Académique Documents
Professionnel Documents
Culture Documents
o Administrator
o Men
o Women
o Kids
o Accessories.
1
1. INTRODUCTION
The Online garment advertising is a large web project executed for an American
garment company. The project consists of various modules like admin and price
knowing. The team of programmers employed to undertake this module consists of three
Component Developers, a Photoshop designer and one Relational Database
Administrator. The component developers are responsible for creating/deploying all
COM components using PHP or Hypertext Preprocessor software as well as creating the
HTML pages using the Dreamweaver components. The DBA is responsible for
maintaining and troubleshooting all database-related issues like privilege control,
granting access to network users and internet users, maintaining security logs,
supervising inter-server database connectivity, administering the Web Server and
controlling access to the Web Server (IIS machine).
The Online garment advertising module mainly deals with advertising products
through the internet. Products like Men’s wear, Women’s wear, kids wear & accessories
are advertised in the site. The web application will retrieve product information from the
database and display it required number of items per page, with images, pricing
information . Users will sign into the website with a userid and password. They can
choose the required model and color of their choice. They will choose the product of their
choice and know their price details
2
1.1 Problem Definition
The Online garment advertising is one of the web page development project. The
main aim of this project is to make a business through online all over the world by sitting
in one place. This web page is developed for the American garment company. They
decided to market their product all over the world. Through online they will give the
advertisement for their product and make the customers to purchase it. The company
contains apparels for men’s, women’s, kids wears etc...
The client side was designed in attractive and interactive manner. When the customer
open the website the Homepage will be displayed. In home page there will be a sign in
option for a registered user. The new user can also register by registration option in the
page. The guest is also allowed to view the web site without registration but he can’t
view any price details of products without registration. He is allowed only to surf
through the website. The links to the other pages are available in the home page.
The Homepage has a link to categories of a product displayed in it. For each product
available in the Homepage has different categories and it also has different products. This
products and categories are fetched from the database. They are stored in database by the
administrator. The products which are available in the store are inserted in the database.
This website gives information to the user on a wide vision .The user can see the
various models available for various persons by simply select the model.The end user
also know the various colours available in the model by right side colour menu.The
registered user can also know the price of various models according to their register
information.The two types of end users are ASI/PPAI or RETAILER.The website
retrieve data about the price according to the end user category .
The admin section is used by the administrator for adding product details in the
database. It is maintained by the administrator only. The administrator has the separate
userid and password, so no one can enter in to the admin section. The administrator will
add the product prices
3
1.2 Company Profile
History
Experience counts more than anything else in the offshore outsourced health care
services market…" say our numerous clients. And it is our steadfast commitment backed
by our years of experience in Offshore Outsourcing that has helped them reap rich
dividends. Nittany is now the largest provider of offshore outsourced services in the
medical billing and collections service space. We understand the rules of the billing and
collections business across geographies and medical specialties, and are constantly fine-
tuning our systems, processes and people to stay on top of our accounts. We understand
that, as part of your providers' revenue cycle our role must extend well beyond mere
manpower arbitrage. Fast turnaround times, high quality levels, constant innovation must
all come together to ensure that your practise makes More Money Faster. Something on
our
Other Information
4
2. PROJECT DESCRIPTION
The project entitled “Online garment advertising” is one of the web application
projects. The main aim of this project is to enable the customer to know the various
models available in the garments through online.
The following are the modules of the project. It has two sections of modules in a
project.
1. Admin section
2. Client section
Project Modules:
Admin section:
Admin login:
Price Details:
Price details is the main module in the admin section. In this section the
administrator will add the price of products available in the garment. There are
two sections available in the price module. They are for retailers and whole salers.
5
Client section:
The client section is used by the clients whose browse this website. They
will browse through the modules available in this section. The modules a
1. Men;
Gkwc 6ukIn this men module we can have lot of models for men’s
wear.And we have lot of colours in every model.The available colours in every
model is in the right hand side.When the client move the mouse over the various
colours the available model are also change in the appropriate colour.The
customer download the product and model for their various usages.
2. Women:
In this women module we can have lot of models for women’s wear.And
we have lot of colours in every model.The available colours in every model is in
the right hand side.When the client move the mouse over the various colours the
available model are also change in the appropriate colour.The customer download
the product and model for their various usages.
3. Kids:
In this kids module we can have lot of models for kids wear.And we have
lot of colours in every model.The available colours in every model is in the right
hand side.When the client move the mouse over the various colours the available
model are also change in the appropriate colour.The customer download the
product and model for various usages.
4.Accessories:
In this accessories module we can have lot of models like bags,caps and
blankets..And we have lot of colours in every model.The available colours in
every model is in the right hand side. available model are also change in the
appropriate colour.The customer download the product and model for various
usages.
6
3. SYSTEM ANALYSIS
System Analysis is an activity that encompasses of the tasks that are collectively
called Computer System Engineering. Data are collected to be used in the complete
system further for the decision-making. The basic requirements are checked out
according to the given subject. The emphasis is on identifying what is needed from the
system, not how the system will achieve its goals. Thus in the system analysis part it is
that the complete working moves from the logical to the physical aspect of the complete
life cycle.
Analysis gathers the requirements for the system. This stage includes a detailed
study of the business needs of the organization. Options for changing the business
process may be considered. Design focuses on high level design like, what programs are
needed and how are they going to interact, low-level design (how the individual programs
are going to work), interface design (what are the interfaces going to look like) and data
design (what data will be required). During these phases, the software's overall structure
is defined. Analysis and Design are very crucial in the whole development cycle. Any
glitch in the design phase could be very expensive to solve in the later stage of the
software development. Much care is taken during this phase. The logical system of the
product is developed in this phase.
7
In this phase, the development team visits the studies their official requirements.
They investigate the need for possible software automation in the given system. By the
end of the feasibility study, the team furnishes a document that holds the different
specific recommendations for the candidate system. It also includes the personnel
assignments, costs, project schedule, and target dates. The requirements gathering process
is intensified and focused specially on software. To understand the nature of the
program(s) to be built, the system engineer ("analyst") must understand the information
domain for the software, as well as required function, behavior, performance and
interfacing. The essential purpose of this phase is to find the need and to define the
problem that needs to be solved.
Requirement analysis is one of the first and foremost part of system development
life cycle. It is very important too as company has to prove the feasibility of proposed
system.
A request to receive requirements from user can be made for many site, in any
case user can enter the daily discharge. The data will save correctly is the preliminary
investigation.
8
3.1 Existing System:
This system is what we have at present? Using this system we have to make our
proposed system. Before designing we must know about our current system. What is its
scope and if it has some limitations, then we must describe them in details. So that user
can understand each and every thing in detail. In this project the current system is done
manually and the marketing is done with in a country only.
And the customers canot know what are the offeref for whole buyers and retail
buyers in the existing system.The main brawback of the existing systen is time
consuming.And the existing systen is not much interactive.
♦ Time Consuming.
♦ Advanced search mode not available
♦ Not interactive
9
3.2 Proposed System:
Design phase follows analysis of the system. But before starting the design we
should have a model of proposed system. We attempt to evolve a system, which will be
evaluated during implementation, and testing phase. The proposed system of our project
is to make it computerized and to market the products all over the world.
10
Feasibility Study
A feasibility study is carried out to select the best system that meets the
performance requirements. This entails identification, description and evaluation
of candidate systems and selection of the best system from the job. It proposes
one or more feasible conceptual solution that gives an idea of what the new
system will. It also indicates what are required by the system and what output will
be produced.
In today’s business, there is more demand for computer services than there
are resources available to meet the demand. The demand is made up of the
following:
11
Technical Feasibility
Economic Feasibility
Economic analysis is the most frequently used method for evaluating the
effectiveness of a candidate system. More commonly known as cost/benefit
analysis the procedure is to determine the benefits and savings that are expected
from a candidate system and compare them with the costs. if the benefit
outweighs the costs, then the decision is made to design and implement the
system. Otherwise further justification or alterations in the proposed system will
have to be made if it is to have a chance of being approved. This is an ongoing
effort that improves in accuracy at each phase of the system life cycle.
In the proposed site the financial value of benefits cannot be calculated. However
the system entails the following benefits:
12
3.3 Data Flow Diagrams
User
No Sign Up
New User 1
Validate
Yes
Collections Search
Children
Database 1
13
3.4 Data Dictionary:
DATABASE: mvsport;
Table: useradmin
Table: mv_members_asi;
Table: mv_members_retail;
14
Table: mv_price_asi;
Table: mv_price_retail;
15
4. SYSTEM CONFIGURATION
System Configuration:
The basic software and hardware requirements for the project include the following: -
Hardware Requirements:
Hardware Requirement:
16
4.2 On the Server side
Software Requirements:
Software Requirement:
17
5.SOFTWARE DESCRIPTION
OPEN SOURCE
Open source usually refers to the software that is released with source code under
a license that ensures that derivative works will also be available as source code, protects
certain rights of the original authors, and prohibits restrictions on how the software can
be used or who can use it.
Open source doesn't just mean access to the source code. The distribution terms of
open-source software must comply with the following criteria:
1. Free Redistribution:
The license shall not restrict any party from selling or giving away the software as
a component of an aggregate software distribution containing programs from several
different sources. The license shall not require a royalty or other fee for such sale.
2. Source Code:
The program must include source code, and must allow distribution in source
code as well as compiled form. Where some form of a product is not distributed with
source code, there must be a well-publicized means of obtaining the source code for
no more than a reasonable reproduction cost preferably, downloading via the Internet
without charge. The source code must be the preferred form in which a programmer
would modify the program. Deliberately obfuscated source code is not allowed.
Intermediate forms such as the output of a preprocessor or translator are not allowed.
3. Derived Works:
The license must allow modifications and derived works, and must allow them to
be distributed under the same terms as the license of the original software.
18
4. Integrity of The Authors Source Code:
The license may restrict source-code from being distributed in modified form
only if the license allows the distribution of "patch files" with the source code for
the purpose of modifying the program at build time. The license must explicitly
permit distribution of software built from modified source code. The license may
require derived works to carry a different name or version number from the
original software.
The license must not discriminate against any person or group of persons.
The license must not restrict anyone from making use of the program in a
specific field of endeavor. For example, it may not restrict the program from
being used in a business, or from being used for genetic research.
7. Distribution of License:
The rights attached to the program must apply to all to whom the program is
redistributed without the need for execution of an additional license by those
parties.
19
parties to whom the program is redistributed should have the same rights as those
that are granted in conjunction with the original software distribution.
The license must not place restrictions on other software that is distributed
along with the licensed software. For example, the license must not insist that all
other programs distributed on the same medium must be open-source software.
PHP
PHP stands for Hypertext Preprocessor. The initials 'PHP' originally meant
Personal Home Page. The Open Source community renamed it Hypertext Processor, in
keeping with the recursive acronym tradition. Its simplicity in comparison to its elder
brother Perl, leads some aficionados to nickname it People Hate Perl.
Page contents can be generated automatically in PHP. In short, this means that
certain parts of your pages are produced by a program that can write HTML. So you can
be sure that the resulting contents can be read by any browser that understands HTML;
you need not worry about that. You can also interact with a database, such as MySQL, an
open source professional database management system. Today, the Apache/PHP/MySQL
trio forms one of the most popular professional Web platforms in the world.
20
Session management is another of PHP's strengths since it helps you to identify
your users from one page to another. Visit tracking or customizing systems can quickly
become exciting applications.
HTML script with some embedded code to do something (in this case, output
some text). The PHP code is enclosed in special start and end tags that allow you to jump
into and out of "PHP mode".
What distinguishes PHP from something like client-side JavaScript is that the
code is executed on the server. If you were to have a script similar to the above on your
server, the client would receive the results of running that script, with no way of
determining what the underlying code may be. You can even configure your web server
21
to process all your HTML files with PHP, and then there's really no way that users can
tell what you have up your sleeve.
Speed of Development
Because PHP allows you to separate HTML code from scripted elements, you
will notice a significant decrease in development time on many projects. In many
instances, you will be able to separate the coding stage of a project from the design and
build stages. Not only can this make life easier for you as a programmer, it also can
remove obstacles that stand in the way of effective and flexible design.
To many people, "open source" simply means free, which is, of course, a benefit
in itself. To quote from the official PHP site at http://www.php.net/: This may sound a little
foreign to all you folks coming from a non-UNIX background, but PHP doesn't cost
anything. You can use it for commercial and/or non-commercial use all you want. You
can give it to your friends, print it out and hang it on your wall or eat it for lunch.
22
Welcome to the world of Open Source software! Smile, be happy, the world is good. For
the full legalese, see the official license. Well-maintained open source projects offer users
additional benefits, though. You benefit from an accessible and committed community
who offer a wealth of experience in the subject. Chances are that any problem you
encounter in your coding can be answered swiftly and easily with a little research. If that
fails, a question sent to a mailing list can yield an intelligent, authoritative response.
You also can be sure that bugs will be addressed as they are found, and that new
features will be made available as the need is defined. You will not have to wait for the
next commercial release before taking advantage of improvements. There is no vested
interest in a particular server product or operating system. You are free to make choices
that suit your needs or those of your clients, secure that your code will run whatever you
decide.
Performance
Because of the powerful Zend engine, PHP4 compares well with ASP in
benchmark tests, beating it in some tests. Compiled PHP leaves ASP far behind.
Portability
PHP is designed to run on many operating systems and to cooperate with many
servers and databases. You can build for a UNIX environment and shift your work to NT
without a problem. You can test a project with Personal Web Server and install it on a
UNIX system running on PHP as an Apache module
Apache is the most widely used HTTP-server in the world today. It surpasses all
free and commercial competitors on the market, and provides a myriad of features; more
than the nearest competitor could give you on a UNIX variant. It is also the most used
web server for a Linux system. A web server like Apache, in its simplest function, is
software that displays and serves HTML pages hosted on a server to a client browser that
understands the HTML code. Mixed with third party modules and programs, it can
become powerful software, which will provide strong and useful services to a client
browser.
Once you have DNS correctly setup and your server has access to the Internet,
you'll need to configure Apache to accept surfers wanting to access your Web site. The
Apache web server is a highly scalable product capable of running on many platforms
and serving thousands of pages a minute. It provides a stable and secure environment for
the host server, and is the industry leader in the web server market. The server package
comes bundled with most Linux distributions and only requires little configuration
changes (if any) to be up and serving pages immediately. If you're serious about your
web development and its a fully dynamic hosting environment you need, then Apache,
23
PHP and MySQL are perfectly suited together, and are also provided with most
distributions.
MySQL
MySQL is a multithread, multi-user SQL database management system(DBMS)
which has, according to MySQL AB, more than 10 million installations. The basic
program runs as a server providing multi-user access to a number of databases.
It was originally financed in a similar fashion to the JBoss model, MySQL was
owned and sponsored by a single for-profit firm, the Swedish company MySQL AB,
which holds the copyright to most of the codebase. The project’s source code is available
under terms of the GNU General Public License, as well as under a variety of proprietary
agreements.
Libraries for accessing MySQL databases are available in all major programming
languages with language specific APIs. In addition, an ODBC interface called MyODBC
allows additional programming languages that support the ODBC interface to
communicate with a MySQL database, such as ASP or ColdFusion. The MySQL server
and official libraries are mostly implemented in ANSI C/ANSI C++.
The MySQL Web site provides the latest information about MySQL software and
MySQL AB.
24
a central role in computing, as standalone utilities, or as parts of other
applications.
• Open Source means that it is possible for anyone to use and modify the software.
Anybody can download the MySQL software from the Internet and use it without
paying anything. If you wish, you may study the source code and change it to suit
your needs. The MySQL software uses the GPL (GNU General Public License),
to define what you may and may not do with the software in different situations.
If you feel uncomfortable with the GPL or need to embed MySQL code into a
commercial application, you can buy a commercially licensed version from us.
See the MySQL Licensing Overview for more information .
• The MySQL Database Server is very fast, reliable, and easy to use.
• If that is what you are looking for, you should give it a try. MySQL Server also
has a practical set of features developed in close cooperation with our users. You
can find a performance comparison of MySQL Server with other database
managers on our benchmark page.
25
• The MySQL Database Software is a client/server system that consists of a multi-
threaded SQL server that supports different backends, several different client
programs and libraries, administrative tools, and a wide range of application
programming interfaces (APIs).
Uses of MySQL
MySQL is a popular for web applications and acts as the database component of
the LAMP, MAMP, WAMP and XAMPP platforms (Linux/Mac/Windows-Apache-
MySQL-PHP/Perl/Python), and for open-source bug tracking tools like Bugzilla. Its
popularity for use with web applications is closely tied to the popularity of PHP and on
Rails, which are often combined with MySQL. PHP and MySQL are essential
26
components for running popular content management systems such as Joomla!,
WordPress, Google, EBay and Drupal. Wikipedia runs on Media Wiki software, which is
written in PHP and uses a MySQL database.
PhpMyAdmin
Click on the database you created in the navigation frame and a new window will
appear on the right hand side.
27
We will now create the first table in the database, called "details". This is done by
using the Create new table feature. The name of the new table is typed into the Name:
field, and the number of columns in the table into Fields:. Please note that when you
create your own databases and tables, it's wise to plan them out carefully to allow for
growth - this exercise is only meant to help you to familiarize with basic
php/MySQL/phpMyAdmin functions.
After you click Go a screen similar to the following should appear. Notice that the
table title will now also appear under the database name in the left hand navigation frame.
We now need to enter the names and attributes of our table fields. Enter the
following information:
Field Type Length
id int 6
name char 100
28
telephone char 50
birthday char 50
The Length value indicates the maximum allowable length of characters for input.
There are many different values that can be set for Type; view further documentation
here. The Types specified in this example aren't the most efficient, but just used for the
purposes of this exercise. The "id" field, which will be used as a Primary key for this
table, has been set to auto increment, saving you from having to having to type in the
next number in sequence when you input records.
Once you've entered all the values, click Save. A screen similar to the following will
appear.
You've done it - the table is now created! You'll notice that the corresponding
SQL command for creating these fields is also displayed. While you don't really need to
know this for the purposes of this exercise, it doesn't hurt to get familiar with the lingo
over time.
29
Also on this page, you'll see many other options - explore these later on once you
are familiar with the way everything is working.
Java Script
JavaScript is a compact, object-based scripting language for developing client and
server Internet applications. Netscape Navigator interprets JavaScript statements
embedded in an HTML page, and LiveWire enables you to create server-based
applications similar to Common Gateway Interface (CGI) programs.
JavaScript is Netscape's cross-platform, object-based scripting language for client and
server applications. There are two types of JavaScript:
JavaScript in Navigator
Netscape Navigator 2.0 (and later versions) can interpret JavaScript statements
embedded in an HTML page. When Navigator requests such a page, the server sends the
full content of the document, including HTML and JavaScript statements, over the
network to the client. The Navigator then displays the HTML and executes the
JavaScript, producing the results that the user sees.
30
Ajax
History of Ajax
Ajax is a concept – a way of making the web more interactive, and as such was never
really created or introduced. In fact, the concept existed much before it became popular.
However, the term was coined in 2005, by Jesse James Garrett, founder of adaptive Path.
With the introduction of the iframe element in HTML by Internet Explorer in 1996,
web developers can now asynchronously load another web page in a section of a
currently loaded page. By using an iframe with zero dimensions, you could use an iframe
to load content from another page, extract the relevant parts and inject it into your own
page, all in the background.
In 1999, the new XMLHttpRequest ActiveX control was developed by Microsoft for
Internet Explorer. The new object can asynchronously load pages, from any website as
desired by the developer. As of now, this is available in all major browsers such as
Firefox, Safari and Opera.
In 2006, this control was standardized by the World Wide Web consortium (W3C), in
a draft specification. As a result, once finalized, any new browser that plans to follow
web standards will have to support this object.
The idea behind Ajax is that you can send requests to a server, as you normally do;
but instead of refreshing the entire page, you use JavaScript to update only a portion of
the page. As a result, Web applications aren’t constantly forcing users to wait for entirely
new pages to be loaded in their browsers; the application feels more like a desktop
program.
31
Ajax is not a singular new technology, but instead a combination of a range of
technologies. These include the following:
• HTML
• CSs
DATABASE: mvsport;
Table: useradmin
Table: mv_members_asi;
32
Table: mv_members_retail;
Table: mv_price_asi;
33
Table: mv_price_retail:
34
6.2 Architectural Design
Price for
Asi
costomer
Price for
Retail
Login
customer
Admin
35
s
Forget
password
36
37
7. IMPLEMENTATION AND TESTING
Software Testing is the process of executing a program or system with the intent
of finding errors. Or, it involves any activity aimed at evaluating an attribute or
capability of a program or system and determining that it meets its required results
Software is not unlike other physical processes where inputs are received and outputs are
produced. Where software differs is in the manner in which it fails. Most physical
systems fail in a fixed (and reasonably small) set of ways. By contrast, software can fail
in many bizarre ways. Detecting all of the different failure modes for software is
generally infeasible
Unlike most physical systems, most of the defects in software are design errors,
not manufacturing defects. Software does not suffer from corrosion, wear-and-tear --
generally it will not change until upgrades, or until obsolescence. So once the software is
shipped, the design defects -- or bugs -- will be buried in and remain latent until
activation
Software bugs will almost always exist in any software module with moderate
size: not because programmers are careless or irresponsible, but because the complexity
of software is generally intractable -- and humans have only limited ability to manage
complexity. It is also true that for any complex systems, design defects can never be
completely ruled out.
Discovering the design defects in software is equally difficult, for the same reason
of complexity. Because software and any digital systems are not continuous, testing
boundary values are not sufficient to guarantee correctness. All the possible values need
to be tested and verified, but complete testing is infeasible. Exhaustively testing a simple
program to add only two integer inputs of 32-bits (yielding 2^64 distinct test cases)
38
would take hundreds of years, even if tests were performed at a rate of thousands per
second
Obviously, for a realistic software module, the complexity can be far beyond the
example mentioned here. If inputs from the real world are involved, the problem will get
worse, because timing and unpredictable environmental effects and human interactions
are all possible input parameters under consideration.
The testing activities are done in all phases of the lifecycle in an iterative software
development approach. However, the emphasis on testing activities varies in different
phases. This procedure explains the focus of testing in inception, elaboration,
construction and transition phases. In the inception phase most of requirements capturing
is done and the test plan is developed. In elaboration phase most of design is developed,
and test cases are developed. Construction phase mainly focuses on development of
components and units, and unit testing is the focus in this phase. Transition phase is about
deploying software in the user community and most of the system testing and acceptance
testing is done in this phase.
7.1 Purpose
39
7.2 Test Planning
Initial test plan addresses system test planning, and over the elaboration,
construction and transition phases this plan is updated to cater other testing requirements
of these phases, like, unit & integration testing.
• Scope of testing
• Methodology to be used for testing
• Types of tests to be carried out
• Resource & system requirements
• A tentative Test Schedule
• Identification of various forms to be used to record test cases and test results
• To improve quality.
40
first time. Finding the problems and get them fixed, is the purpose of debugging in
programming phase.
• Correctness testing
41
of the software module under test, e.g. control flow, data flow, etc. Therefore,
either a white-box point of view or black-box point of view can be taken in testing
software. We must note that the black-box and white-box ideas are not limited in
correctness testing only.
• Black-box testing
The black-box approach is a testing method in which test data are derived
from the specified functional requirements without regard to the final program
structure It is also termed data-driven, input/output driven or requirements-based
testing. Because only the functionality of the software module is of concern, black
box testing also mainly refers to functional testing -- a testing method emphasized
on executing the functions and examination of their input and output data. The
tester treats the software under test as a black box -- only the inputs, outputs and
specification are visible, and the functionality is determined by observing the
outputs to corresponding inputs. In testing, various inputs are exercised and the
outputs are compared against specification to validate the correctness. All test
cases are derived from the specification. No implementation details of the code
are considered.
It is obvious that the more we have covered in the input space, the more
problems we will find and therefore we will be more confident about the quality
of the software. Ideally we would be tempted to exhaustively test the input space.
But as stated above, exhaustively testing the combinations of valid inputs will be
impossible for most of the programs, let alone considering invalid inputs, timing,
sequence, and resource variables. Combinatorial explosion is the major roadblock
in functional testing. To make things worse, we can never be sure whether the
42
specification is either correct or complete. Due to limitations of the language used
in the specifications (usually natural language), ambiguity is often inevitable.
Even if we use some type of formal or restricted language, we may still fail to
write down all the possible cases in the specification. Sometimes, the
specification itself becomes an intractable problem: it is not possible to specify
precisely every situation that can be encountered using limited words.
And people can seldom specify clearly what they want -- they usually can
tell whether a prototype is, or is not, what they want after they have been finished.
Specification problems contributes approximately 30 percent of all bugs in
software.
43
• White-box testing
Control-flow testing, loop testing, and data-flow testing, all maps the
corresponding flow structure of the software into a directed graph. Test cases are
carefully selected based on the criterion that all the nodes or paths are covered or
traversed at least once. By doing so we may discover unnecessary "dead" code --
code that is of no use, or never get executed at all, which can not be discovered by
functional testing.
44
approach is not clear-cut. Many testing strategies mentioned above, may not be
safely classified into black-box testing or white-box testing.
• Performance testing
45
Performance has always been a great concern and a driving force of
computer evolution. Performance evaluation of a software system usually
includes: resource usage, throughput, stimulus-response time and queue lengths
detailing the average or maximum number of tasks waiting to be serviced by
selected resources. Typical resources that need to be considered include network
bandwidth requirements, CPU cycles, disk space, disk access operations, and
memory usage. The goal of performance testing can be performance bottleneck
identification, performance comparison and evaluation, etc. The typical method of
doing performance testing is using a benchmark -- a program, workload or trace
designed to be representative of the typical system usage.
• Reliability testing
46
There is agreement on the intuitive meaning of dependable software: it
does not fail in unexpected or catastrophic ways. Robustness testing and stress
testing are variances of reliability testing based on this simple criterion.
Stress testing, or load testing, is often used to test the whole system rather
than the software alone. In such tests the software or system are exercised with or
beyond the specified limits. Typical stress includes resource exhaustion, bursts of
activities, and sustained high loads.
• Security testing
47
Many critical software applications and services have integrated security
measures against malicious attacks. The purpose of security testing of these
systems include identifying and removing software flaws that may potentially
lead to security violations, and validating the effectiveness of security measures.
Simulated security attacks can be performed to find vulnerabilities.
48
what to do. Much of this steams of poor planning at all. Let us examine the steps
that preceded conversion.
The best method for gaining control of the conversion is to use well-
planned test files for testing all new programs. Before testing live data, test are
created on the old system, copied over to the new system, and used for initial test
of each program. The test file offers the following:
• Predictable results
User Training
• User capabilities
The user may range from naïve to sophisticated users .Naïve users have fear
towards exposure to new system. Therefore formal user training is required with
some training aids like:
• User manual
• User-friendly screen
• Data dictionary
49
• Proper flow of system
8.CONCLUSION
50
BIBLIOGRAPHY AND REFERENCES
Books
Websites
• www.php.net
• www.hotscripts.com
• www.zend.com/php5
• www.w3schools.com
• www.dynamicdrive.com
ANNEXURE
51
Screen Interfaces:
52