platform Independent because of Java Virtual Machine (JVM). Java Virtual Machine (JVM)

83

The client application or operating system must have a java byte-code interpreter to execute byte-code instructions. The interpreter is a part of a lager program called the JVM. The JVM interprets the byte code into native code and is available on a platform that supports java. Connectivity using JDBC There are four kinds of drivers available in Jdbc:1. JdbcOdbc Bridge Driver. 2. Partly Java Driver. 3. Pure Java Driver. 4. Native Driver. Client Side Interface: In client side interface we are using:Servlet / JSP – In Internet Based Application.

J2EE Framework and Architecture J2EE is one of the best solutions that we have had so far for meeting the demand of today’s enterprise. J2EE specifies both the infrastructure for managing our applications, and the service APIs for building our applications. The J2EE platform is essentially a distributed application-server environment- a java environment that provides the following: •

A set of java extension APIs to build applications. These APIs define a programming model for J2EE applications.



A run time infrastructure for hosting and managing applications. This is the server runtime in which our applications resides.

84

The applications that we could develop with the above may be programs to drive web pages, or components to implement complex database transactions, or even java applets, all distributed across the network. The J2EE Runtime While J2EE bundles together APIs that have been in existence in one form or another for quite sometime, perhaps its most significant aspect is the abstraction of the runtime infrastructure. The J2EE specification doesn’t specify how a J2EE runtime should or could be built. Instead, J2EE specify roles and interfaces for applications, and the runtime onto which applications could be deployed. This results in a clear demarcation between applications and the runtime infrastructure. This demarcation allow the runtime to abstract most of the infrastructure services that enterprise developers have traditionally attempt to build on their own. As a result, J2EE application developers could just focus on the application logic and related service, while leveraging the runtime for all infrastructure-related services. Apart from specifying a set of standard APIs, the J2EE architecture also provides a uniform means of accessing platform-level services via its runtime environment. Such service includes distributed transactions, security, messaging etc. The J2EE APIs Used Distributed applications require access to a set of enterprise services. Typical services

include

transaction

processing,

database

access,

messaging,

multithreading etc. The J2EE architecture unifies access to such services in its enterprise service APIs. However, instead of having to access these service through proprietary or non standard interfaces, application programs in J2EE can access these APIs via the container. There are various API specification in J2EE framework which enable us to create an application at great speed with minimum effort. APIs Used To Build the Software 1. JDBC API

85

The JDBC API provides developers with a way to connect to relational data from within java code. Using the JDBC API, developers can create a client (which can be anything from an applet to an EJB) that can connect to a database, execute structured query language statements, and processes the result of those statements. The API provides connectivity and data access across the range of relational databases. It can do this because it provides a set of generic database access methods for sql compliant relational databases. JDBC generalizes the most common database access functions by abstracting the vendor specific detail of particular database. The result is set of classes and interface, placed in the java.sql package, which can be used with any database that has an appropriate JDBC drive. This allow JDBC connectivity to be provided in a consistent way for any database. It also means that with a little care to ensure the application confirms to the most commonly available database features, an application can be use with a different database simple by switching to a different JDBC driver. JDBC includes following packages for the means of database accessing and provides various features of the database. The packages are as follows: •

java.sql Package: -

This package contains classes and interfaces designed with traditional client/server in mind. Its functionality is focused primarily on basic database programming services such as creating connections, executing statements and prepared statements, and running batch queries. Advanced functions such as batch updates, scrollable result sets, transaction isolation, and sql data types are also availabl •

javax.sql Package: -

This package introduces sum major architectural change to JDBC programming compared to java.sql package, and provides better abstractions for connections management, distributed transactions, and legacy connectivity. This package also introduces container-managed connection pooling, distributed transactions, and row sets.

86

2. Java Servlets: Servlets are Java technology’s answer to Common Gateway Interface (CGI) programming. They are programs that run on a Web server, acting as middle layer between a requests coming from a Web browser or other HTTP client and databases or applications on the HTTP server. Their job is to: Read any data sent by the user. This data is usually entered in a form on a Web page, but could also come from a Java applet or a custom HTTP client program. Look up any other information about the request that is embedded in the HTTP request. This information includes details about browser capabilities, cookies, the host name of the requesting client, and so forth. Generate the results. This process may require talking to a database, executing an RMI or CORBA call, invoking a legacy application, or computing the response directly. Format the results inside a document. In most cases, this involves embedding the information inside an HTML page. Set the appropriate HTTP response parameters. This means telling the browser what type of document is being returned (e.g., HTML), setting cookies and caching parameters, and other such tasks. Send the document back to the client. This document may be sent in text format (HTML), binary format (GIF images), or even in a compressed format like gzip that is layered on top of some other underlying format. Many client requests can be satisfied by returning pre-built documents, and these requests would be handled by the server without invoking servlets. In many cases, however, a static result is not sufficient, and a page needs to be generated for each request. Java Server Pages: -

87

Java Server Pages (JSP) technology enables you to mix regular, static HTML with dynamically generated content from servlets. Many Web pages that are built by CGI programs are primarily static, with the parts that change limited to a few small locations. For example, the initial page at most on-line stores is the same for all visitors, except for a small welcome message giving the visitor’s name if it is known. But most CGI variations, including servlets, make you generate the entire page via your program, even though most of it is always the same. JSP lets you create the two parts separately. Listing 1.1 gives an example. Most of the page consists of regular HTML, which is passed to the visitor unchanged. Parts that are generated dynamically are marked with special HTML-like tags and mixed right into the page. The Advantages of JSP JSP has a number of advantages over many of its alternatives. Here are a few of them. Versus Active Server Pages (ASP) ASP is a competing technology from Microsoft. The advantages of JSP are twofold. First, the dynamic part is written in Java, not VBScript or another ASP-specific language, so it is more powerful and better suited to complex applications that require reusable components. Second, JSP is portable to other operating systems and Web servers; you aren’t locked into Windows NT/2000 and IIS. You could make the same argument when comparing JSP to ColdFusion; with JSP you can use Java and are not tied to a particular server product. Versus Pure Servlets JSP doesn’t provide any capabilities that couldn’t in principle be accomplished with a servlet. In fact, JSP documents are automatically translated into servlets behind the scenes. But it is more convenient to write (and to modify!) regular HTML than to have a zillion println statements that generate the HTML. Plus, by separating the presentation from the content, you can put different people on different tasks: your

88

Web page design experts can build the HTML using familiar tools and leave places for your servlet programmers to insert the dynamic content. Versus Server-Side Includes (SSI) SSI is a widely supported technology for inserting externally defined pieces into a static Web page. JSP is better because you have a richer set of tools for building that external piece and have more options regarding the stage of the HTTP response at which the piece actually gets inserted. Besides, SSI is really intended only for simple inclusions, not for “real” programs that use form data, make database connections, and the like. Versus Static HTML Regular HTML, of course, cannot contain dynamic information, so static HTML pages cannot be based upon user input or server-side data sources. JSP is so easy and convenient that it is quite reasonable to augment HTML pages that only benefit slightly by the insertion of dynamic data. Previously, the difficulty of using dynamic data precluded its use in all but the most valuable instances.

APPENDIX-C What is HTML? HTML (Hyper Text Markup Language): A markup language used to structure text and multimedia documents and to set up hypertext links between documents, used extensively on the World Wide Web. HTML is a display language, not a programming language. HTML is a markup language (the ML in HTML) that uses a fixed set of markup tags. •

HTML itself is the set of customizable “markup” tags that are inserted into HTML document govern its format, multimedia content, and hyperlinks. Any HTML

89

viewer can display such documents but they are normally viewed usinga Web browser. •

HTML is a programming language in that an HTML document is a program that, when “run” by a browser, displays its text as hypermedia (multimedia with hyperlinks).



The “language” HTML is really only a collection of predefined tags which , when inserted into regular text, tell a web browser how to: a. Format the document and its text. b. Incorporate i.e. insert a graphic image, video sequence, or sound clip into the displayed document. c. Link into other locations, in the same document, in another web page, or even on another computer (Server), or d. Link to other programs written in Java, JavaScript or other languages (called CGI applications). Features of HTML:HTML stands for Hyper Text Markup Language.



An HTML file is a text file containing small markup tags.



The markup tag tells the Web browser how to display the page.



An HTML file must have an htm or html file extension.



An HTML file can be created using a simple text editor.



It’s a display-only technology.

APPENDIX-D What is JAVASCRIPT? JavaScript is a compact, object-based scripting language. It can provide interactive web pages, validate from data, and make your web page clearer. JavaScript is a lightweight interpreted scripting language. The language is most well known for its use in wesites.It was originally developed by Brendan Each of Netscape Communications. It adds interactive functions to HTML pages, which are

90

otherwise static. JavaScript is easier to use than Java, but not as powerful and deals mainly with the elements on the Web page. On the client, JavaScript is maintained as source code embedded into an HTML page. On the Server, it is compiled into byte code (intermediate language), similar to Java programs. Features of JavaScript:•

JavaScript was designed to add interactively to HTML pages.



JavaScript is a scripting language-a scripting language is a lightweight programming language.



A JavaScript is usually embedded directly in HTML pages.



A JavaScript is an interpreted language (means that script execute without preliminary compilation).



All major browsers, like Netscape and Internet Explorer, support JavaScript. Functions of JavaScript:JavaScript gives you the ability to perform the following functions: •

Control document appearance and content



Control the browser



Interact with document content



Interact with the user



Read and write client state with cookies



Interact with applets



Manipulate Embedded Images Limitations of JavaScript:•

JavaScript does not have any graphics capabilities



Client-side JavaScript can not read or write files



JavaScript does not support networking of any kind



JavaScript doesn’t have any multithreading capabilities.

91

92

Analysis: Breaking a problem into successively manageable parts for individual study. Attribute: A data item that characterizes an object. Cost/Benefit Analysis: The purpose of the comparing the projected savings and benefits to projected to costs to decide whether the system change is justified. Data Base: A store of integrated data capable being directly addressed for multiple user; it is organized so that various files can be accessed through a single referenced based on the relationship among records in the file rather than the physical location. DBMS:

93

The software that determines how data must be structured to produce the user’s view; and maintain update the system. Data Flow: Moment of data in a systems from appoint of origin to specific destination indicated by a line and arrow. Data Security: Protection of data from loss, disclosure, modification or destruction. Data Structure: Logically related set of data that can be decomposed into lower level data elements; a group of data elements handled as a unit. Design: Process of devolving the technical and operational specification of a candidate system for implementation. Feasibility Study: A procedure that identifies describes and evaluates candidate systems and selects the best system for implementation. File: Collection related records organized for a particular purpose also called a data set. Flow Chart: A graphic picture of the logical steps and sequence involved in a procedure or a program. Form: A physical carrier of data of information. Implementation: In system development- a phase that focuses on user training, site preparation and file conversion for installing a candidate system. Maintenance: Restoring to its original condition. Normalization:

94

A process of replacing a given file with its logical equivalent; the object is true derive sample file with no redundant elements. Operating System: In data base machine based software that facilitates the availability information or reports through the DBMS. Password: Identity authenticator a key that allow access to a program system or procedure. Pert: A flow system model used to manipulate various values as a basis for determining the critical path to interpret this relationship and to relate them back to the real world as a control technique. Record: A collection of aggregates or related item of data treated as a unit. Source code: A procedure or format that allow enhancement on a software package. System: A regular or orderly arrangement of components or parts in a connected and interrelated series or whole; a group of components necessary to some operation. System Design: Detailed concentration on the technical and other specification that will make the new system operational. System Development Life Cycle: A structured sequence of phases for implementing an information system. System Testing: Testing the whole system by the user after major programs and sub systems have been tested. Unit Testing Validation: Testing changes made in an existing or new programs. checking the quality of software in both simulated and live environment

95

96

Related Documents

Documentation
May 2020 24
Documentation
November 2019 42
Documentation
November 2019 34
Documentation
May 2020 25
Documentation
June 2020 17