P. 1
Contents

Contents

|Views: 3|Likes:
content
content

More info:

Categories:Types, Speeches
Published by: Prathamesh Malandkar on May 26, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less

05/26/2013

pdf

text

original

CONTENTS About Organization The TRAINING & PLACEMENT CELL is developed for LBSIMDS.

SERVICES provided by LBSIMDS In addition to field of Software Engineering (Technical Course likeMCA), it also conducts • MBA • PGDCA • PGDMSM • PGDBA Computerization – Its importance. “As a rule [S] he who has the most information will have thegreatest success”Information is the tool for management in any businessenvironment and is in use for effective decision making. Thedata collected is processed and the desired informationobtained.Computerization is the need of hour is an undisputable factthat without the help of IT, there is no possibility to sustainthe organization. Computerization has to be implemented ina phased manner. To evaluate the different phase of thecomputerization, we first evaluate the different tires of thecooperatives. The computerization is absolute necessity, butit has to be taken in a phased manner. The phase relatetowards the objective of the whole exerciser i.e. fasteraccess of information, for speedier reporting, better planningand decision making.

• This system can be used as an application for college tomanage the student information with regards toplacement. tologin and all facilities provided by project. • Visitors/Company representatives logging in may alsoaccess/search any information put up by Students. • It will reduce the paper work and utilize the maximumcapabilities of the Setup and organization as well as itwill save time and money which are spending in makingreports and collecting data. • Students logging should be able to upload theirinformation in the form of a CV. • It will provide exact position of project. • It can be accessed throughout the organization andoutside as well with proper login provided. • It provides the facility of maintaining the details of thestudents and gets the requested list of candidates forthe companies who would like to recruit the studentsbased on given query. . The proposed system aims toachieve the following goals : • It will accept the answer of questions proposed byAdministrator of organization.OBJECTIVE Computer based information system are designed toimprove existing system. • It will allow letting Administrator to change profile.

TECHNOLOGIES USED -:FRONT END – Back end: .Requirement analysis is the first technical step in thesoftware process.CurrentPlacement scenario . When the studentuploadshis/her CV. 5. A server is used for storing the CVs. The front-page of the system is created giving a brief descriptionabout the system and a login box . This system can be used as an application for the TPO of thecollege to manage the student information with regards toplacement. A role of approver is also introduced. 4. The systemis an online application that can be accessed throughout theorganization and outside as well with proper login provided. 3. The categories of CVs are decided and uploaded anddefine itformally. Like some companies visiting thecampus forplacements. the approver should approve the documentand onlythen can it be uploaded. CHAPTER :2 SYSTEM ANALYSIS REQUIREMENT ANALYSIS Requirement anlysis is a software engineering task thatbridges the gap between system level requirementsengineering and software design. screens forvariousevents are created. of the college. Other sub-systems like automatic notification.ABOUT PROJECT This project is aimed at developing an online application forthe Training and Placement Dept. Statistics of the previous year’s placements.(Analysis as a bridge between system engineering andsoftware design) The software requirement analysis may bedivided into five areas of effort:Problem recognitionEvaluation and synthesisModelingSpecificationReview.Work in the application will be done in the following way: 1. Visitors/Companyrepresentatives logging in may also access/search anyinformation put up by Students. 2. Students logging should be able to upload theirinformation in the form of a CV.

3.CHAPTER:3 FEASIBILITY STUDY To find out whether the proposed project is feasible or not Idid three types of feasibility study these are given below:Feasibility is the determination of whether or not a project isworth doing. IntroductionPurpose :The purpose of this documentation is todescribe all external requirements of software for project information Managementsystem. The process followed in making thisdetermination is called a feasibility study. The function andperformance allocated to software as part of systemengineering are refined by establishing a completeinformation description a detailed functional and behavioraldescription. 3. . The hardware and software requirements arealready available with the organization. an indication of performance requirements anddesign constraints.For checking out operational feasibility of the system first of all I find out answer to the following questions these aregiven below : Is there sufficient for the project from the management ? Are current business methods acceptable to the user ? Have the users been involved in the planning anddevelopment of the project ? Will the purposed system cause harm ? CHAPTER : 4 SOFTWARE REQUIREMENTSPECIFICATION The software requirements specification is produced at theculmination of the analysis task.2 Economical Feasibility Economic Feasibility is the measure of cost effectiveness of a project. This type of studydetermined that a project is feasible. we will consider threetypes of feasibility study. These are described below: 3.3 Operational Feasibility Operation Feasibility is the feature of how well the systemwill work in the organization and how the user feels aboutthe system.we can go ahead andprepare the project specification which finalizes projectrequirements. No extra costs are involved as the hardware andsoftware recourses are already available with theorganization. In this project report . appropriate validation criteria and otherdata pertinent to requirements 1.1 Technical Feasibility Technical Feasibility is a measure of availability of technicalrecourses.

Any changes made to therequirements in the future will have to gothrough a formal change approval process. Documentation of design decisions The goal of this phase is to transform requirementsspecification in to a structure that is suitable forimplementation in some programming language.Suggest infrastructures and trainingrequirements for the proposed solution. and Validating the system architecture and the algorithmsto realize the individual system components. Suggest prioritization and phasing of theproposed solution . CHAPTER : 7 TESTING . The scope of study is limited to Suggest the proposed solution to achievedefined objectives.Suggest hardware configuration requirementfor the proposed solution. It is meantfor use by the developers and will also be thebasis for validating the final deliveredsystem. Designing underlying logical data model. The outcome of this phase are : Description of logical dDescription of system architecture.Formulate the applications softwarespecifications. Description of algorithmic structure of the systemcomponents. Designing the algorithmic structure of the systemcomponents. Intechnical terms we derive the software architecture fromthe SRS document. and How these system specification will work together ? The important activities of design include : Designing system architecture.Scope :This document is the only one that describesthe requirements of the system. CHAPTER : 5 SYSTEM DESIGN The goals of this phase are : To determine which system components will coverwhich requirements in the system specification.Provide budgetary estimates forimplementation of the proposed solution.

Initialization and termination error. Interface errors.“Doesthe software behaves as specified?” Software testing is often used in the association with theterms Verification and Validation. White Box Testing White Box Testing is test case design approach thatemployees the control architecture of the procedural designto produce test cases. Other types of testing strategies are : Defect testing Interface testing Alpha and beta testing Object oriented testing Real time testing Testing StrategiesUnit Testing .Testing Technique One of the main requirement of the software development isto develop bug free. reliable system.Software testing is the process of executing software in acontrolled manner in order to answer the question. Behaviors or performance error. Testing Approaches : Following are main types of tests software undergoes : Black Box Testing Black Box Testing relates to tests that are performed the atthe software interface. Black Box Testing attempts to finds errors in the followingcategories: Incorrect or missing functions. During the process of development of any application there is always a possibilityof some errors being developed. Errors in data structure or external database access.

They are responsible depends onthe personal working in the computer center. important control paths are tested touncover errors within boundary of the modules. Here using test plans prepared in designdescriptions as guide. . encounteredand provide enough description for the cause of error. System operators Training Running of the system successfully depend on the personalworking in the computer. It is imperativethat user be properly trained in methods of enteringtransactions.Training to provide input to the system3. Allow easy navigation through CV’s and companyinformation.1. Corresponds to errors.Boundary conditions are tested to ensure module operateproperly at boundaries established to limit or restrictprocessing. Therefore the trainingreceived by the personnel involved with the system invarious capacities helps and hinders and my even preventthe successful implementation of management informationsystem.This test focuses verification effort on the small unit iddesign module. editing data formulating queries. Improve the output of operators.Fundamentals of computer2. Integration testing :Validation Testing :Output TestingUse Acceptance Testing CHAPTER : 8 IMPLEMENTATION User Testing/ User Manual Even well designed system can succeed or fail because of the way they are operated and used. All paths in the control structure are exercised toensure all statements in a module are executed at least onceand finally all errors handling paths are tested to seemessage are intelligent. User Training User must be trained on use of equipment. Weakness in any aspect of training mylead to awkward situations that creates errors. Improve accuracy in result.Training to get all required information’s from thesystem PROPOSED SOLUTIONS:To develop a system that would recomplish the following:Reduce the paperwork and storage area. deleting andinserting of records.

It has user friendly interface having quickauthenticated access to documents. Easily scalable to grow with changing systemrequirement. .Manage the man and machine resources efficiently. Locate CV’s easily by various parameters. check out & updates. It is useful to divides software maintenance into twocategoriesSoftware updates – which results in a functionalspecification for the software. S/W Maintenance : I (developer) am responsible for loadingthe software and I will provide the fee maintenance of thissoftware for one year but this does not include future upgraduation. Secured check in.which leaves the functionalspecification intact. Database Security – User identification and passwordprovision to prevent unauthorized access. The activity is defined as the process of modifying existingoperational software while leaving its primary functionintact. Software repair. CHAPTER : 9 MAINTENANCE Software maintenance is an extremely important activity. H/W Maintenance : The AMC (Annual Maintenance Cost) isfree for one year run the s/w smoothly on h/w in theirorganization. Security Measures TakenAuthorization- The person who is in change of authorizationis usually called the authorizer. Security From Viruses – Authenticate Virus Software NortonAntivirus 2004 was installed on every machine for virusprevention. Registration was done so as to get automaticupdates in future.

Backup Backups were designed in proper manner. hardware personnel and projectattributes. simple projects in whichsmall teams with good application experience work to a setof less than rigid requirements. Types of projects : The COCOMO model are defined for three classes of softwareprojects areOrganic ProjectRelatively small.) of the software engineering process. Thefirst of these activities is estimation software cost and effortestimation will never be an exact the ultimate cost of software and effort applied to develop it. Model 3 The advanced COCOMO model incorporates allcharacteristics of the intermediate version with anassessment of the cost drivers impact on each step(analysis.).An .Security of Software – Passwords of the system user andadministrator were aesthetically kept eight characters longand not easily guessable thought at the development timethis was avoided and it was only shared with databaseadministrator and asked to change from time to time.Semidetached Project. Model 2. Oracle server backup and filesystem backup.The intermediate COCOMO model computersoftware development effort as a function of program sizeand a set of “cost drivers” that include subjectiveassessments of product. design etc. Thisinclude system backup of NT. The estimation of cost of the project is a difficult task but wecan estimate the cost of the project by various methods. CHAPTER : 10 COST ESTIMATION OF PROJECT The software project management process begins with a setof activities that are collectively called project planning. Model 1-The basic COCOMO model computed softwaredevelopment effort land cost as a function of program sizeexpressed in estimated line of code. Iam using the COCOMO (Constructive Cost Model. There is a backup option in the utility menu.

There arebasically two types of reports1. software andoperational constraints. Allcurrently active enquires can also be added in the website toview if online. It carries information and the source code. CV’s are categorized according to various streams.project has a big scope to do. then all thevarious parts will be display by clicking on the relatedbuttons. http://www. CHAPTER –11 REPORTS Reports The report is the document that contains the informationabout the document contains what type of matter. Notifications are sent tostudents about the companies. main program file. We can store information of allthestudents.User Report2.intermediate (in size andcomplexity) software project in which teams with experiencelevels must meet a mix of rigid and less than rigidrequirements. CHAPTER : 12 FUTURE SCOPE OF THIS PROJECT This software (Project information Management System) is tobe developed as a generalized software package. Sothat in future use any changes can be mode easily. This system has scope of improvement/ amendments.System Report User Report The user report contains the document how to use thesoftware. i.com/doc/39048027/training-and-placement-cell . Like heresome files. In this project the userhave to open only on file.e.scribd. Embedded projectA software project that mustdevelopment within a set of tight hardware.Variouscompanies can access the information. sector can communicate with each other online. Thesystem report is basically use for the system analyst itcontains the necessary information which file is associatedwith other file. System Report While in the system report there are many file having eachsource code and can be maintained by the programmer. Infuture. Students can access previousinformation about placement. Students canmaintain theirinformation and can update it. what are the various links.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->