Académique Documents
Professionnel Documents
Culture Documents
Degree of Bachelor of Technology (Mody Institute of Technology and Science, Lakshmangarh) in Computer Science and Engineering/ Information Technology
Submitted by
Parul Jain 080457 1
November 2011 Mody Institute of Technology and Science ( a Deemed University Under Section 3 of the UGC Act 1956)
Mody Institute of Technology & Science (a Deemed University Under Section 3 of the UGC Act 1956)
( and Technology
Lakshmangarh 332311, Distt. Sikar (Rajasthan) Phones: (01573) 225001 to 225012 (12 lines) Fax: (01573) 225042
CERTIFICATE 2
This is to certify that Ms. Parul Jain, Ms. Anshika Gupta are students of B.Tech. VII semester and have submitted their project entitled Web Complier under my guidance.
Guide
Project Approval
The Project entitled Web Compiler by Ms. Parul Jain and Ms. Anshika Gupta is approved in partial fulfillment of the requirement of the Degree of Bachelor of Technology of the MITS University.
HOD
Examiner (Internal)
Examiner (External)
ACKNOWLEDGEMENT
It is our profound privilege to express our deep sense of gratitude towards our institute Mody Institute of Technology and Science, Lakshmangarh.
We would also like to thank honorable Vice Chancellor Prof.(Dr.) N.V.Subba Reddy , Dr. P.K.Das, Dean FET, Dr. A.K.Sharma, HOD CSE/IT and Mr. Ajay Kumar, project coordinator for their encouragement and appreciation.
We wish to extend our gratitude in all sincerity to Mr. Niranjan Lal our project guide who gave us an opportunity to work under his guidance. He has been a source of inspiration and without his guidance the project would not have been successful. We would also like to thank all other faculty members who provided us help and support regarding the project.
At last, we are also thankful to our Lab technician and friends who helped us with whole heartedness during the development of our project.
Akshara Singhal (080402) Gargi Tripathi ( 080420) Aditi Singh (080624) CS&E (4th year)
This company was promoted by a band of young professionals with excellent experience and expertise in the field of Information Technology and Management. This group has been in the IT business for over a decade with the main thrust being Software Training and Event Management.
V SUPPORT was started with an aim of producing high quality software solutions for the Global markets. The company is committed to update its knowledge base and technical infrastructure to effectively meet the demands and challenges of its clients so that they may keep abreast with the technology revolution changing the global scenario. The bedrock credo of the management is ethically principled longterm relationship with clients, business Partners, resellers and employee force.
V SUPPORT has the advantage of guidance by highly reputed professional management and technical consultants in all its operations. The company enjoys the collaboration and alliance of international companies to provide hi-tech solutions to its clientele, which is a remarkable testimonial of its business competency and acumen.
The system development life cycle is the process, involving multiple stages (from establishing the feasibility to carrying out post implementation reviews), used to convert a management need into an application system, which is custom-developed or purchased or is a combination of both.
1. The existing system is evaluated. Deficiencies are identified. This can be done by interviewing users of the system and consulting with support personnel. 2. The new system requirements are defined. In particular, the deficiencies in the existing system must be addressed with specific proposals for improvement. 3. The proposed system is designed. Plans are laid out concerning the physical construction, hardware, operating systems, programming, communications, and security issues. 4. The new system is developed. The new components and programs must be obtained and installed. Users of the system must be trained in its use, and all aspects of performance must be tested. If necessary, adjustments must be made at this stage. 5. The system is put into use. This can be done in various ways. The new system can phased in, according to application or location, and the old system gradually replaced. In some cases, it may be more cost-effective to shut down the old system and implement the new system all at once.
6.
exhaustively evaluated. Maintenance must be kept up rigorously at all times. Users of the system should be kept up-to-date concerning the latest modifications and procedures.
The
SDLC
for
an
application
system
would
depend
on
the
chosen
acquisition/development mode. Application systems could be acquired/developed through various modes, which include:
y y
Custom development using internal resources Custom development using fully or partly outsourced resources located onsite or offsite (locally or in an offshore location)
y y
Vendor software packages implemented as-is with no customisation Vendor software packages customised to meet the specific requirements
Some organisations use specific SDLC methodologies and processes, either custom- or vendor-developed. These generally prescribe standard processes for different modes of acquisition with the facility to customise the process design for specific application systems. These may be supported by appropriate tools to manage the SDLC. In such cases, the SDLC would depend on the methodology/tool.
The Method that has been used widely to develop the projects is the most acceptable and flexible cycle called WATERFALL CHART method. In this method the developed products cascade from one level to the next in smooth progression. This 9
method involves project planning, which shows what type of life cycle method to be used, the organizational structure for the project, the preliminary cost and resource estimates, staffing requirements, tools and techniques and standard practices to be followed.
The phased model or waterfall chart is valid model of the development process in situation where it is possible to write reasonably complete set of specification for the software product at the beginning of the life cycle.
The phase used in waterfall method in this project is shown diagrammatically below. System Analysis
System Requirement
System Design
Coding
Testing
Acceptance
10
11
2. PROJECT DESCRIPTION
CRM (CUSTOMER RELATIONALSHIP MANAGEMENT) is System Software for small business in the market. The CRM is an integration of sales,
production, marketing with the customer to empower them with their capacities being actually made to quicken the operational level duties performed by all. Integration between various operation levels of the company will make each level immensely responsible for the development of the company and will enhance the importance of that level for the company. An efficient CRM cannot be defined without taking in account of the customers views. The customer and his view must be the driving force for the whole system and inspirational aspect for any companys development. The communication between the client and the company must be the two way communication, which forms the basis of any CRM.
CRM software comes packaged with every thing users business needs to create a dynamic customer relationship management system. The customers will be delighted with the support they get from the software. The administrator will notice the
difference that sales management task makes in freeing up their time. CRM concepts applied for sales and marketing for company product, customer service provided and feedback of the valued customer received being on important asset in the companys development. CRM designed to facilitate interaction between the clients and the
company, which is promoting many products for business. This process is involves various modules like Login Administrator Transaction Search Engine
12
Login module contains two sub modules Administrator Login User Login Administrator module contains four sub modules Product Information Customer Information User module contains four modules: TRANSACTION SEARCH ENGINE Each Module has been contains Sub Module. TRANSACTION MODULE Enquiry Entry. Booking Entry. Feedback Entry. SEARCH ENGINE MODULE Product Search. Customer Info Search.
13
2.1.2 Booking Entry This page displays about product booking details, so the any customer can easily book the products from the Internet it gives information about, Booking id Customer name Customer email-id Product id Product name Product price Purchase date Delivery 14
By seeing this information the customer can book the products in that he wants. No others fields are kept empty otherwise it will prompt for error and gives the alert message, after entering all the fields it first checks for Booking no if any other fields are invalid it will give an alert message and it wont allow to proceed further if all the information are valid then it adds the records to the database. If there are any modifications, then user can then modify the records.
2.1.3 Feedback Entry: This page provides information about feedback details so the customer can give his suggestion to the company. Enquiry no Customer name Customer email-id Date Suggestion By providing this information the customer can write his feedback to the company. No others fields are kept empty otherwise it will prompt for error and gives the alert message, after entering all the fields it first checks for Enquiry no, if any other fields are invalid it will give an alert message and it wont allow to proceed further, if all the information are valid then it adds the records to the database. If there are any modifications, then user can then modify the records.
15
2.2.2 Customer Info Search Entry: This page give information about customer details, so by giving this details the company can look over individual customer address and other details. By giving the customer name it first checks the given name and lists the available information as Customer Name Customer Email-id Customer Address Customer Phone no Product Purchased Purchase Date
So by seeing the customer name it searches and displays the individual customer information. 16
17
3 SOFTWARE DESCRIPTION
3.1 WINDOWS XP
Windows XP is a popular Operating System produced by Microsoft. It supports has lot of external drivers that supports lot of hardware's. It has high graphics support tools.
Windows XP itself contains IIS software, which is required to install the Visual Studio.NET in a computer.
3.2.1 What is ASP.Net? ASP.NET is a programming framework built on the common language runtime that can be used on a server to build powerful web applications. ASP.NET offers several important advantages over previous web development models:
Enhanced performance ASP.NET is compiled common language runtime code running on the sever. Unlike its interpreted predecessors, ASP.NET can early binding, Just in time compilation, native optimization and catching service right out of the box. This amounts to dramatically better performance before you ever writer a line of code.
3.2.2 Word-Class Tool Support: The ASP.NET framework is complement by a rich toolbox and designer in the Visual Studio integrated development environment. WYSIWYG editing, drag-and-drop server
18
controls and automatic development are just a few of the features this powerful tool provides.
3.2.3 Power and Flexibility: Because ASP.NET is based on the common language runtime, the power and flexible of the entire platform is available to web application developers. The .Net Framework class library, Messaging and Data Access solutions are all seamlessly accessible from the web. ASP.NET is also language-independent, so you can choose the language that best applies to your application or partition your application across many language. Further, common language runtime interoperability guarantees that you existing investment in COM-based development is preserved when migration to ASP.NET.
3.2.4 Simplicity: ASP.NET makes it easy to perform common tasks from simple form submission client authentication to deployment and site configuration. For example, the ASP.NET page framework allows you to build user interfaces that cleanly separate application logic from presentation code and to handle evens in a simple, visual basic like forms processing model. Additionally, the common language runtime simplifiers
development, with managed code services such as automatic reference counting and garbage collection.
3.2.5 Manageability: ASP.NET employs a text-based, hierarchical configuration system, which simplifies applying settings to your server environment and web application. Because configuration information is stored as plain text, new settings may be applied without the aid of local administration tools. This Zero local administration philosophy extends to deploying ASP.NET Framework application as well. An ASP.NET Framework application is deployed to server simply by copying the necessary files to the server. No server restart is deployed to as server simply by copying the necessary 19
files to the server. No server restart is required, even to deploy or replace running compiled code.
3.2.6 Scalability and Availability: ASP.NET has been designed with scalability in mind, with features specifically tailored to improve performance in clustered and Multiprocessor environments. Further, processes are closely monitored and managed by the ASP.NET runtime, so that if one misbehaves (leaks, deadlocks), a new process can be created in its place, which helps keep your application constantly available to handle requests.
3.2.7 Customizability and Extensibility: ASP.NET delivers a well factored architecture that allows developers to plug-in their code at the appropriate level. Infect, it is possible to extend or replace any subcomponent. Implementing custom authentication or state services has never been easier. Security, with built in windows authentication and per-application configuration, you can be assured that your application are secure. 3.2.8 FEATURES: ASP.Nets features for enhancing web page development combined with the .Net frameworks support for web services, make it the perfect tool for building web services:
i.
The code behind model separates HTML (the presentation layer) from program logic (server side code). This eliminates the dangerous practice of writing spaghetti code that is prone to error.
ii.
An even driven program model allows you to write your events and create handlers for them.
iii.
Server controls automatically render HTML appropriate for any client browser.
iv.
v. vi.
Code is compiled, thereby enhancing performance. Application logic can be written in any CLS-compliant programming Language, such as Visual Basic .Net, Managed C++ .NET, or C# .NET.
vii.
Web form development is simplified by using Visual Basic .NET as a RAD tool.
The Framework supports web services and web forms through namespaces that host classes, such as System.Web.Ui and System.Web.Ui.WebControls. The
System.Web.UI namespaces contains classes and interfaces that allows us to create controls and pages that appear in your web applications us user interfaces on a web page. A major advantage offered by ASP.NET is running the controls on the server rather than on the client so you programmatically control then at runtime.
3.2.9 System.Web.Ui Namespace The System.Web.UI namespaces hosts the classes and interfaces especially designed for rendering elements on web form. You can view al classes in the System.Web.UI namespaces as a hierarchical tree beginning with the control class. This is the mother of all controls. Buttons, text boxes, dropdown list boxes and so on derive from the control class. It encapsulates both functionality and user interface properties for all member controls residing in this namespace. Class properties include controls, context, parent, site, unique ID. A collection of classes, interfaces, enumerations and delegates makes up the namespace and are essential for developers to understand so that they can take full advantage of ASP.NET.
3.2.10 Delegates The final item in the System.Web.UI namespaces, delegates contains one item. It describes the method that handles any events raised when a user clicks on an image based ASP.NET server control. Also a delegate is referenced type that encapsulates a method that contains a specific signature and return type. 21
ASP.NET pages begin as code in a text file with an .aspx extension. They lie within Internet Information Services(IIS) virtual directory located somewhere on your LAN or on a remote server. Pages are instantiation classes derived from the parent page class. For example, you can write your code using any text editor such as Notepad or preferably, Visual Studio.NET, the text file becomes a valid ASP.NET page only when a client sends a request to the server to render the pate to the client browser.
The page compiles to a class. It is created at runtime as a page object and is subsequently cached in memory. It naturally follows that the page object serves as a naming container for all server controls implementing the naming container interface.
ASP.NET functionally lies primarily with the page class. Every page derives from the page class, thereby inheriting all the methods and properties the page class exposes. The following list describes several members of this class.
i.
The ASP objects such as Application, Session, Request, Response, Server and context are implemented in ASP.NET as class instances, which are exposed as properties of a specified page.
ii.
The controls collection provides access to the set of controls defined for a specific page. With this collection, you can add or alter controls.
iii.
The IsPostBack property is used to determine whether the current request is a GET request or a POST request.
iv. v.
The user property provides information about the logged in user. The cache property enables access the ASP.NET cache engine. You can see this property to allow data to be cache for later retrieval.
vi.
The find control property allows you to locate a control in the controls collection specifying the ID attribute property. 22
vii.
The view state property allows you to store a pages in a hidden from fiels (key value pair) between client requests.
viii.
The clear child view state property allows you to delete view state information for any child controls residing on a page.
Each ASP.NET page contains a server side <form> tag. These tags direct the page to post back to it when a client submits the form. The form type events include Load, Draw, Render and Unload.
ASP.NET controls
selecting a specified item from a dropdown list, thereby causing PostBack to the server. The ASP.NET runtime also renders a hidden from field to the page and allows it ti preserve its state between client requests. Because ASP.NET is event driven, client and page interaction allows the pate to be reconstructed on the server. It also permits code execution in response to events raised by users and any changes occurring in the hidden fields.
The initials event begins with an HTTP URL client request for rendering a specific page to a clients browser. The load event fires next. Here is where the CLR uses reflection to examine the .aspx page through user interaction with a button or some other page control. If the event is a first time request, the code is converted to a class. Subsequently, the class compiles to an assembly and is stored in a valid internet information server virtual directory where the page can be located. ASP.NET restores any data residing in hidden fields and passes the information to the server. The control event triggering the post back then fires. At this point, all control events are initiated.
The changes events fire first; those events are stored in the browser and execute only when the client sends the page back to the server. After a control event fires the pate is rendered to the browser.
23
Before page Unload() unloads the page from server memory, a final event performs any cleanup tasks before the unload method dispose of the page. ASP.NET has added numerous directives for controlling page behavior, page configuration, and many other tasks. Following table presents a partial list of new directives included with ASP.NET.
24
25
4.1.1 INPUT DESIGN: Input design is the part of the overall system design. The main goal of the design is to achieve easy data entry flawless. The input screen users options for selecting the values from the drop down combo boxes and list boxes to prevent typographic errors.
Validations are done for each and every data entered in the screen for data accuracy. The screens are designed in such a way that no necessary data are omitted. There are several validations involved during the data entry. The inputs to the system have been designed effectively in such a way the manual forms and the inputs are coordinated where the data elements are common to the source document and to the input.
4.1.2 OBJECTIVES OF INPUT DESIGN: The quality of system input determines the quality of the system output. Input
specifications describe the manner in which data enter the system processing. Input design features can ensure the reliability of the system and produce results from accurate data or they can result in the production of erroneous information. The input design also determines whether the user can interact efficiently with the system.
Five objectives guiding the design of the input focuses on: Effectiveness Accuracy Easy to use 26
Consistency Attractiveness 4.1.3 CODE DESIGN: A code is an ordered collection of symbolic designed to provide unique identification of an entity or attribute. The main purpose of the code is to facilitate the identification and retrieval of the information, to simplify and to achieve coding. A variable name should be chosen in such manner that its Scope, data type and reflects could be easily and clearly understood. 4.1.4 OUTPUT DESIGN: Outputs are the direct source of information to the user. They provide a consolidated and permanent copy of records, which helps in decision-making. Output is information delivered to users through the information system. Without quality output, the entire system may appear to be unnecessary that users will avoid using it. Users generally merit the systems analyst works closely with the user through interactive process, until the result is considered to be satisfactory. Therefore, an effective output design is an important feature of design specification. In the report layout, the important items are highlighted so that they are easier to find. 4.1.5 OBJECTIVES OF OUTPUT DESIGN: Since useful output is essential for gaining use and acceptance of the system, the system analyst should try and follow the following objectives, which are useful for designing acceptable outputs. Design output to serve the intended purpose Design output to fit the user Deliver the appropriate quantity of output Assure that output is where it is needed Provide output on time Chose the right output method 27
HOME PAGE
ADMIN_LOGIN PAGE
USER_LOGIN PAGE
ADMINISTRATOR
TRANACTION ENTRY
ENQUIRY ENTRY BOOKING ENTRY FEEDBACK ENTRY
SEARCH MODULE
PRODUCT INFO SEARCH
28
HOME PAGE
ADMIN_LOGIN
USER_LOGIN
Admin_Login
USER LOGIN
USER_LOGIN
29
Registation Module
NEW_USER
Registation Module
ADMIN_LOGIN
ADMINISTRATOR
ENTRY
LogOut
Product details
30
ADMINISTATOR ENTRY
CUSTOMER DETAILS
Customer_details
ADMINISTATOR ENTRY
PRODUCT DETAILS
Product_details
31
Enquiry Entry
Booking Entry
USER_LOGIN
TRANSACTOR ENTRY
LogOut
Feedback Entry
TRANSACTION ENTRY
ENQUIRY DETAILS
ENQUIRY_ ENTRY
32
TRANSACTION ENTRY
BOOKING DETAILS
BOOKING_ENTRY
TRANSACTION ENTRY
FEEDBACK DETAILS
FEEDBACK_ ENTRY
33
USER_LOGIN
SEARCH REPORT
34
SEARCH REPORT
PRODUCT SEARCH
Produt_details
CUST_INFO SEARCH
Cust_details
35
(DBMS). A database system merge data into one pool shared by all systems so that any change automatically affects all relevant systems.
4.4.1 ADVANTAGES OF DATABASE: 1. File Consolidation: Pooling data reduces redundancy and inconsistency and promotes cooperation among different users. Since databases link records together logically, a data change in one system will cascade through all other system using the data.
2. Program and File Independence: This feature separates the definition of the files from their programs, allowing a programmer to concentrate on the logic of the program instead of precisely how to store and retrieve data.
3. Access Versatility: Users can retrieve data in many ways. They enjoy the best of both worlds-sequential access for reporting data in a prescribed order and random access for rapid retrieval of a specific record.
4. Data Security: Usually a DBMS includes a password system that controls access to sensitive data. By limiting their access to read-only, write-only, or specified records, or even fields in records, passwords can prevent certain users from retrieving unauthorized data. 36
5. Program Development: Programmers must use standard names for data items rather than invent their own from program to program. This allows the programmer to focus on desired function.
7. Special Information: Special-purpose report generators can produce reports with minimum effort.
4.4.2 OBJECTIVES OF DATABASE DESIGN: Eliminate redundant data as much as possible Integrate existing data files Share data among all users Incorporate changes easily and quickly Simplify the use of data files Lower the cost of storing and retrieving data Improve accuracy and consistency Provide data security from unauthorized use Exercise central control over standards 4.4.3 Logical and Physical View of Data: In database design, several views of data must be considered along with the persons who use them. The logical view is what the data look like. Regardless of how they are stored. The physical view is the way data exist in physical storage. It deals with how data are stored, accessed, or related to other data in storage. There are four views of data out of which three are logical and one is physical. The logical views are the users view, the programmers view and the overall logical view, called a schema.
37
Schema: Schema is a description of the data structure, which is separate from the data itself. The schema describes the areas, their identifiers and page sizes, and indicates how these are related to the records and sets. Schema is the view of the data, the overall logical data structure that is held by DBMS. Each time a program requires data, the DBMS will look up in the schema for the details of the structure of the data requested. Sub-Schema: In a database system, it is not always possible to allow programmers to write the data division of their choice for reasons of security or control. It is more useful to provide the programmer with a standard description of the logical data to be used in a particular application. All references to data within the program will be for this description, which is called a Subschema and is similar to the Schema in structure. The DBMS has the job of matching data requests on a subschema and data requests based on the schema.
38
ADMIN-LOGIN TABLE TABLE 4.5.1 : ADMIN_ID FIELD Admin_Id Password DATA TYPE Text Text DESCRIPTION ADMINISTATOR ID PASSWORD
USER-LOGIN- TABLE TABLE 4.5.2 : New_User FIELD Cust_Id Name Address Email_Id Phone Password DATATYPE NUMBER(6) TEXT (30) TEXT(50) TEXT(30) NUMBER(25) TEXT(10) PRIMARY KEY Y DESCRIPTION CUSTOMER ID CUSTOMER NAME CUSTOMER ADDRESS CUSTOMER EMAILID CUSTOMER PHONE NUMBER PASSWORD
39
FIELD PRODUCT CODE PRODUCT MODEL PRODUCT NAME PRODUCT PRICE QUANTITY PRODUCT COLOR AVAILABILTY
PRIMARY KEY Y
DESCRIPTION PRODUCT CODE PRODUCT MODEL PRODUCT NAME PRODUCT PRICE QUANTITY PRODUCT COLOR AVAILABILTY
TABLE 4.5.4 : CUSTOMERDETAIL FIELD Cust_Id Cust_Name Cust_EmailId Cust_Address Post DOB NOD PhoneNumber DATA TYPE TEXT(10) TEXT(30) TEXT(30) TEXT(50) NUMBER(10) TEXT(25) TEXT(30) NUMBER(25) PRIMARY KEY Y DESCRIPTION CUSTOMER ID NO CUSTOMER NAME CUSTOMER EMAILID CUSTOMER ADDRESS POST DATE OF BIRTH NAME OF DISTRICT PHONENUMBER
40
TRANSACTION TABLE TABLE 4.5.5 : ENQUIRYENTRY FIELD ENQUIRYNO CUSTOMERNAME CUSTOMEREMAILID ENQUIRYDATE DESCRIPTION DATA TYPE NUMBER(10) TEXT(50) TEXT(50) TEXT(25) TEXT(50) PRIMARY KEY Y DESCRIPTION ENQUIRY NO CUSTOMER NAME CUSTOMER EMAIL-ID ENQUIRY DATE DESCRIPTION
TABLE 4.5.6 : BOOKINGENTRY FIELD BOOKINGID CUSTOMERNAME CUSTOMEREMAILID PRODUCTID PRODUCTNAME PRODUCTPRICE PURCHASEDATE CREDIT CASH DELIVERY DATA TYPE NUMBER(15) TEXT (20) TEXT (20) NUMBER(10) TEXT (20) NUMBER(15) TEXT (20) TEXT (5) TEXT (5) TEXT (20) PRIMARY KEY Y DESCRIPTION BOOKINGID CUSTOMER NAME CUSTOMER EMAILID PRODUCT ID PRODUCT NAME PRODUCT PRICE PURCHASE DATE CREDIT CASH DELIVERY
41
TABLE 4.5.7 : FEEDBACKENTRY FIELD ENQUIRYNO CUSTOMERNAME CUSTOMEREMAIL-ID DATE SUGGESTION DATATYPE NUMBER(10) TEXT (50) TEXT (30) TEXT (30) TEXT (30) PRIMARY KEY DESCRIPTION ENQUIRY NO CUSTOMER NAME CUSTOMER EMAIL-ID FEEDBACK DATE CUSTOMERS SUGGESTION
42
43
5. SYSTEM TESTING
The system was tested using the following strategies: 5.1 UNIT TESTING: Each of the modules developed where tested independently. The following were
considered during the unit test the module interface is tested to ensure the information properly flows in an out of the unit under test. The local data structure is examined to ensure that data stored temporarily maintains integrity throughout the unit lifetime. Boundary conditions are tested. All independent paths through the control structure are exercised to ensure that all statements in the module have been executed atlases once all error-handling paths are tested.
5.2 INTEGRATION TESTING: Integration testing was done to verify the co-existence of the modules and forms involved. Bottom-up integration testing strategy was used for this purpose. After unit testing of each of the modules they are integrated from the bottom up by communicating each of the units into clusters. Dummy driver modules are added to simulate the upper level modules and these clusters were tested.
Finally when all of the modules were developed and integrated they were tested with the live data supplied by the user.
What to do we test for the first test of the system is whether it is producing the correct output? No other test can be more crucial; following this is a variety of other tests are conducted to verify different objectives.
5.3 Volume Testing: This is made to check whether the hardware and software are functioning correctly when a large amount of data is supplied. The user is called to provide test data for volume testing. 44
5.4 Stress Testing: The purpose of stress testing is proving that the system does nap malfunction under peak loads. Unlike volume testing, where time is not a factor we subject the system to a high volume of the data over a short period of time.
5.5 Recovery Testing: A forced system failure is induced to test the back up recovery procedure accurate data are entered to see how the system responds in time of enter deduction and protection.
5.6 Usability Documentation: This is to verify the user friendliness nature of the system. Normal operating and error handling procedures are related to this for example one aspect of user friendliness is accurate and complete documentation.
5.7 The nature of the Test Data: There are two very different sources of test data, live and artificial, both have distinct advantages for the tester.
Live test data are those that are actually entreated from organization files. It is difficult to obtain live data in sufficient amount to conduct intensive testing. Hence such data generally will not test all the combinations or formats that can enter the system.
The artificial data, which can be quickly prepared by a data generating utility program in the information system make possible the testing of all login and control path through the program. Hence the proper choice of test data is as important as the test itself.
45
46
6. CONCLUSION
Project is the mirror that reflects my abilities, skill, and knowledge. This Computerized CUSTOMER RELATIONSHIP MANAGEMENT has been developed for V Support Pvt Limited. The design and testing of the system is successfully done and testing in to account all the requirements laid down by the company
The system developed in Asp.Net and Ms-Access 2003 is user-friendly offering a wide range of choice. The entire input screen in this software is made simple. So that even a layman can feed data into it. This software also provides option for further enhancement if needed in this ever- changing environment.
47
48
7. BIBLIOGRAPHY
NET FRAMEWORK ESSENTIALS Thuan Thai and Hoang Lam, Oreilly Publishing, Wrox Press., SPECIAL EDITION USING MICROSOFT SQL SERVER 2000 Mark Spenik and Orryan sledge, Macmillan Computer Publishing, Sams Teach Yourself Microsoft Access 2000 Wordware Publishing, Julitta Korol ASP.NET 1.1 with VB.NET2003 Chris Ullman, Johnkauffman, Chris Hart, David Sussman
WEBSITES:
www.asp.net.com www.aspemail.com www.asp.net
49
50
HOME PAGE
51
52
ADMINISTRATOR ENTRY
53
CUSTOMER DETAILS
54
USER LOGIN
55
56
USER ENTRY
ENQUIRY ENTRY
57
TRANSACTION
58
ENQUIRY ENTRY
59
BOOKING ENTRY
60
FEEDBACK ENTRY
61
62
63
64