0% found this document useful (0 votes)
49 views66 pages

Demo Project Report 2025

The project report focuses on the Database Management System (DBMS) implemented at Wipro Ltd, detailing its significance in managing data and improving website visibility through search engine optimization techniques. It includes an introduction to DBMS, a company profile of Wipro, and outlines the research methodology, findings, and recommendations. The report emphasizes the importance of good DBMS practices for enhancing user experience and driving traffic to websites.

Uploaded by

NARENDER
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views66 pages

Demo Project Report 2025

The project report focuses on the Database Management System (DBMS) implemented at Wipro Ltd, detailing its significance in managing data and improving website visibility through search engine optimization techniques. It includes an introduction to DBMS, a company profile of Wipro, and outlines the research methodology, findings, and recommendations. The report emphasizes the importance of good DBMS practices for enhancing user experience and driving traffic to websites.

Uploaded by

NARENDER
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 66

PROJECT REPORT

ON
DATA BASE MANAGEMENT SYATEM
AT
WIPRO LTD.

Submitted to:
Maharshi Dayanand University, Rohtak

Towards partial fulfillment of requirements of Two Year Full Time


MBA Programme

Session : 2023-25

Submitted To:- Submitted By:-


Faculty Guide Name -……….
Name ---- Roll No…………
Regn. No. ………..
Univ Roll No: ……….

RAMANUJAN COLLEGE OF MANAGEMENT


Mitrol, Palwal, Haryana
DECLARATION

I, ……….. is a student of Ramanujan College of Management, Palwal hereby declare that


the project entitled “Database Management System - Wipro” is an Original Work and the
same has not been submitted to any other institute for the award of any other degree.

[Student Name ]
ACKNOWLEGEMENT

The success and final outcome of this project required a lot of guidance and assistance from
many people and I am extremely fortunate to have got this all along the completion of my
project work. Whatever I have done is only due to such guidance and assistance and I would
not forget to thank them.

First of all I express my profound sense of gratitude and sincere thanks to the management of
Company Name for giving me an opportunity to do the project work and providing me all
support and guidance which made me complete the project on time.

I would not forget to remember [Faculty Guide Name ] for their unlisted encouragement
and more over for their timely support and guidance till the completion of our project work.

An acknowledgement would not be completed without a word of thanks to all friends for
their valuable suggestions.

[Student Name ]
PREFACE
Every study is incomplete without having a well concrete exposure, of the

research. My overall experience of preparing this report was a

knowledgeable journey. I learned a lot about the functions of. The main

purpose of the study is to use and apply our academic knowledge gained

during the curriculum in getting valuable insight of corporate culture with

all its attendants completes. Students of management are successfully

processed and refined through the mean of final reports so that they may

have a complete exposure to present scenario. I have done a lot of hard

work despite of all my sincere efforts.

For completing this report, I required the annual reports of not only Flexi

Infotech Company, but also of some other leading companies in the field

of making hand made goods. I got my required data from websites of

companies and from newspaper as well. This is a possibility that there

may be some areas, which may remain uncovered in study. I once again

would like to thank all those who helped me directly or indirectly in

preparation of this research work.


TABLE OF CONTENTS

 INTRODUCTION

 COMPANY PROFILE

 REVIEW OF LITERATURE

 RESEARCH METHODOLOGY

 DATA ANALYSIS & INTERPRETATION

 FINDINGS OF THE STUDY

 CONCLUSION & RECOMMENDATIONS

 ANNEXURE

o QUESTIONNAIRE
o BIBLIOGRAPHY
CHAPTER – 1
INTRODUCTION
INTRODUCTION

A DBMS is system that is


designed to manage data of
information on World Wide
Web. The information may be
mix of pages, images or other
so such traffic is generatedon
sites. For solve this problem,
Search Engine Optimization
techniques are used. DBMS is a very broad topic. It is a part of search engine marketing.
DBMS is a paid and organic type of search engine. DBMS is a technique, which is used
to improve visibilities of websites and also improve rank of search result. The term search
engine optimization implies a relevant history must be considered after the development
of search engines. Day by day different search engines are created. In recent era, used and
popularity of internet is increased. It creates difficulty for site seeking, public visibility.
According to study, growth ofinternet used is about 3 million on the internet each moths.
So, number of user become large. It is difficult for websites to be visible for all the other
sites. It helps search mangers to solve traffic problem which are generated on site and
also making site friendly, to build link and making unique market value ofsites.
DBMS may target different kind of search. DBMS is used for website improvements and
understanding the ways individuals may look for it. DBMS is a method to get a better
resultfor a website managing such as Google, Yahoo or Bing. Cause of many uses and
sites are available, delay problems are generated.
So, using cluster k- means algorithm solve delay problems, improve managed data and
also easily used Message Passing Application Programming Interface (MPAPI)
technique. The DBMS Spider, which is a popular open-source web-spider. It includes an
automated crawler, which can follow the links found on a website and an indexer, which
builds an index of all the search terms found in the pages and uses the Porter

Stemming Algorithm in a process of removing. The commoner morphological and


database are used.Means Algorithm and MPAPI to reduce the time of clustering
for all the keywords.
Furthermore, Search engines face some difficulty this difficult was maintained by query
log.

SIGNIFICANCE OF STUDY
It is not only about managing data but good DBMS practices improve the user
experienceand usability of a web site. Users trust search engines and having a presence
in the top positions for the keywords the user is searching, increases the web site's trust.
DBMS is good for the social promotion of your web site.
DBMS optimization is important because:

The majority of search engines users (more than 65% – see graph below) are more
likelyto click on one of the top 5 suggestions in the results pages (SERPS). To take
advantage of this and gain visitors to your web site or customers to your online store,
your website needs to appear in one of the top positions.

DBMS is not only about managing but good DBMS practices improve the user
experience and usability of a web site. Users trust search engines and having a presence
in the top positions for the keywords theuser is searching, increases the web site’s trust.
DBMS is good for managing data of your web site. People who find your web site by
searching Google or Yahoo are more likely to promote it on Facebook, Twitter, or other
social media channels.

DBMS is important for the smooth running of a big web site. Web sites with more than
one author can benefit from DBMS in a direct and indirect way. Their direct benefit is
increase in search engine traffic and their indirect benefit is having a common
framework(checklists) to use before publishing content on the site.

1.Organic Search Is Most Often the Primary Source of Website Traffic Organic search is
a huge part of most business’s website performance, as well as a As marketers know,
Google owns a significantly larger portion of the search market than competitors like
Yahoo, Bing, Baidu, Yandex, DuckDuckGo, and the many, many others. That’s not to
say that all search engines don’t contribute to a brand’s visibility — they do
it’s just that Google owns about 75 percent of the overall search market. It’s the clear
cut leader and thus its guidelines are important to follow.

But the remaining 25 percent of the market owned by other engines is obviously
valuable to brands, too. Google, being the most visited website in the world (as well as
specificallyin the United States), also happens to be the most popular email provider in
the world (with more than 1billion users). Not to mention YouTube is the second biggest
system.

We know that a clear majority of the world that has access to the internet is visiting
Google at least once a day to get information. Being highly visible as a trusted resource
byGoogle and other search engines is always going to work in a brand’s favour. Quality
DBMS and a high-quality website takes brands there.
DBMS Builds Trust & Credibility

The goal of any experienced DBMS is to establish a strong foundation for a beautiful
website with a clean, effective user experience that is easily discoverable in search with
thanks to the trust and credibility of the brand and its digital properties.

Many elements go into establishing authority regarding search engines like Google. In
addition to the factors mentioned above, authority is accrued over time as a result of
elements like:

Quality backlink profiles. Positive user behaviour.

 Machine-learning signals.

 Optimized on-page elements and content.

But establishing that authority will do more for a brand than most, if not all, other digital
optimizations. Problem is, it’s impossible to build trust and credibility overnight just like
real life. Authority is earned and built over time.

Establishing a brand as an authority takes patience, effort, and commitment, but also
relies on offering a valuable, quality product or service that allows customers to trust a
brand.
1. Good DBMS Also Means a Better User Experience

Everyone wants better organic rankings and maximum visibility. Few realize that optimal
user experience is a big part of getting there. Google has learned how tointerpret a
favourable or unfavourable user experience, and a positive user experience has become a
pivotal element to a website’s success.

Customers know what they want. If they can’t find it, there’s going to be a problem. And
performance will suffer. A clear example of building a strong user experience is how
Google has become more and more of an answer engine offering the sought-after data
directly on the SERPs (search engine results pages) for users.

The intention of that is offering users the information they are looking for in fewer clicks,
quickly and easily. Quality DBMS incorporates a positive user experience, leveraging it
to work in a brand’s favour.

2. Local DBMS Means Increased Engagement, Traffic & Conversions

With the rise and growing domination of mobile traffic, local search has become a
fundamental art of small-and medium-sized businesses success.

Local DBMS aims at optimizing your digital properties for a specific vicinity, so people
can find you quickly and easily, putting them one step closer to a transaction. Local
optimizations focus on specific towns, cities, regions, and even states, to establish a
viable medium for a brand’s messaging on a local level. DBMS pros do this by
optimizing the brand’s website and its content, including local citations and back- links,
as well as local listings relevant to the location and business sector a brand belongs to.
To promote engagement on the local level, DBMS pros should optimize a brand’s
Knowledge Graph panel, its Google My Business listing, and its social media profiles as
a start. There should also be a strong emphasis on user reviews on Google, as well as
other reviews sites like Yelp, Home Advisor, and Angie’s List (among others), depending
on the industry.

3. DBMS Impacts the Buying Cycle


Customers do their research. That’s one of the biggest advantages of the internet from a
buyer perspective. Using SEO tactics to relay your messaging for good deals,
groundbreaking products and/or services, and the importance and dependability of what
customers will be a game changer.

It will also undoubtedly impact the buying cycle in a positive way when done right.
Brands must be visible in the places people need them for a worthy connection to be
made. Local SEO enhances that visibility and lets potential customers find the answers,
and the businesses providing those answer.

Shield your PPC ads from competitors and clickbait’s. Automatically protect your ads
from competitors, bots, click farms and other forms of click fraud. Simple setup.
4. DBMS Best Practices Are Always Being Updated

It’s great to have DBMS tactics implemented on a brand’s website and across its digital
properties, but if it’s a short-term engagement (budget constraints, etc.) and the site
isn’t re-evaluated consistently over time, it will reach a threshold where it can nolonger
improve because of other hinderances.
CHAPTER – 2
COMPANY PROFILE
PROFILE OF THE ORGANIZATION

Wipro Limited (formerly, Western India Palm Refined Oils Limited) is an


Indian multinational corporation that provides information
technology, consulting and business process services. Wipro's capabilities range
across cloud computing, cyber security, digital transformation, artificial
intelligence, robotics, data analytics, and other technology consulting services to
customers in 167 countries.

HISTORY OF WIPRO
Early years The company was incorporated on 29 December 1945 in Amalner, India, by
Mohamed Premji as Western India Vegetable Products Limited, later abbreviated to
Wipro. It was initially set up as a manufacturer of vegetable and refined oils under
the trade names of Kisan, Sunflower, and Camel.

In 1966, after Mohamed Premji's death, his son Azim Premji took over Wipro as
its chairman at the age of 21.
SHIFT TO IT INDUSTRY
During the 1970s and 1980s, the company shifted its focus to new opportunities in the
IT and computing industry, which was at a nascent stage in India at the time. On 7
June 1977, the name of the company changed from Western India Vegetable Products
Limited, to Wipro Products Limited. In 1982, the name was changed again, from
Wipro Products Limited to Wipro Limited. In 1999, Wipro was listed on the New
York Stock Exchange. In 2004, Wipro became the second Indian IT company to earn
US$1 billion in annual revenue.

In 2012, Wipro demerged its non-IT businesses into a separate company called Wipro
Enterprises. Prior to this demerger, these businesses, mainly in the consumer care,
lighting, furniture, hydraulics, water treatment, and medical diagnostics, contributed
about 10% of Wipro's total revenues.

In August 2018, Wipro paid US$75m to National Grid US as a settlement for a


botched SAP implementation that an 2014 audit estimated could cost the company
US$1 billion. Wipro had been hired as systems integrator in 2010, but errors in the
rollout, intended to replace an Oracle system, caused serious losses and reputational
damage.

In March 2023, Wipro opened its American international headquarters at Tower


Center in East Brunswick, Middlesex County, New Jersey.
Notable acquisitions

In 2006, Wipro acquired California-based technology company cMango in an all cash


deal.

In 2012, Wipro acquired Australian analytics company, Promax Applications Group


for A$35 million in an all cash deal.

In 2015, Wipro acquired Denmark-based design consultancy Designit for €85 million.

In 2016, Wipro acquired cloud services consultancy Appirio for $500M.


In April 2019, Wipro acquired Filipino personal care company Splash Corporation.

In February 2020, Wipro acquired Rational Interaction, a Seattle-based digital


customer experience consultancy.

In March 2021, Wipro acquired Capco, a 22-year-old global technology and


management consultancy specializing in driving digital transformation in the financial
services industry. The deal was completed in April.
Wipro has signed an agreement to acquire Ampion for a cash consideration of $117
million, according to an exchange filing.

In April 2022, Wipro signed a definitive agreement to acquire the Stamford,


Connecticut-headquartered Systems Applications and Products (SAP) consulting
company, Rizing Intermediate Holdings.

SUSTAINABILITY
Wipro has committed to achieving net-zero emissions by 2040, with an intermittent goal
of reducing emissions 55% by 2030.
Listing and shareholding
Listing - Wipro's equity shares are listed on Bombay Stock Exchange, where it is a
constituent of the BSE SENSEX index, and the National Stock Exchange of India where
it is a constituent of the S&P CNX Nifty. The American Depositary Shares of the
company are listed on the New York Stock Exchange (NYSE) since October 2000.
Shareholding: The table provides the share holding pattern as of 31 March 2022.

Shareholders (as on March 31, 2022) Shareholding

Promoter group led by Azim Premji 73%

Foreign Institutional Investors 9%

Domestic Institutional Investors 3%


Non-Institutions (Retail) 6%

Overseas Depositories 3%

Other Public Shareholding 6%

Employee trust 0.29%

EMPLOYEES
On 6 July 2020, Thierry Delaporte took over from Abidali Neemuchwala as the new CEO
of Wipro.[39] Abidali Neemuchwala was appointed as Wipro's CEO after T. K.
Kurien stepped down in early 2016. Neemuchwala, who had been group president and
CEO from April 2015, was appointed CEO with effect from 1 February 2016.

AWARDS AND RECOGNITIONS


Wipro received the National award for excellence in Corporate Governance from
the Institute of Company Secretaries of India during the year 2004.
Wipro honored as 2010 Microsoft Country Partner of the Year Award for India.
Wipro received the 'NASSCOM Corporate Award for Excellence in Diversity and
Inclusion, 2012', in the category 'Most Effective Implementation of Practices &
Technology for Persons with Disabilities '.
Wipro was ranked second in the Newsweek 2012 Global 500 Green companies.
In 2014, Wipro was ranked 52nd among India's most trusted brands according to the
Brand Trust Report, a study conducted by Trust Research Advisory.
Wipro won seven awards, including Best Managed IT Services and Best System
Integrator in the CIO Choice Awards 2015, India
Wipro won Gold Award for ‘Integrated Security Assurance Service (iSAS)’ under the
‘Vulnerability Assessment, Remediation and Management’ category of the 11th Annual
2015 Info Security PG's Global Excellence Awards.
In May 2016, it was ranked 755th on the Forbes Global 2000 list.
In March 2017, Wipro was recognized as one of the world's most ethical companies by
US-based Ethisphere Institute for the sixth consecutive year.
In 2021 Wipro awarded boomi worldwide spotlight award
Wipro is a global company delivering innovation-led strategy, technology, and business
consulting services.
Wipro Limited (NYSE: WIT, BSE: 507685, NSE: WIPRO) is a leading global
information technology, consulting, and business process services company. We harness
the power of cognitive computing, hyper-automation, robotics, cloud, analytics, and
emerging technologies to help our clients adapt to the digital world and make them
successful. A company recognized globally for its comprehensive portfolio of services, a
strong commitment to sustainability, and good corporate citizenship, we have over
243,000 dedicated employees serving clients across six continents. Together, we discover
ideas and connect the dots to build a better and bold new future.

Mission: The Spirit of Wipro is the core of Wipro. These are our Values. It is about who
we are. It is our character. It is reflected consistently in all our behaviour. The Spirit is
deeply rooted in the unchanging essence of Wipro. But it also embraces what we must
aspire to be. It is the indivisible synthesis of the four values. The Spirit is a beacon. It is
what gives us direction and a clear sense of purpose. It energizes us and is the touchstone
for all that we do.

Vision: Contribute to global e-society, where a wide range of information is being


exchanged beyond time and space over global networks, which breaks down the
boundaries among countries, regions, and cultures, allowing individuals to take part in
various social activities in an impartial, secure way. Continous effort to enhance people's
lifestyle and quality by means of developing new technology in wireless communication.

In 2020, we at Wipro proudly celebrated seventy-five glorious years since our inception.
In this time, we’ve come a long way — from a family-run vegetable oil manufacturer to a
diversified global business and technology consulting leader.
Today, the Wipro brand is an embodiment of customer-centric excellence, drive for
sustainability and outstanding corporate citizenship. Our innovative solutions, lasting
partnerships and commitment to our communities have helped us become one of the
largest, most trusted IT services companies in the world, with more than 250,000
employees in over 66 countries. And our lasting values, the Spirit of Wipro, continue to
guide our actions, fuel our passion for customers and drive positive change in our world.
Thank you to all the customers, partners, employees, and well-wishers who have made
the past seventy-five years of growth and success possible. We look forward to many
years of building a more resilient future together with you.

Azim H. Premji (Founder Chairman)


As the heart and mind that guided Wipro for fifty-three of its seventy-five years, Azim
Premji grew Wipro into the global IT giant it is today, and transferred a majority of the
ownership of the company to the Azim Premji Foundation, a philanthropy that works to
serve some of the most disadvantaged populations in the world. Hear from our Founder
Chairman on how his family’s values and tradition of giving back, inspired him in
business and philanthropy.

75 Years – A Story of Transformation


Older than independent India, Wipro took its first breath in the aftermath of World War II
in 1945. From a traditional, family-run business, it grew into a professional, diversified,
global corporation, revered the world over for its integrity and purpose.

1945 – 1965
At only twenty-one, Mohamed husain Hasham Premji took over his late father’s grain
trade and expanded into manufacturing. His first project was an oil mill in the Indian
heartland - Western India Vegetable Products. Mohamedhusain’s wife, Dr Gulbanoo
Premji, did not shy away from challenges, either. She took over as the Chairperson of
Western India Vegetable Products, and worked to set up the Children’s Orthopaedic
Hospital in Bombay. Later, she helped set up a cerebral palsy unit.

1966 - 1978
After the untimely death of Mohamedhusain at age 51, his son, Azim H. Premji was
called home from college at Stanford to take over the management of the family business.
Premji would move the business to a brand-oriented company, leaving behind its legacy
as a commodity-based vegetable oil-maker.
Western India Vegetable Products was on the rise, moving from its cramped offices to a
new building in the heart of Bombay. Soon afterwards, the company formally registered
itself as Wipro. No longer would it be limited by its name.

1979 – 1990
In August 1979, Wipro recruited its first members of the Infotech division. Two months
later, Wipro applied for a license to develop, manufacture and market minicomputers.
By 1989, Wipro had become a diversified manufacturer of computer systems, consumer
products and industrial equipment, but as the 90s opened up, so did another
transformation in Wipro’s story.

1991 – 2005
As the technology market grew around the world, Wipro dove deeply into IT services and
partnerships with leading technology companies. In 1996, Wipro shifted its base to
Bangalore, where our Headquarters remain today.
In 2000, Wipro grows to a one billion-dollar company and is listed on the New York
Stock Exchange.

2006 onwards
The growth and transformation of Wipro continued into the new millennium with major
acquisitions, investments, and technological innovations. On July 31, 2019, Premji retired
as the Executive Chairman of Wipro Limited.
‘Leading Wipro from 1966 till now has been the greatest privilege of my life. It has been
an extraordinary journey — growing from being a small vegetable oil company to the
diverse global business that we are today. It is the deep commitment and hard work of
Wiproites across generations that has helped shape the organization of today,’ he wrote in
his last letter.
In 2019, Rishad succeeded the senior Premji as the Chairman of Wipro Limited.
In July 2020, Thierry Delaporte took the reins as CEO. ‘It’s the best brand in the
industry,’ says Delaporte. ‘People are constructive, they’re positive, they love their
company. I’m the luckiest because I’m working with people who have placed the
interests of Wipro Limited before their own interests. These are incredible values
CHAPTER – 3
REVIEW
OF
LITERATURE
REVIEW OF LITERATURE
The concept of a DBMS has gained huge significance from the beginning of the
invention of the first search engine in 1990s. The search engine is considered to be a
basic activity such as email and other general activities over the internet. The search
engines are hence measured tobe concierge for the digital network ecology. At present
the recent DBMS have a very good access to the huge information. The first proto of the
search engine started in the year 1990 by the students of McGill of Montreal University
have created a script oriented content accumulating program which is able to download
various files of the FTP directory later the same concept with few more technical;
advancements are being done to reach an enormous databases with huge index of web
pages by the advent of technology. Google, Yahoo, Msn etc. are few majorly browsed
data system. (Serge Abiteboul and Victor Vianu, 1997).

From the above discussion on the background of the DBMS optimization, it can be
understood that the data optimization has acquired a crucial place in the daily life of the
web users as common as checking their emails. The first proto of the data optimization
model was commenced by an experimental study by the students of McGill of Montreal
University. This was later employed in to the World Wide Web services where the web
pages are accumulated and searched as per requirement. Then the advancement of the
technology has created an option for the huge search index for example like Google,
yahoo, AOL, MSN, ASK etc. from the below figure it is evident that, the mostly
searched search engine is Google and the remaining are comparatively less.

The search results ratio compared to various search engines is shown as below:
Figure no. 1: Top Search Engines at present
Ref: I Smart Software

DBMS
(From the study of DBMS basic by Bivings Group, June, 18, 2008) the term DBMS is a
short formof ‘Data Management System’. Generally, the optimization process meant for
highlighting in the search results carried by the abusers in the search engines such as
Google, Overture of Yahoo etc. the web pages of these websites are rated upon the top
ranks.
From the above it can be concluded that, the data base management system, in short
DBMS isa method which will be able to create the appropriate search results available for
the users. (Telnic Limited. 2009) the Search DBMS is considered to be an effective
method.
which is intended to improve the eminence and degree of the user traffic for the particular
website or the domain through the innate searching options. This is referred as a natural
form of managing. This may be again categorized in to algorithmic and organic. More the
searching of that particular website or domain, higher is the ranking given to it by the
SEO. The high rates of ranking are further preserved by a periodical updation of the
contents and in particularaxioms that will improve the traffic. The Data Base
Management System is a huge industry in coordination with numerous professionalsand
groups that attempt to accumulate the comprehensible information and the systemto
assess the significance of a particular keyword optimal for the search inquiry. Some of
the basic activities of SEO are crawling, indexing, processing, calculating relevancy, and
retrieving. (Shari Thurow, 2003)

From the view of the above discussion, it can be understood that the search engine
optimization is a form of process that will improve the eminence and degree of the user
traffic for a specific website of the organization for business purpose. The working of the
search engine optimization is based on the search engine algorithm. The search engine
will provide natural means of probing capacity which can be of two forms namely
algorithmic and organic searching processes. Generally a ranking is given to thewebsite
that will formalize high rate when it is probed for maximum time and is ranked in the first
10 searches. As it is observed that many of the users will invariantly click on the first set
of listing in the search engine, it is very necessary for the business websitesto face a
hectic rivalry.

(By Vertexera Inc) The search engine optimization is considered to be a process that is
intendedto improve the visibility of the particular website. This increased by selecting
particular axiomor a phrase related to it. The search engine optimization transacts with
the data and design related issues which are necessary to solve the issue with ranking

or rating of a site. The task of search engine optimization is not confined to a single
attempt as it hinders testing through trace and slip technique, updating on a regular basis,
enhancing the performance level periodically so that the rank of the site is preserved.

that an approximation of about 500 billion articles are rendered in the Search engine.

Hence a particular website of a company may intend to face a lot of rivalry to gain atop
rating.

The need for the optimization has risen with effective rate of marketing and client
drawing capability which is made possible through the optimization of the websites of the
company. (g., Rita Vine)

From the above it can be concluded that, the search engine optimization is a method of
augmenting the visibility of the websites of the business. The search engine optimization
will employ a specific axiom or key constraints for the particular websites so that, when
the abuser types that specific phrase will list out the website of the business. So
trafficking will mainly depend on the efficiency of the phrases that are coated by the
website. And for this purpose, updating of the content on the site is very important. The
companies generally lease out to other associations for updating.

Working of Data Base Management System:


The working of the DBMS is very crucial to understand the concept in depth. The
DBMS generally optimize a particular webpage whose key phrase or constraint which is
very small and unique is coined once after the optimization form is submitted then based
on the amount of the frequency of the searching it is ranked as first few search results.
Hence this will improve the traffic when a search for a particular phrase is carried out by
the client. Periodical updation of the content is carried out by the search engines so as
to support the sites at the similar rating.
The DBMS can be classified in to two different forms namely human power-driven and
the other is crawler supported. Hence the working is done at a step-by-step process inthe
row as detection of appropriate key phrases, evaluating the intensity of competition,
optimization of the page, and building of the links of the web pages, acquiescence,
investigating and modification and reporting.

Crawler DBMS: This type of a search managed system is intended to send a spider to
follow various sites and the findings of the spider are added to the indexes of the search
engine. The updation of the websites is done once in every return of the spider as it brings
the latest information by searching. Hence when the search is commenced in this engine,
the total index is searched for the matches with the searched phrase. Example for the
Crawler type of a search engine is Google. The index is a form of bulky catalogue that
stores a copy of each web page that the spider uncovers and revise the index.

Human Driven DBMS: This type of data managed system will need a small depiction of
the article such as name of the author or the name of the particular company that will be
matched with the directory of the engine.

Hybrid DBMS: At present various search engines use both the above techniques for
optimization of content of web pages in to the index which are referred as ‘hybrid search
engines’. An example for this type of search engine is MSN and Yahoo.
From the above discussion it can be concluded that, the working of the search engine
optimization very crucial before start optimizing a site. This will continue in a
particular flow of process such as detection of appropriate key phrases, evaluating the
intensity of competition, optimization of the page, and building of the links of the web
pages, acquiescence, investigating and modification and reporting. The search engines
can be of various categories such as crawler supported, human power driven and hybrid
search engines. Each will confine a separate system of searching process. In the crawler
system, a spider is sent to follow various sites and the resultant findings of the spider are
added to the indexes of the search engine done after givinga single phrase in the search
engine options. The process in the human driven will need a small description or the
name of the author of the writings so that search will be commenced. The hybrid form of
the search engine will depict both the initial systems of searching processes so that
maximum search capability is provided in this form.
(Scott Willoughby, 2009)

The ranking or rating of the websites will be given to the webpage’s of the crawler type
of a search engine depending on the degree of significance. The significance of a
matching of the phrase with the defined key words is done by employing the algorithm
that will differ with each type of a search engine however the functioning of the
algorithms is similar such as:

Key constraints tracing: the headlines, title tags or the opening two snippets are checked
by the search engines to trace the atmost matching phrase with the content.
From the view of the author above, it is evident that the crawler system of the search engine
optimization will predict the rating of a particular site based on the no. of times the index phrase
on the particular site is searched. The rating will depend on the significance of the phrase coined
by the website. An algorithm will decide the search ability of the site that has various functions
such as key constraint tracing, key constraint frequency checking and spam prevention.
Benefits :
 (Andrew B. King, July 2008) The DBMS has gained a lot of boom with the growing
technological impedition and with the increased abusers of internet have further
increased the importance. The Search engine optimization has variousbenefits for a
business as follows:
 The axioms or the key constraints highlighted will promote superiorly among the
audience both regionally as well as globally. This will be very beneficial for the
companies that work overseas.

 The DBMS will augment the degree of traffic for the website of the particular business
when operated with significant and most relevant axioms and key words. The DBMS
will intend to convert the traffic of searchers in to potential clients and hence it is
considered as the best way to increase the business. The visibility aspect of the website
of the company will commence after the optimization process. Hence the unique
services and products of the particular business company is perceptible by the users.
(Brad Callen)

 The DBMS is observed to be most functional and beneficial when compared toany
other type of conventional marketing

 The DBMS is effective to increase huge earnings on returns on Investment when


compared to all other marketing forms. This will improve the sales and profits of the
company.
 The ranking provided by the DBMS will help to stay the companies’ website for
reference for a very long time and is a very cheaper approach compared to other
methods.

 The target clients can be approached through a search engine optimization. This will
increase the search ability and traffic depending on the company’s strategies.

 Hybrid System: At present assorted hunt engines use both the above techniques for
optimisation of content of web pages in to the index which are referred as ‘hybrid hunt
engines ‘ . An illustration for this type of hunt engine is MSN and Yahoo.

 From the above treatment it can be concluded that, the working of the hunt engine
optimisation really important before start optimising a site. This will go on in a
peculiar flow of procedure such as sensing of appropriate cardinal phrases, measuring
the strength of competition, optimisation of the page, and edifice of the links of the
web pages, acquiescence, look intoing and alteration and coverage. Thehunt engines
can be of assorted classs such as sycophant supported, human power driven and
intercrossed hunt engines. Each will restrict a separate system of seeking procedure.
In the sycophant system, a spider is sent to follow assorted sites and the attendant
findings of the spider are added to the indexes of the hunt engine done after giving a
individual phrase in the hunt engine options. Theprocedure in the human driven will
necessitate a little description or the name of the writer of the Hagiographas so that
hunt will be commenced. The intercrossed signifier of the hunt engine will picture
both the initial systems of seeking procedures so that maximal hunt capableness is
provided in this signifier.
 The ranking or evaluation of the web sites will be given to the web page ‘s of the
sycophant type of a hunt engine depending on the grade of significance. The
significance of a matching of the phrase with the defined key words is done by using
the algorithm that will differ with each type of a hunt engine nevertheless theoperation
of the algorithms is similar such as:

 Cardinal restraints following: the headlines, rubric tickets or the gap two snippings are
checked by the hunt engines to follow the at most duplicate phrase with the content.
Key restraint frequence: the frequence of a peculiar restraint is checked by the hunt
engine such that the frequence of the word will foretell the truth of the site.

 Spam bar: the Spam formation for illustration like measuring of chink through and
examination of the nexus etc is non restricted by the hunt engine optimisation.

 From the position of the writer above, it is apparent that the sycophant system of the
hunt engine optimisation will foretell the evaluation of a peculiar site based on the
no.of times the index phrase on the peculiar site is searched. The evaluationwill
depend on the significance of the phrase coined by the web site. An algorithm will
make up one’s mind the hunt ability of the site that has assorted maps such as cardinal
restraint tracing, cardinalrestraint frequence checking and spam bar.

Benefits of DBMS:
 ( Andrew B. King, July 2008 ) The DBMS has gained a batch of roar with the turning
technological imp edition and with the increased maltreaters of cyberspace have
further increased the importance. The Search engine optimization has assorted
benefits for a concern as follows:
 The maxims or the cardinal restraints highlighted will advance superiorly among the
audience both regionally every bit good as globally. This will be really goodfor the
companies that work overseas.
 The hunt DBMS will augment the grade of traffic for the web site of the peculiar
concern when operated with important and most relevant maxims and cardinal words.
The DBMS will mean to change over the traffic of seekers in to possible clients and
hence it is considered as the best manner to increase the concern.

 The visibleness facet of the web site of the company will get down after the
optimisation procedure. Hence the alone services and merchandises of the peculiar
concern companyis perceptible by the users. ( Brad Callen ) The DBMS

optimisation is observed to be most functional and good when compared to any other
type of conventional selling

 The DBMS optimisation is effectual to increase immense net incomes on returns on


Investing when compared to all other selling signifiers. This will better the gross
revenues and net incomes of the company.
 The ranking provided by the DBMS will assist to remain the companies ‘ web site for
mention for a really long clip and is a really cheaper attack compared to other
methods.

 The mark clients can be approached through a hunt optimisation. This will increase
the hunt ability and traffic depending on the company ‘s schemes.

 It will be a really cost effectual that need really few sum of capital for theindustries to
optimise and pull traffic. ( By Vertexera Inc ) .

 From the above treatment it can be understood that, the hunt engine optimisation will
supply deadly advantages to the concerns such as commanding the traffic volume,
increased gross revenues and grosss, high net incomes, more benefited manner of
advertisement of the services and merchandises of a company, cost effectual, high
scope of visibleness, planetary and local visibleness, lesser capital for investing etc.

 2.5 Traditional method: before the coming of the Search engine optimisation process
the traditional method considered to be lettering of a peculiar article and showing the
same to assorted other directories to roll up in their index.
 ( Telnic Limited. 2009 ) the traditional attack has assorted defects to hold lack in the
customary constellation that chiefly concentrate on the information’s presentation
techniques that may pull higher traffic but are least daunted about the type of
information in that article. Hence the SEO is been using complexive

algorithms that are able to gauge the degree of consistency from the position of looker-
on.

 From the above it is apparent that the traditional attacks have the above discussed two
signifiers such as sycophant and human goaded signifier of seeking options. Earlier
to this seeking engine option, the web pages were submitted to many of the directories
that will hold a transcript of the same article in each hunt engine.
 2.6 Restrictions of DBMS: ( Kody Rylas, Dave Young ) the DBMS has assorted issues
and restrictions. Few of these are discussed as follows:

 Restriction sing parlances and cardinal restraints: for a peculiar site under the hunt
engine optimisation, the chief restriction is faced ion the signifier of non adequateness
with the peculiar maxims and cardinal restraints merged for thepeculiar web site. This
will be a major drawback that may cut down the traffic of the humane to that peculiar
site. This is occurred due to confusion for picking appropriate maxims.
 Restriction for viing: the competition in addition when two different web sites coats
for the same maxim or cardinal restraints. In this state of affairs, the web sites shall
be faced to defy to make a peculiar rank.
 Restriction of sub pages: the bomber pages of the web sites besides shall keep the
maxims and key restraints which shall be in a place to update each clip to remain
updated so as to boost the evaluation and increase the traffic. Scott Willoughby, 2009
 Linguality: Most of the traditional Search Engine optimizers work on a peculiar
linguistic communication medium which may be restricting the hunt to a peculiar
geographics.

 Restriction of crawl ability: the creeping nature will be limited when go throughing
through 1000000s and 1000000s of web pages and therefore velocityof the hunt will
be affected.
 Restriction of duplicate: the duplicate of a similar web page is occurred in the hunt
engine when a peculiar page is submitted with the similar content assorted times.

 Once the optimization of the web sites takes place the above mentioned restrictions
may happen. This type of restrictions can be efficaciously reduced by assorted
advanced techniques few of which are discussed here.
 From the above treatment it can be concluded that, the hunt engine optimisation holds
assorted restrictions that will cut down the efficiency of the concern. Few of the
restrictions are inconsistent phrases and cardinal restraints, restriction due to high
competition degree, restriction of the bomber pages, Linguality job, restrictionof crawl
ability, concern of the duplicate of the web pages in the index of the hunt engine.
 2.8 Innovation Methods in DBMS: The Search engine optimization is considered to
be the traditional method in the present age. The advanced technique implemented by
the Pay per Click method or PPC method. ( David Wallace, ( September 2003 ) has
predicted that as the hunt engine optimization method has assorted issues to acquire
identified or ranked this will be an optimistic and advanced attack. As the SEO will
confide with the trouble in the coining ofspecific parlances or keywords which is
really much important with the current commercialism may stop up with the client
trafficking concern. If the hunt words are non appropriate these web sites are non
listed.
 From the above it can be concluded that in order to get the better of the restrictionsof
the traditional hunt engine optimisation, assorted inventions are being emerged with
the promotion in the engineering in the recent times. The writer has explainedthe
trouble in coining the phrases or maxims which are exact lucifers with the services or
merchandise of the web site of the company as this may cut down the traffic of the
clients diverted if they are listed suitably. Hence the invention stood from get the
better offing this issue.

 PPC, Pay per Click:


 ( Veri Sign, June 2007 ) The invention of the wage per chink construct can be
understood from its name assigned that a certain monetary value is allocated at
each chink for a peculiar phrase or a keyword in those sites. The monetary valuesof
the peculiar chink may to a great extent change from $ .10 to about $ 50. This
monetary value is by and large specified by the willingness of the booster. Assorted
sites such as Google Ad words and Overture etc are some of the illustrations of this
sort. This type of a service will keep the benefits of feverish selling chance and higher
traffic for a peculiar site and keyword. The benefits for a peculiar PPC are that these
sites will go around the paid listings to its affiliate sites. For illustration when a
peculiar site marked one of the top 3 ranks in Overture ; it will be automatically listed
in its affiliate sites such as Hot Bot, Lycos, Yahoo, iWon, Alta Vista, Info infinite etc
along few more minor SE and meta creepers.The extensibility nature of these sites is
a major benefit which will get the better of the restrictions due to traffic. ( Manoj
Kotak )

 From the above treatment on the invention techniques in the hunt engine optimisation,
it can be concluded that the construct of wage per chink is regarded as an optimistic
attack that has been drawn to over come the job with the traffic of the clients to a
peculiar site outright. The construct of wage per chink, as the name implies, will bear
down monetary value for every individual chink made by the user. The charged
intended to pay by the peculiar site will depend on the understanding and willingness
of the booster. By and large at present assorted web sites are paying from $ .10 to
about $ 50 per chink. Google Ad words and Overtureis an illustration of this attack.
HotBot, Lycos, Yahoo, iWon, Alta Vista, Info infinite etc are assorted fiddling hunt
engines that will hold circulated list of the toprated web sites from the chief hunt
engine. This is concerned to be a major success factor of wage per chink.
 ( W.D. Okla. May 27, 2003 ) The other type of latest inventions are being designed
so as to diminish a peculiar restriction of the traditional hunt engine optimisation for
illustration like, the bound for the duplicate that was observed due to the grounds for
entry of similar content several times in to a larger index of the hunt engine sycophant
is reduced by a procedure that will efficaciously filtrate the extra cyberspace pages
from the hunt index from the punishment on the content. This will protect the original
transcript of that page and filters the reaming duplicates. This type of a service is
observed in the Google hunt engine where filtrating done by the Bot which have
separate Google duplicate policy.
 From the above description of the advanced attack of Google, it can be understood
that the major bound of the traditional hunt engine is the concern about the duplicate
that arises due to the entry of the same article legion times. This concern is overcome
by using the punishment for the extras and canceling them by maintaining a individual
original transcript of it. As this may cancel many pages, the creeping through million
counts of web sites will rush up.
 ( Sergey Brin and Lawrence Page ) The latest inventions of the hunt engine
optimisation are the debut of effectual tools such as backline tracker, Website
Location Tool, Free Search For Your Website, Meta Tag Generator, Search Engine
Position Analyzer, Google Ad Sense Tool, Keyword Suggestion Tool, Back nexus
Tracker Tool, Google Ad Sense Graphs, Free Web Counter Google, Google Page
Rank Tool, All Datacenters Watch Tool, and Keyword Ranking Monitor. Alltheses
tools are advanced and will supply effectual searching capableness for the user.
 From the above, it can be concluded that, the restrictions of the traditional hunt engine
are overcome by using advanced tools such as Website Location Tool, Free Search For
Your Website, Meta Tag Generator, Search Engine Position Analyzer, Google Ad
CONCEPTUALISATION
More and more, people rely on the internet and, more specifically, search engines
tofind information, make transactions, and accomplish an array of goals. As a
marketing medium, search engines offer an incredibly powerful way to target a very
specific audience based on intent. To illustrate this concept we’ll provide a simple
example:
Bob searches for ‘short haired puppies’ in Google.com - Bob sees a lot of images,
peruses some of them, but does not satisfy his need, which is to purchase a puppy Bob
types-in and searches for the term, ‘best small-breed puppies,’ in Google.com - Bob
sees some pet stores, and takes a look at them, but he decides that he wants to find a
location close to home Bob finally types in ‘breeders that sell beagle puppies in
Chicago’ - Now Bob notices that the results that appear are much more relevant as he
begins to see results of local pet stores
What’s at play in the above example about Bob and his quest to buy a puppy?
Bob represents the average search engine user, where he refines his search to become
more detailed as he discovers more information. Bob represents a typical user with
different buying cycle stages. His search also moves from being ‘informational’ in
nature to ‘more transactional’ in nature as he narrows his search query. The websites
that appear in organic search results have a ‘ranking,’ which search engines determine
through complex algorithms. The websites that appear first have higher content
relevancy for Bob’s search terms and are more popular than other websites (these sites
have links from external websites).
CHAPTER – 4
RESEARCH METHODLOGY
FOCUS OF THE STUDY
 In decision, the construct of XMOD when employed in the traditional or conventional
Search engine will transform the general URLs to superiorly distincted usage hunt
engine URLs which will be utile for the concern intent.

 Benefits of the inventions for the concerns:


 The benefits of the latest inventions over the traditional hunt engineoptimisation are as
follows:

 The invention has optimistically reduced the procedure of duplicate of theoriginal


content of the web pages

 Increased the velocity of the seeking capableness of the sycophant


 The scalability nature has augmented
 Improved efficaciousness and traffic for the concern
 High evaluations are possible
 From the above it can be concluded that, the benefits of the new inventions on the
traditional hunt engine for the concern intent is to increase the traffic, cut down
duplicate, augment the velocity of seeking, scalability, improved efficaciousness etc.
 Benefits of Pay per chink procedure: ( Tutorials 26 Pay Per Click ( PPC ) 101 )
 As the name implies it will supply monetary value for every chink on apeculiar
website of the company.

 The construct of Pay per chink technique will be bale to command themeasure of the
traffic.

 It will increase the exposure globally when compared to traditional procedure.


 Other than the traditional attack of organic seeking map, the procedure is able to
command the content of the description that will deviate the userin the web site.

 Most good technique compared to the traditional attack


 It is considered to be a beginning for the instantaneous traffic and creative activity of
leads.

 Track ability is the major benefit for the concern intent


 Consistency of the advertisements of the Pay per chink while it may vanish for a free
hunt.

 From the above the benefits of the advanced attack of wage per chink for the concern
better control over the human traffic, instantaneous traffic coevals, high rate of
exposure both globally and locally, really good as it is resulted as the best cyberspace
selling construct, trackability nature will besides assist the web site to track the user
moves.
 Therefore from the above survey over the construct of hunt engine optimisation and
its inventions, it can be concluded that the hunt engine optimisation hasenhanced the
importance drastically as it is really normally mated wont for the netigens. This
construct is resulted in a really optimistic manner for the concern selling. However the
traditional attack holds assorted restrictions which are later overcome by the
inventions done. Application of assorted tools, wage per chink ( PPC ) construct and
punishment policywill assist to better the use further for the concern. The major
benefits for the concern is ti addition the leads and instantaneous traffic, high grosss
and net incomes, better control, high rate of publicity of concern globally and locally.
However the construct of PPC besides holds assorted restrictions which are worked
on to improvize that will farther.
OBJECTIVES OF THE STUDY

 To find out whether the DBMS strategy Working or not.


 To check the degree of satisfaction of Work With DBMS.
 To Analyze the company’s DBMS Strategy.
 To study the DBMS Working and Ranking of Websites.
 To find the area where some improvement can be mad
RESEARCH METHODOLOGY
Research Methodology Research in common parlance refers to a search for knowledge.
One can also define research as a scientific and systematic search for pertinent
information on a specific topic. In fact, research is an art of scientific investigation.
Research is an academic activity and as such the term should be used in a technical
sense10. According to Clifford Woody research comprises defining and redefining
problems, formulating hypothesis or suggested solutions; collecting, organizing and
evaluating data; making deductions and reaching conclusions; and at last carefully testing
the conclusions to determine whether they fit the formulating hypothesis.

Research is, thus, an original contribution to the existing stock of knowledge making for
its advancement. It is the pursuit of truth with the help of study, observation, comparison
and experiment. In short, the search for knowledge through objective and systematic
method of finding solution to a problem is research. The systematic approach concerning
generalization and the formulation of a theory is also research. The title of the study is
“Study of Financial Performance Evaluation of Indian Companies”. The research
evaluates two leading companies of leading five industries of India. It includes industries
like Automobiles four wheeler, Steel, Cement, Pharmaceuticals and Banking. A criterion
to select the companies is their turnover year over year. The research is purely based on
secondary data as it takes all printed financial statements and market announcements.
RESEARCH DESIGN
The exploratory design is chosen for the research. A research design is the specification of
method and procedure for acquiring the information needed. It is the framework, which
determines the course of action towards the collection and analysis of required data.
This framework is to ensure that the relevant data are collected and it also implies that it is
collected accurately in an economical manner.

DESCRIPTIVE RESEARCH DESIGN :


Sometimes an individual wants to know something about a group of people. Maybe the
individual is a would-be senator and wants to know who they're representing or a surveyor
who is looking to see if there is a need for a mental health program.

Descriptive research is a study designed to depict the participants in an accurate way.


More simply put, descriptive research is all about describing people who take part in the
study.

THE REASON FOR WIDE USE OF SURVEY DESIGN


 It could serve both quantitative as well as qualitative information directly from the
respondents.
 It was quite flexible in terms of data to be assembled method of collection or timing
ofresearch.
Apart from it was presumed that respondent
 Know the answer to the question
 Have authority to answer to these questions

 Were willing to co-operate in answering these questions in the best manner.

RESEARCH INSTRUMENTS

QUETIONNAIRE:

The questionnaire included closed ended questions and multi choice. Answers are to be
chosen by the respondents. The buyer of Bata footwear filled the questionnaire, giving the
opinion without a prompting on my part.
TABLES: This study tables to represent the data collected from the various customers,
theyare Represented in both, numbers of samples and percentages.

GRAPHS: This table study is also employed graphs to represent the data on the table to
give better interpretation of percentage in the table. The graph used is column, pie and
bar andpercentage analysis etc.

SAMPLING SIZE:
This refers to the number of items to be selected from the universe to constitute a
sample. The size of sample should not be excessively too large or too small, so it must
be optimum,so a normal sample size of 100 is selected for research. An optimum
sample is one, which fills the requirements of efficiency, representative ness, reliability
and flexibility

SAMPLING TECHNIQUES:
When sampling, you need to decide what units (i.e., what people, organisations, data, etc.)
to include in your sample and which ones to exclude. As you'll know by now, sampling
techniques act as a guide to help you select these units, and you will have chosen a specific
probability or non-probability sampling technique:

PROBABILITY SAMPLING:
Probability sampling is that every item of the universe has an equal chance of inclusion
in the sample, so it is like a lottery method in which individual unitsare picked up from
the whole group of population. Probability sampling is also called as ‘random sampling
or chance sampling. There result obtained from probability or random sampling can be
assured in terms of probability.

Random sampling ensures the law of Statistical Regularity, which states that if on an
average the sample chosen is a random one, the sample will have the same composition
and characteristic as the universe. This is the reason why random sampling is considered
as the best technique of selecting a representative sample.
In brief, the implications of random sampling are use for the survey.
It gives each element in the population an equal probability of getting into sample, And all
choices are independent of one another. It gives each possible sample combination an equal
probability of being chosen. Keeping this in view we can define a simple random sample
from a finite population as a sample, which is chosen in such a way that each of possible
samples have the same probability of being selected.

NON- STATISTICAL TECHNIQUES:


Simple non-statistical technique such as drawing of percentage for generalizing table for
analysing and graphs for pictorial understanding were used on this study.

SAMPLING PROCEDURE:
Sampling procedure refers to “How should be respondents to be chosen”. In this survey the
researcher has used the probability random Sampling to these respondents. In this study,
the survey was also carried out by personal interviews with the potential customers to
explain theneed of survey and to extract the real opinions from them for obtaining desired
information.

QUESTIONNAIRE:
The questionnaire is the common instrument in collecting primary data. This consists of
a setof questions presented to respondents for their answers. In questionnaire the
researcher has used both closed and open-ended questions.

A) CLOSED-END QUESTIONS:
Pre-specific all the possible answers and respondents make a choice among them. In
closed and questions the researcher has used dichotomous as well as multiple-choice
questions
B) OPEN-END QUESTIONS:
Answers are not pre-specified any answer can be a source of information. A sample
questionnaire has been attached at the end of the Report.
DATA COLLECTION:
One of the important tools for conducting marketing research is the availability of
necessary and useful data. Data collection is in many ways more of an art that a finds.
Sometimes the data are available one form or the other and sometimes they are to be
collected a fresh. In the case of marketing research, the data collection may occupy
only a minor part or sometimes it may be most expensive and time consuming affair.
Mainly data can be collected using two methods. These are:-

i. Primary data
ii. Secondary data

PRIMARY DATA: The data was collected directly from the customers through
methods like survey method

It helped to know the attitudes and opinions of people, awareness and knowledge,
behaviour etc. The sample members were contacted and information was collected
through:

a. Survey Method
b. Observation Method
c. Experience Method.

SURVEY METHOD-
Survey is most commonly used method of primary data collection in marketing
research. This method has been used because of its extreme flexibility. Survey research
his the systematic gathering of data from respondents through questionnaire. The purpose
of survey is to facilitate understanding or enable prediction of some aspects of behaviour
of the population being surveyed. A questionnaire is a formal list ofquestions to be
answered in the survey. In the survey method for collecting primary data three techniques
can be used.

Personal Interview

Telephone Interview

Mail Interview
SECONDARY DATA: The data was also collected from internal and
external sources apart from the information collected from the field. Secondary
data was collected from thefollowing sources:-
GOVERNMENT- Records, Generals, Books, Magazines etc.

COMMERCIAL- Market research companies, Add agencies and private data


collectionagencies.
MISCELLANEOUS SOURCES- These are other sources like old Projects, Public
articles, Files and Books.

INTERNAL SOURCES- Company resources, Catalogs and Brochures etc.


In this project to get proper information, both primary and secondary data were taken.
Primary data was obtained through questionnaire to customers and interviewing
employees of the organization. Secondary data are obtained from company information,
some brochures and from internet.

Analysis Pattern
Analysis is used in a way to take a mass of data and shrink it into smaller datasets that are
more manageable and more understandable. It’s a way to find hidden patterns, show how
those patterns overlap, and show what characteristics are seen in multiple patterns. It is also
used to create a set of variables for similar items in the set (these sets of variables are called
dimensions). It can be a very useful tool for complex sets of data involving psychological
studies, socioeconomic status, and otherinvolved concepts.

LIMITATION OF THE STUDY

This project is limited due to time constraints. As it involves a lot of complex variables
whichrequires a detailed study over a period.

The project did not cover the effect of Online banking at large scale. Only a small
population was studied, which may not be enough to show the correct picture.

The online banking users are very reluctant to answer the question and the
responsesmaybe biased.

In a rapidly changing industry, analysis on one day or in one segment can change
very quickly. The environmental changes are vital to be considered in order to
assimilate thefindings.

The conclusion arrived at are based on a very less experience of researcher in this
fiel
CHAPTER – 5
DATA ANALYSIS
&
INTERPRETATION
Q.1 Are the DBMS convenient to you?
TABLE 1

Opinion No Of Respondents Percentage

Yes 30 30%

No 50 50%

Can’t Say 20 20%

GRAPHICAL REPRESENTATION

60

50

40

30
50

20
30

10 20

YES NO CAN'T SAY


Q2. Is DBMS helpful for all the Websites?

TABLE 2

Opinion No.0f Respondents Percentage

Yes 75 75%

No 20 20%

Can’t Say 5 5%

GRAPHICAL REPRESENTATION

80

70

60

50

40

30

20

10

YES NO CAN'T SAY


Q3. Is your Website Normally Rank in 6 Months with DBMS?

TABLE 3

Opinions No Of Respondents Percentage

Yes 78 78%

No 15 15%

Can’t Say 7 7%

GRAPHICAL REPRESENTATION

90

80

70

60

50 YES
NO
40 78 CAN'T SAY

30

20

10
15
7
0
Q4. Which Type of Tools you are Using for Keyword Research?

TABLE 4

Opinions No Of Respondents Percentage

50
Ahrefs 50%

Semrush 25 25%

Moz 25 25%

GRAPHICAL REPRESENTATION

60

50

40

30

20

10

50 25 25
0

AHREFS SEMRUSH CAN'T SAY


Q5. Which type of Social Media Platforms you are Using for Website Promotion?
TABLE 5

Opinions No Of Respondents Percentage

Facebook 54 54%

Linkedin 36 36%

Rediff 10 10%

GRAPHICAL REPRESENTATION

60

54
50

40

36
30

20

10
10

FACEBOOK LIKEDIN REDIFF


Q6. Are You Providing Your DBMS Services Worldwide?

TABLE 6

Opinions No Of Respondents Percentage

Yes 65 65%

No 20 20%

Can’t Say 15 15%

GRAPHICAL REPRESENTATION

70
65

60

50

40

30

20
20
15

10

YES NO CAN'T SAY


Q7. How Much Experience you Have In DBMS?
TABLE 7

Response No of Respondents Percentage

4 Years 35 35%

2 Years 41 41%

5 Years 24 24%

GRAPHICAL REPRESENTATION

45

40
41

35
35
30

25
24
20

15

10

4 YEAR 2 YEAR 5 YEAR


Q8. You are Focusing on On page DBMS or an Off page ?
TABLE 8

Percentage of
Response No of Respondents
Response

On-Page SEO 66 66%

Off-Page SEO 34 34%

Can’t Say 0 0

GRAPHICAL REPRESENTATION

70
66

60

50

40
34

30

20

10

0
0

ON-PAGE SEO OFF-PAGE SEO CAN'T SAY


Q9. What are you doing in DBMS for Ranking and Getting Traffic?

TABLE 9
Percentage of
Response No of Respondents
Respondents

Classified Ads 40 40%

Profile Linking 24 24%

Social Bookmarking 36 36%

GRAPHICAL REPRESENTATION

45

40
40

35 36

30

25
24
20

15

10

CLASSIFIED ADS PROFILE LINKING SOCIAL BOOKMARKING


Q10. Do you have your Own Site on First Page of Google?
TABLE 10

Percentage of
Opinion No of Respondents
Respondents

Yes 80 80%

No 20 20%

Can’t Say 0 0%

GRAPHICAL REPRESENTATION

90

80

70

60

50

40 80

30

20

10 20
0
0

YES NO CAN'T SAY


INTERPRETATIONS

In Table 1 out of 100 respondents, 30% Says that Data Base Optimization is Convenient
to them, 50% Says that Not Convenient and Remaining 20% Can’t say Anything.

In Table 2 out of 100 respondents, 75% Says that DBMS is Helpful for All theWebsites,
20% Says that Not Helpful for all Websites and Remaining 5% Can’t Say Anything.

In Table 3 out of 100 respondents, 78% Says that Their sites can be Normally Ranksin
6 Months Easily, 15% Respondents Says No and Remaining 7% Can’t Say Anything.

In Table 4 out of 100 respondents, 50% of Respondents Says that they are Using AHrefs
for tool for Keyword Research, 25% Respondents says that they are using Sem Rush
and Remaining 25% Says that they are using Moz for Keyword Research.

In Table 5 out of 100 respondents, 54% of Respondents says that they are Using
Facebook for the Social Media Website Promotion, 36% Says that they are Using
Linkedin and Remaining 10% says that they are using Reditt social Media Platform for
Website Promotion on Social Media.

In Table 6 out of 100 respondents, 65% of Respondents Says that they are Providing
DBMS Services Worldwide, 20% Says that they are Not Providing SEO Services
Worldwide and Remaining 15% of Respondents Can’t say Anything.

In Table 7 out of 100 respondents, 35% of Respondents Says that they are having
4 Years of Experience in DBMS, 41% says that they are having 2 Years of Experience
in DBMS and Remaining 24% Says that they are having 5 Years of experience in
DBMS.

In Table 8 out of 100 respondents, 66% of Respondents Says that they are using or
Focusing on On-Page, 34% Says that they are Focusing on Off-Page and Others
Can’t say anything.
In Table 9 out of 100 respondents, 40% of Respondents says that they are using
Classified ads for Ranking and getting Traffic to their Websites, 24% of Respondents
says that they are using Profile Linking, 36% Says Bookmarking.

In Table 10 out of 100 respondents, 80% of Respondents says Yes that they are having
their site on the First Page of Google, 20% says No and Remaining 0% of Respondents
can’t say anything about it.
CHAPTER – 6
FINDINGS OF THE
STUDY
FINDINGS OF THE STUDY

When examining the contribution of the personality traits and other factors to predicting
the DBMS related variables, openness was found to be a higher predictor of self-efficacy
related to handling security than for secure behavior. However, it is a significant factor
for both While openness has been previously shown to be a major contributor to
academic achievement this study showed it may also contribute to secure behavior and
confidence. Another personality factor, conscientiousness, is shown to be a strong
predictor of behavior but not of self-efficacy. On the other hand, emotional stability (the
inverse of neuroticism) was found to be a predictor of self- efficacy (at p < 0.1), but did
not significantly predict the participant’s behavior These differences may suggest
potential reasons for the limited correlation between behavior awareness and self-
efficacy. Major and gender, age also had different effects on those variables, with men
found to be more confident about their abilities to solve security-related issues. Being a
CS major is also a major aspect and we can say age also affects the awareness factor and
security factor as well.
CHAPTER – 7
CONCLUSION
&
RECOMMENDATIONS
CONCLUSION

From internship program the author is much benefited by having real world experience in
the Software and Web Development Company where author can implement concepts and
logics that learned during study period. Within this short span of time, web development
and analysis activities has been observed and learnt, which taught the significance of
relation, leadership traits and other managerial and advertisement skills. The greatestthings
that was learned doing internship is how to accomplish the task by doing it in team, how
to make best use of internet, how to use different tools to gain efficiency, how to do code
so that are in standard according to coming new technologies. The website was effectively
optimized so that its presence had been highly significant on the search engine, with a good
content, proper placement of keywords, and appreciable number of visits to inbound links,
hits clicks and impressions. The exposure to the practical environment has increased
experience and confidence to deal with various organizational communications with the
customer. The system developed; or more precisely the website optimized by studying the
existing system and client expectation has improved and given more boundaries for the
author to analyse and systemto develop software. The author has learnt to perform
amazingly at the presentation and has developed his demonstration skills as well. With
this, the author has gained the knowledge of the practical environment of the organization
that he has been part of which has boosted him the wisdom of the organizational discipline
and time management. Finally, internship program has increased the skill to communicate
and report to those parties in time regarding any kind of issues that are dealt in the
organization and build up the confidence level to work in team and real world projects
RECOMMENDATION

1. Use a unique and relevant title and meta description on everypage.

2. Do keyword research at the start of the project.


3. Open up a PPC account.
4. Use your keywords as anchor text when linking internally
5. Build links intelligently.
6. Start a blog and participate with other related blogs.
7. Take advantage of local search opportunities.
8. Take advantage of the tools the search engines give you.
9. Ask a lot of questions when hiring an SEO company.
10. Commit yourself to the process.
ANNEXURE
QUESTIONNAIRE

1. Are you satisfied with Lead Generation?

i. Yes
ii. No
iii. Can’t Say
iv. Other Reason

2. Is your Working Satisfies you Customers?

i. Yes
ii. No
iii. Can’t Say
iv. Other Reason

3. Do you feel that your DBMS is according to your Client?

i. Yes
ii. No
iii. Can’t Say
iv. Other Reason

4. Do you save all the data used today for future help?

i. Yes
ii. No
iii. Can’t Say
iv. Other Reason

5. Is there adequate opportunity for promotion?

i. Yes
ii. No
iii. Can’t Say
iv. Other Reason

6. Are you sure that you will get promotion in time?

i. Yes
ii. No
iii. Can’t Say
iv. Other Reason
7. Whether seniority is the only basis for promotion in your organization?

i. Yes
ii. No
iii. Can’t Say
iv. Other Reason

8. Do you feel that you may get more clients and more leads in future?

i. Yes
ii. No
iii. Can’t Say
iv. Other Reason

9. Do you want to add other DBMS strategies in your work?

i. Yes
ii. No
iii. Can’t Say
iv. Other Reason

10. Do you feel that besides free DBMS promotion, paid advertisements arenecessary
for customer satisfaction?

i. Yes
ii. No
iii. Can’t Say
iv. Other Reason
BIBLIOGRAPHY

SEJ’s DBMS 101


The Art of DBMS: Mastering Search Engine Optimization
DBMS All-in-One for Dummies

Websites
www.Askdigitech.com
www.Udemy.com
www.W3schools.com
www.Seoreviewtools.com
www.Moz.com
www.Smallseotools.com

Books
Database System Concepts" by Abraham Silberschatz and S Sudarshan
An Introduction to Database Systems" by Bipin Desai
Fundamentals of Database Systems" by R Elmasri and S Navathe
Fundamentals of Database System" by Elmasri Ramez and Navathe Sham

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy