Vous êtes sur la page 1sur 96

COMPANY PROFILE

The Metric Soft is a true 21st century company


offering superior services from a global staff of 117, dedicated to making every client
and every project our top priority. From our humble beginnings as an IT consulting
firm we have always maintained our staff as our greatest feature.

For us a project is not only measured by end results, but also by the relationship
created along the way. We make each project our own, not only keeping landmarks
but also gaining a greater understanding of our clients during the course of the
journey. How we work is as important to us as what we accomplish. From our site
project managers to our satellite office logistics personnel, our people are the very
heart of our enterprise. While many firms offer a transitional staff assembled on a
per-project basis, we maintain a substantial list of employees and long-term
contractor relationships enabling us to guarantee a higher degree of excellence and
competence for our clients. All of this means that The Metric Soft has the talent,
support and resolves to make even the most unusual project into a viable success.

The Metric Soft began business in 1996 as an Information Technology Outsourcing


(ITO) services provider.

SERVICES OVERVIEW:
The right combination of expertise, affordability, responsiveness and quality.
The Metric soft solutions reflect outsourcing at it best.

METRIC SOFT ADVANTAGE:


From day one, Metric Soft greatest advantage has been our “beyond possible”
philosophy. It's an approach that drives everything we do.

1
RESEARCH & DEVELOPMENT:
Metric Soft has the expertise and experience in managing extended teams with
highly complex research groups.
1. Increasing Business Value
2. Reliable Global Partner

Increasing Business Values:


The Metric Soft is an established IT consulting and services company offering a wide
range of Software solutions that help deliver superior business value. We
conceptualize and develop industry-specific technology solutions that are tailored to
our customers’ requirements. We have successfully undertaken and completed IT
engagements for global corporations including Fortune 500 companies in 58
countries.
We help our customers remain competitive by providing cost-effective and
customized solutions in application development and maintenance, enterprise
resource planning SAP and Oracle. Our domain expertise in focus areas including
BFSI, Telecom, Manufacturing, ISVs and International Organizations enables us to
offer business relevant

Solutions. Complementing this domain expertise is our focus on quality. We are


committed to providing consistently high quality delivery.

Reliable Global Partner


Proven Track Record
Focus on Customer Relationships
Flexible Engagement Models
Seasoned Team

2
Established Software Processes
Knowledge Building

SERVICES:
SAP IMPLEMENTETION SERVICES:
Software development and integration are central to most information systems
projects. We specialize in consulting services for any software development life
cycle environment. Our consultant's focus is on delivering effective software systems
to businesses that are committed to any designing and developing tools. We will
also provide support for the end users of the software. Millennium offers a complete
line of object-oriented development services and technology advantages for
windows-centric solutions including project management, development, testing and
software support. We take care of the development process right from Problem
definition through testing to implementation and support.
We will envision your new ideas to a quality business solution. Our software
development strategy has helped our clients achieve higher ROI, lower maintenance
cost and greater competitiveness in business.

APPLICATION MANAGEMENT:

We will partner with your Information Technology division to ensure all your
application maintenance needs are met. We will work with you as an extension of
your division and we have the high quality process and the expertise to take the
challenge and responsibility of maintaining your existing portfolio.

DATABASE DEVELOPMENT:

Stores of data and information can be the most important assets of an enterprise.
Our highly skilled professionals have extensive experiences in system design and

3
development using SQL Server, Sybase, DB2, Oracle, and Informix. We increase
the value of large-scale databases through our expertise in data modeling, database
and data warehouse design and implementation, and database administration.
We undertake software projects as a fully
managed end-to-end service and deliver them within schedules and budgets agreed
upon with the client. The application development services provided by us span the
entire project life cycle from requirements analysis, design, development, testing,
integration, delivery, and implementation to after-sales support.

We offer the complete suite of traditional SAP implementation /services for SAP R3
and my SAP

Business Suite solutions including:


Business Blueprint
Implementation
Configuration
Integration
Ongoing Support
Project Management

Rapid SAP Implementation:


Fast implementations of SAP All In One with industry templates and minimal
customization and integration.

Rapid Enterprise Portal:


Fixed price, fixed scope SAP Enterprise portal deployments including role definition,
directory integration, employee Self-service functions and views.

SAP Upgrades:
For customers considering SAP upgrades to Enterprise or other dictions.

4
SAP Support on Demand:
Zero entry cost SAP functional and technical support services, delivered via our
technical experts.
SAP TOTAL SUPPORT:

Full application life cycle management services, backed by contracted Service Level
Agreements (SLAs).
SAP Archiving:
Clean up your SAP database with our Archiving services to deliver vastly improved
performance.
SAP Hosting:
Infrastructure management for demanding 24x7 mission-critical SAP systems.
EMBEDED System Information
Embedded System:
A Special-purpose System in Which the Computer Is Completely encapsulated by
the Device It Controls.
Embedding:
One Instance Of Some Mathematical Object Contained Within Another Instance.
Distributed Generation:
Also Known As Embedded enervation Or Decentralized Generation.

CLIENTS:

• Panasonic
• Fidelity
• Pratt & Whitney
• Nike
• Walmart

5
• Pfizer
• Alcon Laboratories, Inc.
• Apex Foot Health Industries, Inc.
• Barco View
• LLC Cybernet Systems Corp.
• Everest & Jennings
• Mexico Hyperbaric Technologies, Inc.
• Monroe, Inc.
• Postin Technologies, Inc.
• Fukuda Denshi Co., Ltd.
• Silgreen Inc.
• IBC Asia Ltd.
• Oriental System Technology Inc.
• Wilson Glove Co.

6
7
ABSTRACT

What contribution would the Project make: -

The project would help in effective and systematic record keeping that is storing and
retrieving of useful data. Project will be able to give the report so that management
can make decisions on the basis of those reports.
Scope of the study: -
The main Scope of study: -
1. It should contain all the information of Company and Vacancy which is registered
in this site.
2. It should contain all the information of Job Seeker like Personal Detail,
Professional Detail, and Educational Detail etc.
3. It should process and evaluate jobs registered by companies.
4. It should contain information related to Job expiry or re registration.
5. It should inform both Job Seeker and Job Provider when the appropriate person
is found for a job.
6. It should maintain proper financial records.
7. It should have Administrator for scheduling administrative work of site.

Objective of the project:


Computerized on Line Job Search System is developed to facilitate the
General administration system to manage the various information of the Job Seeker
and Job Provider and the processes involved in a placement company. So, that

8
organization can access accurate information quickly and easily as and when
required, thereby improving its operational efficiency & effectiveness
In today’s competitive environment, where
Everybody wants to be on the top, Information plays very crucial role. As fast as
information is accessed and processed, it can give good results. Today Internet is
the fast way of transferring Data and Information over wide area, hence I have used
internet as a way for exchanging information.
Computerized system helps to fulfill these goals. Computerization of the official
works will help in doing lot of manual work quickly. It will help in easy storage and
access of all information, in short period of time.

Specific Objective of the site:


Objective of doing this project is to enhance my knowledge in the field of E-com
technology using java (j2ee) as a language. Some of the client requirement and
objectives of this site is as under:-
• To increase the business of Client.
• To make it Global.
• To facilitate job search.
• To facilitate company so that it can search for best candidates available.
• To help candidates to fetch a right job.
• To act as a middle men connecting Job seeker and Provider
• User can search for different options available.
• User can do on-line resume posting etc.
• User can use search engine to look for different vacancies, facilities available etc.
• User can do apply for job on-line.
• User can download different forms etc.
So these are some of the objectives which we have to accomplish.

Features of the site:

9
It has the features of providing all the information online (through the net). About the
Vacancy and About the Job seeker.

• The Job site is a special purpose web site as discussed above it is not a Portal.

• The site includes the search engine and advance search engine which gives the

user easy way to find the Vacancy and eligible candidate for a post.

• The site also includes the electronic mail facility for the users who have

registered themselves.

• The site acts as a middle-ware for the Job Seeker and Job Provider.

• The site has the facility to inform the Seeker and Company about the job and
candidate.

10
11
Modules of project:
The project can be divided in to four main modules.
• Registration module
• Job Seeker Administration section
• Job Provider Administration section
• Test your skills
Module 1:
Registration module, which is further sub-divided into:-

• Job Seeker Registration.

• Job Provider Registration.

• Change Password Job Seeker.

• Change Password Job Provider.

• Forget Password Job Seeker.

• Forget Password Job Provider.

• Login for both Job Seeker and Job Provider.

Module 2:

Job Seeker Administration section, which is further sub-divided into -

• Resume Registration under Vacancy Category.

• Resume Updating

• Search for Job according to his skill set.

12
• Expert Guidance.

• Application Status.

Module 3:

Job Provider Administration section, which is further sub-divided into four sub-

sections: -

• Register Vacancy.

• Update Vacancy.

• Search for eligible candidate.

• Check Job Status.

Module 4:

Check skills section which is further sub-divided into two sub-sections: -

• Beginners
• Intermediate
• Expert

Site Working :-

Case A Job Seeker Administration:-

• Job Seeker has to register him self with the site.


• This is a free site for Job Seeker.

13
• After success full Log in Job Seeker can register his resume.
• Job Seeker Register his Bio Data in a particular Vacancy Category.
• He can also update his resume.
• He can search for Vacancy according to his skill set and can apply for a job.
• He can check his Job Status i.e. from where does he get a response.

Case B Job Provider Administration:-


• Company has to register it self.
• After success full Login Company can register Vacancy.
• Registration for Vacancy will generate Vacancy Id.
• Company can update a Vacancy.
• Company can search for skill full candidate to fill up Job.

14
15
Existing System

When the requirement of this system is putted before the team they was willing to
know that how the employee of the company is working. Then the study is done it
gives the result that all the work is done manually and there is nothing that help the
employee to save the time and do the work with the system. All the documentation is
done by the employee of the company. A lot of works have to be done before the
candidates are placed in an organization.
All that the company needs to store about the job seekers must be written on
the paper. Some times it is very difficult to know about some special highlights of the
job seeker, because the information is stored on the paper and it is not clear that due
to human error or by some other means this paper is lost and the information is now
not in the hands of the company.
At the time of hiring the companies policy says that the only those companies
can hire who are registered with SEEKJOB. So it is critical task to find out the
registered employer, when the company has so many employers.
There is extra requirement of employee who have to check that the
requesting person is an registered employer. This seams a critical task

Limitations
The current system have all the problems which generally in count in the manual
system such as wastage of time, wastage of money, more efforts to work etc. if the
responsible person wants the full information of the total sale of various models of
the vehicles at various center at the evening then he/she can not get it. Because the
current system work manually and it is very slow same as if he/she wants the total

16
production then it take time. The current system can not give the fast response as
needed. It also does not keep records of grievances of the faults in the vehicles in
various parts of the country. If he/she wants the information regarding the total stock
at various warehouses at his\her office then using current system he\she can not get
it.
He\she can not get the full information on time. It may be late and this process is

time consuming and generally the administrators receive the relevant information

next day which is the major limitation of existing system.

Proposed system:
This site is an attempt to make the task of administrator as well as jobseekers
easier. This project ensures the consistency by enabling the jobseekers to register
themselves and to find the desired information of jobs, get them involved with the
jobsite and can access the different services provided by the jobsite.
The administrator has the right to know everything. He has the right to know the
details of the jobseekers, has the right to change any service that the jobsite is
currently providing or can add services which are not being provided currently. Even
the customer’s passwords and hidden details are accessible by the administrator.
Now jobseekers are able to apply online also. Through this system all works are
done through computer so it results in fast service provider.
The jobseekers can also contact the company officials through email or his contact
numbers but first they have to register themselves as a member by filling up a
registration form which can be filled online. Once registered, jobseekers can access
this jobsite and register for any services being provided by seekjob.com, that too
online by sitting at home within a fraction of a second by a flick of a button.
Aim of this project is to provide an environment helpful for administrator and
jobseekers as well, so that, they find it easy to implement it without any harassment
for the jobseekers also. This project is developed after a

17
Through study of the existing manual system & the jobseekers requirements.
Requirement analysis is concerned with identifying the basic function of software
component in a hardware & software system.

Features of proposed system:


• The features of the proposed system are as follows.
• Provide the full information of employees/employer at various places at one site.
• Provide the full information of total vacancies at various regions at one site .
• Provide the full information of total vacancies of various industries/companies at
one site.
• Helps the management to find out the current trend in industries as well as
current manpower pool.

18
19
Feasibility Study :

A feasibility study is conducted to select the best system that meets performance
requirement. This entails an identification description, an evaluation of candidate
system and the selection of best system for he job. The system required
performance is defined by a statement of constraints, the identification of specific
system objective and a description of outputs.

The key consideration in feasibility analysis are :

Economic feasibility

The proposed system is economically feasible because the cost involved in


purchasing the hardware and the software are within approachable. The personal
cost like salaries of employees hired are also nominal, because working in this
system need not required a highly qualified professional. The operating-environment
costs are marginal. The less time involved also helped in its economical feasibility.

The benefits of this project include four types:

Cost – saving benefits


This project reduces the administrative and operational cost. Because of the
reduction in the use of paper, use of labors the cost also reduces.

Improve-service-level benefits

20
Proposed system improves the system’s performance because the current system
is based on manual processing while the proposed system is based on computer
processing.
Improve-information-level benefits
It provides better information in the stipulated space and time for decision-making.

Time-saving-benefits
It saves lots of time and provides the same result in a far lesser period of time.

Te c hn ic a l Fe a s ib ilit y

HARDWARE & SOFTWARE


REQUIREMENT SPECIFICATIONS

Hardware requirement for development

Hardware Configuration

 Processor : Intel Pentium 4 CPU, 2.66GHz

 Memory

 RAM : 256 MB DDR

 Hard Disk : 40 GB SATA

 Mouse : Quantum

 Keyboard : Samsung (Multimedia Supported)

 Drive : CD-RW, Floppy drive

 Printer : HP-Laser printer

Hardware requirement for Implementation

21
 Processor:

 Minimum : 568 MHz Pentium Processor

 Memory:

 RAM : 64 MB

 Hard Disk : 4 GB

 Display : 1024 * 768, True Type Color-32 Bit

 Mouse : Any Normal Mouse.

 Keyboard : Any window Supported Keyboard.

Software requirement for development

Software Configuration

 Operating System : Windows XP Professional

 Front End : Java, Java Server Pages, HTML,


Dream weaver

 Back End : Oracle 8i/MS-Access

Behavioral Feasibility
Employees of the company are habitual of working with manual system and
don’t have the knowledge of working in a computer application based environment
that is used in their intranet and are generally resistant to make changes in their
working attitude.
People are inherently resistant to change and computers have been known
to facilitate changes. An estimate should be made of how strong a reaction the staffs
are likely to have towards the development of an online computerized system
because now this may lead to expulsion of some of the staffs from their jobs.
So a system has to be chosen which will provide them much more facilities
and less mental disturbance to check weather correct entry is entered and that too at

22
its right place. The System will provide them automatic reporting and checks on
entries while storing as well as entering. So the front end has been made user
friendly for both the jobseekers and the employees.

23
Symbols Used :-

In order to create DFD’s we used following symbols:-

Input/Output

Data Processing

Flow of data
1. One way data flow.

2. Two way data flow.

Data store

24
Database

25
EMPLOYEE/CONSULTANT JOBSEEKER/USER
Give

Give details

Give job
Give applicant details Opening

Get vacancy detail


Get vacancy
Details
Get emp. details
JOBSEEKER Selection process
MANAGEMENT status

Report of selected applicants


Resume status

0-Level Data Flow Diagram

26
User ID User ID

Logi
n If
Location valid User

If
New
Passwor Password
d
New User

New User Password

27
Id & Valid Id &
User password password
Seeker login Job
Process Section
Registration
details

New Job seeker Job Job User


details search

Search job & Seeker details


news
Registrati
New Employer login Get details
on details

News letter Job seeker


Id &
Employer
EMPLOYER
Passwor Login
d process
Job
Com details
info.
Employer Jobs

2-Level data Flow Diagram

28
29
E-R DIAGRAM
Emp_i
Qualificatio
Job location
Password
LName
Experience
Fname Username

Skills
High
Speci. Jobseeker Has Check Job
User Seek
Control

Registration
Job Exp Name
Job loc. Email id

Maintain Email
Job cat. Username

Jobs Jobseeker News letter


Com. Manageme
nt
Password

Userna

Registration Site login Site map


login
Employer

30
Emil
Company name
Reference_no

Location Remark User name

Passwor
Employer
Check Emp control

31
DATABASE DESIGN

In our data flow diagram, we give names to data flows, processes and data stores.
Although the names are descriptive of data, they do not dive details .So following
DFD, our interest is to build some details of the contents of data flows, processes
and data store. A data dictionary is a structured repository of data about data .It is a
set of rigorous definitions of all DFD data elements and data structures .The data
dictionary for the current system has been given as under:

Tables for Project:


Employer: This table maintains details of Employer

Field Name Data Type


User name Text
Password Text
company-name Text
company-location Text
company email Text

Jobs: This table maintains details of Jobs

Field name Data type

username Text)
Job company Text
Job category Text
Job location Text
Job_exp Text
Job email Text

32
emp_phone Text
emp_email Text

Vacancy: This table maintains detail of jobs for which vacancies are open

Field Name Data Type

User name Text


Password Text
fname Text
lname Text
email Text
jobloc Text
prfjobloc Text
exp Text
jcat Text
key skills Text
highest degree Text
specialization Text

Newsletter: This table stores and maintains status news

Field Name Data Type

Name Text
email Text

Site admin: This table stores and maintains status site admin

Field Name Data Type

Username Text
Password Text

33
34
Main Form

35
Jobseeker login

36
New Jobseeker Signup

37
Employer login

38
New Employer Signup

39
Site administrator login

40
Tips

41
Interview Tips for Professionals

42
Resume Tips for Professionals

43
Job Fair List

44
Contact us

45
Newsletter Subscription

46
Hot Vacancies

47
IT JOBS Openings

48
New JOBS This Week

49
SeekJOBs.com success stories

50
JOBS For Disabled people

51
Job Fair list

52
53
Testing
Testing plays a critical role in quality assurance for software .Due to the limitation of
the verification method for the previous phases, design and requirement fault also
appear in the code. Testing is used to detect these errors, in edition to the error
introduced during coding phase.
Testing is a dynamic method for verification and validation, where the system is
to be tested is executed and behavior of the system is observed. Due to this testing
the failure of the system can be observed, from which the presence of fault can be
deduced. However, separate activities have to be performed to identify the faults.
There are two method of testing: functional and structural. In functional
testing, the internal logic of the system under testing is not considered and the test
cases are decided from the specification or the requirements. It is often called “Black
Box Testing”. Equivalence class partitioning, boundary analysis, and cause effect
graphing are examples of methods for selecting test cases for functional testing. In
structural testing, the test cases are decided entirely on the internal logic of the
program or module being tested.
As the goal of testing is to detect any errors in the programs different flavor of
testing are often used. Unit testing are used to test a module or a small collection of
modules and the focus is on detecting coding errors in modules. During integration
testing modules are combined into sub-system, which are then tested. The goal here
is to test the system design. In system testing and acceptance testing, the entire
System is tested. The goal here is to test the requirement themselves. Structural

54
testing can be used for unit testing while at higher level mostly functional testing is
used.
In the project Monthly Materialization Report System we used the unit testing
and functional testing. System testing is a critical phase in systems implementation.
Testing of a system involves hardware device testing and debugging of computer
programs and testing information processing procedures. Testing can be done with
test data, which attempts to simulate all possible conditions that may arise during
processing. The plane for testing are prepared and then implemented.
The testing methods adopted in the testing of the system were Independent
Unit Testing and System Testing
Independent Unit Test (IUT)
IUT focuses first on the modules, independently of one another, to locate errors. This
enables the tester to detect errors in coding and logic that are contained within that
module alone. Those resulting from the interaction between modules are initially
avoided.
IUT is generally white box oriented which is predicted on the close
examination of procedural detail. It exercises all the logical decisions on their true
and false side, executes all loops at their boundaries and within their operational
bounds and checks whether the required validations have been met. White box
testing exercises internal data structure to assure their validity.

SYSTEM TESTING

Here the system testing involved is the most widely used testing process consists of
five stages as shown in the figure. In general, the sequence of testing activities is
component testing, integration testing then user testing. However, as defects are
discovered at any one stage, they required program modifications to correct them
and this may required other stages in the testing process to be repeated.

55
Unit testing

Module
testing

Sub-
system
testing

System
testing

Acceptanc
e testing

(Component testing) (Integration testing) (User testing)

56
Testing is the process of detecting errors. Testing performs a very critical role for
quality assurance and for ensuring the reliability of the software. The results of
testing are used later on during maintenance also.

Testing is vital to the success of the system. System testing makes a logical
assumption that if the parts of the system are correct, the goal will be successfully
achieved. In adequate testing or non-testing leads to errors that may not appear until
months or even years later (Remember the New York three day power failure due to
a misplaced ‘Break’ statement).

This creates two problems:


1. The time lag between the cause and the appearance of the problem.
2. The time interval effect of the system errors on files and the records on the
system.

A small error can conceivably explode into a much larger problem. Effective testing
early in the process translates directly into long term cost savings from a reduced
number of errors.

Another reason for system testing is its utility as a user oriented vehicle before
implementation. The best program is worthless if it does not meet the user
requirements. Unfortunately, the user’s demands are often compromised by efforts
to facilitate program or design efficiency in terms of processing time or design
efficiency.

57
Thus in this phase we went to test the code we wrote. We needed to know if the
code compiled with the design or not? Whether the code gave the desired outputs
on given inputs? Whether it was ready to be installed on the user’s computer or
some more modifications were needed?

Through the web applications are characteristically different from there software
counterparts but the basic approach for testing these web applications is quite
similar. These basic steps of testing have been picked from software engineering
practices. The following are the steps, we undertook:

1. The content of the Intranet site is reviewed to uncover Content errors. Content
Errors covers the typographical errors, grammatical errors, errors in content
consistency, graphical representation and cross referencing errors

2. The design model of the web application is reviewed to uncover the navigation
errors. Use cases, derived as a part of the analysis activity allows a web designer
to exercise each usage scenario against the architectural and navigational
design. In essence these non-executable tests help to uncover the errors in
navigation.

3. When web applications are considered the concept of unit changes. Each web
page encapsulates content navigation links, content and processing elements
(Forms, Scripts, JSP’s as in our case). It is not always possible to test each of
these individually. Thus is the base of the web applications the unit to be
considered is the web page. Unlike the testing of the algorithmic details of a
module the data that flows across the module interface, page level testing for
web applications is driven by content, processing and links encapsulating the
web page.

58
4. The Assembled web application is tested for overall functionality and content
delivery. The various user cases are used that test the system for errors and
mistakes.

5. The Web application is tested for a variety of environmental settings and is tested
for various configurations and upon various platforms.

The modules are integrated and integration test are conducted.

1. Thread based testing is done to monitor the regression tests so that the site does
not become very slow is a lot of users are simultaneously logged on.
2. A controlled and monitored population of end users tests Intranet application, this
all comprises of the User Acceptance Testing.

Because web application evolves continuously, the testing process is an


ongoing activity, conducted by web support staff in our case the Organization’s IS
people who will finally update and manage the application.

PSYCHOLOGY OF TESTING

The aim of testing is often to demonstrate that a program works by showing that it
has no errors. The basic purpose of testing phase is to detect the errors that may be
present in the program. Hence one should not start testing with the intent of showing
that a program works, but the intent should be to show that a program doesn’t work.
Testing is the process of executing a program with the intent of finding errors.

TESTING OBJECTIVES:

59
The main objective of testing is to uncover a host of errors, systematically and with
minimum effort and time. Stating formally, we can say,

1. Testing is a process of executing a program with the intent of finding an error.


2. A successful test is one that uncovers an as yet undiscovered error.
3. A good test case is one that has a high probability of finding error, if it exists.
4. The tests are inadequate to detect possibly present errors.
5. The software more or less confirms to the quality and reliable standards.

LEVELS OF TESTING

In order to uncover the errors present in different phases, we have the concept of
levels of testing. The basic levels of testing are
Client Needs Acceptance Testing

Requirements System Testing

Design Integration Testing

Code Unit Testing

Unit testing
Unit testing focuses verification effort on the smallest unit of software i.e. the
module. Using the detailed design and the process specifications, testing is done to

60
uncover errors within the boundary of the module. All modules must be successful in
the unit test before the start of the integration testing begins.
In this project each service can be thought of a module. There are so many modules
like Login, HR Department, Interviewer Section, etc. Each module has been tested
by giving different sets of inputs. When developing the module as well as finishing
the development, the module works without any error. The inputs are validated when
accepting them from the user.

Integration Testing

After unit testing, we have to perform integration testing. The goal here is to see if
modules can be integrated properly, the emphasis being on testing interfaces
between modules. This testing activity can be considered as testing the design and
hence the emphasis on testing module interactions.

In this project the main system is formed by integrating all the modules. When
integrating all the modules I have checked whether the integration effects working of
any of the services by giving different combinations of inputs with which the two
services run perfectly before Integration.

SYSTEM TESTING

Here the entire software system is tested. The reference document for this process
is the requirements document, and the goal is to see if software meets its
requirements.
Here entire ‘HRRP’ has been tested against requirements of project and it is
checked whether all requirements of project have been satisfied or not.
ACCEPTANCE TESTING

61
Acceptance Testing is performed with realistic data of the client to demonstrate that
the software is working satisfactorily. Testing here is focused on external behavior of
the system; the internal logic of program is not emphasized.

Test cases should be selected so that the largest number of attributes of an


equivalence class is exercised at once. The testing phase is an important part of
software development. It is the process of finding errors and missing operations and
also a complete verification to determine whether the objectives are met and the
user requirements are satisfied.

WHITE BOX TESTING

This is a unit testing method, where a unit will be taken at a time and tested
thoroughly at a statement level to find the maximum possible errors.
I tested step wise every piece of code, taking care that every statement in the code
is executed at least once. The white box testing is also called Glass Box Testing.
I have generated a list of test cases, sample data, which is used to check all
possible combinations of execution paths through the code at every module level.

White-box test focuses on the program control structure. Test cases are
derived to ensure that all statement in the program control structure. Test cases are
derived to ensure that all statement in the program control structure. Test cases are
derived to ensure that all statement in the program has been executed at least once
during testing and that all logical conditions have been exercised. Basis path testing,
a white box technique, makes use of program graphs (or graph matrices) to derive
the set of linearly independent test that will ensure coverage. Condition and data
flow testing further exercising degrees of complexity.

BLACK BOX TESTING

62
This testing method considers a module as a single unit and checks the unit at
interface and communication with other modules rather getting into details at
statement level. Here the module will be treated as a block that will take some input
and generate output. Output for a given set of input combinations are forwarded to
other modules.
Black-box test are designed to uncover errors functional requirement without
regard to the internal workings of a program. Black-box testing techniques focus on
the information domain of the software, deriving test cases by partitioning the input
and output domain of a program in manner that provides through test coverage. The
black-box test is used to demonstrate that software functions are operational, that
input is properly produced, and that the integrity of external information are
maintained. A black-box test examines some fundamental aspect of a system with
little or no regard for the integral logical structure of the software.

Graph based testing methods explore the relationship between and behavior of
program objects. Equivalence partitioning divides the input classes of data are likely
to exercise specific software function. Boundary values analysis probes the
program’s ability to handle data at the limits of acceptability.

TEST INFORMATION FLOW

A strategy for software testing may also be viewed in the context of the spiral. Unit
testing begins at the vortex of the spiral and, concentrates on each unit, component
of the software as implemented in source code. Testing progresses moving outward
along the spiral to integration testing, where the focus is on designed the
construction of the software architecture. Taking another turn outward on spiral, we
encounter validation testing, where requirements established as part of software
requirements analysis are validated against the software that has been constructed.
Finally, we arrive at system testing, where the software and other system elements
are tested as a whole. To test computer software, we spiral out along stream lines
that broaden the scope of testing with each turn.

63
Considering the process from a procedural point of view, testing within the
context of software engineering is actually a series of four steps that are
implemented sequentially. The steps are shown in Figure. Initially, tests focus on
each component individually, ensuring that it functions properly as unit. Hence, the
name unit testing. Unit testing makes heavy use of white-box testing techniques,
exercising specific paths in module’s control structure to ensure complete coverage
and maximum error detection.

System Testing
Validation Testing

Integration Testing

Validation testing

Code

Design

System Security
System Engineering

SYSTEM SECURITY

64
There are basically two types of security associated with this system:-

1. Physical security:-
Damage due to natural causes like earth tremor, flooding, water logging, fire
hazards, atmospheric or environmental conditions etc.For overcoming these
difficulties the replica of the data are automatically stored at various networks and for
environmental conditions Air conditioning environment is created.
2. Data security:-
There are basically two problems associated with data security:-
1. Data not being available to the authorized person at the time of need.
2. Data becoming available to the unauthorized person.

To overcome these difficulties the following access facilities has been provided:-
i) Identification:-
Unique Ids for the different users have been provided.
ii) Authentication:-
System checks the password under the particular user identification. The
computer permits the various resources to the authorized person.
iii) Authorization:-
The access control mechanism to prevent unauthorized logging to the
system.

65
66
IMPLEMENTATION

System implementation is the stage when the user has thoroughly tested the system
and approves all the features provided by the system. The various tests are
performed and the system is approved only after all the requirements are met and
the user is satisfied.
The new system may be totally new; replacing an existing manual or automated
system, or it may a major modification to an existing system. In the either case,
proper implementation is essential to provide a reliable system to meet organization
requirements .successful implementation may not guarantee improvement in the
organization using the new system (that is a design question) ,but improper will
prevent it.
Implementation is the process of having systems personal cheek out and put
new equipment to use, train users, install the new application and construct any files
of data needed to use it. This phase is less creative than system design. Depending
on the size of the organization that will be involve in using the application and the
risk involved in its use, system developer may choose to test the operation in only
one area of the firm with only one or two persons. Some times, they will run both old
and new system in parallel way to compare the results. In steel other situations,
system developers stop using the old systems one day and start using the new one
the next.
The implementation of the web based or LAN base network project has some
extra steps at the time of implementation. We need to configure the system
according the requirement of the software.

67
For the project we need to install and configure weblogicserver8.1, database
server and deployment directory for the project.

Aspects of implementation:-

The two aspects of implementation are:

• Training Personnel

• Conversion Procedures

Training:-

Even well designed and technically elegant systems can succeed or fail because of

the way they are used. Therefore the quality of the training received by the

personnel involved with the stem in various ways helps or hinders, and may event

prevent, the successful implementation of an information system. Since

68
69
MAINTENANCE
Software maintenance is the last phase in the software Engineering process that
eliminates errors in the working system during its work span and to tune the system
to any variations in its working environment. The system requires maintenance as
there may be changes and requirements in the organizational needs, government
policies, hardware and software environment etc. often small system deficiencies
are found as a system is brought into operation and changes are made to remove
them. System requirements may be revised as a result of system usage or changing
operational needs. Perhaps oversight that occurred during the development process
needs to be corrected. Often the maintenance need arises to capture additional data
for storage in a database or in transaction files or perhaps it may be necessary to
add error detection features to prevent system users from in adversely taking an
unwanted action.
Maintenance of the system after it is installed is concerned with an
additional factor in hardware. Once the system is delivered and installed there is a
brief warranty period during which time the vendor is responsible for maintenance.
This is a typically a 90 day period after that time the purchaser has the option of
acquiring maintenance from various sources. Maintenance source excepting vendor
is also available from companies specializing in providing the service, called third
party maintenance companies.

When the system is installed, it is generally used for long period. The average life of
system is 4-6 years, with the eldest applications often is used for over 10 years. The
need for debugging and correcting errors or failure on an emergency basic is
comparatively low: less than 20% of the task of correction. System and organization
are in constant state of flux; therefore the maintenance of the system also involved
adoptions for earlier version of software.

70
Approximately 20% of all maintenance work is performed to
accommodate changes in report, files and database. The greatest amount of
maintenance work is for user enhancement, improved documentation and recording
system components or greater efficiency. About 60% of all maintenance is for this
purposed.
Following table summarized the broad classes of maintenance found in
development of sekkjob.com

CATEGORY ACTIVITY
 Corrective Emergency fixes, routine debugging.
 Adaptive Accommodation of changes to data and to hardware
and software, Changes in the external environment.
 Pre effective User enhancement, improved documentation recording of
computational efficiency, user recommendations for new capabilities.
 Preventive Routine service of cleaning
and adjusting the equipment to prevent breakdowns, future maintainability
reliability enhancement, recovering design information to improve the overall
quality.
Maintainable Design
The points to reduce the needs for maintenance are:
 More accurately defining the user’s requirements during the system development
assembling better system documentation.
 Using more effective methods for designing process logic and communicating it
to project team members.
 Making better use of existing tools and techniques.
 Managing the system engineering process effectively.

71
The maintenance for Integrated Advertising System was performed with the above-
mentioned points as the underlying principles and according to the demands of the
users.

72
CONCLUSION

This is a well defined job of our team that has taken six weeks to analyze the
situation in which this project will work and the environment of the company that will
use this project.
It was a good experience for us to work in a company that has a very friendly
environment and learning atmosphere.
I am very thankful to Mr. Mohd Gurfan khan.
Who gave a lot of good programming skills and so many company related skills that
will help me in the future?

I am also thankful to all my friends and team members.

73
FUTURE SCOPE OF THIS PROJECT

• In future this project can be treated as product according to specification and


needs of any organization.

• Since Jobseeker plays key role in any organization; thus, success over a long
period of time and reliance of organization over recruitment is going to be one of
the most considered topic for any organization. Therefore Jobs seeker Process
will be of great help in carrying out recruitment process smoothly and effectively.

• At present days every organization is using web technology for their proper
functioning, so this web based project is all in all important from market aspects.

• Furthermore if this project will be uploaded, it can be used as Jobs site and any
organization can register their self on the site to carry out their recruitment
process making this site as Jobs seeker.

74
LIMITATIONS
Since, every system has some limitations so our proposed system is also not
untouchable in this regard. Although it includes every kind of features but it can’t be
used in a huge organization where number of networks are very large, because the
data base used in this system is an average one. Also it doesn’t have different kind
of access feature for different users.

SOFTWARE SCOPE

• Reusability:

Reusability is possible as and when we require in this application. We


can update it next version. Reusable software reduces design, coding and testing
cost by amortizing effort over several designs. Reducing the amount of code also
simplifies understanding, which increases the likelihood that the code is correct. We
follow up both types of reusability: Sharing of newly written code within a project and
reuse of previously written code on new projects.

• Extensibility:

This software is extended in ways that its original developers may not
expect. The following principles enhance extensibility like Hide data structure, avoid

75
traversing multiple links or methods, Avoid case statements on object type and
distinguish public and private operations.

• Robustness:
Its method is robust if it does not fail even if it receives improper
parameters. There are some facilities like Protect against errors, Optimize after the
program runs, validating arguments and Avoid predefined limits.

• Understandability:
A method is understandable if someone other than the creator of the
method can understand the code (as well as the creator after a time lapse). We use
the method, which small and coherent helps to accomplish this.

• Cost-effectiveness:
Its cost is under the budget and make within given time
period. It is desirable to aim for a system with a minimum cost subject to the
condition that it must satisfy all the requirements.
Scope of this document is to put down the requirements, clearly identifying the
information needed by the user, the source of the information and outputs expected
from the system.

76
77
SITES REFERRED:
1. http://www.sun.com
2. http://www.coreservlets.com
3. http://www.serverside.com
4. http://www.w3schools.com
5. http://www.google.com
6. http://www.webopedia.com
7. http://www.ddj.com

BOOKS:

 J2EE by GARRY CORNELL.


 J2EE by Allamaraju & Buest (Apress Publications).
 JSP & Servlets by Marty Hall (SUN Microsystems)
 SYSTEM ANALYSIS AND DESIGN by ELIAS M AWAD.
 SOFTWARE ENGINEERING by IAN SOMMEVILLE.

78
79
APPENDIX-A

Backend remains on server side and has two components i.e.


1. Server side program
2. Data Base.
Data base is the most important thing in this universe as data base gives identity to
a thing without data base existence of a thing is impossible while working on a
project first step is to design a database.
What is data base?
Data Base is a collection of tables and table is a collection of records in a tabular
form i.e. in row and columns.
Data Base can be divided into two parts:-
1. RDBMS.
2. DBMS.
We will be using RDBMS (Relational Database Management System) in our project
i.e. oracle 8i Enterprise edition.
Why we are using Oracle (RDBMS)?
Some of the merits of using Oracle (RDBMS) are as under:-
• Centralization of database.
• Client Server Technology.

80
• Security.
• Normalization of Data Base.
• Relationship.
• Transaction Processor.
• It gives some internet related features.
Hence because of these features we are using Oracle as a back end technology.
ABOUT ORACLE 8i
Oracle 8i contains all the features of previous version. It also supports some
new features & enhancement to some existing features. Oracle servers provide
deficient & effective solution for the major features.

• Large Database & Space Management Control


• Many Concurrent Database Performances
• High Transaction Processing Performance
• High Availability
• Controlled Availability
• Industry Accepted Standards
• Manageable Security

• Database Enforced Integrity


• Distributed Database System
• Portability
• Compatibility
• Connectivity

81
NEW FEATURES OF ORACLE 8i
• Improved Scalability
• Improved Security
• Improved Performance Via Partition
• Enhanced Support for Database Replication
• Capability To Handle a Much Larger Number Of Concurrent Users
• New & Improved Data Types

APPENDIX-B
What is Middle Ware?
Middle Ware is a concept, Middle Ware provides centralization of business logic i.e.
instead of putting logic on each and every client machine we put logic on a
centralized server hence middle ware is nothing but a server side program where all
your business logic and business methods reside. It remains on server side and it
has all the logical building. Middle ware provides:-
1. Multiple Client access.
2. Centralized business logic in case of distributed application.
Because we are working on Distributed Application Based Project we need platform
independent Language:-

Technology Used

82
Introduction to Java
Java is a high level, third-generation programming language, like C, Fortran, Perl
and many others. It is a platform for distributed computing – a development and run-
time environment that contains built-in support for the World Wide Web.
History of Java
Java development began at Sun Microsystems in 1991, the same year the World
Wide Web was conceived. Java’s creator, James Gosling did not design java for the
Internet. His Objective was to create a common development environment for
consumer electronic devices which was easily portable from one device to another.
This effort evolved into a language , code named Oak and later renamed Java
that retains much of the syntax and power of c++ , but is simpler and more platform
independent.
Java Features
Some of the important features of Java are as follows:
• Simplicity
• Orientation
• Platform Independence

• Security
• High Performance
• Multi Threading
• Dynamic linking.
• Garbage Collection.
One of the most important features of Java is Platform Independence which makes it
famous and suitable language for World Wide Web.
Why java is Platform Independent?
Java is Platform Independent because of Java Virtual Machine (JVM).
Java Virtual Machine (JVM)

83
The client application or operating system must have a java byte-code interpreter to
execute byte-code instructions. The interpreter is a part of a lager program called the
JVM. The JVM interprets the byte code into native code and is available on a
platform that supports java.
Connectivity using JDBC
There are four kinds of drivers available in Jdbc:-
1. JdbcOdbc Bridge Driver.
2. Partly Java Driver.
3. Pure Java Driver.
4. Native Driver.

Client Side Interface:


In client side interface we are using:-
Servlet / JSP – In Internet Based Application.

J2EE Framework and Architecture


J2EE is one of the best solutions that we have had so far for meeting the demand of
today’s enterprise. J2EE specifies both the infrastructure for managing our
applications, and the service APIs for building our applications.
The J2EE platform is essentially a distributed application-server environment- a java
environment that provides the following: -
• A set of java extension APIs to build applications. These APIs define a
programming model for J2EE applications.
• A run time infrastructure for hosting and managing applications. This is the server
runtime in which our applications resides.

84
The applications that we could develop with the above may be programs to drive
web pages, or components to implement complex database transactions, or even
java applets, all distributed across the network.
The J2EE Runtime
While J2EE bundles together APIs that have been in existence in one form or
another for quite sometime, perhaps its most significant aspect is the abstraction of
the runtime infrastructure. The J2EE specification doesn’t specify how a J2EE
runtime should or could be built. Instead, J2EE specify roles and interfaces for
applications, and the runtime onto which applications could be deployed. This results
in a clear demarcation between applications and the runtime infrastructure. This
demarcation allow the runtime to abstract most of the infrastructure services that
enterprise developers have traditionally attempt to build on their own. As a result,
J2EE application developers could just focus on the application logic and related
service, while leveraging the runtime for all infrastructure-related services.
Apart from specifying a set of standard APIs, the J2EE architecture also provides a
uniform means of accessing platform-level services via its runtime environment.
Such service includes distributed transactions, security, messaging etc.
The J2EE APIs Used
Distributed applications require access to a set of enterprise services. Typical
services include transaction processing, database access, messaging,
multithreading etc. The J2EE architecture unifies access to such services in its
enterprise service APIs. However, instead of having to access these service through
proprietary or non standard interfaces, application programs in J2EE can access
these APIs via the container.
There are various API specification in J2EE framework which enable us to create an
application at great speed with minimum effort.

APIs Used To Build the Software


1. JDBC API

85
The JDBC API provides developers with a way to connect to relational data from
within java code. Using the JDBC API, developers can create a client (which can be
anything from an applet to an EJB) that can connect to a database, execute
structured query language statements, and processes the result of those
statements. The API provides connectivity and data access across the range of
relational databases. It can do this because it provides a
set of generic database access methods for sql compliant relational databases.
JDBC generalizes the most common database access functions by abstracting the
vendor specific detail of particular database. The result is set of classes and
interface, placed in the java.sql package, which can be used with any database that
has an appropriate JDBC drive. This allow JDBC
connectivity to be provided in a consistent way for any database. It also means that
with a little care to ensure the application confirms to the most commonly available
database features, an application can be use with a different database simple by
switching to a different JDBC driver. JDBC includes following packages for the
means of database accessing and provides various features of the database. The
packages are as follows: -
• java.sql Package: -
This package contains classes and interfaces designed with traditional client/server
in mind. Its functionality is focused primarily on basic database programming
services such as creating connections, executing statements and prepared
statements, and running batch queries. Advanced functions such as batch updates,
scrollable result sets, transaction isolation, and sql data types are also availabl

• javax.sql Package: -
This package introduces sum major architectural change to JDBC programming
compared to java.sql package, and provides better abstractions for connections
management, distributed transactions, and legacy connectivity. This package also
introduces container-managed connection pooling, distributed transactions, and row
sets.

86
2. Java Servlets: -
Servlets are Java technology’s answer to Common Gateway Interface (CGI)
programming. They are programs that run on a Web server, acting as middle layer
between a requests coming from a Web browser or other HTTP client and
databases or applications on the HTTP server. Their job is to:
Read any data sent by the user.
This data is usually entered in a form on a Web page, but could also come from a
Java applet or a custom HTTP client program.
Look up any other information about the request that is embedded in the HTTP
request.
This information includes details about browser capabilities, cookies, the host name
of the requesting client, and so forth.
Generate the results.
This process may require talking to a database, executing an RMI or CORBA call,
invoking a legacy application, or computing the response directly.
Format the results inside a document.
In most cases, this involves embedding the information inside an HTML page.
Set the appropriate HTTP response parameters.
This means telling the browser what type of document is being returned (e.g.,
HTML), setting cookies and caching parameters, and other such tasks.
Send the document back to the client.
This document may be sent in text format (HTML), binary format (GIF images), or
even in a compressed format like gzip that is layered on top of some other
underlying format. Many client requests can be satisfied by
returning pre-built documents, and these requests would be handled by the server
without invoking servlets. In many cases, however, a static result is not sufficient,
and a page needs to be generated for each request.

Java Server Pages: -

87
Java Server Pages (JSP) technology enables you to mix regular, static HTML with
dynamically generated content from servlets. Many Web pages that are built by CGI
programs are primarily static, with the parts that change limited to a few small
locations. For example, the initial page at most on-line stores is the same for all
visitors, except for a small welcome message giving the visitor’s name if it is known.
But most CGI variations, including servlets, make you generate the entire page via
your program, even though most of it is always the same. JSP lets you create the
two parts separately. Listing 1.1 gives an example.
Most of the page consists of regular HTML, which is passed to the visitor
unchanged. Parts that are generated dynamically are marked with special HTML-like
tags and mixed right into the page.
The Advantages of JSP
JSP has a number of advantages over many of its alternatives. Here are a few of
them.
Versus Active Server Pages (ASP)
ASP is a competing technology from Microsoft. The advantages of JSP are twofold.
First, the dynamic part is written in Java, not VBScript or another ASP-specific
language, so it is more powerful and better suited to

complex applications that require reusable components. Second, JSP is portable to


other operating systems and Web servers; you aren’t locked into Windows NT/2000
and IIS. You could make the same argument when comparing JSP
to ColdFusion; with JSP you can use Java and are not tied to a particular server
product.
Versus Pure Servlets
JSP doesn’t provide any capabilities that couldn’t in principle be accomplished with a
servlet. In fact, JSP documents are automatically translated into servlets behind the
scenes. But it is more convenient to write (and to modify!) regular HTML than to
have a zillion println statements that generate the HTML. Plus, by separating the
presentation from the content, you can put different people on different tasks: your

88
Web page design experts can build the HTML using familiar tools and leave places
for your servlet programmers to insert the dynamic content.
Versus Server-Side Includes (SSI)
SSI is a widely supported technology for inserting externally defined pieces into a
static Web page. JSP is better because you have a richer set of tools for building
that external piece and have more options regarding the

stage of the HTTP response at which the piece actually gets inserted. Besides, SSI
is really intended only for simple inclusions, not for “real” programs that use form
data, make database connections, and the like.
Versus Static HTML
Regular HTML, of course, cannot contain dynamic information, so static HTML
pages cannot be based upon user input or server-side data sources. JSP is so easy
and convenient that it is quite reasonable to augment HTML pages that only benefit
slightly by the insertion of dynamic data. Previously, the difficulty of using dynamic
data precluded its use in all but the most valuable instances.

APPENDIX-C
What is HTML?
HTML (Hyper Text Markup Language): A markup language used to structure text and
multimedia documents and to set up hypertext links between documents, used
extensively on the World Wide Web. HTML is a display language, not a
programming language. HTML is a markup language (the ML in HTML) that uses a
fixed set of markup tags.
• HTML itself is the set of customizable “markup” tags that are inserted into HTML
document govern its format, multimedia content, and hyperlinks. Any HTML

89
viewer can display such documents but they are normally viewed usinga Web
browser.
• HTML is a programming language in that an HTML document is a program that,
when “run” by a browser, displays its text as hypermedia (multimedia with
hyperlinks).
• The “language” HTML is really only a collection of predefined tags which , when
inserted into regular text, tell a web browser how to:
a. Format the document and its text.
b. Incorporate i.e. insert a graphic image, video sequence, or sound clip
into the displayed document.
c. Link into other locations, in the same document, in another web page,
or even on another computer (Server), or
d. Link to other programs written in Java, JavaScript or other languages
(called CGI applications).
Features of HTML:-
HTML stands for Hyper Text Markup Language.
• An HTML file is a text file containing small markup tags.
• The markup tag tells the Web browser how to display the page.
• An HTML file must have an htm or html file extension.
• An HTML file can be created using a simple text editor.
• It’s a display-only technology.

APPENDIX-D
What is JAVASCRIPT?
JavaScript is a compact, object-based scripting language. It can provide
interactive web pages, validate from data, and make your web page clearer.
JavaScript is a lightweight interpreted scripting language. The language is most well
known for its use in wesites.It was originally developed by Brendan Each of
Netscape Communications. It adds interactive functions to HTML pages, which are

90
otherwise static. JavaScript is easier to use than Java, but not as powerful and deals
mainly with the elements on the Web page. On the client, JavaScript is maintained
as source code embedded into an HTML page. On the Server, it is compiled into
byte code (intermediate language), similar to Java programs.
Features of JavaScript:-
• JavaScript was designed to add interactively to HTML pages.
• JavaScript is a scripting language-a scripting language is a lightweight
programming language.
• A JavaScript is usually embedded directly in HTML pages.
• A JavaScript is an interpreted language (means that script execute without
preliminary compilation).
• All major browsers, like Netscape and Internet Explorer, support JavaScript.
Functions of JavaScript:-
JavaScript gives you the ability to perform the following functions:
• Control document appearance and content
• Control the browser
• Interact with document content
• Interact with the user
• Read and write client state with cookies
• Interact with applets
• Manipulate Embedded Images
Limitations of JavaScript:-
• JavaScript does not have any graphics capabilities
• Client-side JavaScript can not read or write files
• JavaScript does not support networking of any kind
• JavaScript doesn’t have any multithreading capabilities.

91
92
Analysis:
Breaking a problem into successively manageable parts for individual study.
Attribute:
A data item that characterizes an object.
Cost/Benefit Analysis:
The purpose of the comparing the projected savings and benefits to projected to
costs to decide whether the system change is justified.
Data Base:
A store of integrated data capable being directly addressed for multiple user; it is
organized so that various files can be accessed through a single referenced based
on the relationship among records in the file rather than the physical location.
DBMS:

93
The software that determines how data must be structured to produce the user’s
view; and maintain update the system.
Data Flow:
Moment of data in a systems from appoint of origin to specific destination
indicated by a line and arrow.
Data Security:
Protection of data from loss, disclosure, modification or destruction.
Data Structure:
Logically related set of data that can be decomposed into lower level data
elements; a group of data elements handled as a unit.
Design:
Process of devolving the technical and operational specification of a candidate
system for implementation.
Feasibility Study:
A procedure that identifies describes and evaluates candidate systems and selects
the best system for implementation.
File:
Collection related records organized for a particular purpose also called a data set.
Flow Chart:
A graphic picture of the logical steps and sequence involved in a procedure or a
program.
Form:
A physical carrier of data of information.
Implementation:
In system development- a phase that focuses on user training, site preparation
and file conversion for installing a candidate system.
Maintenance:
Restoring to its original condition.
Normalization:

94
A process of replacing a given file with its logical equivalent; the object is true derive
sample file with no redundant elements.
Operating System:
In data base machine based software that facilitates the availability information or
reports through the DBMS.
Password:
Identity authenticator a key that allow access to a program system or procedure.
Pert:
A flow system model used to manipulate various values as a basis for determining
the critical path to interpret this relationship and to relate them back to the real world
as a control technique.
Record:
A collection of aggregates or related item of data treated as a unit.
Source code:
A procedure or format that allow enhancement on a software package.

System:
A regular or orderly arrangement of components or parts in a connected and
interrelated series or whole; a group of components necessary to some operation.
System Design:
Detailed concentration on the technical and other specification that will make the
new system operational.
System Development Life Cycle:
A structured sequence of phases for implementing an information system.
System Testing:
Testing the whole system by the user after major programs and sub systems have
been tested.
Unit Testing Validation:
Testing changes made in an existing or new programs. checking the quality of
software in both simulated and live environment

95
96

Vous aimerez peut-être aussi