This action might not be possible to undo. Are you sure you want to continue?
1) Abstract 2) Introduction i) ii) i) ii) iii) i) ii) iii) iv) 5) Forms 6) Reports 7) System Testing i) ii) iii) Unit Testing Integration Testing Performance Testing Project Overview Software & Hardware Specification Proposed System Requirement Analysis & Specification Feasibility Study Data Flow Diagrams Data Dictionary ER Diagrams Software & Hardware Requirements
3) System Analysis
4) System Design
8) Software Tools 9) Technical Notes 10) Conclusion 11) Bibliography
The Hotel Loyalty Programs can be used to entice guests into becoming a regular guest at the hotel. Through this software the Hotel administration can manage their loyalty programs in an effective way. The scope of the project defines only those functionalities which are provided by the eZee Rewards and Loyalty Software. These programs are especially beneficial to hotel chains.eZee Rewards and Loyalty is a software that can be used in the hospitality industry. On the other hand the scope of the users involved in the Rewards and Loyalty Program is defined as the roles of each user in the system and their accessibilities to the different elements and prospects within the system. and make them come back for more. where the benefits of the program can span over their entire hotel chain. (iii) The Member ( The customer of the hotel who subscribed for the Hotel’s Rewards and . Considering the complete functionality and interactions within the eZee Rewards and Loyalty System we will define the roles of each user along with their access permissions towards the various elements of the system. The eZee Rewards and Loyalty System will include three main users who take part in the working of the system as a complete functionality. The various users participating in the system are as follows: (i) (ii) The Hotel Administrator The Hotel Front Desk Office Loyalty Program ) (iv) The System (or the eZee Rewards and Loyalty Software). Personalized service and rewards deliver exceptional experiences to guests.
The number of different types in the membership cards can also be edited as per the hotel’s choice.e. These fields in the configuration page can be edited anytime by the hotel . As an initial step after buying the software. The hotel is solely responsible on its decision on how to avail the subscription form to its customers. the hotel administration. The details of all the customers are maintained by the hotel administration as a part of the hotel’s database. the hotel administration has to setup the configuration page of the eZee Rewards and Loyalty to determine how the points are allocated to the different subscribers of the hotel’s Loyalty program. These membership cards represent the points allocated to the customers who subscribed for the hotel loyalty program. For this the hotel maintains a subscription form and is made available on the hotel’s website. The Hotel Loyalty Program works primarily on the basis of the type of membership cards the hotel administration provides to its customers who subscribed for the hotel loyalty program. the hotel front desk office and the customers of the hotel. The subscription to the eZee Rewards and Loyalty is offered to the customers of the hotel when they make their first reservation in the hotel. The hotel administration will be given an address book table as a part of the software which can be updated by the hotel staff in order to maintain the records of all the subscribers of the Hotel’s Loyalty Program.e. As a default the eZee Rewards and Loyalty provides the hotel with three types of membership cards i. Initially when a customer of the hotel subscribes for the hotel’s Rewards and (i) Points per day stay and (ii) Points for the overall amount spent. The hotel can also opt to send the subscription form through emails to the appropriate customers. This address book is supposed to be updated on a regular basis to contain the updated membership details list of all the subscribers of the Hotel’s Loyalty Program. (i) Silver (ii) Gold and (iii) Platinum.The eZee Rewards and Loyalty includes three types of users i. The hotel can also maintain a paper form which can be given to the new customers who have made their first reservation. The fields on the configuration page may include the following: administration. The names of these membership cards can be edited as per the will of the hotel.
Loyalty program, he/she is given a membership card of silver type. From this moment onwards the customer will be a part of the Rewards and Loyalty Program that the hotel offers. Hence the customer becomes a subscriber for the hotel’s Rewards and Loyalty program and can now increase his points of loyalty by making more and more reservations in this hotel or by spending on other hospitality services offered by the hotel. In this way the customer who is now a member of the Rewards and Loyalty program of the hotel can increase his/her points by becoming a regular customer to the hotel. Moreover by increasing his/her points the customer can improve his/her membership type so as to avail nice offers and discounts from the hotel. The subscribers to this program can view their points from time to time either through the hotels’ website or through automated mails delivered by the hotel. This depends on the hotels decision on how to implement the process of delivering updates to their subscribers. Whenever the subscribers have crossed the milestone of their respective membership type, they are promoted to the next membership type and the new membership card is posted to the respective subscriber’s official postal address. This posting of the membership card is the responsibility of the front desk office of the respective hotel. All this happens when an alert message triggers to the front desk office of the hotel as and when the milestones of any subscriber is crossed. This automated reminder can benefit the hotel’s administration by reducing their overhead of maintaining and updating their customers’ membership details. It also acts as a prime factor in the process of maintaining consistency in updating the records. In this way it is close to impossible for the management to miss on the updating of any membership account.
Figure:Overview of eZee Rewards and Loyalty Software
This section involves the scope of the project and the scope of its users. The scope of the project defines only those functionalities which are provided by the eZee Rewards and Loyalty Software. On the other hand the scope of the users involved in the Rewards and Loyalty Program is defined as the roles of each user in the system and their accessibilities to the different elements and prospects within the system. The eZee Rewards and Loyalty System will include three main users who take part in the working of the system as a complete functionality. Considering the complete functionality and interactions within the eZee Rewards and Loyalty System we will define the roles of each user along with their access permissions towards the various elements of the system. The various users participating in the system are as follows: (i) The Hotel Administrator (ii) The Hotel Front Desk Office (iii) The Member ( The customer of the hotel who subscribed for the Hotel’s Rewards and Loyalty Program ) (iv) The System (or the eZee Rewards and Loyalty Software). 1) Role Based Access a) The Hotel Administrator i) Configures The Configuration Page The hotel administrator is responsible for deciding on the number of points to be allocated per day stay and also the number of points allocated for each hospitality service provided by the hotel. These hospitality services may include: Reservation charges, Add Ons, Restaurants, Bars, Shops, Other Extra Charges depending on the corresponding hotel.
ii) Creation Of A New Member The hotel administrator can create a new user in the Rewards and Loyalty Program by approving the subscription submitted by the customer as legitimate only after reviewing his/her details completely. iii) Creation Of The Subscription Form For The Rewards And Loyalty Program The hotel administrator can design the subscription form for making it available to all the customers who are new to the hotel. Having made their first reservation, these customers are provided with the subscription form. iv) Making The Subscription Form Available To The New Customers The hotel administrator can do this in three ways as mentioned below: • • • The form can be made available on the hotel’s website. The form can be mailed to his new customers ( i.e. those customers who have just made their first reservation in the hotel ). The form can be handed over in hand at the time when the customer makes his/her reservation for the first time in the hotel. v) Manage Existing Members • The hotel administrator has the access to all his subscribers’ information and can therefore communicate with them. He can send automated messages to his eligible subscribers about any offers or discounts which are announced. • The hotel administrator can send alert messages to the existing Rewards and Loyalty members ( i.e. customers who have subscribed for the Rewards and Loyalty Program ) regarding their membership expiry issues. • • The hotel administrator maintains the details of all the members of the hotel’s Rewards and Loyalty Program. Apart from details in the form of data records and tables like address book the hotel administrator also maintains and generates reports for details of all the subscribers to the hotel’s Rewards and Loyalty Program.
b) The Hotel Front Desk Office i) Delivers Membership Cards To Members • The Front Desk Office is prompted when there is a member whose membership points cross the milestone of the respective membership card type. vii) Reward Redemption The hotel administrator maintains all the details of reward redemption and the members associated with this functionality. In this case the front desk office is responsible for delivering the updated card to the respective member of the Rewards and Loyalty Program. • The Front Desk Office is also responsible for delivering membership cards to all the members of the list given by the hotel administrator. c) The Member i) View The Member’s Profile Page The members i. the customers who have subscribed for the Rewards and Loyalty Program of the hotel can view their profile page in the hotel’s website under the . This list may include members who have lost their membership cards and also the new members of the Rewards and Loyalty Program.e. This list includes the members who have lost their membership cards and have applied for new ones and also those members who are new to the Rewards and Loyalty Program and are yet to receive their default membership cards.vi) Maintains Information About Cards To Be Sent The hotel administrator maintains a list of all the cards that are to be delivered to the respective members of the Rewards and Loyalty Program along with their complete details.
ii) Maintains A View/Modify Page This page is only available for the hotel administrator to modify or update its members’ membership details. The hotel administrator can find these details on the configuration page in the Rewards and Loyalty section of the hotel’s website. . Hence this page is seen when a user makes a reservation in the hotel. Through this a search can be made possible for a member’s details or for a particular reservation’s details. iii) Interact With The Front Desk Office The member can interact with the front desk office of the hotel for any kind of enquiries. These details are available for the hotel administrator to modify whenever necessary. This profile page also contains the Rewards and Loyalty points of the member along with the membership details.Rewards and Loyalty section. 2) This page includes a confirmation message for making a reservation in the hotel. iii) Maintains A Search Page This is provided for the hotel administrator and the hotel front desk office. This pages accessibility can be defined by the hotel administrator. iv) Maintains A Reports Page Through this the system generates reports for the different users and also for the different reservations related to the hotel. ii) Apply For A New Membership Card The member can apply for a new membership card in case he/she loses their card. d) The System ( or the eZee Rewards and Loyalty Software ) i) Maintains The Configuration Page The latest configuration details are maintained.
2.4(IDE) Jboss 4. 150GB Hard Disk space.87 GB RAM.0 Eclipse 3.0 or above or Netscape navigator.3GA(AS) Mysql 5.3) This page also includes two options. . SOFTWARE & HARDWARE SPECIFICATION Software: Server Side: Microsoft Windows XP Internet explorer 5. Hardware: Pentium Dual Core Processor. 1.0 (DB) Navicat( DB client) Client Side: Any Web Browser on any Windows operating system. Java 6. These are respectively for viewing the user’s profile if he/she is already a member in the Rewards and Loyalty Program of the hotel and for viewing the Rewards and Loyalty Form for subscribing for the Rewards and Loyalty Program of the hotel if he/she is new to this program.
SYSTEM ANALYSIS .
PROPOSED SYSTEM: eZee Rewards and Loyalty is a software that can be used in the hospitality industry.. These programs are especially beneficial to hotel chains. REQUIREMENT ANALYSIS & SPECIFICATION: The scopes of eZee Loyalty and Rewards are: The scope of the project defines only those functionalities which are provided by the eZee Rewards and Loyalty Software. In this system administrator collects the information from different hotels. where the benefits of the program can span over their entire hotel chain. The Hotel Loyalty Programs can be used to entice guests into becoming a regular guest at the hotel. Personalized service and rewards deliver exceptional experiences to guests. Through this software the Hotel administration can manage their loyalty programs in an effective way. The contents are as follows: . The system will be divided into the following subsystems. eZee Loyalty and Rewards system administrator contacts the specified rooms and collects the information and update the information time to time and store in database in a flexible manner. and make them come back for more. The scope of the users involved in the Rewards and Loyalty Program is defined as the roles of each user in the system and their accessibilities to the different elements and prospects within the system. User Get Information eZee Loyalty and Rewards is a Web Application. The scope of this system includes planning and designing.
Menu Structure Loyalty and Rewards Configure Membership Levels Points o Metric Types o Qualification Metrics o Points Allocation o Points Purchase o Rewards Membership Details Add/View/Modify Search Reports .User Module Tasks: Create a separate Menu item in eZeeFrontOffice application called “Loyalty and Rewards” In that create the following sub menu items viz..
Simply stated. we have to be very clear about what are the technologies that are to be required for the development of the new system.at this point in time. . not too many detailed design of the system. i) Understand the different technologies involved in the proposed system: Before commencing the project. making it difficult to access issues like performance. this test of feasibility asks if the system will work when it is developed and installed. Are there major barriers to Implementation? Here are questions that will help test the operational feasibility of a project: . ii) Find out whether the organization currently possesses the required technologies: o Is the required technology available with the organization? o If so is the capacity sufficient? For instance – “Will the current printer be able to handle the new reports and forms required for the new system?” OPERATIONAL FEASIBILITY: Proposed projects are beneficial only if they can be turned into information systems that will meet the organizations operating requirements.FEASIBILITY STUDY TECHINICAL FEASIBILITY: Evaluating the technical feasibility is the trickiest part of a feasibility study. costs on (on account of the kind of technology to be deployed) etc. A number of issues have to be considered while doing a technical analysis. This is because.
better employee morale. . improved accuracy of operations. These could include increased customer satisfaction. Are the current business methods acceptable to the user? If they are not. expediting activities. against the benefits that would accrue from having the new system in place. Since the proposed system was to help reduce the hardships encountered. better documentation and record keeping. A simple economic analysis which gives the actual comparison of costs and benefits are much more meaningful in this case. Have the user been involved in the planning and development of the project? Early involvement reduces the chances of resistance to the system and in General and increases the likelihood of successful project. In addition. Is there sufficient support for the project from management from users? If the current system is well liked and used to the extent that persons will not be able to see reasons for change. This feasibility study gives the top management the economic justification for the new system. there may be resistance. Users may welcome a change that will bring about a more operational and useful systems. ECONOMIC FEASIBILITY: Economic feasibility attempts 2 weigh the costs of developing and implementing a new system. faster retrieval of information. There could be various types of intangible benefits on account of automation. In the existing manual system. the new system was considered to be operational feasible. improvement in product quality better decision making timeliness of information. this proves to be a useful point of reference to compare actual costs as the project progresses.
SYSTEM DESIGN .
. A DFD does not show a sequence of steps. The following are some DFD symbols used in the project External entities Process: A transaction of information that resides within the bounds of the system to be module. A DFD only shows what the different process in a system is and what data flows between them. while data stores are data structures.DATA FLOW DIAGRAMS Data flows are data structures in motion. may be as simple as buffer of queue or as a relational database. The diagram will describe the logical data flows dealing the movements of any physical items. DATAFLOWS DATASTORE: A repository of data that is to be stored for use by one or more processes. who actually uses it is temporarily stored. along which data structures travel. . it is a diagrammatic approach. Hence it is possible that the data flow and the data store would be made up of the same data structure. Data flows are paths or ‘pipe lines’. Data flows are data structures in motion.e. while data stores are data structures at rest. Data flow diagrams is a very handy tool for the system analyst because it gives the analyst the overall picture of the system. where as the data stores are place where data structures are kept until needed. A DFD is a pictorial representation of the path which data takes From its initial interaction with the existing system until it completes any interaction. The DFD also gives the insight into the data that is used in the system i.
RULES FOR DFD: • • • • • Fix the scope of the system by means of context diagrams. A data flow can’t connect two external entity. Identify and label each process internal to the system with rounded circles. Identify all data flows for each process step. except simple Record retrievals. Therefore. Label data flow on each arrow. Use details flow on each arrow. A process is required for all the data transformation and transfers. Make sure the names of the processes accurately convey everything the process is done. There can’t be unnamed data flow. Organize the DFD so that the main sequence of the actions reads left to right and top to bottom. with squares. Identify all inputs and outputs. never connect a data store to a data source or the destinations or another data store with just a data flow arrow. Indicate external sources and destinations of the data. Number each occurrence of repeated external entities. • • • • • • • • • • • Do not indicate hardware and ignore control information. LEVELS OF DFD: . Use the details flow arrow to indicate data movements. There must not be unnamed process.
LEVEL-1: SUBSYSTEM LEVEL DATA FLOW A level-1 DFD describes the next level of details within the system. When exploded into DFD They are represented by: • • • LEVEL-0 : SYSTEM INPUT/OUTPUT LEVEL-1 : SUBSYSTEM LEVEL DATAFLOW FUNCTIONAL LEVEL-2 : FILE LEVEL DETAIL DATA FLOW. LEVEL-2: FILE LEVEL DETAIL DATA FLOW All the projects are feasible given unlimited resources and infinite time. which makeup the whole. It is both necessary and prudent to evaluate the feasibility of the project at the earliest possible time. This diagram is similar to the combined user-level context diagram. At the top level. dealing inputs to and outputs from the system and major processes. Feasibility and the risk analysis are pertained in many ways. If project risk is great. detailing the data flows between subsystems. an Overview of the different systems in an organization is shown by the way of context analysis diagram. .The complexity of the business system means that it is a responsible to represent the operations of any system of single data flow diagram. LEVEL-0: SYSTEM INPUT/OUTPUT LEVEL A level-0 DFD describes the system-wide boundaries. The input and output data shown should be consistent from one level to the next.
DATA DICTIONARY .
ER DIAGRAMS UNIFIED MODELING LANGUAGE DIAGRAMS • The unified modeling language allows the software engineer to express an analysis model using the modeling notation that is governed by a set of syntactic semantic and pragmatic rules. Structural model view In this model the data and functionality are arrived from inside the system. The analysis representation describes a usage scenario from the end-users perspective. ii. Implementation Model View In this the structural and behavioral as parts of the system are represented as they are to be built. Each view is defined by a set of diagram. • User Model View i. This view represents the system from the users perspective. • A UML system is represented using five different views that describe the system from distinctly different perspective. depicting the interactions of collection between various structural elements described in the user model and structural model view. This model view models the static structures. which is as follows. . Behavioral Model View It represents the dynamic of behavioral as parts of the system.
bank customer …etc. UML design modeling. Examples of actors include users like administrator.. Use cases are used during requirements elicitation and analysis to represent the functionality of the system. . Use cases focus on the behavior of the system from external point of view. implementation modeling and environmental model views. Use case Diagrams represent the functionality of the system from a user’s point of view. which focuses on the behavioral modeling. or another system like central database. Actors are external entities that interact with the system. which focuses on the user model and structural model views of the system.Environmental Model View In this the structural and behavioral aspects of the environment in which the system is to be implemented are represented. UML is specifically constructed through two different domains they are UML Analysis modeling.
Use Case diagram Admin: eZee Loyalty and Rewards Login Password Configure Admin Search Add/View Reports .
Use Case Diagram User : eZee Loyalty and Rewards Registration Login Forgot Password User Update Profile View Details Get Rooms Log Out .
Sequence Diagram .eZee Loyalty and Rewards (Admin Login) Administrator Login Home Data Base 1 : Login() 2 : I nvalid Data() 3 : Request to DB() 4 : Response from DB() 5 : Get Home() .
User Login Sequence U se r Lo gin H o me Da ta Ba se 1 : Lo gin () 2 : I nv a lid Da ta () 3 : R e qu e st to DB() 4 : R e spo nse f ro m D B() 5 : G e t H o me () .
User Activities U se r P a sw o rd V ie w M o d if y D a ta Ba se 1 : C ha ng e () 2 : V ie w o w n D e t a ils ( ) 3 : M o d if y ( ) 4 : Sa v e () 5 : S a v e () 6 : S a v e () .
It is essential to distinguish between client servers and file server systems. Midrange or Main Frames server usually capable of handling request from more than one client. This technology has acquired a certain critical mass attention with its dedication conferences and magazines. However. have declared that Client Servers is their main future market.2 billion in 1996. Both provide shared . a client input from or report can transparently access and manipulate both local database on the client machine and remote databases on one or more servers. which has generated more heat than light. The typical client either a PC or a Work Station connected through a network to a more powerful PC. Client Server is one. With the proper middleware. What is a Client Server Two prominent systems in existence are client server and file server systems. Major computer vendors such as IBM and DEC. The key client server idea is that client as user is essentially insulated from the physical location and formats of the data needs for their application. The growth in the client server development tools from $200 million in 1992 to more than $1. An added bonus is the client server opens the door to multi-vendor database access indulging heterogeneous table joins. A server may need to access other server in order to process the original client request. A survey of DBMS magazine reveled that 76% of its readers were actively looking at the client server solution. with some configuration server may also act as client. Workstation. Client server implementations are complex but the underlying concept is simple and powerful. The software mediating this client server interaction is often referred to as MIDDLEWARE. and also more hype than reality.SOFTWARE & HARDWARE REQUIREMENTS Client Server Over view: With the varied topic in existence in the fields of computers. A client is an application running with local resources but able to request the database and relate the services from separate remote server.
the client server middleware provides a flexible interface between client and server. drums and later disks). Delete with full relational integrity backup/ restore performance for high volume of transactions. During mainframe era choices were quite limited. Front end or User Interface Design The entire user interface is planned to be developed in browser specific environment with a touch of Intranet-Based Architecture for achieving the Distributed Concept. The earliest client server solutions therefore could best be characterized as “SLAVE-MASTER”. . subject to access permissions. A strong central information service department ruled the corporation. when and to whom. Why Client Server Client server has evolved to solve a problem that has been around since the earliest days of computing: how best to distribute your computing. Time-sharing changed the picture. Remote terminal could view and even change the central data. who does what. tapes. etc. The role of the rest of the corporation limited to requesting new or more frequent reports and to provide hand written forms from which the central data banks were created and updated. data generation and data storage resources in order to obtain efficient. The client server offers full relational database services such as SQL-Access. Insert. online users could formulate adhoc queries and produce local reports with out adding to the MIS applications software backlog. and the client server remained subordinate to the Slave\Master. Access to these resources was initially confined to batched runs that produced departmental reports at the appropriate intervals. Record modifying. as the central data banks evolved in to sophisticated relational database with non-programmer query languages. A central machine housed both the CPU and DATA (cards. And. However remote access was through dumb terminals. cost effective departmental an enterprise wide data processing.network access to data but the comparison dens there! The file server simply provides a remote disk drive that can be accessed by LAN applications on a file-by-file basis.
Features of The Language Used . The database connectivity is established by using the Java Data Base Connectivity. and the dynamism of the designed by concentrating on the constructs of the Java Server Pages. The standards of three-tire architecture are given major concentration to keep the standards of higher cohesion and limited coupling for effectiveness of the operations.The browser specific components are designed by using the HTML standards. Communication or Database Connectivity Tier The Communication architecture is designed by concentrating on the Standards of Servlets and Enterprise Java Beans.
SYSTEM TESTING Testing .
Hence one should not start testing with the intent of showing that a program works. systematically and with minimum effort and time. Levels of Testing . Psychology of Testing The aim of testing is often to demonstrate that a program works by showing that it has no errors. but the intent should be to show that a program doesn’t work. we can say. Testing performs a very critical role for quality assurance and for ensuring the reliability of software. The tests are inadequate to detect possibly present errors. Testing Objectives The main objective of testing is to uncover a host of errors. Stating formally. Testing is a process of executing a program with the intent of finding an error. The results of testing are used later on during maintenance also.Testing is the process of detecting errors. The software more or less confirms to the quality and reliable standards. A good test case is one that has a high probability of finding error. Testing is the process of executing a program with the intent of finding errors. A successful test is one that uncovers an as yet undiscovered error. The basic purpose of testing phase is to detect the errors that may be present in the program. if it exists.
Systems are not designed as entire nor are they tested as single systems. The basic levels of testing are as shown below… Client Needs Requirements Design Acceptance Testing System Testing Integration Testing Code Unit Testing System Testing The philosophy behind testing is to find errors. Test cases are devised with this in mind. A strategy employed for system testing is code testing. To ensure that the coding is perfect two types of testing is performed or for that matter is performed or that matter is performed or for that matter is performed on all systems.e. Types Of Testing . Code Testing: This strategy examines the logic of the program.In order to uncover the errors present in different phases we have the concept of levels of testing. every path is tested. To follow this method we developed some test data that resulted in executing every instruction in the program and module i.
Unit testing is first done on modules. Link Testing Link testing does not test software but rather the integration of each module in system. The goal here is to see if modules can be integrated properly. length. independent of one another to locate errors. the emphasis being on testing interfaces between modules. When developing the module as well as finishing the development so that each module works without any error. All modules must be successful in the unit test before the start of the integration testing begins. In this application developer tests the programs up as system. There are so many modules like Login. HWAdmin. Software units in a system are the modules and routines that are assembled and integrated to form a specific function.e. the module. Integration Testing After the unit testing we have to perform integration testing. . type etc. Giving different sets of inputs has tested each module. The inputs are validated when accepting from the user. The Programmer tests where modules are designed with different parameters. In this project each service can be thought of a module. and PManager. Using the detailed design and the process specifications testing is done to uncover errors within the boundary of the module. MasterAdmin. This testing activity can be considered as testing the design and hence the emphasis on testing module interactions. Unit Testing Link Testing Unit Testing Unit testing focuses verification effort on the smallest unit of software i. The primary concern is the compatibility of each module. This enables to detect errors. Through this errors resulting from interaction between modules initially avoided. Normal User.
I tested step wise every piece of code. The testing phase is an important part of software development. . the internal logic of program is not emphasized. White Box Testing This is a unit testing method where a unit will be taken at a time and tested thoroughly at a statement level to find the maximum possible errors. sample data. When integrating all the modules I have checked whether the integration effects working of any of the services by giving different combinations of inputs with which the two services run perfectly before Integration. Test cases should be selected so that the largest number of attributes of an equivalence class is exercised at once. System Testing Here the entire software system is tested. and the goal is to see if software meets its requirements. I have generated a list of test cases. The reference document for this process is the requirements document. which is used to check all possible combinations of execution paths through the code at every module level. Acceptance Testing Acceptance Test is performed with realistic data of the client to demonstrate that the software is working satisfactorily. Testing here is focused on external behavior of the system. It is the process of finding errors and missing operations and also a complete verification to determine whether the objectives are met and the user requirements are satisfied.In this project integrating all the modules forms the main system. In this project ‘Network Management Of Database System’ I have collected some data and tested whether project is working correctly or not. Here entire ‘ATM’ has been tested against requirements of project and it is checked whether all requirements of project have been satisfied or not. The white box testing is also called Glass Box Testing. taking care that every statement in the code is executed at least once.
Criteria Satisfied by Test Cases Test cases that reduced by a count that is greater than one.Black Box Testing This testing method considers a module as a single unit and checks the unit at interface and communication with other modules rather getting into details at statement level. Test cases that tell us something about the presence or absence of classes of errors. Output for a given set of input combinations are forwarded to other modules. . the number of additional test cases that much be designed to achieve reasonable testing. rather than an error associated only with the specific test at hand. Here the module will be treated as a block box that will take some input and generate output.
SOFTWARE TOOLS Methodology .
4: Waterfall Model (SDLC) System Development Life Cycle (SDLC) .The method being used in developing the system is the system Development Life Cycle (SDLC) The SDLC process includes project identification and selection. implementation and maintenance. analysis. project initiation and planning. PROJECT IDENTIFICATION AND SELECTION . PROJECT INITIATION AND PLANNING ANALYSIS LOGICAL DESIGN PHYSICAL DESIGN IMPLEMENTATION MAINTENANCE Figure 2. design.
1.4. maintain and replace or enhance information system. the exiting system is studies by collecting the information through the Internet and analyzed the information to get alternatives for the used of proposed system.4 Phase 4: Design Logical design is the fourth phase in SDLC methodology. Part of the logical design of the information system is to devise the user interface. .4. 1. The interface plays an important role to connect the user with the system and is thus extremely important.2 Phase 2: Project initiation and planning During this phase the Gantt chart has been developed as a time line to determining the task involve in developing the Web Based XpathAnalyzer. 1. The main reason SDLC model is chosen because in SDLC it is possible to complete some activities in one phase in parallel with some activities of another phase.4. 1.1.1.The system Development Life Cycle(SDLC) is a traditional methodology used to develop.3 Phase 3: Analysis In the phase.1. scope and objective of the Web Based XpathAnalyzer. Determine what the Web Based XpathAnalyzer should do. The life cycle can also be interactive that is phase are repeated as required until an acceptable system is found. The functional features chosen for the proposed system in Analysis phase are described.4.1.1 Phase 1: Project identification and selection In this phase the project information system needs are identified and analyzed such as identified the title of the project that is Web Based XpathAnalyzer.
TECHNICAL NOTES • Windows XP Operating System .
0 Framework Microsoft MYSQL-5.0.51b-win32 Internet Mozilla FireFox .• • • Microsoft Visual Studio-2007 2.
which are planned to be developed in near future. Any specification untraced errors will be concentrated in the coming versions. it is found to be bug free as per the testing standards that are implemented. .CONCLUSION The entire project has been developed and deployed as per the requirements stated by the user.
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue listening from where you left off, or restart the preview.