Online Job Portal
Online Job Portal
TABLE OF CONTENTS
1. INTRODUCTION 1
1.6 ADVANTAGES
2. SYSTEM ANALYSIS 6
2.1 INTRODUCTION
3. FEASIBILITY REPORT 17
5. SELECTED SOFTWARE 26
5.2 ASP.NET
5.3 C#.NET
6. SYSTEM DESIGN 47
6.1 INTRODUCTION
6.2 NORMALIZATION
7. OUTPUT SCREENS 63
8.1 INTRODUCTION
9. SYSTEM SECURITY 89
9.1 INTRODUCTION
10. CONCLUSION 91
12. BIBLOGRAPHY 94
ABSTRACT
Now a day’s there is no such place left where the computer is not used.
Computer technology is essential for all to do work easy, quickly and
perfectly.
Here is website “Online Job Portal”. This website provides the user to know
about the jobs available to his field. And it also helps the user to submit his
or her resume
and also gives the information about the on goings in the markets. Through
this website one can come to know about the jobs available in the markets.
Apart from that it is also helpful for the company people to get the right
person where they are in need of them.
1.INTRODUCTION
To get a job, it is very difficult, that’s why we developed a web site called
online Job Portal. This portal having a lot options through this you can search
jobs very easily according to your qualification, today’s world facing lots of
unemployment, this web application will help the UN employed persons.
The basic purpose of this system is to search jobs online, and get the job
on their respective places. In this application we provided online Job
Searching all over India with one click. In this application you can check the
available jobs of different qualified persons, as well as you can get the job
online just providing just personal details. It is a user friendly application.
Here is website “Online Job Portal”. This website provides the user to know
about the jobs available to his field. And it also helps the user to submit his
or her personal Details.
And also gives the information about the on goings in the markets. Through
this website one can come to know about the jobs available in the markets.
Apart from that it is also helpful for the company people to get the right
person where they are in need of them.
1.6 ADVANTAGES
2.SYSTEM ANALYSIS
2.1 INTRODUCTION
some cases, to extract the maximum output, the system should be re-
engineered and spruced up. Once the ideal system is engineered or tuned,
the development team studies the software requirement for the system.
4. Code Generation
5. Testing
Once the code is generated, the software program testing begins.
Different testing methodologies are available to unravel the bugs that were
committed during the previous phases. Different testing tools and
methodologies are already available. Some companies build their own
testing tools that are tailor made for their own development operations.
6. Maintenance
The software will definitely undergo change once it is delivered to the
customer. There can be many reasons for this change to occur. Change
could happen because of some unexpected input values into the system. In
addition, the changes in the system could directly affect the software
operations. The software should be developed to accommodate changes that
could happen during the post implementation period Waterfall model
tends to consume a lot more time compared to other software development
models though it is able to pinpoint definite starting and ending points for a
given project.This model assumes the requirements to remain static during
the life of the project, so there is little or no chance of incorporating new
changes to the software once work begins. If changes are tried to be
incorporated it leads to more confusion and further delays.
In our Project we are using Spiral Model
SPIRAL MODEL was defined by Barry Boehm in his 1988 article, “A spiral
Model of Software Development and Enhancement. This model was not
the first model to discuss iterative development, but it was the first model
to explain why the iteration models.
At the customer option, the entire project can be aborted if the risk
is deemed too great. Risk factors might involve development cost
overruns, operating-cost miscalculation, or any other factor that
could, in the customer’s judgment, result in a less-than-satisfactory
final product.
The preceding steps are iterated until the customer is satisfied that
the refined prototype represents the final product desired.
ADVANTAGES:
Software engineers can get their hands in and start woring on the
core of a project earlier.
The operational or generic user interface helps the users upon the
system in transactions through the existing data and required services. The
operational user interface also helps the ordinary users in managing their
own information helps the ordinary users in managing their own information
in a customized manner as per the assisted flexibilities
NUMBER OF MODULES
The system after careful analysis has been identified to be presented with
the following modules:
Registration
Administration
Job Application
Authentication
Search
Reports
Feedback
Registration Process:
As the job process requires security aspects, the primary
function is to register the user who wants to see his applied job
information. Proper validations will be provided to keep only
authenticated users i.e. those users who will provide correct
information. All the data supplied by the user will be stored in database
and it will be used for further validation and authentication. During
registration, user has to give login and password of their choice. Login
names and passwords will be stored in the database so that the user
can directly login without registering again and again. The login name
can be numeric or characters or both and the password. User can also
give is feedback to administrator for his satisfaction messages with
correct Email Address.
Administration Process:
In this process Administrator will enter the job details like local
jobs and Oversea Jobs database. In admin model is the super model
because he as the full authorization over all details which can view by
user but he can’t change or modify but admin have the authorization.
Authentication
Job Application
After the user has given a valid login name and password he
can view the available job Information. To view the details of a
particular job he has to click on that link so that he can view the job
document details, so that he can get full information about the jobs. If
the customer is fully satisfied with that job and he is interested in
downloading, he has to register first. After registration he can search
the job according to his qualification, and then he can fill the
application.
Search
Reports
Feedback Process
Proper Feedback will be handled through user’s input. Feedback
will be required for the proper functioning of the utilities as supplied by
the project. The feedback given by the customer will be stored on the
main database of the system. The user will be asked to give his user
id, user id number, email and his comments or suggestions to the
system. Any system need feedback in order to estimate
performance of the system .If the customer feedback is not
satisfactory then modifications are done. The feedback given by the
customer is considered in order to improve the efficiency of the
system. If the customer gives a justified suggestion his suggestion will
be considered in developing the system.
Hardware Requirements:
Monitoring and make them effective and better. The entire scope has been
classified into five streams knows as Coordinator Level, management Level,
Auditor Level, User Level and State Web Coordinator Level. The proposed
software will cover the information needs with respect to each request of the
user group viz. accepting the request, providing vulnerability document
report and the current status of the audit.
The major inputs and outputs and major functions of the system are
follows:
Inputs:
Admin enter his user id and password for login. User enters his user id
and password for login. User Create new folder for personnel usage. Admin
enter user id or date for track the user login information. New user gives his
completed personnel, address and phone details for registration. Admin
gives different kind of user information for search the user data. User gives
his user id, hint question, answer for getting the forgotten password. User
gives the folder permission for sharing the folder to other users.
Outputs:
Admin can have his own home page. Users enter their own home page.
The user defined folders can store in the centralized database. Admin will get
the login information of a particular user. The new user’s data will be stored
in the centralized database. Admin get the search details of different criteria.
User can get his forgot password. The user folder having permission for
private or public purpose.
The following commands specify access control identifiers and they are
typically used to authorize and authenticate the user (command codes are
shown in parentheses)
The user identification is that which is required by the server for access
to its file system. This command will normally be the first command
transmitted by the user after the control connections are made (some
servers may require this).
PASSWORD (PASS)
CONTEXT DIAGRAM:
3. FEASUBILITY STUDY
Preliminary investigation examine project feasibility, the likelihood the
system will be useful to the organization. The main objective of the feasibility
study is to test the Technical, Operational and Economical feasibility for
adding new modules and debugging old running system. All system is
feasible if they are unlimited resources and infinite time. There are aspects
in the feasibility study portion of the preliminary investigation:
Technical Feasibility
Operational Feasibility
Economical Feasibility
3.1. TECHNICAL FEASIBILITY
Since the project is designed with ASP.NET with C# as Front end and
SQL Server 2000 as Back end, it is easy to install in all the systems wherever
needed. It is more efficient, easy and user-friendly to understand by almost
everyone. Huge amount of data can be handled efficiently using SQL Server
as back end. Hence this project has good technical feasibility
INTRODUCTION
Purpose: The main purpose for preparing this document is to give a general
insight into the analysis and requirements of the existing system or situation
and for determining the operating characteristics of the system.
Scope: This Document plays a vital role in the development life cycle (SDLC)
and it describes the complete requirement of the system. It is meant for use
by the developers and will be the basic during testing phase. Any changes
made to the requirements in the future will have to go through formal
change approval process.
Developing the system, which meets the SRS and solving all the
requirements of the system?
Demonstrating the system and installing the system at client's location
after the acceptance testing is successful.
Submitting the required user manual describing the system interfaces to
work on it and also the documents of the system.
Conducting any user training that might be needed for using the system.
Maintaining the system for a period of one year after installation.
For Example
INPUT DESIGN
Data recording
Data transcription
Data conversion
Data verification
Data control
Data transmission
Data validation
Data correction
INPUT TYPES:
Type of input
Flexibility of format
Speed
Accuracy
Verification methods
Rejection rates
Ease of correction
Storage and handling requirements
Security
Easy to use
Portability
Keeping in view the above description of the input types and input
media, it can be said that most of the inputs are of the form of internal and
interactive. As
Input data is to be the directly keyed in by the user, the keyboard can be
considered to be the most suitable input device.
ERROR AVOIDANCE
ERROR DETECTION
Even though every effort is make to avoid the occurrence of errors, still
a small proportion of errors is always likely to occur, these types of errors
can be discovered by using validations to check the input data.
DATA VALIDATION
It is essential to consult the system users and discuss their needs while
designing the user interface:
USER_INITIATED INTERGFACES
1. The menu system for the user is presented with a list of alternatives and
the user chooses one; of alternatives.
2. Questions – answer type dialog system where the computer asks question
and takes action based on the basis of the users reply.
Right from the start the system is going to be menu driven, the
opening menu displays the available options. Choosing one option gives
another popup menu with more options. In this way every option leads the
users to data entry form where the user can key in the data.
5.SELECTED SOFTWARE
5.1 INTRODUCTION TO .NET FRAMEWORK
The pre-coded solutions that form the framework's Base Class Library
cover a large range of programming needs in a number of areas, including
user interface, data access, database connectivity, cryptography, web
application development, numeric algorithms, and network communications.
The class library is used by programmers, who combine it with their own
code to produce applications.
Interoperability
The Base Class Library (BCL), part of the Framework Class Library
(FCL), is a library of functionality available to all languages using
the .NET Framework. The BCL provides classes which encapsulate a
number of common functions, including file reading and writing,
graphic rendering, database interaction and XML document
manipulation.
Simplified Deployment
Security
Portability
Architecture
The core aspects of the .NET framework lie within the Common
Language Infrastructure, or CLI. The purpose of the CLI is to provide a
language-neutral platform for application development and execution,
including functions for exception handling, garbage collection, security, and
interoperability. Microsoft's implementation of the CLI is called the Common
Language Runtime or CLR.
Assemblies
Metadata
All CLI is self-describing through .NET metadata. The CLR checks the
metadata to ensure that the correct method is called. Metadata is usually
generated by language compilers but developers can create their own
metadata through custom attributes. Metadata contains information about
the assembly, and is also used to implement the reflective programming
capabilities of .NET Framework.
Security
.NET has its own security mechanism with two general features: Code
Access Security (CAS), and validation and verification. Code Access Security
is based on evidence that is associated with a specific assembly. Typically
the evidence is the source of the assembly (whether it is installed on the
local machine or has been downloaded from the intranet or Internet). Code
Access Security uses evidence to determine the permissions granted to the
code. Other code can demand that calling code is granted a specified
permission. The demand causes the CLR to perform a call stack walk: every
assembly of each method in the call stack is checked for the required
permission; if any assembly is not granted the permission a security
exception is thrown.
When an assembly is loaded the CLR performs various tests. Two such
tests are validation and verification. During validation the CLR checks that
the assembly contains valid metadata and CIL, and whether the internal
tables are correct. Verification is not so exact. The verification mechanism
checks to see if the code does anything that is 'unsafe'. The algorithm used
is quite conservative; hence occasionally code that is 'safe' does not pass.
Unsafe code will only be executed if the assembly has the 'skip verification'
permission, which generally means code that is installed on the local
machine.
Class library
System. CodeDom
System. Collections
System. Diagnostics
System. Globalization
System. IO
System. Resources
System. Text
System.Text.RegularExpressi
ons
The Base Class Library (BCL) includes a small subset of the entire class
library and is the core set of classes that serve as the basic API of the
Common Language Runtime. The classes in mscorlib.dll and some of the
classes in System.dll and System.core.dll are considered to be a part of the
BCL. The BCL classes are available in both .NET Framework as well as its
alternative implementations including .NET Compact Framework, Microsoft
Silver light and Mono.
The Framework Class Library (FCL) is a superset of the BCL classes and
refers to the entire class library that ships with .NET Framework. It includes
an expanded set of libraries, including Win Forms, ADO.NET, ASP.NET,
Language Integrated Query, Windows Presentation Foundation, Windows
Communication Foundation among others. The FCL is much larger in scope
than standard libraries for languages like C++, and comparable in scope to
the standard libraries of Java.
Memory management
The .NET Framework CLR frees the developer from the burden of
managing memory (allocating and freeing up when done); instead it does the
memory management itself. To this end, the memory allocated to
as older objects tend to have a larger lifetime than newer objects. Thus, by
removing older (and thus more likely to survive a collection) objects from the
scope of a collection run, fewer objects need to be checked and compacted.
Versions
Version Release
Version Number Date
1.0 1.0.3705.0 2002-01-05
1.1 1.1.4322.573 2003-04-01
2.0 2.0.50727.42 2005-11-07
3.0 3.0.4506.30 2006-11-06
3.5 3.5.21022.8 2007-11-09
5.2 ASP.NET
language runtime and class library while gaining the performance and
scalability of the host server.
The following illustration shows a basic network schema with managed
code running in different server environments. Servers such as IIS and SQL
Server can perform standard operations while your application logic executes
through the managed code.
protocol), XML (an extensible data format), and WSDL ( the Web Services
Description Language). The .NET Framework is built on these standards to
promote interoperability with non-Microsoft solutions.
For example, the Web Services Description Language tool included
with the .NET Framework SDK can query an XML Web service published on
the Web, parse its WSDL description, and produce C# or Visual Basic source
code that your application can use to become a client of the XML Web
service. The source code can create classes derived from classes in the class
library that handle all the underlying communication using SOAP and XML
parsing. Although you can use the class library to consume XML Web
services directly, the Web Services Description Language tool and the other
tools contained in the SDK facilitate your development efforts with the .NET
Framework.
If you develop and publish your own XML Web service, the .NET
Framework provides a set of classes that conform to all the underlying
communication standards, such as SOAP, WSDL, and XML. Using those
classes enables you to focus on the logic of your service, without concerning
yourself with the communications infrastructure required by distributed
software development.
Finally, like Web Forms pages in the managed environment, your XML Web
service will run with the speed of native machine language using the scalable
communication of IIS.
LANGUAGE SUPPORT
The Microsoft .NET Platform currently offers built-in support for three
languages: C#, Visual Basic, and Java Script.
The ability to create and use reusable UI controls that can encapsulate
common functionality and thus reduce the amount of code that a page
developer has to write.
The ability for developers to cleanly structure their page logic in an
orderly fashion (not "spaghetti code").
The ability for development tools to provide strong WYSIWYG design
support for pages (existing ASP code is opaque to tools).
ASP.NET Web Forms pages are text files with an .aspx file name
extension. They can be deployed throughout an IIS virtual root directory tree.
When a browser client requests .aspx resources, the ASP.NET runtime parses
and compiles the target file into a .NET Framework class. This class can then
be used to dynamically process incoming requests. (Note that the .aspx file
is compiled only the first time it is accessed; the compiled type instance is
then reused across multiple requests).
HTML content within an .aspx file. These code blocks execute in a top-down
manner at page render time.
In addition to (or instead of) using <% %> code blocks to program
dynamic content, ASP.NET page developers can use ASP.NET server controls
to program Web pages. Server controls are declared within an .aspx file
using custom tags or intrinsic HTML tags that contain a runat="server"
attributes value. Intrinsic HTML tags are handled by one of the controls in the
System.Web.UI.HtmlControls namespace. Any tag that doesn't explicitly map
to one of the controls is assigned the type of
System.Web.UI.HtmlControls.HtmlGenericControl.
1. ASP.NET Web Forms provide an easy and powerful way to build dynamic
Web UI.
2. ASP.NET Web Forms pages can target any browser client (there are no
script library or cookie requirements).
3. ASP.NET Web Forms pages provide syntax compatibility with existing ASP
pages.
4. ASP.NET server controls provide an easy way to encapsulate common
functionality.
5. ASP.NET ships with 45 built-in server controls. Developers can also use
controls built by third parties.
6. ASP.NET server controls can automatically project both uplevel and
downlevel HTML.
7. ASP.NET templates provide an easy way to customize the look and feel of
list server controls.
8. ASP.NET validation controls provide an easy way to do declarative client
or server data validation.
5.3 C#.NET
ADO.NET OVERVIEW
While the DataSet has no knowledge of the source of its data, the
managed provider has detailed and specific information. The role of the
managed provider is to connect, fill, and persist the DataSet to and from
data stores. The OLE DB and SQL Server .NET Data Providers
(System.Data.OleDb and System.Data.SqlClient) that are part of the .Net
Framework provide four basic objects: the Command, Connection,
DataReader and DataAdapter. In the remaining sections of this document,
we'll walk through each part of the DataSet and the OLE DB/SQL Server .NET
Data Providers explaining what they are, and how to program against them.
The following sections will introduce you to some objects that have evolved,
and some that are new. These objects are:
connections and resultsets are returned in the form of streams which can be
read by a DataReader object, or pushed into a DataSet object.
Commands:
Commands contain the information that is submitted to a database,
and are represented by provider-specific classes such as SqlCommand. A
command can be a stored procedure call, an UPDATE statement, or a
statement that returns results. You can also use input and output
parameters, and return values as part of your command syntax. The
example below shows how to issue an INSERT statement against the
Northwind database.
DataReaders:
The DataReader object is somewhat synonymous with a read-only/forward-
only cursor over data. The DataReader API supports flat as well as
hierarchical data. A DataReader object is returned after executing a
command against a database. The format of the returned DataReader object
is different from a recordset. For example, you might use the DataReader to
show the results of a search list in a web page.
to the DataSet they can be tracked and verified before updating the source
data. The GetChanges method of the DataSet object actually creates a
second DatSet that contains only the changes to the data. This DataSet is
then used by a DataAdapter (or other objects) to update the original data
source.
The DataSet has many XML characteristics, including the ability to produce
and consume XML data and XML schemas. XML schemas can be used to
describe schemas interchanged via WebServices. In fact, a DataSet with a
schema can actually be compiled for type safety and statement completion.
DATAADAPTERS (OLEDB/SQL)
The DataAdapter object works as a bridge between the DataSet and
the source data. Using the provider-specific SqlDataAdapter (along with its
associated SqlCommand and SqlConnection) can increase overall
performance when working with a Microsoft SQL Server databases. For other
OLE DB-supported databases, you would use the OleDbDataAdapter object
and its associated OleDbCommand and OleDbConnection objects.
The DataAdapter object uses commands to update the data source after
changes have been made to the DataSet. Using the Fill method of the
DataAdapter calls the SELECT command; using the Update method calls the
INSERT, UPDATE or DELETE command for each changed row. You can
explicitly set these commands in order to control the statements used at
runtime to resolve changes, including the use of stored procedures. For ad-
hoc scenarios, a CommandBuilder object can generate these at run-time
based upon a select statement. However, this run-time generation requires
an extra round-trip to the server in order to gather required metadata, so
explicitly providing the INSERT, UPDATE, and DELETE commands at design
time will result in better run-time performance.
1. ADO.NET is the next evolution of ADO for the .Net Framework.
PRIMARY KEY
RELATIONAL DATABASE
FOREIGN KEY
When a field is one table matches the primary key of another field is
referred to as a foreign key. A foreign key is a field or a group of fields in
one table whose values match those of the primary key of another table.
REFERENTIAL INTEGRITY
Not only does SQL Server allow you to link multiple tables, it also
maintains consistency between them. Ensuring that the data among related
tables is correctly matched is referred to as maintaining referential integrity.
DATA ABSTRACTION
Physical level: This is the lowest level of abstraction at which one describes
how the data are actually stored.
Conceptual Level: At this level of database abstraction all the attributed and
what data are actually stored is described and entries and relationship
among them.
View level: This is the highest level of abstraction at which one describes
only part of the database.
ADVANTAGES OF RDBMS
SQL SERVER is a truly portable, distributed, and open DBMS that delivers
unmatched performance, continuous operation and support for every
database.
SQL SERVER with transactions processing option offers two features which
contribute to very high level of transaction processing throughput, which are
PORTABILITY
OPEN SYSTEMS
UNMATCHED PERFORMANCE
The most advanced architecture in the industry allows the SQL SERVER
DBMS to deliver unmatched performance.
NO I/O BOTTLENECKS
write whole data block to disk at commit time, SQL Server commits
transactions with at most sequential log file on disk at commit time, On high
throughput systems, one sequential writes typically group commit multiple
transactions. Data read by the transaction remains as shared memory so
that other transactions may access that data without reading it again from
disk. Since fast commits write all data necessary to the recovery to the log
file, modified blocks are written back to the database independently of the
transaction commit, when written from memory to disk.
6.SYSTEM DESIGN
6.1. INTRODUCTION
6.2 NORMALIZATION
Normal Forms: These are the rules for structuring relations that eliminate
anomalies.
modeling activity the attributes of each data object noted is the ERD can
be described resign a data object descriptions.
The set of primary components that are identified by the ERD are
Data object
Relationships
Attributes
Various types of indicators.
The primary purpose of the ERD is to represent data objects and their
relationships.
The idea behind the explosion of a process into more process is that
understanding at one level of detail is exploded into greater detail at the
next level. This is done until further explosion is necessary and an adequate
amount of detail is described for analyst to understand the process.
DFD SYMBOLS:
Data flow
Data Store
CONSTRUCTING A DFD:
Questionnaires should contain all the data elements that flow in and
out. Missing interfaces redundancies and like is then accounted for often
through interviews.
1. The DFD shows flow of data, not of control loops and decision are
controlled considerations do not appear on a DFD.
2. The DFD does not indicate the time factor involved in any process
whether the dataflow take place daily, weekly, monthly or yearly.
3. The sequence of events is not brought out on the DFD.
1. Current Physical
2. Current Logical
3. New Logical
4. New Physical
CURRENT PHYSICAL:
CURRENT LOGICAL:
NEW LOGICAL:
This is exactly like a current logical model if the user were completely
happy with the user were completely happy with the functionality of the
current system but had problems with how it was implemented typically
through the new logical model will differ from current logical model while
having additional functions, absolute function removal and inefficient flows
recognized.
NEW PHYSICAL:
PROCESS
2) No process can have only inputs. If an object has only inputs than it must
be a sink.
3) A process has a verb phrase label.
DATA STORE
1) Data cannot move directly from one data store to another data store, a
process must move data.
2) Data cannot move directly from an outside source to a data store, a
process, which receives, must move data from the source and place the
data into data store
3) A data store has a noun phrase label.
SOURCE OR SINK
DATA FLOW
1) A Data Flow has only one direction of flow between symbols. It may flow
in both directions between a process and a data store to show a read
before an update. The later is usually indicated however by two separate
arrows since these happen at different type.
2) A join in DFD means that exactly the same data comes from any of two or
more different processes data store or sink to a common location.
3) A data flow cannot go directly back to the same process it leads. There
must be at least one other process that handles the data flow produce
some other data flow returns the original data into the beginning process.
4) A Data flow to a data store means update (delete or change).
5) A data Flow from a data store means retrieve or use.
A data flow has a noun phrase label more than one data flow noun phrase
can appear on a single arrow as long as all of the flows on the same arrow
move together as one package.
ADMIN
ADMIN
Oversea job Details
ADMIN
USER
Applicant Details
USER
Login DFD
Login
Check
User
YES YES
Enter User
name and User
password home
Open Login page
NO
Verification
data
tblLocal
tblFeedback
Login
Admin Local
YES
job
Form
NO Feed Back
Admin
Form
tblapplication
Login Over Sea
form Form
application
form
Tbloverseajobs
User Activities
Tbllocaljobs
tblovers
Search eajobs
Jobs
YES
User
User
Login
Form
TblLocaljobs
NO
Local &
oversea
Login
jobs
tbltrainfare
Viewer Activities
Tblapplication tbllocalJobs
Search Jobs
Oversea job
Train tickets
view
Fare view
7. OUTPUT SCREENS
Home Page:
Home Page:
About us Form:
Sample CV Form:
Login Form:
validated against the software that has been constructed. Finally we arrive at
system testing, where the software and other system elements are tested as
a whole.
UNIT TESTING
MODULE TESTING
Component Testing
SUB-SYSTEM TESING
SYSTEM TESTING
Integration Testing
ACCEPTANCE TESTING
User Testing
Use the design of the code and draw correspondent flow graph.
V(G)=E-N+2 or
V(G)=P+1 or
V(G)=Number Of Regions
3. CONDITIONAL TESTING
In this part of the testing each of the conditions were tested to both true and
false aspects. And all the resulting paths were tested. So that each path that
This type of testing selects the path of the program according to the location
of definition and use of variables. This kind of testing was used only when
some local variable were declared. The definition-use chain method was
used in this type of testing. These were particularly useful in nested
statements.
5. LOOP TESTING
In this type of testing all the loops are tested to all the limits possible. The
following exercise was adopted for all loops:
All the loops were tested at their limits, just above them and just below
them.
For nested loops test the inner most loop first and then work outwards.
For concatenated loops the values of dependent loops were set with the
help of connected loop.
Each unit has been separately tested by the development team itself
and all the input have been validated.
9.SYSTEM SECURITY
9.1 INTRODUCTION
Security
Integrity
Privacy
Confidentiality
SYSTEM SECURITY refers to the technical innovations and procedures applied
to the hardware and operation systems to protect against deliberate or
accidental damage from a defined threat.
Various Access Control Mechanisms have been built so that one user may
not agitate upon another. Access permissions to various types of users
are controlled according to the organizational structure. Only permitted
users can log on to the system and can have access according to their
category. User- name, passwords and permissions are controlled o the
server side.
10. CONCLUSION
Sometimes the user finds in the later stages of using project that he
needs to update some of the information that he entered earlier. There
are options for him by which he can update the records. Moreover there is
restriction for his that he cannot change the primary data field. This keeps
the validity of the data to longer extent.
User is provided the option of monitoring the records he entered earlier.
He can see the desired records with the variety of options provided by
him.
From every part of the project the user is provided with the links through
framing so that he can go from one option of the project to other as per
the requirement. This is bound to be simple and very friendly as per the
user is concerned. That is, we can sat that the project is user friendly
which is one of the primary concerns of any good project.
Data storage and retrieval will become faster and easier to maintain
because data is stored in a systematic manner and in a single database.
Decision making process would be greatly enhanced because of faster
processing of information since data collection from information available
on computer takes much less time then manual system.
Allocating of sample results becomes much faster because at a time the
user can see the records of last years.
Easier and faster data transfer through latest technology associated with
the computer and communication.
Through these features it will increase the efficiency, accuracy and
transparency,
LIMITATIONS:
The size of the database increases day-by-day, increasing the load on the
database back up and data maintenance activity.
Training for simple computer operations is necessary for the users
working on the system.
A console for the data centre may be made available to allow the
personnel to monitor on the sites which were cleared for hosting during
a particular period.
BIBLIOGRAPHY
www.15seconds.com
FOR SQL
www.msdn.microsoft.com
FOR ASP.NET
Asp.Net 3.5 Unleashed
www.msdn.microsoft.com/net/quickstart/aspplus/
default.com
www.asp.net
www.fmexpense.com/quickstart/aspplus/default.com
www.asptoday.com
www.aspfree.com
www.4guysfromrolla.com/index.aspx