Gensan Buy Premise
-
Upload
edward-ian-belmes -
Category
Documents
-
view
220 -
download
0
Transcript of Gensan Buy Premise
-
8/2/2019 Gensan Buy Premise
1/77
gensan-buy.comOnline shopping, fastest, safest and the easiest way, RIGHT TO YOUR DOORS
ORGANIZATION PROFILE
Gensan-buy.com is an all Filipino website developed to cater needs of Generals and
its patrons in terms of shopping needs by linking shoppers and shop owners
through the web.
Provides quick access to service providers, shop owners and business men through
advertising and easy guide to their valued shoppers and patrons.
Provides quick reference for shoppers and patrons for a wise buy. A great deal tobudgeting people.
Provides access to freebies, gigs and discounts through promotion.
TOP CLIENTS (Shop Owners):
Gsano General Santos
XCC Mall of General Santos
PD Plaza General Santos
Pitmart Mall of General Santos
Hotel Dolres
Tropican Beach Resort
ZM South Mall
Bobinson Mall
Gensan Arcadia
ENCOR Appliance Center
1
-
8/2/2019 Gensan Buy Premise
2/77
II. ABSTRACT
Objective:
As a non-profit organization, gensan-buy.com is dedicated to provide the most
convenient access to Generals shoppers and patrons in promotions, discounts, gigs,
and quick reference to budget-conscious people.
This website has been developed to provide the most convenient way for
shoppers in which, they can access real time pricing of commodities in different
service providers of General Santos City and neighboring municipalities, cities and
regions.
Specific Objective of the site:
Objective of doing this project is to enhance knowledge in the field of e-commerce using
mainly php and htmlas a frontend and MySQL as the backend. Applying System
Analysis and Design principle through basic application and guidelines.
Addressing clients requirement and objectives of this site as follows:
To increase the business of Client/s.
To benchmark for a potential global advertising. To act as a middle men connecting Shoppers and Service Providers
User can search for different options available.
User can do on-line inquiry for basic price of commodities.
User can use search engine to look for different services, discounts, promotions,
available etc.
So these are some of the objectives which we have to accomplish.
Features of the site:
It has the features of providing all the information online (through the net). About the
commodity prices, Shop Owners promotion, discounts, sales, gigs, freebies and About
the price comparison, if there is.
2
-
8/2/2019 Gensan Buy Premise
3/77
The site includes
the search engine which gives both users easy way to find the products and
promotions for a post.
The site acts as a
middle-ware for the Shoppers and Service Providers.
III. Modules of project:
The project can be divided in to two main modules.
Registration module
Shoppers and Shop Owners Administration module
Module 1:Registration module, are divided into:
Shoppers Registration.
Service Provider Registration.
Change Password for Shoppers.
Change Password for Service Provider.
Forget Password for Shoppers.
Forget Password for Service Provider.
Login for both Shoppers and Service Provider.
3
-
8/2/2019 Gensan Buy Premise
4/77
Module 2:
Shoppers and Shop Owners Administration module are divided into two
categories:
o Shoppers Panelo Service Providers Panel
Shoppers
Search for product pricing, promotion, gigs, freebies, discounts of different service
providers.
Service Providers
Add products
Update Pricing of Commodities
Post for available promotions, gigs, freebies, discounts and sales.
Site Working:
Case A Shoppers:
Shoppers has to register him self with the site.
This is a free site for Shoppers.
After success full Log in Shoppers can view products and equivalent price available.
Can inquire promotions, sales, discounts, gigs and freebies from different service
providers.
Case BService Providers:
Service Providers has to register itself. This needs administrators verification.
After success full Login Service Providers can register various products with equivalent
price (itemized).
Company can post promotion, discounts, sales, freebies, gigs with administrators
approval.
4
-
8/2/2019 Gensan Buy Premise
5/77
Company can contact administrator for support and additional services.
IV. SYSTEM ANALYSIS
Existing System
When the requirement of this system is putted before the team they was willing to know
that how the employee of the company is working. Then the study is done it gives the
result that all the work is done manually and there is nothing that help the employee to
save the time and do the work with the system. All the documentation is done by theemployee of the company. A lot of works have to be done before the candidates are
placed in an organization.
All that the company needs to store about the job seekers must be written on the
paper. Some times it is very difficult to know about some special highlights of the job
seeker, because the information is stored on the paper and it is not clear that due to
human error or by some other means this paper is lost and the information is now not in
the hands of the company.
At the time of hiring the companies policy says that the only those companies
can hire who are registered with SEEKJOB. So it is critical task to find out the registered
employer, when the company has so many employers.
There is extra requirement of employee who have to check that the requesting
person is an registered employer. This seams a critical task
Limitations
The current system have all the problems which generally in count in the manualsystem such as wastage of time, wastage of money, more efforts to work etc. if the
responsible person wants the full information of the total sale of various models of the
vehicles at various center at the evening then he/she can not get it. Because the current
system work manually and it is very slow same as if he/she wants the total production
then it take time. The current system can not give the fast response as needed. It also
5
-
8/2/2019 Gensan Buy Premise
6/77
does not keep records of grievances of the faults in the vehicles in various parts of the
country. If he/she wants the information regarding the total stock at various warehouses
at his\her office then using current system he\she can not get it.
He\she can not get the full information on time. It may be late and this process is time
consuming and generally the administrators receive the relevant information next day
which is the major limitation of existing system.
Proposed system:
This site is an attempt to make the task of administrator as well as jobseekers easier.
This project ensures the consistency by enabling the jobseekers to register themselves
and to find the desired information of jobs, get them involved with the jobsite and can
access the different services provided by the jobsite.
The administrator has the right to know everything. He has the right to know the details
of the jobseekers, has the right to change any service that the jobsite is currently
providing or can add services which are not being provided currently. Even the
customers passwords and hidden details are accessible by the administrator. Now
jobseekers are able to apply online also. Through this system all works are done
through computer so it results in fast service provider.
The jobseekers can also contact the company officials through email or his contactnumbers but first they have to register themselves as a member by filling up a
registration form which can be filled online. Once registered, jobseekers can access this
jobsite and register for any services being provided by seekjob.com, that too online by
sitting at home within a fraction of a second by a flick of a button.
Aim of this project is to provide an environment helpful for administrator and jobseekers
as well, so that, they find it easy to implement it without any harassment for the
jobseekers also. This project is developed after a
Through study of the existing manual system & the jobseekers requirements.
Requirement analysis is concerned with identifying the basic function of software
component in a hardware & software system.
6
-
8/2/2019 Gensan Buy Premise
7/77
Features of proposed system:
The features of the proposed system are as follows.
Provide the full information of employees/employer at various places at one site.
Provide the full information of total vacancies at various regions at one site.
Provide the full information of total vacancies of various industries/companies at one
site.
Helps the management to find out the current trend in industries as well as current
manpower pool.
V. RELATED STUDY
Feasibility Study:
A feasibility study is conducted to select the best system that meets performance
requirement. This entails an identification description, an evaluation of candidate system
and the selection of best system for he job. The system required performance is defined
by a statement of constraints, the identification of specific system objective and a
description of outputs.
The key consideration in feasibility analysis are:
Economic feasibility
The proposed system is economically feasible because the cost involved in purchasing
the hardware and the software are within approachable. The personal cost like salaries
of employees hired are also nominal, because working in this system need not required
a highly qualified professional. The operating-environment costs are marginal. The less
time involved also helped in its economical feasibility.
The benefits of this project include four types:
Cost saving benefits
7
-
8/2/2019 Gensan Buy Premise
8/77
This project reduces the administrative and operational cost. Because of the reduction
in the use of paper, use of labors the cost also reduces.
Improve-service-level benefits
Proposed system improves the systems performance because the current system is
based on manual processing while the proposed system is based on computer
processing.
Improve-information-level benefits
It provides better information in the stipulated space and time for decision-making.
Time-saving-benefits
It saves lots of time and provides the same result in a far lesser period of time.
VI. SYTEM REQUIREMENT
Technical Feasibility
HARDWARE & SOFTWARE
REQUIREMENT SPECIFICATIONS
Hardware requirement for developmentHardware Configuration
Processor : Intel Pentium 4 CPU, 2.66GHz
Memory
RAM : 256 MB DDR
Hard Disk : 40 GB SATA
Mouse : Quantum
8
-
8/2/2019 Gensan Buy Premise
9/77
Keyboard : Samsung (Multimedia Supported)
Drive : CD-RW, Floppy drive
Printer : HP-Laser printer
Hardware requirement for Implementation
Processor:
Minimum : 1.8 GHz Pentium Processor
Memory:
RAM : 64 MB
Hard Disk : 4 GB
Display : 1024 * 768, True Type Color-32 Bit
Mouse : Any Normal Mouse.
Keyboard : Any window Supported Keyboard.
Software requirement for development
Software Configuration
Operating System : Windows XP Professional
Front End : PHP, HTML, Dreamweaver, JSP
Back End : MySQL, Navicat for MySQL, XAMMP
Behavioral Feasibility
Employees of the company are habitual of working with manual system and dont
have the knowledge of working in a computer application based environment that is
used in their intranet and are generally resistant to make changes in their working
attitude.
9
-
8/2/2019 Gensan Buy Premise
10/77
People are inherently resistant to change and computers have been known to
facilitate changes. An estimate should be made of how strong a reaction the staffs are
likely to have towards the development of an online computerized system because now
this may lead to expulsion of some of the staffs from their jobs.
So a system has to be chosen which will provide them much more facilities and
less mental disturbance to check weather correct entry is entered and that too at its
right place. The System will provide them automatic reporting and checks on entries
while storing as well as entering. So the front end has been made user friendly for both
the jobseekers and the employees.
VII. SYSTEM DESIGN
Symbols Used:-
In order to create DFDs we used following symbols:-
Input/Output
Data Processing
Flow of data
1. One way data flow.
2. Two way data flow.
Data store
10
-
8/2/2019 Gensan Buy Premise
11/77
Database
VIII.DATA FLOW DIAGRAM
Get vacancy detail
JOBSEEKERMANAGEMENT
JOBSEEKER/USEREMPLOYEE/CONSULTANTGive
Give details
Give applicant details
Get emp. details
Report of selected applicants
Give jobOpening
Get vacancyDetails
Selection processstatus
Resume status
0-Level Data Flow Diagram
11
-
8/2/2019 Gensan Buy Premise
12/77
Login UserLocation
User ID
Password
Password
User ID
Ifvalid
New User
New UserPassword
IfNew
12
-
8/2/2019 Gensan Buy Premise
13/77
Seeker loginProcess
JobSection
Seeker details
Job seeker
User
Get details
Search job &news
News letter
EmployerLogin
process
Employer Jobs
New Employer login
EMPLOYERId &
Password
Registration details
Cominfo.
Jobdetails
Id &
password
Valid Id &
password
New Job seeker
Registrationdetails
Jobsearch
Jobdetails
2-Level data Flow Diagram
User
13
-
8/2/2019 Gensan Buy Premise
14/77
IX. ER-DIAGRAM
Has
Registration
Maintain
Registration
14
Jobseeker
Emp_idQualificatio
nJob location
FnameExperience
Skills
Speci.
High Degree
LName
Jobseeker
Manageme
nt
Jobs
Com.
Job Exp
Job loc.
UsernameJob cat.
Email id
Check
User JobSeek
Control
Username
Password
Employer
Company name
Location
Emil
Reference_no
Remark User name
News letter
Email
Name
Site map
login
Userna
me
Password
Site login
-
8/2/2019 Gensan Buy Premise
15/77
THE DATABASE
DATABASE DESIGN
In our data flow diagram, we give names to data flows, processes and data stores.
Although the names are descriptive of data, they do not dive details .So following DFD,
our interest is to build some details of the contents of data flows, processes and data
store. A data dictionary is a structured repository of data about data .It is a set of
rigorous definitions of all DFD data elements and data structures .The data dictionary
for the current system has been given as under:
Tables for Project:
Employer: This table maintains details of Employer
Field Name Data Type
User name Text
Password Text
company-name Textcompany-location Text
company email Text
Jobs: This table maintains details of Jobs
Field name Data type
username TextJob company Text
Job category Text
Job location Text
Job_exp Text
Job email Text
emp_phone Text
emp_email Text
15
EmployerCheck Emp control
Passwor
d
-
8/2/2019 Gensan Buy Premise
16/77
Vacancy: This table maintains detail of jobs for which vacancies are open
Field Name Data Type
User name Text
Password Text
fname Text
lname Text
email Text
jobloc Text
prfjobloc Text
exp Text
jcat Text
key skills Text
highest degree Text
specialization Text
ewsletter: This table stores and maintains status news
Field Name Data Type
Name Text
email Text
te admin: This table stores and maintains status site admin
Field Name Data Type
Username Text
Password Text
16
-
8/2/2019 Gensan Buy Premise
17/77
17
-
8/2/2019 Gensan Buy Premise
18/77
Main Form
18
-
8/2/2019 Gensan Buy Premise
19/77
Jobseeker login
19
-
8/2/2019 Gensan Buy Premise
20/77
New Jobseeker Signup
20
-
8/2/2019 Gensan Buy Premise
21/77
Employer login
21
-
8/2/2019 Gensan Buy Premise
22/77
New Employer Signup
22
-
8/2/2019 Gensan Buy Premise
23/77
Site administrator login
23
-
8/2/2019 Gensan Buy Premise
24/77
Tips
24
-
8/2/2019 Gensan Buy Premise
25/77
Interview Tips for Professionals
25
-
8/2/2019 Gensan Buy Premise
26/77
Resume Tips for Professionals
26
-
8/2/2019 Gensan Buy Premise
27/77
Job Fair List
27
-
8/2/2019 Gensan Buy Premise
28/77
Contact us
28
-
8/2/2019 Gensan Buy Premise
29/77
Newsletter Subscription
29
-
8/2/2019 Gensan Buy Premise
30/77
Hot Vacancies
30
-
8/2/2019 Gensan Buy Premise
31/77
IT JOBS Openings
31
-
8/2/2019 Gensan Buy Premise
32/77
New JOBS This Week
32
-
8/2/2019 Gensan Buy Premise
33/77
SeekJOBs.com success stories
33
-
8/2/2019 Gensan Buy Premise
34/77
JOBS For Disabled people
34
-
8/2/2019 Gensan Buy Premise
35/77
Job Fair list
35
-
8/2/2019 Gensan Buy Premise
36/77
36
-
8/2/2019 Gensan Buy Premise
37/77
TestingTesting plays a critical role in quality assurance for software .Due to the limitation of the
verification method for the previous phases, design and requirement fault also appear in
the code. Testing is used to detect these errors, in edition to the error introduced during
coding phase.
Testing is a dynamic method for verification and validation, where the system is to
be tested is executed and behavior of the system is observed. Due to this testing the
failure of the system can be observed, from which the presence of fault can be
deduced. However, separate activities have to be performed to identify the faults.
There are two method of testing: functional and structural. In functional testing,
the internal logic of the system under testing is not considered and the test cases are
decided from the specification or the requirements. It is often called Black Box Testing.
Equivalence class partitioning, boundary analysis, and cause effect graphing are
examples of methods for selecting test cases for functional testing. In structural testing,
the test cases are decided entirely on the internal logic of the program or module beingtested.
As the goal of testing is to detect any errors in the programs different flavor of
testing are often used. Unit testing are used to test a module or a small collection of
modules and the focus is on detecting coding errors in modules. During integration
testing modules are combined into sub-system, which are then tested. The goal here is
to test the system design. In system testing and acceptance testing, the entire System
is tested. The goal here is to test the requirement themselves. Structural testing can be
used for unit testing while at higher level mostly functional testing is used.
In the project Monthly Materialization Report System we used the unit testing
and functional testing. System testing is a critical phase in systems implementation.
Testing of a system involves hardware device testing and debugging of computer
programs and testing information processing procedures. Testing can be done with test
37
-
8/2/2019 Gensan Buy Premise
38/77
data, which attempts to simulate all possible conditions that may arise during
processing. The plane for testing are prepared and then implemented.
The testing methods adopted in the testing of the system were Independent Unit
Testing and System Testing
Independent Unit Test (IUT)
IUT focuses first on the modules, independently of one another, to locate errors. This
enables the tester to detect errors in coding and logic that are contained within that
module alone. Those resulting from the interaction between modules are initially
avoided.
IUT is generally white box oriented which is predicted on the close
examination of procedural detail. It exercises all the logical decisions on their true and
false side, executes all loops at their boundaries and within their operational bounds
and checks whether the required validations have been met. White box testing
exercises internal data structure to assure their validity.
SYSTEM TESTING
Here the system testing involved is the most widely used testing process consists of five
stages as shown in the figure. In general, the sequence of testing activities is
component testing, integration testing then user testing. However, as defects are
discovered at any one stage, they required program modifications to correct them and
this may required other stages in the testing process to be repeated.
38
-
8/2/2019 Gensan Buy Premise
39/77
(Component testing) (Integration testing) (User testing)
Testing is the process of detecting errors. Testing performs a very critical role for quality
assurance and for ensuring the reliability of the software. The results of testing are used
later on during maintenance also.
39
Unit testing
Moduletesting
Acceptance testing
Sub-systemtesting
Systemtesting
-
8/2/2019 Gensan Buy Premise
40/77
Testing is vital to the success of the system. System testing makes a logical assumption
that if the parts of the system are correct, the goal will be successfully achieved. In
adequate testing or non-testing leads to errors that may not appear until months or even
years later (Remember the New York three day power failure due to a misplaced Break
statement).
This creates two problems:
1. The time lag between the cause and the appearance of the problem.
2. The time interval effect of the system errors on files and the records on the system.
A small error can conceivably explode into a much larger problem. Effective testing
early in the process translates directly into long term cost savings from a reduced
number of errors.
Another reason for system testing is its utility as a user oriented vehicle before
implementation. The best program is worthless if it does not meet the user
requirements. Unfortunately, the users demands are often compromised by efforts to
facilitate program or design efficiency in terms of processing time or design efficiency.
Thus in this phase we went to test the code we wrote. We needed to know if the code
compiled with the design or not? Whether the code gave the desired outputs on given
inputs? Whether it was ready to be installed on the users computer or some more
modifications were needed?
Through the web applications are characteristically different from there software
counterparts but the basic approach for testing these web applications is quite similar.
These basic steps of testing have been picked from software engineering practices. The
following are the steps, we undertook:
40
-
8/2/2019 Gensan Buy Premise
41/77
1. The content of the Intranet site is reviewed to uncover Content errors. Content Errors
covers the typographical errors, grammatical errors, errors in content consistency,
graphical representation and cross referencing errors
2. The design model of the web application is reviewed to uncover the navigation errors.
Use cases, derived as a part of the analysis activity allows a web designer to exercise
each usage scenario against the architectural and navigational design. In essence
these non-executable tests help to uncover the errors in navigation.
3. When web applications are considered the concept of unit changes. Each web page
encapsulates content navigation links, content and processing elements (Forms,
Scripts, JSPs as in our case). It is not always possible to test each of these individually.
Thus is the base of the web applications the unit to be considered is the web page.
Unlike the testing of the algorithmic details of a module the data that flows across the
module interface, page level testing for web applications is driven by content,
processing and links encapsulating the web page.
4. The Assembled web application is tested for overall functionality and content delivery.The various user cases are used that test the system for errors and mistakes.
5. The Web application is tested for a variety of environmental settings and is tested for
various configurations and upon various platforms.
The modules are integrated and integration test are conducted.
1. Thread based testing is done to monitor the regression tests so that the site does not
become very slow is a lot of users are simultaneously logged on.
2. A controlled and monitored population of end users tests Intranet application, this all
comprises of the User Acceptance Testing.
41
-
8/2/2019 Gensan Buy Premise
42/77
Because web application evolves continuously, the testing process is an ongoing
activity, conducted by web support staff in our case the Organizations IS people who
will finally update and manage the application.
PSYCHOLOGY OF TESTING
The aim of testing is often to demonstrate that a program works by showing that it has
no errors. The basic purpose of testing phase is to detect the errors that may be present
in the program. Hence one should not start testing with the intent of showing that a
program works, but the intent should be to show that a program doesnt work. Testing is
the process of executing a program with the intent of finding errors.
TESTING OBJECTIVES:
The main objective of testing is to uncover a host of errors, systematically and with
minimum effort and time. Stating formally, we can say,
1. Testing is a process of executing a program with the
intent of finding an error.2. A successful test is one that uncovers an as yet
undiscovered error.
3. A good test case is one that has a high probability of
finding error, if it exists.
4. The tests are inadequate to detect possibly present
errors.
5. The software more or less confirms to the quality and
reliable standards.
LEVELS OF TESTING
42
-
8/2/2019 Gensan Buy Premise
43/77
In order to uncover the errors present in different phases, we have the concept of levels
of testing. The basic levels of testing are
Client Needs Acceptance Testing
Requirements System Testing
Design Integration Testing
Code Unit Testing
Unit testing
Unit testing focuses verification effort on the smallest unit of software i.e. the module.
Using the detailed design and the process specifications, testing is done to uncover
errors within the boundary of the module. All modules must be successful in the unit test
before the start of the integration testing begins.
In this project each service can be thought of a module. There are so many modules
like Login, HR Department, Interviewer Section, etc. Each module has been tested by
giving different sets of inputs. When developing the module as well as finishing the
development, the module works without any error. The inputs are validated when
accepting them from the user.
Integration Testing
After unit testing, we have to perform integration testing. The goal here is to see if
modules can be integrated properly, the emphasis being on testing interfaces between
43
-
8/2/2019 Gensan Buy Premise
44/77
modules. This testing activity can be considered as testing the design and hence the
emphasis on testing module interactions.
In this project the main system is formed by integrating all the modules. When
integrating all the modules I have checked whether the integration effects working of
any of the services by giving different combinations of inputs with which the two
services run perfectly before Integration.
SYSTEM TESTING
Here the entire software system is tested. The reference document for this process is
the requirements document, and the goal is to see if software meets its requirements.
Here entire HRRP has been tested against requirements of project and it is checked
whether all requirements of project have been satisfied or not.
ACCEPTANCE TESTING
Acceptance Testing is performed with realistic data of the client to demonstrate that the
software is working satisfactorily. Testing here is focused on external behavior of the
system; the internal logic of program is not emphasized.
Test cases should be selected so that the largest number of attributes of an equivalence
class is exercised at once. The testing phase is an important part of software
development. It is the process of finding errors and missing operations and also a
complete verification to determine whether the objectives are met and the user
requirements are satisfied.
WHITE BOX TESTING
This is a unit testing method, where a unit will be taken at a time and tested thoroughly
at a statement level to find the maximum possible errors.
44
-
8/2/2019 Gensan Buy Premise
45/77
I tested step wise every piece of code, taking care that every statement in the code is
executed at least once. The white box testing is also called Glass Box Testing.
I have generated a list of test cases, sample data, which is used to check all possible
combinations of execution paths through the code at every module level.
White-box test focuses on the program control structure. Test cases are derived
to ensure that all statement in the program control structure. Test cases are derived to
ensure that all statement in the program control structure. Test cases are derived to
ensure that all statement in the program has been executed at least once during testing
and that all logical conditions have been exercised. Basis path testing, a white box
technique, makes use of program graphs (or graph matrices) to derive the set of linearly
independent test that will ensure coverage. Condition and data flow testing further
exercising degrees of complexity.
BLACK BOX TESTING
This testing method considers a module as a single unit and checks the unit at interface
and communication with other modules rather getting into details at statement level.
Here the module will be treated as a block that will take some input and generate
output. Output for a given set of input combinations are forwarded to other modules.Black-box test are designed to uncover errors functional requirement without
regard to the internal workings of a program. Black-box testing techniques focus on the
information domain of the software, deriving test cases by partitioning the input and
output domain of a program in manner that provides through test coverage. The black-
box test is used to demonstrate that software functions are operational, that input is
properly produced, and that the integrity of external information is maintained. A black-
box test examines some fundamental aspect of a system with little or no regard for the
integral logical structure of the software.
Graph based testing methods explore the relationship between and behavior of
program objects. Equivalence partitioning divides the input classes of data are likely to
45
-
8/2/2019 Gensan Buy Premise
46/77
exercise specific software function. Boundary values analysis probes the programs
ability to handle data at the limits of acceptability.
TEST INFORMATION FLOW
A strategy for software testing may also be viewed in the context of the spiral. Unit
testing begins at the vortex of the spiral and, concentrates on each unit, component of
the software as implemented in source code. Testing progresses moving outward along
the spiral to integration testing, where the focus is on designed the construction of the
software architecture. Taking another turn outward on spiral, we encounter validation
testing, where requirements established as part of software requirements analysis are
validated against the software that has been constructed. Finally, we arrive at systemtesting, where the software and other system elements are tested as a whole. To test
computer software, we spiral out along stream lines that broaden the scope of testing
with each turn.
Considering the process from a procedural point of view, testing within the context
of software engineering is actually a series of four steps that are implemented
sequentially. The steps are shown in Figure. Initially, tests focus on each component
individually, ensuring that it functions properly as unit. Hence, the name unit testing.
Unit testing makes heavy use of white-box testing techniques, exercising specific paths
in modules control structure to ensure complete coverage and maximum error
detection.
46
System Testing
System Engineering
Validation Testing
Integration Testing
Design
Validation testing
-
8/2/2019 Gensan Buy Premise
47/77
System Security
SYSTEM SECURITY
There are basically two types of security associated with this system:-
1. Physical security:-
Damage due to natural causes like earth tremor, flooding, water logging, fire
hazards, atmospheric or environmental conditions etc.For overcoming these difficulties
the replica of the data are automatically stored at various networks and for
environmental conditions Air conditioning environment is created.
2. Data security:-
There are basically two problems associated with data security:-
1. Data not being available to the authorized person at the time of need.
2. Data becoming available to the unauthorized person.
To overcome these difficulties the following access facilities has been provided:-
i) Identification:-
Unique Ids for the different users have been provided.
ii) Authentication:-
47
-
8/2/2019 Gensan Buy Premise
48/77
System checks the password under the particular user identification. The
computer permits the various resources to the authorized person.
iii) Authorization:-
The access control mechanism to prevent unauthorized logging to the system.
48
-
8/2/2019 Gensan Buy Premise
49/77
IMPLEMENTATION
System implementation is the stage when the user has thoroughly tested the system
and approves all the features provided by the system. The various tests are performed
and the system is approved only after all the requirements are met and the user is
satisfied.
The new system may be totally new; replacing an existing manual or automatedsystem, or it may a major modification to an existing system. In the either case, proper
implementation is essential to provide a reliable system to meet organization
requirements .successful implementation may not guarantee improvement in the
organization using the new system (that is a design question) ,but improper will prevent
it.
49
-
8/2/2019 Gensan Buy Premise
50/77
-
8/2/2019 Gensan Buy Premise
51/77
51
-
8/2/2019 Gensan Buy Premise
52/77
MAINTENANCE
Software maintenance is the last phase in the software Engineering process that
eliminates errors in the working system during its work span and to tune the system to
any variations in its working environment. The system requires maintenance as there
may be changes and requirements in the organizational needs, government policies,
hardware and software environment etc. often small system deficiencies are found as a
system is brought into operation and changes are made to remove them. System
requirements may be revised as a result of system usage or changing operational
needs. Perhaps oversight that occurred during the development process needs to be
corrected. Often the maintenance need arises to capture additional data for storage in a
database or in transaction files or perhaps it may be necessary to add error detection
features to prevent system users from in adversely taking an unwanted action.
Maintenance of the system after it is installed is concerned with an additional
factor in hardware. Once the system is delivered and installed there is a brief warranty
period during which time the vendor is responsible for maintenance. This is a typically a
52
-
8/2/2019 Gensan Buy Premise
53/77
90 day period after that time the purchaser has the option of acquiring maintenance
from various sources. Maintenance source excepting vendor is also available from
companies specializing in providing the service, called third party maintenance
companies.
When the system is installed, it is generally used for long period. The average life of
system is 4-6 years, with the eldest applications often is used for over 10 years. The
need for debugging and correcting errors or failure on an emergency basic is
comparatively low: less than 20% of the task of correction. System and organization are
in constant state of flux; therefore the maintenance of the system also involved
adoptions for earlier version of software.
Approximately 20% of all maintenance work is performed to accommodate
changes in report, files and database. The greatest amount of maintenance work is for
user enhancement, improved documentation and recording system components or
greater efficiency. About 60% of all maintenance is for this purposed.
Following table summarized the broad classes of maintenance found in
development of sekkjob.com
CATEGORY ACTIVITY Corrective Emergency fixes, routine debugging.
AdaptiveAccommodation
of changes to
data and to
hardware
and software,
Changes in the
external
environment.
Pre effectiveUser
53
-
8/2/2019 Gensan Buy Premise
54/77
enhancement,
improved
documentation
recording of
computational
efficiency, user
recommendation
s for new
capabilities.
Preventive
Routine service
of cleaning and
adjusting the
equipment to
prevent
breakdowns,
future
maintainability
reliability
enhancement,
recovering
design
information to
improve the
overall quality.Maintainable Design
The points to reduce the needs for maintenance are:
More accurately defining the users requirements during the system development
assembling better system documentation.
54
-
8/2/2019 Gensan Buy Premise
55/77
Using more effective methods for designing process logic and communicating it to
project team members.
Making better use of existing tools and techniques.
Managing the system engineering process effectively.
The maintenance for Integrated Advertising System was performed with the above-
mentioned points as the underlying principles and according to the demands of the
users.
55
-
8/2/2019 Gensan Buy Premise
56/77
CONCLUSION
This is a well defined job of our team that has taken six weeks to analyze the situation in
which this project will work and the environment of the company that will use this
project.
It was a good experience for us to work in a company that has a very friendly
environment and learning atmosphere.
I am very thankful to Mr. Mohd Gurfan khan.
Who gave a lot of good programming skills and so many company related skills that will
help me in the future?
I am also thankful to all my friends and team members.
56
-
8/2/2019 Gensan Buy Premise
57/77
FUTURE SCOPE OF THIS PROJECT
In future this project can be treated as product according to specification and needs of
any organization.
Since Jobseeker plays key role in any organization; thus, success over a long period of
time and reliance of organization over recruitment is going to be one of the most
considered topic for any organization. Therefore Jobs seeker Process will be of great
help in carrying out recruitment process smoothly and effectively.
At present days every organization is using web technology for their proper functioning,
so this web based project is all in all important from market aspects.
Furthermore if this project will be uploaded, it can be used as Jobs site and any
organization can register their self on the site to carry out their recruitment process
making this site as Jobs seeker.
57
-
8/2/2019 Gensan Buy Premise
58/77
LIMITATIONS
Since, every system has some limitations so our proposed system is also not
untouchable in this regard. Although it includes every kind of features but it cant be
used in a huge organization where number of networks are very large, because the data
base used in this system is an average one. Also it doesnt have different kind of access
feature for different users.
SOFTWARE SCOPE
Reusability:
Reusability is possible as and when we require in this application. We can
update it next version. Reusable software reduces design, coding and testing cost by
amortizing effort over several designs. Reducing the amount of code also simplifies
understanding, which increases the likelihood that the code is correct. We follow up
both types of reusability: Sharing of newly written code within a project and reuse of
previously written code on new projects.
Extensibility:
This software is extended in ways that its original developers may not
expect. The following principles enhance extensibility like Hide data structure, avoid
traversing multiple links or methods, Avoid case statements on object type and
distinguish public and private operations.
Robustness:
58
-
8/2/2019 Gensan Buy Premise
59/77
Its method is robust if it does not fail even if it receives improper
parameters. There are some facilities like Protect against errors, Optimize after the
program runs, validating arguments and Avoid predefined limits.
Understandability:
A method is understandable if someone other than the creator of the
method can understand the code (as well as the creator after a time lapse). We use the
method, which small and coherent helps to accomplish this.
Cost-effectiveness:
Its cost is under the budget and make within given time period.
It is desirable to aim for a system with a minimum cost subject to the condition that it
must satisfy all the requirements.
Scope of this document is to put down the requirements, clearly identifying the
information needed by the user, the source of the information and outputs expected
from the system.
59
-
8/2/2019 Gensan Buy Premise
60/77
60
-
8/2/2019 Gensan Buy Premise
61/77
SITES REFERRED:
1. http://www.sun.com
2. http://www.coreservlets.com
3. http://www.serverside.com
4. http://www.w3schools.com
5. http://www.google.com
6. http://www.webopedia.com7. http://www.ddj.com
BOOKS:
J2EE by GARRY CORNELL. J2EE by Allamaraju & Buest (Apress Publications). JSP & Servlets by Marty Hall (SUN Microsystems) SYSTEM ANALYSIS AND DESIGN by ELIAS M AWAD. SOFTWARE ENGINEERING by IAN SOMMEVILLE.
61
http://www.sun.com/http://www.coreservlets.com/http://www.serverside.com/http://www.w3schools.com/http://www.google.com/http://www.webopedia.com/http://www.ddj.com/http://www.sun.com/http://www.coreservlets.com/http://www.serverside.com/http://www.w3schools.com/http://www.google.com/http://www.webopedia.com/http://www.ddj.com/ -
8/2/2019 Gensan Buy Premise
62/77
62
-
8/2/2019 Gensan Buy Premise
63/77
APPENDIX-A
Backend remains on server side and has two components i.e.
1. Server side program
2. Data Base.
Data base is the most important thing in this universe as data base gives identity to a
thing without data base existence of a thing is impossible while working on a project first
step is to design a database.
What is data base?Data Base is a collection of tables and table is a collection of records in a tabular form
i.e. in row and columns.
Data Base can be divided into two parts:-
1. RDBMS.
2. DBMS.
We will be using RDBMS (Relational Database Management System) in our project i.e.
oracle 8i Enterprise edition.
Why we are using Oracle (RDBMS)?
Some of the merits of using Oracle (RDBMS) are as under:-
Centralization of database.
Client Server Technology.
Security.
Normalization of Data Base.
Relationship.
Transaction Processor.
It gives some internet related features.
Hence because of these features we are using Oracle as a back end technology.
63
-
8/2/2019 Gensan Buy Premise
64/77
ABOUT ORACLE 8i
Oracle 8i contains all the features of previous version. It also supports some new
features & enhancement to some existing features. Oracle servers provide deficient &
effective solution for the major features.
Large Database & Space Management Control
Many Concurrent Database Performances
High Transaction Processing Performance
High Availability
Controlled Availability
Industry Accepted Standards
Manageable Security
Database Enforced Integrity
Distributed Database System
Portability
Compatibility
Connectivity
NEW FEATURES OF ORACLE 8iImproved Scalability
Improved Security
Improved Performance Via Partition
Enhanced Support for Database Replication
Capability To Handle a Much Larger Number Of Concurrent Users
New & Improved Data Types
64
-
8/2/2019 Gensan Buy Premise
65/77
APPENDIX-BWhat is Middle Ware?
Middle Ware is a concept, Middle Ware provides centralization of business logic i.e.
instead of putting logic on each and every client machine we put logic on a centralized
server hence middle ware is nothing but a server side program where all your business
logic and business methods reside. It remains on server side and it has all the logical
building. Middle ware provides:-
1. Multiple Client access.
2. Centralized business logic in case of distributed application.
Because we are working on Distributed Application Based Project we need platform
independent Language:-
Technology Used
Introduction to Java
Java is a high level, third-generation programming language, like C, Fortran, Perl and
many others. It is a platform for distributed computing a development and run-time
environment that contains built-in support for the World Wide Web.
History of Java
Java development began at Sun Microsystems in 1991, the same year the World Wide
Web was conceived. Javas creator, James Gosling did not design java for the Internet.
His Objective was to create a common development environment for consumer
electronic devices which was easily portable from one device to another.
This effort evolved into a language, code named Oak and later renamed Java thatretains much of the syntax and power of c++, but is simpler and more platform
independent.
Java Features
Some of the important features of Java are as follows:
Simplicity
65
-
8/2/2019 Gensan Buy Premise
66/77
Orientation
Platform Independence
Security
High Performance
Multi Threading
Dynamic linking.
Garbage Collection.
One of the most important features of Java is Platform Independence which makes it
famous and suitable language for World Wide Web.
Why java is Platform Independent?
Java is Platform Independent because of Java Virtual Machine (JVM).
Java Virtual Machine (JVM)
The client application or operating system must have a java byte-code interpreter to
execute byte-code instructions. The interpreter is a part of a lager program called the
JVM. The JVM interprets the byte code into native code and is available on a platform
that supports java.
Connectivity using JDBC
There are four kinds of drivers available in Jdbc:-
1. JdbcOdbc Bridge Driver.
2. Partly Java Driver.
3. Pure Java Driver.
4. Native Driver.
Client Side Interface:In client side interface we are using:-
Servlet / JSP In Internet Based Application.
66
-
8/2/2019 Gensan Buy Premise
67/77
J2EE Framework and Architecture
J2EE is one of the best solutions that we have had so far for meeting the demand of
todays enterprise. J2EE specifies both the infrastructure for managing our applications,
and the service APIs for building our applications.
The J2EE platform is essentially a distributed application-server environment- a java
environment that provides the following: -
A set of java extension APIs to build applications. These APIs define a programming
model for J2EE applications.
A run time infrastructure for hosting and managing applications. This is the server
runtime in which our applications resides.
The applications that we could develop with the above may be programs to drive web
pages, or components to implement complex database transactions, or even java
applets, all distributed across the network.
The J2EE Runtime
While J2EE bundles together APIs that have been in existence in one form or another
for quite sometime, perhaps its most significant aspect is the abstraction of the runtime
infrastructure. The J2EE specification doesnt specify how a J2EE runtime should or
could be built. Instead, J2EE specify roles and interfaces for applications, and theruntime onto which applications could be deployed. This results in a clear demarcation
between applications and the runtime infrastructure. This demarcation allow the runtime
to abstract most of the infrastructure services that enterprise developers have
traditionally attempt to build on their own. As a result, J2EE application developers
could just focus on the application logic and related service, while leveraging the
runtime for all infrastructure-related services.
Apart from specifying a set of standard APIs, the J2EE architecture also provides a
uniform means of accessing platform-level services via its runtime environment. Such
service includes distributed transactions, security, messaging etc.
The J2EE APIs Used
Distributed applications require access to a set of enterprise services. Typical services
include transaction processing, database access, messaging, multithreading etc. The
67
-
8/2/2019 Gensan Buy Premise
68/77
J2EE architecture unifies access to such services in its enterprise service APIs.
However, instead of having to access these service through proprietary or non standard
interfaces, application programs in J2EE can access these APIs via the container.
There are various API specification in J2EE framework which enable us to create an
application at great speed with minimum effort.
APIs Used To Build the Software
1. JDBC API
The JDBC API provides developers with a way to connect to relational data from
within java code. Using the JDBC API, developers can create a client (which can be
anything from an applet to an EJB) that can connect to a database, execute structured
query language statements, and processes the result of those statements. The API
provides connectivity and data access across the range of relational databases. It can
do this because it provides a
set of generic database access methods for sql compliant relational databases. JDBC
generalizes the most common database access functions by abstracting the vendor
specific detail of particular database. The result is set of classes and interface, placed in
the java.sql package, which can be used with any database that has an appropriate
JDBC drive. This allow JDBCconnectivity to be provided in a consistent way for any database. It also means that with
a little care to ensure the application confirms to the most commonly available database
features, an application can be use with a different database simple by switching to a
different JDBC driver. JDBC includes following packages for the means of database
accessing and provides various features of the database. The packages are as follows:
-
java.sql Package: -
This package contains classes and interfaces designed with traditional client/server in
mind. Its functionality is focused primarily on basic database programming services
such as creating connections, executing statements and prepared statements, and
running batch queries. Advanced functions such as batch updates, scrollable result
sets, transaction isolation, and sql data types are also availabl
68
-
8/2/2019 Gensan Buy Premise
69/77
javax.sql Package: -
This package introduces sum major architectural change to JDBC programming
compared to java.sql package, and provides better abstractions for connections
management, distributed transactions, and legacy connectivity. This package also
introduces container-managed connection pooling, distributed transactions, and row
sets.
2. Java Servlets: -
Servlets are Java technologys answer to Common Gateway Interface (CGI)
programming. They are programs that run on a Web server, acting as middle layer
between a requests coming from a Web browser or other HTTP client and databases or
applications on the HTTP server. Their job is to:
Read any data sent by the user.
This data is usually entered in a form on a Web page, but could also come from a Java
applet or a custom HTTP client program.
Look up any other information about the request that is embedded in the HTTP
request.
This information includes details about browser capabilities, cookies, the host name of
the requesting client, and so forth.Generate the results.
This process may require talking to a database, executing an RMI or CORBA call,
invoking a legacy application, or computing the response directly.
Format the results inside a document.
In most cases, this involves embedding the information inside an HTML page.
Set the appropriate HTTP response parameters.
This means telling the browser what type of document is being returned (e.g., HTML),
setting cookies and caching parameters, and other such tasks.
Send the document back to the client.
This document may be sent in text format (HTML), binary format (GIF images), or even
in a compressed format like gzip that is layered on top of some other underlying format.
Many client requests can be satisfied by
69
-
8/2/2019 Gensan Buy Premise
70/77
returning pre-built documents and these requests would be handled by the server
without invoking servlets. In many cases, however, a static result is not sufficient, and a
page needs to be generated for each request.
Java Server Pages: -
Java Server Pages (JSP) technology enables you to mix regular, static HTML with
dynamically generated content from servlets. Many Web pages that are built by CGI
programs are primarily static, with the parts that change limited to a few small locations.
For example, the initial page at most on-line stores is the same for all visitors, except for
a small welcome message giving the visitors name if it is known. But most CGI
variations, including servlets, make you generate the entire page via your program,
even though most of it is always the same. JSP lets you create the two parts separately.
Listing 1.1 gives an example.
Most of the page consists of regular HTML, which is passed to the visitor
unchanged. Parts that are generated dynamically are marked with special HTML-like
tags and mixed right into the page.
The Advantages of JSP
JSP has a number of advantages over many of its alternatives. Here are a few of them.
Versus Active Server Pages (ASP)ASP is a competing technology from Microsoft. The advantages of JSP are twofold.
First, the dynamic part is written in Java, not VBScript or another ASP-specific
language, so it is more powerful and better suited to
complex applications that require reusable components. Second, JSP is portable to
other operating systems and Web servers; you arent locked into Windows NT/2000 and
IIS. You could make the same argument when comparing JSP
to ColdFusion; with JSP you can use Java and are not tied to a particular server
product.
Versus Pure Servlets
JSP doesnt provide any capabilities that couldnt in principle be accomplished with a
servlet. In fact, JSP documents are automatically translated into servlets behind the
70
-
8/2/2019 Gensan Buy Premise
71/77
scenes. But it is more convenient to write (and to modify!) regular HTML than to have a
zillion println statements that generate the HTML. Plus, by separating the presentation
from the content, you can put different people on different tasks: your Web page design
experts can build the HTML using familiar tools and leave places for your servlet
programmers to insert the dynamic content.
Versus Server-Side Includes (SSI)
SSI is a widely supported technology for inserting externally defined pieces into a
static Web page. JSP is better because you have a richer set of tools for building that
external piece and have more options regarding the
stage of the HTTP response at which the piece actually gets inserted. Besides, SSI is
really intended only for simple inclusions, not for real programs that use form data,
make database connections, and the like.
Versus Static HTML
Regular HTML, of course, cannot contain dynamic information, so static HTML pages
cannot be based upon user input or server-side data sources. JSP is so easy and
convenient that it is quite reasonable to augment HTML pages that only benefit slightly
by the insertion of dynamic data. Previously, the difficulty of using dynamic data
precluded its use in all but the most valuable instances.
APPENDIX-C
What is HTML?
HTML (Hyper Text Markup Language): A markup language used to structure text andmultimedia documents and to set up hypertext links between documents, used
extensively on the World Wide Web. HTML is a display language, not a programming
language. HTML is a markup language (the ML in HTML) that uses a fixed set of
markup tags.
71
-
8/2/2019 Gensan Buy Premise
72/77
HTML itself is the set of customizable markup tags that are inserted into HTML
document govern its format, multimedia content, and hyperlinks. Any HTML viewer can
display such documents but they are normally viewed usinga Web browser.
HTML is a programming language in that an HTML document is a program that, when
run by a browser, displays its text as hypermedia (multimedia with hyperlinks).
The language HTML is really only a collection of predefined tags which , when
inserted into regular text, tell a web browser how to:
a. Format the document and its text.
b. Incorporate i.e. insert a graphic image, video sequence, or sound clip into the
displayed document.
c. Link into other locations, in the same document, in another web page, or even on
another computer (Server), or
d. Link to other programs written in Java, JavaScript or other languages (called CGI
applications).
Features of HTML:-
HTML stands for Hyper Text Markup Language.
An HTML file is a text file containing small markup tags.
The markup tag tells the Web browser how to display the page.
An HTML file must have an htm or html file extension.
An HTML file can be created using a simple text editor.
Its a display-only technology.
APPENDIX-D
What is JAVASCRIPT?
JavaScript is a compact, object-based scripting language. It can provide
interactive web pages, validate from data, and make your web page clearer. JavaScript
is a lightweight interpreted scripting language. The language is most well known for its
use in wesites.It was originally developed by Brendan Each of Netscape
Communications. It adds interactive functions to HTML pages, which are otherwise
static. JavaScript is easier to use than Java, but not as powerful and deals mainly with
72
-
8/2/2019 Gensan Buy Premise
73/77
the elements on the Web page. On the client, JavaScript is maintained as source code
embedded into an HTML page. On the Server, it is compiled into byte code
(intermediate language), similar to Java programs.
Features of JavaScript:-
JavaScript was designed to add interactively to HTML pages.
JavaScript is a scripting language-a scripting language is a lightweight programming
language.
A JavaScript is usually embedded directly in HTML pages.
A JavaScript is an interpreted language (means that script execute without preliminary
compilation).
All major browsers, like Netscape and Internet Explorer, support JavaScript.
Functions of JavaScript:-
JavaScript gives you the ability to perform the following functions:
Control document appearance and content
Control the browser
Interact with document content
Interact with the user
Read and write client state with cookies
Interact with applets
Manipulate Embedded Images
Limitations of JavaScript:-
JavaScript does not have any graphics capabilities
Client-side JavaScript can not read or write files
JavaScript does not support networking of any kind
JavaScript doesnt have any multithreading capabilities.
73
-
8/2/2019 Gensan Buy Premise
74/77
74
-
8/2/2019 Gensan Buy Premise
75/77
Analysis:
Breaking a problem into successively manageable parts for individual study.
Attribute:
A data item that characterizes an object.
Cost/Benefit Analysis:
The purpose of the comparing the projected savings and benefits to projected to coststo decide whether the system change is justified.
Data Base:
A store of integrated data capable being directly addressed for multiple user; it is
organized so that various files can be accessed through a single referenced based on
the relationship among records in the file rather than the physical location.
DBMS:
The software that determines how data must be structured to produce the users view;
and maintain update the system.
Data Flow:
Moment of data in a systems from appoint of origin to specific destination indicated
by a line and arrow.
Data Security:
75
-
8/2/2019 Gensan Buy Premise
76/77
Protection of data from loss, disclosure, modification or destruction.
Data Structure:
Logically related set of data that can be decomposed into lower level data elements;
a group of data elements handled as a unit.
Design:
Process of devolving the technical and operational specification of a candidate system
for implementation.
Feasibility Study:
A procedure that identifies describes and evaluates candidate systems and selects the
best system for implementation.
File:
Collection related records organized for a particular purpose also called a data set.
Flow Chart:
A graphic picture of the logical steps and sequence involved in a procedure or a
program.
Form:
A physical carrier of data of information.
Implementation:
In system development- a phase that focuses on user training, site preparation andfile conversion for installing a candidate system.
Maintenance:
Restoring to its original condition.
Normalization:
A process of replacing a given file with its logical equivalent; the object is true derive
sample file with no redundant elements.
Operating System:
In data base machine based software that facilitates the availability information or
reports through the DBMS.
Password:
Identity authenticator a key that allow access to a program system or procedure.
Pert:
76
-
8/2/2019 Gensan Buy Premise
77/77
A flow system model used to manipulate various values as a basis for determining
the critical path to interpret this relationship and to relate them back to the real world as
a control technique.
Record:
A collection of aggregates or related item of data treated as a unit.
Source code:
A procedure or format that allow enhancement on a software package.
System:
A regular or orderly arrangement of components or parts in a connected and
interrelated series or whole; a group of components necessary to some operation.
System Design:
Detailed concentration on the technical and other specification that will make the new
system operational.
System Development Life Cycle:
A structured sequence of phases for implementing an information system.
System Testing:
Testing the whole system by the user after major programs and sub systems have been
tested.Unit Testing Validation:
Testing changes made in an existing or new programs. checking the quality of software
in both simulated and live environment