6
TABLE OF CONTENTS Certificate………………..………………………………………………... i Abstract………..……...…………………………………………………... i i Acknowledgement…………..……………………………………………. i v List of Tables……………………………………………………………... v List of Figures……..……………………………………………………… v i 1. INTRODUCTION 1. 1 Overview….……………..…………………………………………… 1 1. 2 Purpose……….………………………………………………………. 1 1. 3 Objective……………..……………………………………………….. 1 1. 4 Project Significance………….……………………………………….. 2 1. 5 Limitation………….…………………………………………………. 2 2. REVIEW AND METHODOLOGY 2. 1 Introduction …………………………………………………….…… 3 2. Facts and Finding on Job Portal……………………………………… 3

4 contents

Embed Size (px)

Citation preview

Page 1: 4 contents

TABLE OF CONTENTS

Certificate………………..………………………………………………... iAbstract………..……...…………………………………………………... iiAcknowledgement…………..……………………………………………. ivList of Tables……………………………………………………………... vList of Figures……..……………………………………………………… vi

1. INTRODUCTION

1.1 Overview….……………..…………………………………………… 11.2 Purpose……….………………………………………………………. 11.3 Objective……………..……………………………………………….. 11.4 Project Significance………….……………………………………….. 21.5 Limitation………….…………………………………………………. 2

2. REVIEW AND METHODOLOGY

2.1 Introduction …………………………………………………….…… 32.2 Facts and Finding on Job Portal……………………………………… 32.3 Existing System……………………………………………………….

2.3.1 Drawbacks of Existing System………………..…………….33

2.4 Proposed System……………………………………….......................2.4.1 Advantages of proposed system……………………...……….

44

2.5 Research……………………………………………………………… 52.6 Project Methodology…………………………………………………. 5

3. REQUIREMENT ANALYSIS

3.1 Introduction………………………………………………………... 73.2 Problem Analysis………………………………...………………...

3.2.1 Principles of System Analysis……………………………... 8 8

3.3 Feasibility Study…………………………………………….……... 93.4 Object Oriented Analysis………………………………………….. 113.5 Architectural Specification………………………………………… 113.6 Input Design………………………………………………………. 133.7 Output Design……………………………………………………… 133.8 Database Design…………………………………………………… 14

Page 2: 4 contents

3.8.1 Objectives of Database design….…………………………… 143.9 Software & Hardware Requirements……...………………………. 143.10 Software Descriptions……………………………………………... 153.11 ASP.NET…………………………………………………………. 163.12 C#.NET……………………………………………..………………

3.12.1 ADO.NET overview………………………………….......1919

3.13 Sql server…………………………………………………...………3.13.1 Advantages of Rdbms…………………………………….3.13.2 Disadvantages of Dbms…………………………..…….…3.13.3 Features of sql server (Rdbms)……………………........…

20202121

4. SYSTEM DESIGN

4.1 Introduction………………………………………………………... 224.2 Modules………………….…………………………………………

4.2.1 Job Seeker Module..……………………….……………….4.2.2 Employer Module………..…………………………………4.2.3 Administration Module……………..……………...………

22222323

4.3 Context Diagram…………………………………………………... 234.4 Sequence Diagram…………………………………………………. 254.5 Data Flow Diagram(DFD)………………………………………...

4.5.1 Components of Data Flow Diagram…...…………...………4.5.2 Silent features of dfd’s……………..….…………………...

272727

4.6 E-R Diagram……………………………………………………….. 324.7 Tables……………………………………………………………… 34

5. FORM LAYOUT

5.1 Home page……………………………………………...………… 415.2 Jobseeker’s Login Page…………………………………………… 425.3 New Jobseeker Registration…………………………….………… 435.4 Active Profile……………………………………………...……… 465.5 Forgot Password…………………………………………………... 475.6 Search jobs……………………………...………………………… 485.6 Recruiter Login…………………………………………………… 495.7 Recruiter Profile…………………………………………………... 505.8 Administrator Login………………………………………………. 51

Page 3: 4 contents

5.9 User Names & Passwords………………………………………… 525.10 Employer’s Profile………………………………………………... 535.11 Post Jobs…………………………………………………………... 545.12 Admin Area……………………………………………………….. 555.13 Add Package……………………………………………………… 565.14 Posted Job………………………………………………………… 575.16 Security Question…………………………………………………. 585.17 Company Package………………………………………………... 59

6. TESTING

6.1 Introduction………………………………………………………... 606.2 Types of Testing……………………………………………………

6.2.1 Unit Testing………………………………………...………6.2.2 Integration Testing…………………………………………6.2.3 Black box Testing…………………………………………6.2.4 Validation Testing…………………………………….……6.2.5 Output Testing…………………………………………...…6.2.6 User Acceptance Testing………………………………...…6.2.7 White Box Testing………………………….........................6.2.8 Stress Testing………………………………………………6.2.9 System Testing……………………………………………..6.2.10 Component Testing……………………………………..…

6060606161626262626263

6.3 System Security……………………………………………….…… 646.4 Threats To System Security…………………………………..…… 646.5 System Security Measures………………………………………….

6.5.1 Identification…………………………………………….…6.5.2 Access Control………………………………………..……6.5.3 Audit Control………………………………………….……6.5.4 System Integrity……………………………………………

6465656565

7. SYSTEM IMPLEMENTATION………………………………...……66

8. FUTURE SCOPE OF THE APPLICATION…………………...……68

9. CONCLUSION……….…………………...……………………...…….69

10. BIBLIOGRAPHY………………………..……………………...…….70