123
C OMPANY PROFILE The Metric Soft is a true 21st century company offering superior services from a global staff of 117, dedicated to making every client and every project our top priority. From our humble beginnings as an IT consulting firm we have always maintained our staff as our greatest feature. For us a project is not only measured by end results, but also by the relationship created along the way. We make each project our own, not only keeping landmarks but also gaining a greater understanding of our clients during the course of the journey. How we work is as important to us as what we accomplish. From our site project managers to our satellite office logistics personnel, our people are the very heart of our enterprise. While many firms offer a transitional staff assembled on a per-project basis, we maintain a substantial list of employees and long-term contractor relationships enabling us to guarantee a higher degree of excellence and competence for our clients. All of this means that The Metric Soft has the talent, support and resolves to make even the most unusual project into a viable success. 1

Job Site Documentation 32(Ank)

Embed Size (px)

Citation preview

C OMPANY PROFILE

The Metric Soft is a true 21st century company

offering superior services from a global staff of 117, dedicated to making every client

and every project our top priority. From our humble beginnings as an IT consulting

firm we have always maintained our staff as our greatest feature.

For us a project is not only measured by end results, but also by the relationship

created along the way. We make each project our own, not only keeping landmarks

but also gaining a greater understanding of our clients during the course of the

journey. How we work is as important to us as what we accomplish. From our site

project managers to our satellite office logistics personnel, our people are the very

heart of our enterprise. While many firms offer a transitional staff assembled on a

per-project basis, we maintain a substantial list of employees and long-term

contractor relationships enabling us to guarantee a higher degree of excellence and

competence for our clients. All of this means that The Metric Soft has the talent,

support and resolves to make even the most unusual project into a viable success.

The Metric Soft began business in 1996 as an Information Technology Outsourcing (ITO) services provider.

SERVICES OVERVIEW:

The right combination of expertise, affordability, responsiveness and quality.

The Metric soft solutions reflect outsourcing at it best.

METRIC SOFT ADVANTAGE:

From day one, Metric Soft greatest advantage has been our “beyond possible”

philosophy. It's an approach that drives everything we do.

1

RESEARCH & DEVELOPMENT:

Metric Soft has the expertise and experience in managing extended teams with

highly complex research groups.

1. Increasing Business Value

2. Reliable Global Partner

Increasing Business Values:

The Metric Soft is an established IT consulting and services company offering a wide

range of Software solutions that help deliver superior business value. We

conceptualize and develop industry-specific technology solutions that are tailored to

our customers’ requirements. We have successfully undertaken and completed IT

engagements for global corporations including Fortune 500 companies in 58

countries.

We help our customers remain competitive by providing cost-effective and

customized solutions in application development and maintenance, enterprise

resource planning SAP and Oracle. Our domain expertise in focus areas including

BFSI, Telecom, Manufacturing, ISVs and International Organizations enables us to

offer business relevant

Solutions. Complementing this domain expertise is our focus on quality. We are

committed to providing consistently high quality delivery.

Reliable Global Partner

 Proven Track Record

 Focus on Customer Relationships

 Flexible Engagement Models

 Seasoned Team

2

 Established Software Processes

 Knowledge Building

SERVICES:

SAP IMPLEMENTETION SERVICES:

Software development and integration are central to most information systems

projects. We specialize in consulting services for any software development life

cycle environment. Our consultant's focus is on delivering effective software systems

to businesses that are committed to any designing and developing tools. We will

also provide support for the end users of the software. Millennium offers a complete

line of object-oriented development services and technology advantages for

windows-centric solutions including project management, development, testing and

software support. We take care of the development process right from Problem

definition through testing to implementation and support.

We will envision your new ideas to a quality business solution. Our software

development strategy has helped our clients achieve higher ROI, lower maintenance

cost and greater competitiveness in business.

APPLICATION MANAGEMENT:

We will partner with your Information Technology division to ensure all your

application maintenance needs are met. We will work with you as an extension of

your division and we have the high quality process and the expertise to take the

challenge and responsibility of maintaining your existing portfolio.

DATABASE DEVELOPMENT:

Stores of data and information can be the most important assets of an enterprise.

Our highly skilled professionals have extensive experiences in system design and

3

development using SQL Server, Sybase, DB2, Oracle, and Informix. We increase

the value of large-scale databases through our expertise in data modeling, database

and data warehouse design and implementation, and database administration.

We undertake software projects as a fully managed end-to-end service and

deliver them within schedules and budgets agreed upon with the client. The

application development services provided by us span the entire project life cycle

from requirements analysis, design, development, testing, integration, delivery, and

implementation to after-sales support.

We offer the complete suite of traditional SAP implementation /services for SAP R3

and my SAP

Business Suite solutions including:

Business Blueprint

Implementation

Configuration

Integration

Ongoing Support

Project Management

Rapid SAP Implementation:

Fast implementations of SAP All In One with industry templates and minimal

customization and integration.

Rapid Enterprise Portal:

Fixed price, fixed scope SAP Enterprise portal deployments including role definition,

directory integration, employee Self-service functions and views.

SAP Upgrades:

For customers considering SAP upgrades to Enterprise or other dictions.

4

SAP Support on Demand:

Zero entry cost SAP functional and technical support services, delivered via our

technical experts.

SAP TOTAL SUPPORT:

Full application life cycle management services, backed by contracted Service Level

Agreements (SLAs).

SAP Archiving:

Clean up your SAP database with our Archiving services to deliver vastly improved

performance.

SAP Hosting:

Infrastructure management for demanding 24x7 mission-critical SAP systems.

EMBEDED System Information

Embedded System:

A Special-purpose System in Which the Computer Is Completely encapsulated by

the Device It Controls.

Embedding:

One Instance Of Some Mathematical Object Contained Within Another Instance.

Distributed Generation:

Also Known As Embedded enervation Or Decentralized Generation.

CLIENTS:

Panasonic

Fidelity

Pratt & Whitney

Nike

5

Walmart

Pfizer

Alcon Laboratories, Inc.

Apex Foot Health Industries, Inc.

Barco View

LLC Cybernet Systems Corp.

Everest & Jennings

Mexico Hyperbaric Technologies, Inc.

Monroe, Inc.

Postin Technologies, Inc.

Fukuda Denshi Co., Ltd.

Silgreen Inc.

IBC Asia Ltd.

Oriental System Technology Inc.

Wilson Glove Co.

6

7

ABSTRACT

What contribution would the Project make: -

The project would help in effective and systematic record keeping that is storing and

retrieving of useful data. Project will be able to give the report so that management

can make decisions on the basis of those reports.

Scope of the study: -

The main Scope of study: -

1. It should contain all the information of Company and Vacancy which is

registered in this site.

2. It should contain all the information of Job Seeker like Personal Detail,

Professional Detail, and Educational Detail etc.

3. It should process and evaluate jobs registered by companies.

4. It should contain information related to Job expiry or re registration.

5. It should inform both Job Seeker and Job Provider when the appropriate

person is found for a job.

8

6. It should maintain proper financial records.

7. It should have Administrator for scheduling administrative work of site.

Objective of the project:

Computerized on Line Job Search System is developed to facilitate the

General administration system to manage the various information of the Job Seeker

and Job Provider and the processes involved in a placement company. So, that

organization can access accurate information quickly and easily as and when

required, thereby improving its operational efficiency & effectiveness

In today’s competitive environment, where

Everybody wants to be on the top, Information plays very crucial role. As fast as

information is accessed and processed, it can give good results. Today Internet is

the fast way of transferring Data and Information over wide area, hence I have used

internet as a way for exchanging information.

Computerized system helps to fulfill these goals. Computerization of the official

works will help in doing lot of manual work quickly. It will help in easy storage and

access of all information, in short period of time.

Specific Objective of the site :

Objective of doing this project is to enhance my knowledge in the field of E-com

technology using java (j2ee) as a language. Some of the client requirement and

objectives of this site is as under:-

To increase the business of Client.

To make it Global.

To facilitate job search.

To facilitate company so that it can search for best candidates available.

To help candidates to fetch a right job.

To act as a middle men connecting Job seeker and Provider

User can search for different options available.

User can do on-line resume posting etc.

9

User can use search engine to look for different vacancies, facilities available

etc.

User can do apply for job on-line.

User can download different forms etc.

So these are some of the objectives which we have to accomplish.

Features of the site:

It has the features of providing all the information online (through the net). About the

Vacancy and About the Job seeker.

The Job site is a special purpose web site as discussed above it is not a

Portal.

The site includes the search engine and advance search engine which gives

the user easy way to find the Vacancy and eligible candidate for a post.

The site also includes the electronic mail facility for the users who have

registered themselves.

The site acts as a middle-ware for the Job Seeker and Job Provider.

The site has the facility to inform the Seeker and Company about the job and candidate.

10

11

Modules of project:

The project can be divided in to four main modules.

Registration module

Job Seeker Administration section

Job Provider Administration section

Test your skills

Module 1:

Registration module, which is further sub-divided into:-

Job Seeker Registration.

Job Provider Registration.

Change Password Job Seeker.

Change Password Job Provider.

Forget Password Job Seeker.

Forget Password Job Provider.

Login for both Job Seeker and Job Provider.

Module 2:

12

Job Seeker Administration section, which is further sub-divided into -

Resume Registration under Vacancy Category.

Resume Updating

Search for Job according to his skill set.

Expert Guidance.

Application Status.

Module 3:

Job Provider Administration section, which is further sub-divided into four sub-

sections: -

Register Vacancy.

Update Vacancy.

Search for eligible candidate.

Check Job Status.

Module 4:

Check skills section which is further sub-divided into two sub-sections: -

Beginners

Intermediate

Expert

Site Working :-

13

Case A Job Seeker Administration:-

Job Seeker has to register him self with the site.

This is a free site for Job Seeker.

After success full Log in Job Seeker can register his resume.

Job Seeker Register his Bio Data in a particular Vacancy Category.

He can also update his resume.

He can search for Vacancy according to his skill set and can apply for a job.

He can check his Job Status i.e. from where does he get a response.

Case B Job Provider Administration:-

Company has to register it self.

After success full Login Company can register Vacancy.

Registration for Vacancy will generate Vacancy Id.

Company can update a Vacancy.

Company can search for skill full candidate to fill up Job.

14

15

Existing System

When the requirement of this system is putted before the team they was willing to

know that how the employee of the company is working. Then the study is done it

gives the result that all the work is done manually and there is nothing that help the

employee to save the time and do the work with the system. All the documentation is

done by the employee of the company. A lot of works have to be done before the

candidates are placed in an organization.

All that the company needs to store about the job seekers must be written on the

paper. Some times it is very difficult to know about some special highlights of the job

seeker, because the information is stored on the paper and it is not clear that due to

human error or by some other means this paper is lost and the information is now

not in the hands of the company.

At the time of hiring the companies policy says that the only those companies can

hire who are registered with SEEKJOB. So it is critical task to find out the registered

employer, when the company has so many employers.

There is extra requirement of employee who have to check that the

requesting person is an registered employer. This seams a critical task

LimitationsThe current system have all the problems which generally in count in the manual

system such as wastage of time, wastage of money, more efforts to work etc. if the

16

responsible person wants the full information of the total sale of various models of

the vehicles at various center at the evening then he/she can not get it. Because the

current system work manually and it is very slow same as if he/she wants the total

production then it take time. The current system can not give the fast response as

needed. It also does not keep records of grievances of the faults in the vehicles in

various parts of the country. If he/she wants the information regarding the total stock

at various warehouses at his\her office then using current system he\she can not get

it.

He\she can not get the full information on time. It may be late and this process is

time consuming and generally the administrators receive the relevant information

next day which is the major limitation of existing system.

Proposed system:

This site is an attempt to make the task of administrator as well as jobseekers

easier. This project ensures the consistency by enabling the jobseekers to register

themselves and to find the desired information of jobs, get them involved with the

jobsite and can access the different services provided by the jobsite.

The administrator has the right to know everything. He has the right to know the

details of the jobseekers, has the right to change any service that the jobsite is

currently providing or can add services which are not being provided currently. Even

the customer’s passwords and hidden details are accessible by the administrator.

Now jobseekers are able to apply online also. Through this system all works are

done through computer so it results in fast service provider.

The jobseekers can also contact the company officials through email or his contact

numbers but first they have to register themselves as a member by filling up a

registration form which can be filled online. Once registered, jobseekers can access

this jobsite and register for any services being provided by seekjob.com, that too

online by sitting at home within a fraction of a second by a flick of a button.

17

Aim of this project is to provide an environment helpful for administrator and

jobseekers as well, so that, they find it easy to implement it without any harassment

for the jobseekers also. This project is developed after a

Through study of the existing manual system & the jobseekers requirements.

Requirement analysis is concerned with identifying the basic function of software

component in a hardware & software system.

Features of proposed system:

The features of the proposed system are as follows.

Provide the full information of employees/employer at various places at one

site.

Provide the full information of total vacancies at various regions at one site .

Provide the full information of total vacancies of various industries/companies

at one site.

Helps the management to find out the current trend in industries as well as

current manpower pool.

18

19

Feasibility Study :

A feasibility study is conducted to select the best system that meets performance

requirement. This entails an identification description, an evaluation of candidate

system and the selection of best system for he job. The system required

performance is defined by a statement of constraints, the identification of specific

system objective and a description of outputs.

The key consideration in feasibility analysis are :

Economic feasibility

The proposed system is economically feasible because the cost involved in

purchasing the hardware and the software are within approachable. The personal

cost like salaries of employees hired are also nominal, because working in this

system need not required a highly qualified professional. The operating-environment

costs are marginal. The less time involved also helped in its economical feasibility.

The benefits of this project include four types:

20

Cost – saving benefits

This project reduces the administrative and operational cost. Because of the

reduction in the use of paper, use of labors the cost also reduces.

Improve-service-level benefits

Proposed system improves the system’s performance because the current system

is based on manual processing while the proposed system is based on computer

processing.

Improve-information-level benefits

It provides better information in the stipulated space and time for decision-making.

Time-saving-benefits

It saves lots of time and provides the same result in a far lesser period of time.

Technical Feasibil i ty

HARDWARE & SOFTWARE

REQUIREMENT SPECIFICATIONS

Hardware requirement for development Hardware Configuration

Processor : Intel Pentium 4 CPU, 2.66GHz

Memory

RAM : 256 MB DDR

Hard Disk : 40 GB SATA

Mouse : Quantum

Keyboard : Samsung (Multimedia Supported)

21

Drive : CD-RW, Floppy drive

Printer : HP-Laser printer

Hardware requirement for Implementation

Processor:

Minimum : 568 MHz Pentium Processor

Memory:

RAM : 64 MB

Hard Disk : 4 GB

Display : 1024 * 768, True Type Color-32 Bit

Mouse : Any Normal Mouse.

Keyboard : Any window Supported Keyboard.

Software requirement for development

Software Configuration

Operating System : Windows XP Professional

Front End : Java, Java Server Pages, HTML, Dream weaver

Back End : Oracle 8i/MS-Access

Behavioral Feasibility

Employees of the company are habitual of working with manual system and don’t

have the knowledge of working in a computer application based environment that is

used in their intranet and are generally resistant to make changes in their working

attitude.

People are inherently resistant to change and computers have been known

to facilitate changes. An estimate should be made of how strong a reaction the staffs

22

are likely to have towards the development of an online computerized system

because now this may lead to expulsion of some of the staffs from their jobs.

So a system has to be chosen which will provide them much more facilities and less

mental disturbance to check weather correct entry is entered and that too at its right

place. The System will provide them automatic reporting and checks on entries while

storing as well as entering. So the front end has been made user friendly for both the

jobseekers and the employees.

23

Symbols Used :-

In order to create DFD’s we used following symbols:-

Input/Output

Data Processing

Flow of data

1. One way data flow.

2. Two way data flow.

24

Data store

Database

25

26

Get vacancy detail

JOBSEEKERMANAGEMENT

JOBSEEKER/USEREMPLOYEE/CONSULTANTGive

Give details

Give applicant details

Get emp. details

Report of selected applicants

Give job Opening

Get vacancyDetails

Selection processstatus

Resume status

0-Level Data Flow Diagram

27

Login UserLocation

User ID

Password

Password

User ID

If valid

New User

New User Password

IfNew

28

Seeker loginProcess

JobSection

Seeker details

Job seeker

User

Get details

Search job &news

News letterEmployer

Login process

Employer Jobs

New Employer login

EMPLOYERId &

Password

Registration details

Com info.

Job details

Id & password

Valid Id & password

New Job seeker

Registration details

Job search

Jobdetails

2-Level data Flow Diagram

User

29

30

E-R DIAGRAM

Has

Registration

Maintain

Registration

31

Jobseeker

Emp_idQualificatio

n Job location

FnameExperience

Skills

Speci.

High Degree

LName

JobseekerManagement

JobsCom.

Job ExpJob loc.

UsernameJob cat.

Email id

Check User

Job Seek Control

Username

Password

Employer

Company name

Location

Emil

Reference_no

Remark

EmployerCheck Emp control

User name

Password

News letter

Email

Name

Site map login

Username

Password

Site login

32

DATABASE DESIGN

In our data flow diagram, we give names to data flows, processes and data stores.

Although the names are descriptive of data, they do not dive details .So following

DFD, our interest is to build some details of the contents of data flows, processes

and data store. A data dictionary is a structured repository of data about data .It is a

set of rigorous definitions of all DFD data elements and data structures .The data

dictionary for the current system has been given as under:

Tables for Project:

Employer: This table maintains details of Employer

Field Name Data Type

User name Text

Password Text

company-name Text

company-location Text

company email Text

Jobs: This table maintains details of Jobs

Field name Data type

username Text)Job company TextJob category TextJob location TextJob_exp TextJob email Textemp_phone Textemp_email Text

33

Vacancy: This table maintains detail of jobs for which vacancies are open

Field Name Data Type

User name Text

Password Text

fname Text

lname Text

email Text

jobloc Text

prfjobloc Text

exp Text

jcat Text

key skills Text

highest degree Text

specialization Text

Newsletter: This table stores and maintains status news

Field Name Data Type

Name Text

email Text

Site admin: This table stores and maintains status site admin

Field Name Data Type

Username Text

Password Text

34

35

Main Form

36

Jobseeker login

37

New Jobseeker Signup

38

Employer login

39

New Employer Signup

40

Site administrator login

41

Tips

42

Interview Tips for Professionals

43

Resume Tips for Professionals

44

Job Fair List

45

Contact us

46

Newsletter Subscription

47

Hot Vacancies

48

IT JOBS Openings

49

New JOBS This Week

50

SeekJOBs.com success stories

51

JOBS For Disabled people

52

Job Fair list

53

54

TestingTesting plays a critical role in quality assurance for software .Due to the limitation of

the verification method for the previous phases, design and requirement fault also

appear in the code. Testing is used to detect these errors, in edition to the error

introduced during coding phase.

Testing is a dynamic method for verification and validation, where the system

is to be tested is executed and behavior of the system is observed. Due to this

testing the failure of the system can be observed, from which the presence of fault

can be deduced. However, separate activities have to be performed to identify the

faults.

There are two method of testing: functional and structural. In functional

testing, the internal logic of the system under testing is not considered and the test

cases are decided from the specification or the requirements. It is often called “Black

Box Testing”. Equivalence class partitioning, boundary analysis, and cause effect

graphing are examples of methods for selecting test cases for functional testing. In

structural testing, the test cases are decided entirely on the internal logic of the

program or module being tested.

As the goal of testing is to detect any errors in the programs different flavor of

testing are often used. Unit testing are used to test a module or a small collection of

modules and the focus is on detecting coding errors in modules. During integration

testing modules are combined into sub-system, which are then tested. The goal here

is to test the system design. In system testing and acceptance testing, the entire

System is tested. The goal here is to test the requirement themselves. Structural

55

testing can be used for unit testing while at higher level mostly functional testing is

used.

In the project Monthly Materialization Report System we used the unit testing

and functional testing. System testing is a critical phase in systems implementation.

Testing of a system involves hardware device testing and debugging of computer

programs and testing information processing procedures. Testing can be done with

test data, which attempts to simulate all possible conditions that may arise during

processing. The plane for testing are prepared and then implemented.

The testing methods adopted in the testing of the system were Independent

Unit Testing and System Testing

Independent Unit Test (IUT)

IUT focuses first on the modules, independently of one another, to locate errors.

This enables the tester to detect errors in coding and logic that are contained within

that module alone. Those resulting from the interaction between modules are initially

avoided.

IUT is generally white box oriented which is predicted on the close

examination of procedural detail. It exercises all the logical decisions on their true

and false side, executes all loops at their boundaries and within their operational

bounds and checks whether the required validations have been met. White box

testing exercises internal data structure to assure their validity.

SYSTEM TESTING

Here the system testing involved is the most widely used testing process consists of

five stages as shown in the figure. In general, the sequence of testing activities is

component testing, integration testing then user testing. However, as defects are

discovered at any one stage, they required program modifications to correct them

and this may required other stages in the testing process to be repeated.

56

(Component testing) (Integration testing) (User testing)

57

Unit testing

Module testing

Acceptance testing

Sub-system testing

System testing

Testing is the process of detecting errors. Testing performs a very critical role for

quality assurance and for ensuring the reliability of the software. The results of

testing are used later on during maintenance also.

Testing is vital to the success of the system. System testing makes a logical

assumption that if the parts of the system are correct, the goal will be successfully

achieved. In adequate testing or non-testing leads to errors that may not appear until

months or even years later (Remember the New York three day power failure due to

a misplaced ‘Break’ statement).

This creates two problems:

1. The time lag between the cause and the appearance of the problem.

2. The time interval effect of the system errors on files and the records on the

system.

A small error can conceivably explode into a much larger problem. Effective testing

early in the process translates directly into long term cost savings from a reduced

number of errors.

Another reason for system testing is its utility as a user oriented vehicle before

implementation. The best program is worthless if it does not meet the user

requirements. Unfortunately, the user’s demands are often compromised by efforts

to facilitate program or design efficiency in terms of processing time or design

efficiency.

Thus in this phase we went to test the code we wrote. We needed to know if the

code compiled with the design or not? Whether the code gave the desired outputs

58

on given inputs? Whether it was ready to be installed on the user’s computer or

some more modifications were needed?

Through the web applications are characteristically different from there software

counterparts but the basic approach for testing these web applications is quite

similar. These basic steps of testing have been picked from software engineering

practices. The following are the steps, we undertook:

1. The content of the Intranet site is reviewed to uncover Content errors.

Content Errors covers the typographical errors, grammatical errors, errors in

content consistency, graphical representation and cross referencing errors

2. The design model of the web application is reviewed to uncover the

navigation errors. Use cases, derived as a part of the analysis activity allows

a web designer to exercise each usage scenario against the architectural and

navigational design. In essence these non-executable tests help to uncover

the errors in navigation.

3. When web applications are considered the concept of unit changes. Each

web page encapsulates content navigation links, content and processing

elements (Forms, Scripts, JSP’s as in our case). It is not always possible to

test each of these individually. Thus is the base of the web applications the

unit to be considered is the web page. Unlike the testing of the algorithmic

details of a module the data that flows across the module interface, page level

testing for web applications is driven by content, processing and links

encapsulating the web page.

59

4. The Assembled web application is tested for overall functionality and content

delivery. The various user cases are used that test the system for errors and

mistakes.

5. The Web application is tested for a variety of environmental settings and is

tested for various configurations and upon various platforms.

The modules are integrated and integration test are conducted.

1. Thread based testing is done to monitor the regression tests so that the site

does not become very slow is a lot of users are simultaneously logged on.

2. A controlled and monitored population of end users tests Intranet application,

this all comprises of the User Acceptance Testing.

Because web application evolves continuously, the testing process is an

ongoing activity, conducted by web support staff in our case the Organization’s IS

people who will finally update and manage the application.

PSYCHOLOGY OF TESTING

The aim of testing is often to demonstrate that a program works by showing that it

has no errors. The basic purpose of testing phase is to detect the errors that may be

present in the program. Hence one should not start testing with the intent of showing

that a program works, but the intent should be to show that a program doesn’t work.

Testing is the process of executing a program with the intent of finding errors.

TESTING OBJECTIVES:

The main objective of testing is to uncover a host of errors, systematically and with

minimum effort and time. Stating formally, we can say,

60

1. Testing is a process of executing a program with the intent of finding an

error.

2. A successful test is one that uncovers an as yet undiscovered error.

3. A good test case is one that has a high probability of finding error, if it

exists.

4. The tests are inadequate to detect possibly present errors.

5. The software more or less confirms to the quality and reliable standards.

LEVELS OF TESTING

In order to uncover the errors present in different phases, we have the concept of

levels of testing. The basic levels of testing are

Client Needs Acceptance Testing

Requirements System Testing

Design Integration Testing

Code Unit Testing

Unit testing

Unit testing focuses verification effort on the smallest unit of software i.e. the

module. Using the detailed design and the process specifications, testing is done to

61

uncover errors within the boundary of the module. All modules must be successful in

the unit test before the start of the integration testing begins.

In this project each service can be thought of a module. There are so many modules

like Login, HR Department, Interviewer Section, etc. Each module has been tested

by giving different sets of inputs. When developing the module as well as finishing

the development, the module works without any error. The inputs are validated when

accepting them from the user.

Integration Testing

After unit testing, we have to perform integration testing. The goal here is to see if

modules can be integrated properly, the emphasis being on testing interfaces

between modules. This testing activity can be considered as testing the design and

hence the emphasis on testing module interactions.

In this project the main system is formed by integrating all the modules. When

integrating all the modules I have checked whether the integration effects working of

any of the services by giving different combinations of inputs with which the two

services run perfectly before Integration.

SYSTEM TESTING

Here the entire software system is tested. The reference document for this process

is the requirements document, and the goal is to see if software meets its

requirements.

Here entire ‘HRRP’ has been tested against requirements of project and it is

checked whether all requirements of project have been satisfied or not.

ACCEPTANCE TESTING

62

Acceptance Testing is performed with realistic data of the client to demonstrate that

the software is working satisfactorily. Testing here is focused on external behavior of

the system; the internal logic of program is not emphasized.

Test cases should be selected so that the largest number of attributes of an

equivalence class is exercised at once. The testing phase is an important part of

software development. It is the process of finding errors and missing operations and

also a complete verification to determine whether the objectives are met and the

user requirements are satisfied.

WHITE BOX TESTING

This is a unit testing method, where a unit will be taken at a time and tested

thoroughly at a statement level to find the maximum possible errors.

I tested step wise every piece of code, taking care that every statement in the code

is executed at least once. The white box testing is also called Glass Box Testing.

I have generated a list of test cases, sample data, which is used to check all

possible combinations of execution paths through the code at every module level.

White-box test focuses on the program control structure. Test cases are

derived to ensure that all statement in the program control structure. Test cases are

derived to ensure that all statement in the program control structure. Test cases are

derived to ensure that all statement in the program has been executed at least once

during testing and that all logical conditions have been exercised. Basis path testing,

a white box technique, makes use of program graphs (or graph matrices) to derive

the set of linearly independent test that will ensure coverage. Condition and data

flow testing further exercising degrees of complexity.

BLACK BOX TESTING

63

This testing method considers a module as a single unit and checks the unit at

interface and communication with other modules rather getting into details at

statement level. Here the module will be treated as a block that will take some input

and generate output. Output for a given set of input combinations are forwarded to

other modules.

Black-box test are designed to uncover errors functional requirement without

regard to the internal workings of a program. Black-box testing techniques focus on

the information domain of the software, deriving test cases by partitioning the input

and output domain of a program in manner that provides through test coverage. The

black-box test is used to demonstrate that software functions are operational, that

input is properly produced, and that the integrity of external information are

maintained. A black-box test examines some fundamental aspect of a system with

little or no regard for the integral logical structure of the software.

Graph based testing methods explore the relationship between and behavior of

program objects. Equivalence partitioning divides the input classes of data are likely

to exercise specific software function. Boundary values analysis probes the

program’s ability to handle data at the limits of acceptability.

TEST INFORMATION FLOW

A strategy for software testing may also be viewed in the context of the spiral. Unit

testing begins at the vortex of the spiral and, concentrates on each unit, component

of the software as implemented in source code. Testing progresses moving outward

along the spiral to integration testing, where the focus is on designed the

construction of the software architecture. Taking another turn outward on spiral, we

encounter validation testing, where requirements established as part of software

requirements analysis are validated against the software that has been constructed.

Finally, we arrive at system testing, where the software and other system elements

are tested as a whole. To test computer software, we spiral out along stream lines

that broaden the scope of testing with each turn.

64

Considering the process from a procedural point of view, testing within the

context of software engineering is actually a series of four steps that are

implemented sequentially. The steps are shown in Figure. Initially, tests focus on

each component individually, ensuring that it functions properly as unit. Hence, the

name unit testing. Unit testing makes heavy use of white-box testing techniques,

exercising specific paths in module’s control structure to ensure complete coverage

and maximum error detection.

System Security

SYSTEM SECURITY

65

System Testing

System Engineering

Validation Testing

Integration Testing

Design

Validation testing

Code

There are basically two types of security associated with this system:-

1. Physical security:-

Damage due to natural causes like earth tremor, flooding, water logging, fire

hazards, atmospheric or environmental conditions etc.For overcoming these

difficulties the replica of the data are automatically stored at various networks and for

environmental conditions Air conditioning environment is created.

2. Data security:-

There are basically two problems associated with data security:-

1. Data not being available to the authorized person at the time of need.

2. Data becoming available to the unauthorized person.

To overcome these difficulties the following access facilities has been provided:-

i) Identification:-

Unique Ids for the different users have been provided.

ii) Authentication:-

System checks the password under the particular user identification. The

computer permits the various resources to the authorized person.

iii) Authorization:-

The access control mechanism to prevent unauthorized logging to the

system.

66

67

IMPLEMENTATION

System implementation is the stage when the user has thoroughly tested the system

and approves all the features provided by the system. The various tests are

performed and the system is approved only after all the requirements are met and

the user is satisfied.

The new system may be totally new; replacing an existing manual or automated

system, or it may a major modification to an existing system. In the either case,

proper implementation is essential to provide a reliable system to meet organization

requirements .successful implementation may not guarantee improvement in the

organization using the new system (that is a design question) ,but improper will

prevent it.

Implementation is the process of having systems personal cheek out and put

new equipment to use, train users, install the new application and construct any files

of data needed to use it. This phase is less creative than system design. Depending

on the size of the organization that will be involve in using the application and the

risk involved in its use, system developer may choose to test the operation in only

one area of the firm with only one or two persons. Some times, they will run both old

and new system in parallel way to compare the results. In steel other situations,

system developers stop using the old systems one day and start using the new one

the next.

The implementation of the web based or LAN base network project has some

extra steps at the time of implementation. We need to configure the system

according the requirement of the software.

68

For the project we need to install and configure weblogicserver8.1, database

server and deployment directory for the project.

Aspects of implementation:-

The two aspects of implementation are:

Training Personnel

Conversion Procedures

Training:-

Even well designed and technically elegant systems can succeed or fail because of

the way they are used. Therefore the quality of the training received by the

personnel involved with the stem in various ways helps or hinders, and may event

prevent, the successful implementation of an information system. Since

69

70

MAINTENANCE

Software maintenance is the last phase in the software Engineering process that

eliminates errors in the working system during its work span and to tune the system

to any variations in its working environment. The system requires maintenance as

there may be changes and requirements in the organizational needs, government

policies, hardware and software environment etc. often small system deficiencies

are found as a system is brought into operation and changes are made to remove

them. System requirements may be revised as a result of system usage or changing

operational needs. Perhaps oversight that occurred during the development process

needs to be corrected. Often the maintenance need arises to capture additional data

for storage in a database or in transaction files or perhaps it may be necessary to

add error detection features to prevent system users from in adversely taking an

unwanted action.

Maintenance of the system after it is installed is concerned with an

additional factor in hardware. Once the system is delivered and installed there is a

brief warranty period during which time the vendor is responsible for maintenance.

This is a typically a 90 day period after that time the purchaser has the option of

acquiring maintenance from various sources. Maintenance source excepting vendor

is also available from companies specializing in providing the service, called third

party maintenance companies.

When the system is installed, it is generally used for long period. The average life of

system is 4-6 years, with the eldest applications often is used for over 10 years. The

need for debugging and correcting errors or failure on an emergency basic is

comparatively low: less than 20% of the task of correction. System and organization

are in constant state of flux; therefore the maintenance of the system also involved

adoptions for earlier version of software.

71

Approximately 20% of all maintenance work is performed to

accommodate changes in report, files and database. The greatest amount of

maintenance work is for user enhancement, improved documentation and recording

system components or greater efficiency. About 60% of all maintenance is for this

purposed.

Following table summarized the broad classes of maintenance found in

development of sekkjob.com

CATEGORY ACTIVITY

Corrective Emergency fixes, routine debugging.

Adaptive Accommodation of changes to data and to hardware

and software, Changes in the external environment.

Pre effective User enhancement, improved documentation recording

of computational efficiency, user recommendations for new capabilities.

Preventive

Routine service of cleaning and adjusting the equipment

to prevent breakdowns, future maintainability reliability enhancement, recovering

design information to improve the overall quality.

Maintainable Design

The points to reduce the needs for maintenance are:

More accurately defining the user’s requirements during the system development

assembling better system documentation.

Using more effective methods for designing process logic and communicating it

to project team members.

Making better use of existing tools and techniques.

Managing the system engineering process effectively.

The maintenance for Integrated Advertising System was performed with the above-

mentioned points as the underlying principles and according to the demands of the

users.

72

73

CONCLUSION

This is a well defined job of our team that has taken six weeks to analyze the

situation in which this project will work and the environment of the company that will

use this project.

It was a good experience for us to work in a company that has a very friendly

environment and learning atmosphere.

I am very thankful to Mr. Mohd Gurfan khan.

Who gave a lot of good programming skills and so many company related skills that

will help me in the future?

I am also thankful to all my friends and team members.

74

FUTURE SCOPE OF THIS PROJECT

In future this project can be treated as product according to specification and

needs of any organization.

Since Jobseeker plays key role in any organization; thus, success over a long

period of time and reliance of organization over recruitment is going to be one

of the most considered topic for any organization. Therefore Jobs seeker

Process will be of great help in carrying out recruitment process smoothly and

effectively.

At present days every organization is using web technology for their proper

functioning, so this web based project is all in all important from market

aspects.

Furthermore if this project will be uploaded, it can be used as Jobs site and

any organization can register their self on the site to carry out their

recruitment process making this site as Jobs seeker.

75

LIMITATIONS

Since, every system has some limitations so our proposed system is also not

untouchable in this regard. Although it includes every kind of features but it can’t be

used in a huge organization where number of networks are very large, because the

data base used in this system is an average one. Also it doesn’t have different kind

of access feature for different users.

SOFTWARE SCOPE

Reusability:

Reusability is possible as and when we require in this application. We

can update it next version. Reusable software reduces design, coding and testing

cost by amortizing effort over several designs. Reducing the amount of code also

simplifies understanding, which increases the likelihood that the code is correct. We

follow up both types of reusability: Sharing of newly written code within a project and

reuse of previously written code on new projects.

Extensibility:

This software is extended in ways that its original developers may not

expect. The following principles enhance extensibility like Hide data structure, avoid

traversing multiple links or methods, Avoid case statements on object type and

distinguish public and private operations.

Robustness:

76

Its method is robust if it does not fail even if it receives improper

parameters. There are some facilities like Protect against errors, Optimize after the

program runs, validating arguments and Avoid predefined limits.

Understandability:

A method is understandable if someone other than the creator of the

method can understand the code (as well as the creator after a time lapse). We use

the method, which small and coherent helps to accomplish this.

Cost-effectiveness:

Its cost is under the budget and make within given time

period. It is desirable to aim for a system with a minimum cost subject to the

condition that it must satisfy all the requirements.

Scope of this document is to put down the requirements, clearly identifying the

information needed by the user, the source of the information and outputs expected

from the system.

77

78

SITES REFERRED:

1. http://www.sun.com

2. http://www.coreservlets.com

3. http://www.serverside.com

4. http://www.w3schools.com

5. http://www.google.com

6. http://www.webopedia.com

7. http://www.ddj.com

BOOKS:

J2EE by GARRY CORNELL.

J2EE by Allamaraju & Buest (Apress Publications).

JSP & Servlets by Marty Hall (SUN Microsystems)

SYSTEM ANALYSIS AND DESIGN by ELIAS M AWAD.

SOFTWARE ENGINEERING by IAN SOMMEVILLE.

79

80

APPENDIX-A

Backend remains on server side and has two components i.e.

1. Server side program

2. Data Base.

Data base is the most important thing in this universe as data base gives identity to

a thing without data base existence of a thing is impossible while working on a

project first step is to design a database.

What is data base?

Data Base is a collection of tables and table is a collection of records in a tabular

form i.e. in row and columns.

Data Base can be divided into two parts:-

1. RDBMS.

2. DBMS.

We will be using RDBMS (Relational Database Management System) in our project

i.e. oracle 8i Enterprise edition.

Why we are using Oracle (RDBMS)?

Some of the merits of using Oracle (RDBMS) are as under:-

Centralization of database.

Client Server Technology.

Security.

Normalization of Data Base.

Relationship.

Transaction Processor.

It gives some internet related features.

81

Hence because of these features we are using Oracle as a back end technology.

ABOUT ORACLE 8i

Oracle 8i contains all the features of previous version. It also supports some

new features & enhancement to some existing features. Oracle servers provide

deficient & effective solution for the major features.

Large Database & Space Management Control

Many Concurrent Database Performances

High Transaction Processing Performance

High Availability

Controlled Availability

Industry Accepted Standards

Manageable Security

Database Enforced Integrity

Distributed Database System

Portability

Compatibility

Connectivity

NEW FEATURES OF ORACLE 8i

Improved Scalability

Improved Security

Improved Performance Via Partition

Enhanced Support for Database Replication

Capability To Handle a Much Larger Number Of Concurrent Users

New & Improved Data Types

82

APPENDIX-B

What is Middle Ware?

Middle Ware is a concept, Middle Ware provides centralization of business logic i.e.

instead of putting logic on each and every client machine we put logic on a

centralized server hence middle ware is nothing but a server side program where all

your business logic and business methods reside. It remains on server side and it

has all the logical building. Middle ware provides:-

1. Multiple Client access.

2. Centralized business logic in case of distributed application.

Because we are working on Distributed Application Based Project we need platform

independent Language:-

Technology Used

Introduction to Java

Java is a high level, third-generation programming language, like C, Fortran, Perl

and many others. It is a platform for distributed computing – a development and run-

time environment that contains built-in support for the World Wide Web.

History of Java

Java development began at Sun Microsystems in 1991, the same year the World

Wide Web was conceived. Java’s creator, James Gosling did not design java for the

Internet. His Objective was to create a common development environment for

consumer electronic devices which was easily portable from one device to another.

This effort evolved into a language , code named Oak and later renamed Java

that retains much of the syntax and power of c++ , but is simpler and more platform

independent.

83

Java Features

Some of the important features of Java are as follows:

Simplicity

Orientation

Platform Independence

Security

High Performance

Multi Threading

Dynamic linking.

Garbage Collection.

One of the most important features of Java is Platform Independence which makes it

famous and suitable language for World Wide Web.

Why java is Platform Independent?

Java is Platform Independent because of Java Virtual Machine (JVM).

Java Virtual Machine (JVM)

The client application or operating system must have a java byte-code interpreter to

execute byte-code instructions. The interpreter is a part of a lager program called the

JVM. The JVM interprets the byte code into native code and is available on a

platform that supports java.

Connectivity using JDBC

There are four kinds of drivers available in Jdbc:-

1. JdbcOdbc Bridge Driver.

2. Partly Java Driver.

3. Pure Java Driver.

4. Native Driver.

Client Side Interface:

In client side interface we are using:-

84

Servlet / JSP – In Internet Based Application.

J2EE Framework and Architecture

J2EE is one of the best solutions that we have had so far for meeting the demand of

today’s enterprise. J2EE specifies both the infrastructure for managing our

applications, and the service APIs for building our applications.

The J2EE platform is essentially a distributed application-server environment- a java

environment that provides the following: -

A set of java extension APIs to build applications. These APIs define a

programming model for J2EE applications.

A run time infrastructure for hosting and managing applications. This is the

server runtime in which our applications resides.

The applications that we could develop with the above may be programs to drive

web pages, or components to implement complex database transactions, or even

java applets, all distributed across the network.

The J2EE Runtime

While J2EE bundles together APIs that have been in existence in one form or

another for quite sometime, perhaps its most significant aspect is the abstraction of

the runtime infrastructure. The J2EE specification doesn’t specify how a J2EE

runtime should or could be built. Instead, J2EE specify roles and interfaces for

applications, and the runtime onto which applications could be deployed. This results

in a clear demarcation between applications and the runtime infrastructure. This

demarcation allow the runtime to abstract most of the infrastructure services that

enterprise developers have traditionally attempt to build on their own. As a result,

J2EE application developers could just focus on the application logic and related

service, while leveraging the runtime for all infrastructure-related services.

85

Apart from specifying a set of standard APIs, the J2EE architecture also provides a

uniform means of accessing platform-level services via its runtime environment.

Such service includes distributed transactions, security, messaging etc.

The J2EE APIs Used

Distributed applications require access to a set of enterprise services. Typical

services include transaction processing, database access, messaging,

multithreading etc. The J2EE architecture unifies access to such services in its

enterprise service APIs. However, instead of having to access these service through

proprietary or non standard interfaces, application programs in J2EE can access

these APIs via the container.

There are various API specification in J2EE framework which enable us to create an

application at great speed with minimum effort.

APIs Used To Build the Software

1. JDBC API

The JDBC API provides developers with a way to connect to relational data from

within java code. Using the JDBC API, developers can create a client (which can be

anything from an applet to an EJB) that can connect to a database, execute

structured query language statements, and processes the result of those

statements. The API provides connectivity and data access across the range of

relational databases. It can do this because it provides a

set of generic database access methods for sql compliant relational databases.

JDBC generalizes the most common database access functions by abstracting the

vendor specific detail of particular database. The result is set of classes and

interface, placed in the java.sql package, which can be used with any database that

has an appropriate JDBC drive. This allow JDBC

connectivity to be provided in a consistent way for any database. It also means that

with a little care to ensure the application confirms to the most commonly available

database features, an application can be use with a different database simple by

switching to a different JDBC driver. JDBC includes following packages for the

86

means of database accessing and provides various features of the database. The

packages are as follows: -

java.sql Package: -

This package contains classes and interfaces designed with traditional client/server

in mind. Its functionality is focused primarily on basic database programming

services such as creating connections, executing statements and prepared

statements, and running batch queries. Advanced functions such as batch updates,

scrollable result sets, transaction isolation, and sql data types are also availabl

javax.sql Package: -

This package introduces sum major architectural change to JDBC programming

compared to java.sql package, and provides better abstractions for connections

management, distributed transactions, and legacy connectivity. This package also

introduces container-managed connection pooling, distributed transactions, and row

sets.

2. Java Servlets: -

Servlets are Java technology’s answer to Common Gateway Interface (CGI)

programming. They are programs that run on a Web server, acting as middle layer

between a requests coming from a Web browser or other HTTP client and

databases or applications on the HTTP server. Their job is to:

Read any data sent by the user.

This data is usually entered in a form on a Web page, but could also come from a

Java applet or a custom HTTP client program.

Look up any other information about the request that is embedded in the HTTP

request.

This information includes details about browser capabilities, cookies, the host name

of the requesting client, and so forth.

Generate the results.

This process may require talking to a database, executing an RMI or CORBA call,

invoking a legacy application, or computing the response directly.

87

Format the results inside a document.

In most cases, this involves embedding the information inside an HTML page.

Set the appropriate HTTP response parameters.

This means telling the browser what type of document is being returned (e.g.,

HTML), setting cookies and caching parameters, and other such tasks.

Send the document back to the client.

This document may be sent in text format (HTML), binary format (GIF images), or

even in a compressed format like gzip that is layered on top of some other

underlying format. Many client requests can be satisfied by

returning pre-built documents, and these requests would be handled by the server

without invoking servlets. In many cases, however, a static result is not sufficient,

and a page needs to be generated for each request.

Java Server Pages: -

Java Server Pages (JSP) technology enables you to mix regular, static HTML with

dynamically generated content from servlets. Many Web pages that are built by CGI

programs are primarily static, with the parts that change limited to a few small

locations. For example, the initial page at most on-line stores is the same for all

visitors, except for a small welcome message giving the visitor’s name if it is known.

But most CGI variations, including servlets, make you generate the entire page via

your program, even though most of it is always the same. JSP lets you create the

two parts separately. Listing 1.1 gives an example.

Most of the page consists of regular HTML, which is passed to the visitor

unchanged. Parts that are generated dynamically are marked with special HTML-like

tags and mixed right into the page.

The Advantages of JSP

JSP has a number of advantages over many of its alternatives. Here are a few of

them.

Versus Active Server Pages (ASP)

88

ASP is a competing technology from Microsoft. The advantages of JSP are twofold.

First, the dynamic part is written in Java, not VBScript or another ASP-specific

language, so it is more powerful and better suited to

complex applications that require reusable components. Second, JSP is portable to

other operating systems and Web servers; you aren’t locked into Windows NT/2000

and IIS. You could make the same argument when comparing JSP

to ColdFusion; with JSP you can use Java and are not tied to a particular server

product.

Versus Pure Servlets

JSP doesn’t provide any capabilities that couldn’t in principle be accomplished with a

servlet. In fact, JSP documents are automatically translated into servlets behind the

scenes. But it is more convenient to write (and to modify!) regular HTML than to

have a zillion println statements that generate the HTML. Plus, by separating the

presentation from the content, you can put different people on different tasks: your

Web page design experts can build the HTML using familiar tools and leave places

for your servlet programmers to insert the dynamic content.

Versus Server-Side Includes (SSI)

SSI is a widely supported technology for inserting externally defined pieces into a

static Web page. JSP is better because you have a richer set of tools for building

that external piece and have more options regarding the

stage of the HTTP response at which the piece actually gets inserted. Besides, SSI

is really intended only for simple inclusions, not for “real” programs that use form

data, make database connections, and the like.

Versus Static HTML

Regular HTML, of course, cannot contain dynamic information, so static HTML

pages cannot be based upon user input or server-side data sources. JSP is so easy

and convenient that it is quite reasonable to augment HTML pages that only benefit

89

slightly by the insertion of dynamic data. Previously, the difficulty of using dynamic

data precluded its use in all but the most valuable instances.

APPENDIX-C

What is HTML?

HTML (Hyper Text Markup Language): A markup language used to structure text

and multimedia documents and to set up hypertext links between documents, used

extensively on the World Wide Web. HTML is a display language, not a

programming language. HTML is a markup language (the ML in HTML) that uses a

fixed set of markup tags.

HTML itself is the set of customizable “markup” tags that are inserted into

HTML document govern its format, multimedia content, and hyperlinks. Any

HTML viewer can display such documents but they are normally viewed

usinga Web browser.

HTML is a programming language in that an HTML document is a program

that, when “run” by a browser, displays its text as hypermedia (multimedia

with hyperlinks).

The “language” HTML is really only a collection of predefined tags which ,

when inserted into regular text, tell a web browser how to:

a. Format the document and its text.

b. Incorporate i.e. insert a graphic image, video sequence, or sound clip

into the displayed document.

c. Link into other locations, in the same document, in another web page,

or even on another computer (Server), or

d. Link to other programs written in Java, JavaScript or other languages

(called CGI applications).

Features of HTML:-

90

HTML stands for Hyper Text Markup Language.

An HTML file is a text file containing small markup tags.

The markup tag tells the Web browser how to display the page.

An HTML file must have an htm or html file extension.

An HTML file can be created using a simple text editor.

It’s a display-only technology.

APPENDIX-D

What is JAVASCRIPT?

JavaScript is a compact, object-based scripting language. It can provide

interactive web pages, validate from data, and make your web page clearer.

JavaScript is a lightweight interpreted scripting language. The language is most well

known for its use in wesites.It was originally developed by Brendan Each of

Netscape Communications. It adds interactive functions to HTML pages, which are

otherwise static. JavaScript is easier to use than Java, but not as powerful and deals

mainly with the elements on the Web page. On the client, JavaScript is maintained

as source code embedded into an HTML page. On the Server, it is compiled into

byte code (intermediate language), similar to Java programs.

Features of JavaScript:-

JavaScript was designed to add interactively to HTML pages.

JavaScript is a scripting language-a scripting language is a lightweight

programming language.

A JavaScript is usually embedded directly in HTML pages.

A JavaScript is an interpreted language (means that script execute without

preliminary compilation).

All major browsers, like Netscape and Internet Explorer, support JavaScript.

Functions of JavaScript:-

JavaScript gives you the ability to perform the following functions:

Control document appearance and content

Control the browser

91

Interact with document content

Interact with the user

Read and write client state with cookies

Interact with applets

Manipulate Embedded Images

Limitations of JavaScript:-

JavaScript does not have any graphics capabilities

Client-side JavaScript can not read or write files

JavaScript does not support networking of any kind

JavaScript doesn’t have any multithreading capabilities.

92

Analysis:

93

Breaking a problem into successively manageable parts for individual study.

Attribute:

A data item that characterizes an object.

Cost/Benefit Analysis:

The purpose of the comparing the projected savings and benefits to projected to

costs to decide whether the system change is justified.

Data Base:

A store of integrated data capable being directly addressed for multiple user; it is

organized so that various files can be accessed through a single referenced based

on the relationship among records in the file rather than the physical location.

DBMS:

The software that determines how data must be structured to produce the user’s

view; and maintain update the system.

Data Flow:

Moment of data in a systems from appoint of origin to specific destination

indicated by a line and arrow.

Data Security:

Protection of data from loss, disclosure, modification or destruction.

Data Structure:

Logically related set of data that can be decomposed into lower level data

elements; a group of data elements handled as a unit.

Design:

Process of devolving the technical and operational specification of a candidate

system for implementation.

Feasibility Study:

A procedure that identifies describes and evaluates candidate systems and selects

the best system for implementation.

File:

Collection related records organized for a particular purpose also called a data set.

Flow Chart:

94

A graphic picture of the logical steps and sequence involved in a procedure or a

program.

Form:

A physical carrier of data of information.

Implementation:

In system development- a phase that focuses on user training, site preparation

and file conversion for installing a candidate system.

Maintenance:

Restoring to its original condition.

Normalization:

A process of replacing a given file with its logical equivalent; the object is true derive

sample file with no redundant elements.

Operating System:

In data base machine based software that facilitates the availability information or

reports through the DBMS.

Password:

Identity authenticator a key that allow access to a program system or procedure.

Pert:

A flow system model used to manipulate various values as a basis for determining

the critical path to interpret this relationship and to relate them back to the real world

as a control technique.

Record:

A collection of aggregates or related item of data treated as a unit.

Source code:

A procedure or format that allow enhancement on a software package.

System:

A regular or orderly arrangement of components or parts in a connected and

interrelated series or whole; a group of components necessary to some operation.

System Design:

95

Detailed concentration on the technical and other specification that will make the

new system operational.

System Development Life Cycle:

A structured sequence of phases for implementing an information system.

System Testing:

Testing the whole system by the user after major programs and sub systems have

been tested.

Unit Testing Validation:

Testing changes made in an existing or new programs. checking the quality of

software in both simulated and live environment

96