Upload
preeti-dahiya
View
231
Download
0
Embed Size (px)
Citation preview
8/3/2019 65331897 Final Doc Project of Training and Placement
1/60
Project SynopsisProject Synopsis
TRAINING AND PLACEMENT MANAGEMENTTRAINING AND PLACEMENT MANAGEMENT
Submitted By
Student Name University University
Roll Number Registration Number
Gorakh Nath Das
Soumyajit Ghosh
Suchandra Mandal
Tushar Bhattachariya
OfOf
Computer Application, 3Computer Application, 3rdrd
YearYear
Under the Guidance of
Mr. Partha GuhaMr. Partha Guha
DEPT:Information TechnologyInformation Technology
Narula Institute of TechnologyNarula Institute of Technology
81, Nilgunj Road, Agarpara,81, Nilgunj Road, Agarpara,
Kolkata 700109.Kolkata 700109.
1
8/3/2019 65331897 Final Doc Project of Training and Placement
2/60
CertificateCertificate
This is to certify that the following students of Computer Science & Engineering department of
Narula Institute of Technology are working on the project entitled TRAINING ANDTRAINING AND
PLACEMENT MANAGEMENTPLACEMENT MANAGEMENTunder the guidance of Mr. Partha Guha(Lecturer: Information Technology Department).
Student Name Signature
Gorakh Nath Das ..
Soumyajit Ghosh ..
Suchandra Mandal ..
Tushar Bhattachariya ..
..
Mr. Partha Guha Lecturer,
Dept. Information Technology
2
ACKNOWLEDGEMENTS
8/3/2019 65331897 Final Doc Project of Training and Placement
3/60
LETS MAKE THINGS BETTER- I think these are
some words which encourage me to draw my attention to
this project. The project for the Training and Placement
DEPARTMENT of a college System is a good Project
which is helpful to solving the various appliation
concerning to student As a result in establishing this
project I am very obliged. It has been a long project andnaturally many people got associated with it. I am
grateful for the assistance and cooperation of all those who
contributed their suggestions for the betterment of the
project, during the development phase.
We are very much grateful to our parents and our project
guide Mr. PARTHA GUHA who encourages me a
lot in the critical moments during the development phase.
A special thanks to Mr. PARTHA GUHA(guide) for his
kind help.
Table of ContentsTable of Contents
3
8/3/2019 65331897 Final Doc Project of Training and Placement
4/60
0 Notation
0.1 Notation for Entity Relationship Diagram
0.2 Notation for Flow Chart
1 Introduction
1.1 Abstract of the project...
1.2 Goals andObjectives1.3 General Requirements(functional)...1.4 About the Project..
2 System analysis
2.1 SOSFTWARE MODELING
3 Technolgy used..
4 Nature of application...
5 software requirement specification
5.1 System requirements
5.2 Hardware Requirements5.3 Software Requirements
6 Data Modeling
6.1 Entity Relationship Diagram.
7 Code optimization
8 Data Structure
8.1 Table in the Database
9 Data structure..Table in the database.
10. Data Base design
4
8/3/2019 65331897 Final Doc Project of Training and Placement
5/60
11. source code of data... ...
12.Testing
13 chart report of project13.1 Gnatt chart13.2 Pert chart
14. SCOPE FOR FUTURE APPLICATION
15. Bibilography
16.GLOSASRY
17.conclusion
5
8/3/2019 65331897 Final Doc Project of Training and Placement
6/60
Pic of e-r diagram
here
1. INTRODUCTION
Development of a feature rich practical online application for the
training and placement cell of the institute involves the computerization of
the training and placement cell(T/P cell).the work done in T/P cell involves
collecting student details for the availability
To the company at the time of campus selections and train the students ready
to face interviews, informing students about the events going to take place
through mailing ,reports. It also provides the statistics of the number of
students selected in the college in the previous year.The project considerably
6
8/3/2019 65331897 Final Doc Project of Training and Placement
7/60
reduces the work pressure of the T/P cell staffs and helps the students
concerning their careers with minimum time factor and maximum training
and placement support for the students.
1.1 Abstract of the project
1.2 Goals and Objectives
The goals of our system are: A project is a central mechanism to unify and
coordinate the element of any language or package application .A project keeps track
of the location of all programs ,screens, reports and so on, that an application comprise.
This makes it convenient to organize programs, screens and other components in
directories according to function, subsystem and other application categories. Online
institutional training and placement Management Support System is an application
software that will enable the user to do all the profile submission and updation and
information of eligible students name list and company name for camoussing and other
services through the organisation.
The objectives of our system are:
THE APPLICATION TAKES EVERY CARE TO ENSURE THE ACCURACY
OF:-
Student details
Career development programs
7
8/3/2019 65331897 Final Doc Project of Training and Placement
8/60
Personality development programs
Campus interviews and the interview techniques programs
Arranging guest lecturers from industry for career counselling
Proper details of all criteria for campussing
And upcoming comanies
Daily updatation
100 % placement assistance
The software ensures the security and will prevent any unauthorized persons to access the
software.
WHY IS THIS TOPIC CHOSEN
We have chosen this particular topic because We are very much familiar to this topic.
The is the training institute, which provides various courses or teaches to the students.
Another reason is that I have got the opportunity to work at their place and they gave me
all the support for making the software error free and demanding. This project may help
me in getting job in this competitive market.
PURPOSE AND SCOPE OF THE PROJECT IS
1) To ensure correct accordance with the day-to-day submission and updatation.
2) Speedy functioning of the office procedure and thereby ensuring smooth functioning to
the student
3) Good maintenance of the student database.
4) Data store and retrieval as and when required.
At per service with the changing environment i.e., adopting this software system for high
quality of service, which is the basis and fundamental objective of this project.
8
8/3/2019 65331897 Final Doc Project of Training and Placement
9/60
As this project is meant for the student who enquire about the placement, availability of
Training provided or not. Information of upcoming companies,As the system is designed
in a generalized manner so that it can be used in modern institute .Through this system
the whole management of the student transactions, details etc can also be maintained
smoothly.
This system will specify the process starting from the enquiry of the student or admission
of the student to the transaction related to the student and the Information on the Net also
The main aim of the project is to make the query response fast. The entire work of the
processing should be done with a high speed i.e.; the updating and modifications of the
list of the student and their profiles etc.
The system will provide different reports with information e.g. day wise updatation,
student queries,elligible student details etc. This system will also provide all details
information, which are necessary for the management of the system.
1.3 General Requirements (functional)
All the Id numbers, Names and other numbers cannot be empty / invalid.
The Date should be given in mm/dd/yyyy format.
The width of a data should not exceed the space allotted for it in the file.
Only student registers theirs profiles are eligible in any type of process.
A form for student and administrator login
A form for help service plan.
A form for querying about the student personal details.
A form for querying service details of a of student of different criteria.
A form for checking out about the upcoming company for campussing
1.4 About the project
The software for the training and placement cell of a college is a vital need for the
students and the institute management for the purpose of proper placement and training
of the aspiring students of the institute. It helps the students to provide their profiles tothe training and placement cell of the institute,update their respective profiles(with their
gradual approach towards course end),get to know
about the companies coming for the on-campus/off campus/pool/group pool categories of
9
8/3/2019 65331897 Final Doc Project of Training and Placement
10/60
campus interviews. Under this system all the students of the ongoing(current) batches ofvarious streams can register their profiles. The training and placement cell(t/p
cell)remains in continuous touch with all the students of the institute time-to-time.
This dedicated software for the institute's t/p cell can be expanded to the various
machines in the institute and can be accessed by the students as well as by theadministrator(tpo in charge).The system remains connected with the profile databases of
the various students
to continuously monitor the variety of scopes available for the students' placements.
2. SYSTEM ANALYSIS
The system analysis is one of the most important parts to study the activity of an
organization. Without proper system study it is not only very difficult but also almost
impossible to build a system, which will serve the purpose of an organization. System
analysis is the most crucial phase in a software life cycle. Any mistake made at this stage
can replicate the steps that will follow it and result in software, which neither serves any
purpose for the organization nor it can be, implemented any further.
The most important point in system analysis understands the entire system thoroughly.
The current system can be a manual one or it may be a partly automated system. In any of
the case, system study provides the starting point to develop software. With an eye to the
users needs System study can be divided into two major parts, they are :
1) Identification of the need from the client
2) Start preliminary investigation of the system.
2.1 SOFTWARE MODELING
10
8/3/2019 65331897 Final Doc Project of Training and Placement
11/60
8/3/2019 65331897 Final Doc Project of Training and Placement
12/60
theoretical way of developing software. But wee also study this model because all other life cycle models
are essentially derived from the classical waterfall model. The classical waterfall model divides the life
cycle into the phases shown in figure 1.
Classical waterfall Model
The name of this model is justified by its diagrammatic representation, which resembles a cascade of
waterfall. This model breaks down the life cycle into an intuitive set of phases. The different phases of this
model are feasibility studies, requirement analysis and specifications, design coding and unit testing,
integration and system testing and maintenance. The different phases starting from the feasibility study to
the integration and system-testing phase are known as the development phases. The part of the life cycle
model between the feasibilitystudy and product testing and delivery is known as the development part. At
the end of the development part of the life cycle the productbecomes ready to the deliver to thecustomer.
The maintenance phase commences after the completion of the development phases. And activity thatspans all phases of any software development is project management. Completion of each phase typically
requires relatively different amounts of effort to be put in by the development team. The relative
magnitudes of effort necessary for completing the activities in different phases of a typical product are
shown in figure2.
1: Requirement Analysis and Specification
2: Design
3: coding and Unit Testing
4: Integration And System Testing
5: Maintenance
Relative effort distribution among different phases of a typical product.
Observed that among all the life cycle phases the maintenance part normally requires the maximum
efforts. However among the development phases, the integration and system-testing phase requires the
maximum effort for development of a typical product.
The classical waterfall model is an idealistic one since it assumes that no development error is
ever committed by the engineers during any of the life cycle phase. However in practical development
environments the engineers do commit a large number of errors in almost every phase of the life cycle.
12
8/3/2019 65331897 Final Doc Project of Training and Placement
13/60
The source of the defect can be many: oversights, wrong assumptions, use of inappropriate technology,
communication gap among the project engineer etc. these defects usually detected much later in the life
cycle. For example a design defect might go unnoticed till we reached the coding or testing phase. Once a
defect is detected the engineer need to go back to the phase where the defect has occurred and need some
of the work done during that phase and the subsequence phases to correct the defect and its effect on the
later phases. Therefore in any practical; software development works it is not possible to strictly follow the
classical waterfall model. Feedback paths are needed in classical waterfall model fromevery phases to its
preceding phase as shown in figure 3 to allow the correction of the errors committed during the phase that
is detected in later phases.
Iterative waterfall Model
Though errors are inevitable in almost every phase of development, it is desirable to detect these errors in
the same phase in which they occur. However it may not always be possible to detect all errors in the same
phase in which they occur. Nevertheless the errors should be detected as early as possible.
Even though a basic understanding of the waterfall model is necessary to be able to appreciate the other
development processes the waterfall model suffers from many shortfalls. Some of the glaring shortcomings
of the waterfall model are the following:
The waterfall model cannot satisfactorily handle the different types of risks
that a real life software project is subjected to. e.g. the waterfall model
assumes that the requirements be completely specified before the rest of the
development activity can start. Therefore it cannot be accommodate the
uncertainties that exist at the beginning of moist ofthe project. As a result it
cannot be satisfactorily used in projects where only rough requirements are
available at the beginning of the project.
To achieve better efficiency and higher productivity most real life projects
cannot follow the rigid phase sequence imposed by the waterfall model. A
rigid adherence to the waterfall model creates blocking states in the system.
That is some team members would have to wait for a phase to be completed
before they can start their next activity. This is clearly wastage of resources
and such wastages are rarely tolerated in real projects.
3. TECHNOLOGY USED
DB : MICROSOFT SQL SERVER
COMPONENTS: VB.NET
13
8/3/2019 65331897 Final Doc Project of Training and Placement
14/60
4. NATURE OF APPLICATION
Any student of the institute is the general user of this system and
administrator(tpo in charge) of the system is the super user. The general students get into the system through general log-in and the
administrator(tpo in charge) does the same through the admin log-in toaccess their respective accounts. This system contains a available companies pagefor the students . User(students/administrator) has to login to welcome page before doing
anything. Login functionality should check the authenticity of the user from the database.
User(students/administrator)can change their respective log-in passwords at a time oftheir choosing or will. The administrator can check the fulfillment of any students
eligibility for a given upcoming companys campussing.Any student of the institution can
update their profile(S) at a time of their will or requirement.A crystal report can be
generated for the purpose of proper information of the eligible students for anyparticular upcoming campuss interviews.
5. SOFTWARE Requirements Specification
5.1 System Requirements
INTRODUCTION:
5.11 Purpose: - The purpose of this document is to be describing the external
requirements for e TRAINING AND PLACEMENT system. It also describes the
interface of the system.
5.12 Scope: - This document is the only that describes the requirements of a
system. It is meant for use by the developer and will be the basis for the
validating the final delivered system. Any changes made to requirements in the
future will have to go through a formal change approval process. The developer
is responsible for asking clarifications where necessary and will make anyalterations without the permission of the student.
5.13Abbreviations and Symbols Used: - Any text enclosed within
represents the replicable parameters.
5.14 Developer Responsibilities Overview: - The developer is responsible for:
14
8/3/2019 65331897 Final Doc Project of Training and Placement
15/60
a) Developing the system.
b) Installing the software on the clients hardware.
c) Conducting any user training that might be needed for using the system.
d) Maintaining the system for a specific duration.
5.15 GENERAL DESCRIPTION:
Product function overview:-
studentis the user of the system and administrator of the TRAINING
AND PLACEMENT mang. is the super use When the user types in the login page of the
system, a Welcome page is shown which has a menu on the left hand side, a banner at thetop and related links to other pages. This system contains an online profile for the
student. User has to login to welcome page before processing anything. Login
functionality should check the authenticity of the user from the database.Menu should contain following screens;
View details:View details:if the user is registered then registration screen should be available with the
updataion facility.
GenerateGenerate
List (List (eligible stud list & upcoming com list)):This Screen will show different types of letter which can be ordered on
line. Provide an image for each student details those are satisfying the eligible criteria.
On selecting any one of elligible type like marks,certification,skillset,streamwise. usersoon find out tose students profiles.
Student can any time check out the upcoming company list which are coming for
campussing.
Generate report:Generate report:This screen contains the information about the eligible students list which is
printable.
.
Change password:Change password: student and administrator can any time change his/her password from this menu.
Help:Help: this form is designed for students to help them for using the system forsome regular queries.
15
8/3/2019 65331897 Final Doc Project of Training and Placement
16/60
Exit:Exit: this is the function where user can any time exit from the system
5.16 User Characteristics: -
The main users of this system will be computer operators who have a
sound knowledge of computer fundamentals and can use programs as editors and word
processors. They should know how to use a Printer and Scanner and can access internet
smoothly to access their company website.
5.17 General Constraints:-
The workstations should at least have the following configurations:
5.18 General assumptions and dependencies:-
The photographs should be scanned using a scanner and then the image should be
converted to JPEG format using any image converting utility like Microsoft Photo Editor.
5.19 SPECIFIC REQUIREMENTS
Inputs and Outputs Files:
Input File1: Contains the following information about the details of a student
id,name,
address,
email,residenceno,
userid,
Password,
ten,twelve,
graduation,post graduation,certificateset1,
skillset1,
languages,experience,
course,
coursesession,
fileupload,hobbies,
16
8/3/2019 65331897 Final Doc Project of Training and Placement
17/60
extracurricular
Input File2: Contains the following information about the administrator
userid,
Password
5.2 Hardware Requirements
PROCESSOR: -Intel Pentium 4
MOTHERBOARD: -Intel Original / 845 chipset
HARD DISK: -40 GB
RAM: -256 MB
ADSL MODEM: -256 KBPS (BROAD BAND)
MONITOR: -15 COLOUR SVGA Color Monitor
PRINTER: -Desk Jet or Dot Matrix Printer or Laser
CD ROM DRIVE:-40X
CACHE MEMORY:-566 KB
5.3 Software Requirements
OS : Microsoft Windows 2000 / Microsoft Windows XP
DB : MICROSOFT SQL SERVER
COMPONENTS: VB.NET
BROWSER: Internet Explorer / Mozilla / Netscape
Reporting Tool: Crystal Repor
5.4 Software Interface: -
To run the above proposed software in the clients hardware properly themachine should support the following interfaces
i) Operating System Windows 9X, 2000, XP
ii) Vb.net
17
8/3/2019 65331897 Final Doc Project of Training and Placement
18/60
iii) Microsoft sql server
5.5 EXTERNAL INTERFACE REQUIREMENTS
5.5.1 User Interface : -
The proposed software is totally based upon GUI. Thus maximum data entryworkload will be reduced by the introduction of several controls like List box, Combo
box, Check box, Radio buttons etc. and it has following web based (webpage) windowslisted below.
Password protection window
Main operational window
Data entry window for administrator
Browser window for student
Data entry window for personal details
Browser window for help
Data entry window for changing password
Browser window for company list
5.6 Acceptance Criteria
Before accepting the system, the developer must demonstrate that the system
works fine on the clients hardware on few validate data. The developer will have to showthrough test cases that all condition is satisfied.
After demonstration, the client should pay the price of the software to the
developer within a week.
6. SYSTEM DESIGN
Meaning Of Design:
The term 'design' means to plan or mark out the form and method of a solution. It
represents the major characteristics of the final system and determines the upper found in
quality for the system. Beginning once software requirements have been analyzed and
specified, software design is the first of three technical activities design, code
generation and test that are required to built and verify the software.
18
8/3/2019 65331897 Final Doc Project of Training and Placement
19/60
Design Principles:
Basic design principles enable the software engineer to navigate the design process.
They are as follows
The design should be traceable to the analysis model.
The design should exhibit uniformity and integration.
The design should be reviewed to minimize conceptual errors.
The design should be structural to accommodate change.
Design Constraints:
Constraints on systems design fall into two categories:
Development constraints
Operational constraints
Development constraints include limitations on resource consumptions, overall costs,
machine time, man-hours and schedule limitations.
Operational constraints are expressed in terms of maximum memory size or maximum
response time for an on-line system.
Structured Design:
Structured design is the art of designing the components of a system and the
relationship between these components in the best possible way. It is the process of
deciding the way the components are to be interconnected to solve some well-specified
problem. Structured design merely consolidates, formalizes and makes visible those
design activities which happen inevitably and invisibly in the course of every system
development project.
19
8/3/2019 65331897 Final Doc Project of Training and Placement
20/60
Snaps of our
window form infollowing pages
From page no:19 -28
20
8/3/2019 65331897 Final Doc Project of Training and Placement
21/60
21
8/3/2019 65331897 Final Doc Project of Training and Placement
22/60
22
8/3/2019 65331897 Final Doc Project of Training and Placement
23/60
23
8/3/2019 65331897 Final Doc Project of Training and Placement
24/60
24
8/3/2019 65331897 Final Doc Project of Training and Placement
25/60
25
8/3/2019 65331897 Final Doc Project of Training and Placement
26/60
26
8/3/2019 65331897 Final Doc Project of Training and Placement
27/60
27
8/3/2019 65331897 Final Doc Project of Training and Placement
28/60
28
8/3/2019 65331897 Final Doc Project of Training and Placement
29/60
2 Pic of database
29
8/3/2019 65331897 Final Doc Project of Training and Placement
30/60
Coding window pic from page no 29-
38
30
8/3/2019 65331897 Final Doc Project of Training and Placement
31/60
31
8/3/2019 65331897 Final Doc Project of Training and Placement
32/60
32
8/3/2019 65331897 Final Doc Project of Training and Placement
33/60
33
8/3/2019 65331897 Final Doc Project of Training and Placement
34/60
34
8/3/2019 65331897 Final Doc Project of Training and Placement
35/60
35
8/3/2019 65331897 Final Doc Project of Training and Placement
36/60
36
8/3/2019 65331897 Final Doc Project of Training and Placement
37/60
37
8/3/2019 65331897 Final Doc Project of Training and Placement
38/60
38
8/3/2019 65331897 Final Doc Project of Training and Placement
39/60
39
8/3/2019 65331897 Final Doc Project of Training and Placement
40/60
As we all know, a compiler is a program that reads the source program in a
high-level language and translates it into (typically) machine language. This is a
complicated process involving a number of stages. If the compiler is an optimizing
compiler, one of these stages "optimizes" the machine language code so that it either
takes less time to run or occupies less memory or sometimes both. Of course, whatever
optimizations the compiler does, it must not affect the logic of the program i.e. the
optimization must preserve the meaning of the program. One might wonder what type of
optimizations the compiler uses to produce efficient machine code? Since in no case the
meaning of the program being compiled should be changed, the compiler must inspect
the program very thoroughly and find out the suitable optimizations that can be applied.
Some of the code optimization techniques that are commonly used are listed below.
Constant Folding :
Constant folding is the simplest code optimization to understand. Let us
suppose that you write the statement x = 45 * 88; in your C program. A non-optimizing
compiler will generate code to multiply 45 by 88 and store the value in x. An optimizing
compiler will detect that both 45 and 88 are constants, so their product will also be a
constant. Hence it will find 45 * 88 = 3960 and generate code that simply copies 3960
into x. This is constant folding, and means the calculation is done just once, at compile
time, rather than every time the program is run.
Common Subexpression Elimination:
Many a times, it happens that the same expression is evaluated at different
places in the same program and the values of the operands in the expression do not
change in between the two evaluations of that expression. For example, the program may
evaluate say a * b at the beginning and at the end. If the values of a and b do not change
in between these two evaluations of a * b, then instead of evaluating a * b again at the
end, we can save the result of the evaluation of a * b at the beginning in some temporary
variable and use it at the end. This will help eliminate redundant computations in the
program. This optimization is called as common subexpression elimination.
40
7. CODE OPTIMIZATION
8/3/2019 65331897 Final Doc Project of Training and Placement
41/60
Dead Code Elimination:
Dead code is the code in the program that will never be executed for any
input or other conditions. A common example is an if statement. If the compiler finds out
that the condition inside the if is never going to be true, then the body of the if statement
will never be executed. In that case, the compiler can completely eliminate this deadcode, thus saving the memory space occupied by the code.
Strength Reduction using Induction Variable:
One type of code optimization is strength reduction in which a "costly"
operation is replaced by a less expensive one. For example, the evaluation of x2 is much
more efficient if we multiply x by x rather than call the exponentiation routine. One place
where this optimization can be applied is in loops. Many times in a loop, one variable
changes in synchronization with the loop variable. Such a variable is called as induction
variable.
8. Implementation Modeling8.1 Flow Chart
Administrator (userid,Password)
Studentdetails (id,name,address,email, residenceno, userid, Password, ten, twelve,
graduation, post
graduation,certificateset1,skillset1,languages,experience,course,coursesession,fileupload,hobbies,extracurricular)
9. Data Structure9.1 Table in the Database
Table Name Attributes
Administrator userid,Password
Studentdetails id,name,address,email, residenceno, userid, Password, ten,twelve, graduation, post
graduation,certificateset1,skillset1,languages,experience,course,coursesession,fileupload,hobbies,extracurricular
41
8/3/2019 65331897 Final Doc Project of Training and Placement
42/60
Pic of dfd diagram
42
8/3/2019 65331897 Final Doc Project of Training and Placement
43/60
10. Database design:
Data Dictionary / Data Structure
1. Table name : studentdetailsPrimary Key: useridColumn name Data type Width Constraint Description
id
name
address
residenceno
mobileno
userid
Password
ten
twelve
graduation
post graduation
certificate
set1
skillset1
languages
experience
course
coursesession
hobbies
extracurricular
2 Table name :
Number
varchar
varchar
varchar
varchar
varchar
varchar
varchar
varchar
varchar
varchar
varchar
varchar
varchar
varchar
varchar
varchar
varchar
varchar
50
50
50
50
50
50
50
50
50
50
50
50
50
50
50
50
50
50
50
Unique, not null
Not null
Not null
Allow null
Not null
Not null
Not null
Not null
Not null
Allow null
Allow null
Allow null
Allow
null
Allow null
Allow null
Allow null
Allow null
Allow null
Allow null
Identification of
student
Student name
student address
email id
residence no
mobile no
user id
password of
corresponding userid
% of marks scored inclass 10
% of marks scored in
12
% of marks scored in
graduation
% of marks scored in
p.graduation
Certificate
information
information
information
information
information
information
information
information
43
8/3/2019 65331897 Final Doc Project of Training and Placement
44/60
11. Sources of data :
administrator
Primary Key:
userid
userid
Password
varchar
varchar
50
50
Not null
Not null
information
information
a. For vb.net
i. http://www.vbnethomeandlearn.co.uk/NET/vb
Net.htmlii. msdn.microsoft.com/vb.net/code
iii. http://www.learnvisualstudio.net/default.aspx
b. For sql server
i. http://computer.howstuffworksinserver.com/
ii. http://www.markupxservertutorials.com/iii. http://www.webdesignfromhomeserver.org/web/html-and-
css/articles/
II. We got some inspiration form the following websites a. http://www.letshavejoby.com/walkin.htm
44
http://www.vbnethomeandlearn.co.uk/NET/vbNet.htmlhttp://www.vbnethomeandlearn.co.uk/NET/vbNet.htmlhttp://www.learnvisualstudio.net/default.aspxhttp://computer.howstuffworksinserver.com/http://www.markupxservertutorials.com/http://www.webdesignfromhomeserver.org/web/html-and-css/articles/http://www.webdesignfromhomeserver.org/web/html-and-css/articles/http://www.letshavejoby.com/walkin.htmhttp://www.vbnethomeandlearn.co.uk/NET/vbNet.htmlhttp://www.vbnethomeandlearn.co.uk/NET/vbNet.htmlhttp://www.learnvisualstudio.net/default.aspxhttp://computer.howstuffworksinserver.com/http://www.markupxservertutorials.com/http://www.webdesignfromhomeserver.org/web/html-and-css/articles/http://www.webdesignfromhomeserver.org/web/html-and-css/articles/http://www.letshavejoby.com/walkin.htm8/3/2019 65331897 Final Doc Project of Training and Placement
45/60
12. TESTING
Testing Techniques and Testing
strategies
Software testing is a critical element of software quality assurance and
represents the ultimate review of specialization, design and code
generation. The increasing visibility of software as a system element
and the attendant costs associated with a software failure are
motivating forces for well planned thorough testing. It is not unusual
for a software development organization to expend between 30-40 %
of the total project effort in testing.
The following are the few characteristics of testing: -
This is a major quality control measure, which is applied for
software development.
After coding phase available computer programmers are
executed for testing purpose.
Testing detects and uncover the errors introduce during coding
phase
Testing also detects and uncovers errors, which are occurring in
the previous phases like requirement phase, design phase etc.
The following testing strategies are used for the development of the
software: -
45
8/3/2019 65331897 Final Doc Project of Training and Placement
46/60
Unit testing
Integration testing
Validation testing
System testing
Unit testing
1. As per this testing strategy all parts of a module, e.g.
individual forms, reports etc. is tested separately as per its
own operation.
2. To exercise the different parts of any module and also their
code to detect coding errors.
Integration Testing
1. During integration of module this testing strategy is used. For
example say while testing the entire sales order generation
process starting from offer Followup to sales order preparation,
can be done using integrated testing method.
2. To detect design an error focusing on the interconnection
between modules uses these testing strategies.
Validation Testing
1. By this testing strategy validation criteria is tested form wise.
2. It provides final assurance, that the software meets all
functional, behavioral and performance requirement.
46
8/3/2019 65331897 Final Doc Project of Training and Placement
47/60
3. This testing strategy is performed keeping in mind the client
requirements for individual functional elements of a form (UI).
System Testing
1. This testing strategy is used to verify overall system function or
performance is achieved or not.
Apart from the above-mentioned strategies there are other testing
strategies that are also available and widely used in the industry.
During the development of this software I also followed the some of
the strategies mentioned below: -
Regression Testing
Alpha and Beta Testing
Security Testing
Stress testing
Regression Testing: - Each time a new module is added as part of
integration testing, the software changes. New data flow paths are
established, new I/O may occur, and new control logic may be invoked.
These changes may cause problem with functions that previously
worked flawlessly. In the context of an integration test strategy,
regression testing is the re-execution of some sub set of tests that
have already been conducted to ensure that changes have not
propagated un-intended side effects.
Alpha and Beta Testing: - It is virtually impossible for a software
developer how the customer will really use a program. When
47
8/3/2019 65331897 Final Doc Project of Training and Placement
48/60
customized software is built for customer, a series of acceptance test
are conducted to enable the customer to validate all requirements.
A customer conducts the alpha test at the developers site. The
software is used in a natural setting. In my last stage of the project
while I am performing testing I have also done the same. Alpha tests
are normally conducted in a controlled environment
The beta test is conducted at the customer site by the end-users of the
software. It is basically a real life testing of the software with real data.
Security Testing: - Security testing attempts to verify that protection
mechanisms built into the system will, in fact, protect it from improper
penetration. I have also performed the security testing by trying to
enter in the system with wrong user id and password. Try to break into
the system by changing only the case of the password.
Stress testing: - Stress testing executes a system in a manner that
demands resources in abnormal quantity, frequency, or volume. To
perform stress testing I have used a very low configuration machine. In
that machine I opened multiple instances of the same software and fire
transactions and perform query in the database using the different
user front-end interface.
Testing techniques used for this software development can be
characterized as per the following chart: -
48
8/3/2019 65331897 Final Doc Project of Training and Placement
49/60
White box Testing or Structural Testing
This testing technique is used in unit testing strategy only.
This technique guaranties that all independent paths within a
form/module have been executed at least once.
It executes all loops at their boundary and within their
operational bounds.
Basis Path Testing
It enables that the test case to be designed depending on the
logical complexity measure of a procedure/forms.
This measure is used as a guide for designing a basis set of
execution path.
Control Structure testing can be divided into three parts: -
49
Testing Techniques
White Box Black Box
Basic Path testing Control structure testing
Condition Testing Dataflow Testing Loop Testing
Equivalence
Partitioning
Summarizingfindings and
8/3/2019 65331897 Final Doc Project of Training and Placement
50/60
Condition Testing
This testing is basically done to check the logical conditions in a
code written inside a form or module.
Measurement of test coverage of a condition is simple by using
this technique. The test coverage of conditions in a program
provides guidance for the generation of additional tests for that
particular program.
Dataflow Testing
This testing is carried out in order to identify the flow of data
within a program. The flow of data within a program some
times encounter unnecessary loops or delay due to miss
judgment from the part of the programmer.
This method is useful for selecting test paths of a program
containing nested if and loop statements.
Loop Testing
It is a white box or code testing technique that focuses
exclusively on the validity of loop constructs.
Different types of loops can be tested using this technique e.g.
simple loop, concatenated loops, nested loops and unstructured
loops.
After white box testing is done it is the turn of the Black box testing or
functional testing. Features of the same are given below: -
50
8/3/2019 65331897 Final Doc Project of Training and Placement
51/60
This is not a fully complementary approach of white box
testing but it uncovers a different set of errors rather than
white box testing.
By applying this testing technique I can be able to derive all
functional requirements i.e. all input and output conditions are
fulfilled or not.
This testing technique I have performed after completing the
black box testing.
Equivalence Partitioning
This testing method divides the input domain of a Programme
into classes of data from which test cases can be derived.
By this partitioning the test case design will able to uncover the
errors, which are occurred in this class.
Boundary Value Analysis
BVA leads to a selection of test cases that exercise boundary
values.
BVA is a list of case design technique, which is complement of
equivalence partitioning.
By using BVA the front end validations can be checked or put
under stress. Suppose a field can handle 100 characters, what
will happen if 101 characters are entered.
In the following section Test data and error listed for a given test case
is shown for better understanding. These data are real data and used
51
8/3/2019 65331897 Final Doc Project of Training and Placement
52/60
during real life testing. For this purpose I have taken few sample forms
from this project for better understanding.
A Sample Test case structure
Group-1
Category-1
Test Case-1
Test Case-2
.
test Case-N
Category-2
.
.
Category-N
Group-2
.
Group-N
For Example: -
Group-1= User Interface Testing
Category-1= Validation Testing
Test Case-1=Maximum Length checking
Test Case-2=Alphanumeric support checking
Test Case-2=Blank Checking
Category-2=Design Testing
Test Case-1=Caption Checking of All components
52
8/3/2019 65331897 Final Doc Project of Training and Placement
53/60
Test Case-2=Size uniformity checking.
Test Case-3=Positional uniformity checking.
13.1
GNATT CHARTA Gnatt chart is perhaps the simplest from of formal project management. The Gantt chart is used
almost exclusively for scheduling purpose and therefore controls only the time dimension of
projects.
Let us drawn Gantt chart for the tasks identified in the chart: we estimate the number of
days required for each of the eight tasks as follow: preliminary investigation, 1;
feasibility study,2; analysis, 2; detail design, 2; database design, 1; coding and testing, 3;
validation testing, 3; preparation of project report, 1. Using these estimates, we can draw
the Gantt chart for the compiler project.
Brief introduction to GNATT charts:
Gantt charts can be used for project planning show project activities and time required.
The Steps to be performed are: -----
1. Identified which tasks are to be performed by which date.
2. Identified tasks, which can be performed at the some time.
3. Identified tasks, which are dependent on completion of some other tasks.
ot activities
n GNATT
chart.
ject Activity04/07/2007
05/08/2007
06/08/2007
19/08/2007
02/08/2007
06/09/2007
07/09/2007
08/09/2007
06/10/2007
7/10/2007
25/11/2007
09/11/2008
09/18/2008
01/2/2008
10/02/2008
16/02/2008
08/03/2008
1/15/2008
22/03/2008
25/03/2008
Preliminary
nvestigation
asibility Study
Analysis
eparation of
Synopsis
ailed Analysis
tabase Design
ystem Design
Coding and
Unit Testing
dation Testing
Building the
Executable
53
8/3/2019 65331897 Final Doc Project of Training and Placement
54/60
eparation of
Project
13.2 PERT CHART
The most sophisticated planning method is the Program Evaluation and Review
Technique (PERT). This method, developed in 1958 by the US Navy and Booze, Allen, and
Hamilton, a management consulting firm, ahs been used in many complex projects requiring
careful planning and management.
Information system projects must be planned carefully if they are to meet important
development schedules. The time required to develop a system can be estimated by using
historical records of the effort needed to develop similar projects. Sometimes experience orintuition is the basis of estimates. A third method uses a standard formula that takes into account
program and personnel characteristics.
Both project hour requirements, the number of personnel hours needed to develop a
system, and the number of calendar days are important in estimating development time. PERT
allows analysts to identify and assess the interdependence of activities in a project.
Although the best approach to project management is to break the project into small,
manageable pieces, there is a danger of losing sight of the overall project while supervising the
smaller tasks..
The PERT chart is most valuable when a project is being planned and designed. When the
network is finished, it is studied to determine the critical path over which the total time required
will be greater than for any other path. If activities along this path are not completed on time, the
entire project will be late. PERT also show the interdependencies of the tasks and assists in
answering three common management questions:
1. What other activities must precede or be completed before the initiation of a specificactivity?
2. What other activities can be performed while a specific activity is in progress?
3. What activities cannot be started until after the completion of a specific activity
Three time estimates for PERT: If the activity durations in a project are uncertain then activity
scheduling calculations are done by using the expected values of the durations. Sometimes, such
54
8/3/2019 65331897 Final Doc Project of Training and Placement
55/60
expected duration estimations may not give an accurate answer. Thus, rather than estimating
directly the expected completion time of an activity, three values are considered. From these
times a single value is estimated for future consideration. This is called three-time estimates in
PERT.
The three time estimates are as under:
1. Optimistic time (to) : This is the shortest possible time to perform the activity , assuming
that everything goes well.
2. Pessimistic time (tp) : This is the maximum time that is required to perform the activity,
under extremely bad conditions .
3. Most likely time (tm) : This is the most often occurring duration of the activity ,
Statistically , it is the model value of duration of the activity .
The three time estimates are reduced into a single expected time (t e) with the average formula:
te =(to+4tm+tp)/6
Activity Duration (in days )
to tp tm te1 Preliminary Investigation 28 30 29 29
2 Feasibility Study 13 15 14 14
3 Analysis 20 22 21 21
4 Preparation of Synopsis 20 22 21 21
5 Detailed Analysis 41 43 42 42
6 Database Design 20 22 21 21
7 System Design 27 29 28 288 Coding & Unit Testing 104 106 105 105
9 Validation Testing 20 22 21 21
10 Building The Executable 6 8 7 7
11 Preparation of Project49 50 49 49
The corresponding Network Diagram As follows:
55
2
8/3/2019 65331897 Final Doc Project of Training and Placement
56/60
14.
In my project the software has been developed in a modest way but it has a
tremendous scope of future application. It is handled properly with supporting
infrastructure new modules like online queries and response. Where we just have
to entry the data randomize and the software will make the details information by
internally with required program. And it can also handle the data of students
record , can query of their status by a simple click. It can be added with this
software to make its a complete management information system this will
definitely true it self as a cost worthy software for every enduser.
Training and placement mang. can be made for enabling students for upcoming
campus interviews and so that the students can groom themselves through the
given facilities of downloading of sample aptitude papers, mock interviews,
sample resumes in the system. In a word the system should be equipped with
electronic grooming facility.
This system can also be extended to incorporate certification by t/p mang. Providing to
best students.Though it will need some kind of embedded system to read the E.certification and update
the system accordingly.
56
SCOPE FOR FUTURE APPLICATION
8/3/2019 65331897 Final Doc Project of Training and Placement
57/60
15.
Software Engineering : a Practitioners Approach
Publication: McGraw Hill Publishing Company
Fifth edition
Writer: Roger S. Pressman
Mastering Visual Basic 6
Publication:BPB Publication
Writer: Evangelos Petroutsos
Sams Teach Yourself JSP in 24 hours
Publication : Tech Media
SQL , PL/SQL :The programming language for oracle
Publication :BPB Publication
Writer : Ivan Bayross
Database system concepts
Fourth edition
Publication : McGRAW Hill Publishing Company
Writer : Silberschatz , Korth , Sudarshan
16 . GLOSSARY
DFD:( Data flow Diagram ): It is a graphical technique that depicts information flow and
transforms that are applied as data move from input to output. DFD can represent any
level of abstrction of a system or a software.
57
Bibliography
8/3/2019 65331897 Final Doc Project of Training and Placement
58/60
ERD: (Entity relationship Diagram): The entity relationship diagram as originally
proposed by Peter Chem for the design of the relational database system and has been
extended by the others . A set of primary components are identilfied for the ERD :
data objects, attributes , relationships and various types of indicators. The primary
purpose of ERD is to represent data objects and their relationships . Data objects are
represented bya labeled triangle .Relationships are indicated with a labeled line
connecting objects. In some variation of ERD the connecting line contains diamond
that is labeled as relationship. Connection between data objects and relationshipar
established using variety of symbols that indicates cardilnality and modality.
Feasibility study : The study to find out the viability of a problem solution scheme. It
includes study of Economic, Technical, Legal Feasibilities and alternative methods.
First normal form : A database scheme is in first normal form if every relation scheme
included in database scheme is in 1NF.
Second normal form: A database scheme is in second normal form if every relation
scheme included in database scheme is in 2NF.
Third normal form : A database scheme is in third normal form if every relation
scheme included in database scheme is in 3NF.
LAN (Local Area Network) : Any physical network technology designed to span short
distances. Unusually LANs operate at tens of megabits per second.
MS-SQLSERVER 2000 : MS-SQLSERVER 2000 is an RDMS package developed by
Software giant Microsoft corporation. The MS-SQLSERVER RDMS is available in
configurations MS-SQLSERVER workgroup, MS-SQLSERVER server.
Package : A set of PL/SQL procedures functions, cursors, and other PL/SQL variables
are bundled together in a package.
58
8/3/2019 65331897 Final Doc Project of Training and Placement
59/60
Partitioning : Problems often too large and complex to be understood as a whole. For
this reason we tend to partition such problems into parts that can easily understood
and establish interfaces between parts so that the overall functions can be
accomplished.
Primary Key : Primary key is a key that is a single attribute or a combination of
attributes of an entity set and provides the uniqueness of an entity.
RDBMS(Relational Database Management System) : Relational database is an
information system that presents information in the form of rows contained in
a collection of tables, each table processing a set of one or more columns and
follow the rules of relational algebra.
SQL (Structured Query Language) : Structured query language is a nonprocedural
language that is the official and defector standard language for interfacing with
relational database.
Trigger : Database-level triggers is a group of PL/SQL statements: (i) Statement-level
(ii) Row-level Front-end triggers is one or more pl/sql statements that execute when
an event occurs, such as pressing a button. A trigger can be defined at the three levels:
at the form level, at the block level and at the item level.
View : Any relation that is not a part of a database i.e. a virtual relationship is made
available to the users as a view.
WWW (World Wide Web): Large-scale information service that follows users to browse
information. WWW offers a hypermedia system that can store information as a text,
graphics, audio etc.
59
8/3/2019 65331897 Final Doc Project of Training and Placement
60/60
17. CONCLUSION
This project help a better student support and time saving factor. It also supports better
students queries and would also provide better reports and information to the
management for smooth running. There is no chance of human error, as the various
reports will be printed without any human intervention. The various types of reports will
be available quickly without any effort.