This action might not be possible to undo. Are you sure you want to continue?
PROJECT DONE UNDER E J O B I N D I A The job portal system is a technological web
based system built to provide an easy interacting interface between the job seekers A T A D A M A S I N S T I T U T E O Fand the recruiters via internet.
PROJECT GUIDE-PRITAM TECHNOLOGY AUGUST 2011 TO JULY 2011
ISHITA CHAKRABORTY(TL) TWISHA BANNERJEE SHREEJA CHAKRABORTY NAIRITA PANJA KALPANA JHA SAHELI MUKHERJEE
Certificate of Originality
To Whom It May Concern
This is to certify that the Project Report entitled JOB PORTAL SYSTEM, submitted to EJOB INDIA PRIVATE LIMITED, in partial fulfillment of the requirement for the award of the degree of Bachelor of Information Technology, is an original work carried out by Ishita Chakraborty, Twisha Bannerjee, Shreeja Chakraborty, Nairita Panja, Kalpana Jha, Saheli Mukherjee under the guidance of Mr Pritam .
The matter in this project is a genuine work done by the student and has not been submitted elsewhere of any course of study.
Ejob India Private Limited Industry Seal and Signature
Principal (ADAMAS INSTITUTE OF TECHNOLOGY)
Acknowledgement is not only a ritual but, also an expression of indebtedness to all those who help the process of project development. One of the most pleasant aspects in collecting the necessary information compiling it is the opportunity to think of those who actively contributed to it. I wish to express my heartfelt thanks to all those who assisted me during this project. My deepest thanks to Pritam, the guide of the project for guiding and correcting my project with attention and care. He had great pain in going through the project and make necessary corrections as and when needed. I express my thanks to the Principal of Adamas Institute of Technology, for extending his support. My deep sense of gratitude to ejobindia for their support. Mostly I would like to thank them for giving me the opportunity to prepare the project under their guidance. I would like to express my profound and deep sense of gratitude to my institution and faculty members for their invaluable help, guidance and suggestions without which this project would not have been successful. I offer my sincere thanks to all my batch mates for their unconditional help and inspiration at Adamas Institute of Technology .Lastly I would like to express my gratitude to all the staff, who helped me in their own way whenever I needed. We are thankful to Microsoft for developing softwares like Microsoft .Net Framework, Microsoft SQL Server, Microsoft Office for providing us with a platform to develop this software quite easily and comfortably. Last but not the least we would like to thank the reader for bearing with us. We would be grateful to them if they forgive us for our mistakes and help us to rectify them by filling up the provided feedback form.
Table of Contents
which we are going to propose.It is also difficult for the rectriuters to search among a huge number of people their desired candidate So here we’re providing those users to save their time as well as energy . The software helps the recruiters to post a job and find the people for the given post. Some of the most important work that the software we are going to propose performs is as follows: 1. The job seekers can search items and apply for those online without wasting time and energy. Provides a user id and password to every user and use that information to authenticate a user. 2. let us narrate our thinking about the project.Introduction First. these days people have insufficient time to go to the offices and submit their resume or search for their job with desired options . It helps he job seeker to search for their desired job 3. . We all know. And the job seekers can very easily search their job accoding to their options. We’re offering them a web based job portal by which the recuiters will be able to post their job and get the desired candidate.
Why I choose this project .
The . The framework's Base Class Library provides a large range of features including user interface. Also part of the . database connectivity. numeric algorithms.NET Framework execute in a software environment that manages the program's runtime requirements.NET Framework.TECHNOLOGIES USED Microsoft . and network communications. cryptography.NET Framework is a Microsoft offering and is intended to be used by most new applications created for the Windows platform. The CLR provides the appearance of an application virtual machine so that programmers need not consider the capabilities of the specific CPU that will execute the program. The class library is used by programmers.NET Framework The Microsoft . It includes a large library of coded solutions to common programming problems and a virtual machine that manages the execution of programs written specifically for the framework. this runtime environment is known as the Common Language Runtime (CLR). who combine it with their own code to produce applications. web application development. data access. Programs written for the .NET Framework is a software framework that can be installed on computers running Microsoft Windows operating systems. The .
is available on Windows CE platforms. Additionally. the . The previous stable version of the framework. and can also be installed on Windows XP and the Windows Server 2003 family of operating systems. The class library and the CLR together constitute the . the .InteropServices and System Enterprise Services namespaces of the framework. A reduced version of the framework. the final version of the .0 of the .NET Framework.NET Framework 4 release candidate. memory management. and exception handling.NET Framework provides means to access functionality that is implemented in programs that execute outside the .NET Micro Framework is targeted at severely resource constrained devices Principal Designing Features: Interoperability Because interaction between new and older applications is commonly required. is included with Windows 7.NET Framework 4 was released. Microsoft released a . the . 3. . Version 3.NET Compact Framework. The . On April 12 2010. In February 2010.5.CLR also provides other important services such as security. including Windows Mobile devices such as smart phones. Runtime .NET Framework family also includes two versions for mobile or embedded device use.NET environment. Version 4 of the framework was released as a public beta on 20 May 2009.NET Framework is included with Windows Server 2008 and Windows Vista. access to other functionality is provided using the P/Invoke feature.
XML document manipulation and so on. The CTS specification defines all possible data types and programming constructs supported by the CLR and how they may or may not interact with each other conforming to the Common Language Infrastructure (CLI) specification.Common Runtime Engine The Common Language Runtime (CLR) is the virtual machine component of the . Base Class Library The Base Class Library (BCL).NET Framework introduces a Common Type System. Because of this feature. is a library of functionality available to all languages using the . including file reading and writing. Language Independence The . Simplified Deployment The . or CTS.NET Framework supports the exchange of types and object instances between libraries and applications written using any conforming . and exception handling. security.NET language.NET framework. the . guaranteeing certain properties and behaviors in the areas of memory management.NET Framework.NET framework includes design features and tools that help manage the installation of computer software to ensure that it . database interaction. All .NET programs execute under the supervision of the CLR. graphic rendering. The BCL provides classes which encapsulate a number of common functions. part of the Framework Class Library (FCL).
is to provide a language-neutral platform for application development and execution.NET Framework within the scope of the CLR. garbage collection. and the C++/CLI language to both ECMA and the ISO. Security The design is meant to address some of the vulnerabilities. Portability The design of the . this functionality will not be tied to a single language but will be . and that it conforms to security requirements. That is. Additionally. Common Type System. or CLI. By implementing the core aspects of the .NET Framework allows it to theoretically be platform agnostic.NET provides a common security model for all applications. such as buffer overflows. and interoperability.does not interfere with previously installed software. and thus cross-platform compatible. making them available as open standards. . security. Microsoft submits the specifications for the Common Language Infrastructure (which includes the core class libraries. that have been exploited by malicious software. a program written to use the framework should run without change on any type of system for which the framework is implemented. including functions for exception handling. Common Language Infrastructure (CLI) The purpose of the Common Language Infrastructure. This makes it possible for third parties to create compatible implementations of the framework and its languages on other platforms. and the Common Intermediate Language). the C# language.
NET Framework. Microsoft's implementation of the CLI is called the Common Language Runtime. Security . common on the Windows platform for all DLL and EXE files. As mandated by specification. The public key token is a unique hash generated when the assembly is compiled. assemblies are stored in the Portable Executable (PE) format. and public key token. Code Access Security is based on .available across the many languages supported by the framework. The CLR checks the metadata to ensure that the correct method is called. version number. Metadata is usually generated by language compilers but developers can create their own metadata through custom attributes.NET metadata. Metadata All CIL is self-describing through . The complete name of an assembly (not to be confused with the filename on disk) contains its simple text name. A private key can also be specified known only to the creator of the assembly and can be used for strong naming and to guarantee that the assembly is from the same author when a new version of the assembly is compiled (required to add an assembly to the Global Assembly Cache). culture.NET assemblies. and is also used to implement the reflective programming capabilities of . or CLR. and validation and verification. Assemblies The CIL code is housed in . thus two assemblies with the same public key token are guaranteed to be identical from the point of view of the framework.NET has its own security mechanism with two general features: Code Access Security (CAS). Metadata contains information about the assembly.
The demand causes the CLR to perform a call stack walk: every assembly of each method in the call stack is checked for the required permission. has to split the application into subdomains.NET Framework uses AppDomains as a mechanism for isolating code running in a process. however. AppDomains can be created and code loaded into or unloaded from them independent of other AppDomains. AppDomains can also be configured independently with different security privileges. During validation the CLR checks that the assembly contains valid metadata and CIL. The algorithm used is quite conservative. Other code can demand that calling code is granted a specified permission. as faults or crashes in one AppDomains do not affect rest of the application. and whether the internal tables are correct. hence occasionally code that is 'safe' does not pass. which generally means code that is installed on the local machine. it is not done by the CLR. Verification is not so exact. if any assembly is not granted the permission a security exception is thrown. .evidence that is associated with a specific assembly. This helps increase the fault tolerance of the application. Unsafe code will only be executed if the assembly has the 'skip verification' permission. Code Access Security uses evidence to determine the permissions granted to the code. . The developer. The verification mechanism checks to see if the code does anything that is 'unsafe'. When an assembly is loaded the CLR performs various tests. Two such tests are validation and verification. This can help increase the security of the application by isolating potentially unsafe code. Typically the evidence is the source of the assembly (whether it is installed on the local machine or has been downloaded from the intranet or Internet).
NET Framework CLR frees the developer from the burden of managing memory (allocating and freeing up when done). Most of the built in APIs are part of either System.dll are considered to be a part of the BCL. Windows Presentation Foundation.NET Framework class library is divided into two parts: the Base Class Library and the Framework Class Library. The FCL is much larger in scope than standard libraries for languages like C++. The .NET Compact Framework. To this end. among others.NET types (objects) is done . The classes in mscorlib.dll and some of the classes in System.NET Framework.NET.* namespaces. The Framework Class Library (FCL) is a superset of the BCL classes and refers to the entire class library that ships with .The Base Class Library (BCL) includes a small subset of the entire class library and is the core set of classes that serve as the basic API of the Common Language Runtime. instead it does the memory management itself.NET Framework includes a set of standard class libraries. ADO. Windows Communication Foundation among others. Language Integrated Query. Memory management The . such as file reading and writing.NET class libraries are available to all CLI compliant languages. It includes an expanded set of libraries. and XML document manipulation.* or Microsoft. The BCL classes are available in both .The .core. and comparable in scope to the standard libraries of Java. the memory allocated to instantiations of . The class library is organized in a hierarchy of namespaces. database interaction. including Windows Forms.dll and System. Microsoft Silverlight and Mono. These class libraries implement a large number of common functions.NET Framework as well as its alternative implementations including .NET. The . graphic rendering. ASP.
Each . as well as objects referred to by CPU registers. and then recursively walk them. It uses . mark-and-sweep garbage collector. on a separate thread from the application's thread.NET metadata and reflection to discover the objects encapsulated by an object.NET Framework includes a garbage collector which runs periodically. As long as there exists a reference to an object. a pool of memory managed by the CLR. which are pointers to objects on the managed heap (managed objects). When there is no reference to an object. and it cannot be reached or used. that enumerates all the unusable objects and reclaims the memory allocated to them. the GC runs are nondeterministic. it recursively enumerates all the objects reachable from the root objects and marks them as reachable. The GC runs only when a certain amount of memory has been used or there is enough pressure for memory on the system. The .contiguously from the managed heap. However. These include references to static objects and objects defined as local variables or method parameters currently in scope. All objects not marked as reachable are garbage This is the mark phase.NET Garbage Collector (GC) is a non-deterministic. it pauses the application. which might be either a direct reference to an object or via a graph of objects. it still holds on to the memory allocated to it. However. When the GC runs. the object is considered to be in use by the CLR. .NET application has a set of roots. and for each object referred to in the root. It then enumerates all the objects on the heap (which were initially allocated contiguously) using reflection. Since the memory held by garbage is not of any consequence. it becomes garbage. it is considered free space. Since it is not guaranteed when the conditions to reclaim memory are reached. this leaves chunks of free space between objects which were initially . compacting.
4322.0 1.0 3. Objects are assigned a generation. Thus. fewer objects need to be checked and compacted. Any reference to an object invalidated by moving the object is updated to reflect the new location by the GC.4506.57 3 2003-0424 Visual Studio . Windows Server 2008 .contiguous.4 2 2005-1107 Visual Studio 2005 3.50727.0. and the Generation 1 objects that survive another collection are Generation 2 objects. Higher generation objects are garbage collected less frequently than lower generation objects.3705. The objects are then compacted together.1 1. The application is resumed after the garbage collection is over.NET 2003 Windows Server 2003 2.NET Framework is actually generational. by using memcpy to copy them over to the free space to make them contiguous again.30 2006-1106 Windows Vista.0.0 2. as older objects tend to have a larger lifetime than newer objects. newly created objects belong to Generation 0.NET Framework uses up to Generation 2 objects. This helps increase the efficiency of garbage collection.1. The objects that survive a garbage collection are tagged as Generation 1. The .0 2002-0213 Visual Studio . The . The GC used by .NET Framework Stack Versio n Version Number Release Date Visual Studio Default in Windows 1.0. by removing older (and thus more likely to survive a collection) objects from the scope of a collection run.NET 1.
EFFICIENT DATA ACCESS. and managed C# compile to a common Intermediate Language. provides efficient access to relational databases and a variety of data sources.1 2010-0412 Visual Studio 2010 ADVANTAGES: OOP.NET all of the languages VB.21022.0 4.3.NET.With . LANGUAGE INDEPENDENCE.5 3.NET.The . Windows Server 2008 R2 4.30319..Each assembly can also contain built-in security information that can indicate precisely who or what category of user or process is allowed to call which methods on which class. CODE SHARING. which replaces the traditional DLL.5.0. J#. introducing the concept of the assembly. DEBUGGING. GOOD DESIGN-A base class library.NET components.8 2007-1119 Visual Studio 2008 Windows 7.NET Framework simplifies debugging which support for Runtime diagnostics .NET has completely revamped the way that code is shared between applications. C#. collectively known as ADO. IMPROVED SECURITY. which is designed from the ground up in a highly intuitive way.NET Framework is entirely based on object-oriented principles right from the start.. This means that languages are interoperable in a way that has not been seen before.A set of .
and object-oriented. Visual J# and Visual C++.NET Framework. a powerful and easy-touse debugger. and other tools. is a programming language designed for building a wide range of applications that run on the ." The term Visual denotes a brand-name relationship with other Microsoft programming languages such as Visual Basic. While multiple implementations of the specification exist. All of these products are packaged with a graphical IDE and support rapid application development of Windows-based applications. an unqualified reference to "C#" is taken to mean "Visual C#. project templates. Visual Studio supports Visual C# with a full-featured Code Editor. Microsoft Visual C# is Microsoft's implementation of the C# programming language specification. designers.Visual C#: Microsoft Visual C# 2005. type-safe. With its many innovations. Visual FoxPro. Visual C# is by far the one most commonly used. The . . C# enables rapid application development while retaining the expressiveness and elegance of C-style languages. which Microsoft also created. It is based on the ECMA/ISO specification of the C# language. included in the Microsoft Visual Studio suite of products. C# is simple. powerful. In most contexts. code wizards. well-designed classes that speed up the development cycle significantly. pronounced C sharp.NET Framework class library provides access to a wide range of operating system services and other useful.
C# implements the modern programming concepts of objectoriented language. C# provides the ability of code extension to the developer.ADVANTAGES: C# supports effective and reusable components. C# is portable at the same time it is cross language compatible for all Microsoft Windows based language. .
Originally bought from Sybase.Microsoft SQL Server: Generically. When capitalized. Microsoft have released versions 6. the term generally refers to either of two database management products from Sybase and Microsoft. Definition: SQL Server is a relational database developed and sold by Microsoft. Both companies offer client-server DBMS products called SQL Server. SQL Server uses an enhanced version of SQL called T-SQL. 7. 6. The Express Edition of SQL Server 2005 is used in the C+ + and C# tutorials. Microsoft SQL Server 2008 Reporting Services provides a complete. any database management system (DBMS) that can respond to queries from client machines formatted in the SQL language. server-based platform designed to support a wide variety of . 2000 and 2005.5.
. Top New Features: • Design reports with any structure by using the new unique layout capabilities of Flexible Report Layout • Benefit from enhanced performance and scalability to reach all Render reports into Microsoft Office Word format Integrate Reporting Services with Microsoft Office SharePoint Create reports with richly formatted text Display data graphically with enhanced visualization users throughout the enterprise • • Services for central delivery and management of business insight • • capabilities ADVANTAGES: Through this kind of sites you one came to know now a days what kind of products are occupying the markets. Everyone can get various information regarding any new item. They don’t have to pay time or money instantly. Everyone can access the site and do shopping instantly online.reporting needs enabling organizations to deliver relevant information where needed across the entire enterprise.
. Microsoft Power point. .Net. To build up a good interacting interface between the seeker and recruiter To make myself familiar with the professional tools like Visual Studio 2008. Microsoft word. Photoshop CS4 etc.Objectives We have the following objectives in our mind: To provide the better accessibility to the job seekers to search jobs and apply to the same To help the recruiters search for the people and save both time and energy.
The language used is C#.Category of the Project This proposed software would be a web application.net. The IDE used is Visual Studio 2008. we will be using overall C# . The GUI Tool which we use in the front end is ASP . Therefore. At the back end we are using SQL server. To develop the website we would be using 3-tier architecture of . The complete GUI will be designed with proper care.net.net concept in my project .
Problem Definition: Problem faced by an individual during searching for a job are as follows: They have to spend their time as well as money and energy searching for a job with their desired options It also becomes hectic and a difficult job for the recruiters to search for their desired candidate .
Clear evidence of this is to be found in an unprecedented growth in the software. In modern world computerized systems are used almost everywhere. . SAD is the starting point for system design. I am going to analyze the following user requirement as they face a lot of problem to operating a college management system. During this analysis stage. Now one aspect of this analysis is defining the boundaries of the system and determining whether and how this system is interacting with the other related systems.Analysis: Systems Analysis Definition . The term is most commonly used in the context of commercial programming. Now analyzing the minutes of discussion with the clients and summarizing the problem. The programmers are then responsible for implementing it.e.(SAD) The analysis of the role of a proposed system and the identification of the requirements that it should meet. systems analysis) and producing a design. The last couple of years have witnessed an upsurge of interest in computer system. where software developers are often classed as either systems analysts or programmers. The systems analysts are responsible for identifying requirements (i. transactions involve in the current system are noted. In other words system analysis s a detailed study of the various performed by the system and their relationship within and outside of this system. data are collected on the available files and decisions points.
In fact. voice recognition software etc. In modern times faster lifestyles requires the job to be done quickly. Software has its own strength depending on the power of the programmer. banking software. high-speed digital computer is one of the reasons for the recent growth in software. The presented software is concerned with a college management system. and it is hard enough to do that job without the aid of the computer. . Many types of software are now available in the market to solve problems.Now lots of software’s are found for various works like Graphics software. which can be used in any college.
Tools and Platforms Used PLATFORM Windows 7 TOOLS Ultimate PURPOSE OS Platform Visual Studio 2008 RAD Tool C# Background Programs MS Word 2007 Typing and editing documents Documentation MS PowerPoint 2007 Slide Show Make presentation for Project MS Paint Photo Editing. Screen shorts Support design. .
term.JOB PORTAL SYSTEM Requirement Analysis Software Requirement Specifications A Software Requirements Specification (SRS) is a complete description of the behavior of the system to be developed. Non-functional requirements are requirements which impose constraints on the design or implementation (such as performance engineering requirements. Use cases are also known as functional requirements. The intended audience for this document is the development . testing team and end users of the product. It includes a set of use cases that describe all the interactions the users will have with the software. In addition to use cases. Product Perspective: 30 FRONT END BACK END . or design constraints) Purpose: The specification document describes the capabilities and efficiency that will be provided by the SOFTWARE application “The Integrated System”. quality standards. It also states the various required constraints by which the system will be abide. the SRS also contains nonfunctional (or supplementary) requirements.
JOB PORTAL SYSTEM 31 .
which is the drive that boots your system. the default installation location is your system drive. Increasing your RAM above the recommended system configuration will increase your performance. Performance has not been tuned for minimum system configuration.0. as listed above. you can install the application on any drive. You cannot install Visual Studio on Windows NT 4. and ensure that additional space. the installation process installs some files on your system drive. For information on the hardware requirements for other products that are included in some Visual Studio . local Web application development is only supported in Windows XP Professional. Windows 2000. Regardless of the application's location.NET installer. working with large projects. specifically when running multiple applications. Windows XP Home does not support local Web application development. is available on the drive on which you install the application. When you start the Visual Studio . read their associated readme files. Windows NT 4. ensure that the above amount of space is available on your system drive regardless of the application's location.JOB PORTAL SYSTEM System Requirement: The computer on which you install your Visual Studio . However. or doing enterprise-level development. and Windows Server 2003.NET editions. 32 . Consequently.NET edition should meet the following system requirements.0 supports only the installation of remote components.
Windows Server 2003. 256 colors Recommended: High Color 16-bit Microsoft Mouse or compatible pointing device Same Same Same Same Same Same CD-ROM or DVD-ROM Drive Video Mouse Same Same Same Same Same Same Same Same Same 33 .0 Required 800 x 600. The type of media provided with the product determines whether a CDROM or DVD-ROM is required. Windows XP. Windows XP Professional & Windows Server 2003 — 192 MB Recommended: 128MB for 2000 Professional. Windows XP Home — 96 MB. 256 MB for XP Professional & Windows Server 2003 Visual C++ Same Visual C# Same Visual J# Same RAM Same Same Same Available Hard Disk Space Operating System 750 MB on system drive. Require ment Processor Visual Basic PC with a Pentium II-class processor. 450 MHz Recommended: Pentium III-class. or Windows NT 4.JOB PORTAL SYSTEM Microsoft Windows 2000 Datacenter Server is not a supported operating system. Windows 2000 Server — 192 MB. 160 MB for XP Home. 256 MB for 2000 Server.5 GB installation drive Windows® 2000. 600MHz Windows 2000 Professional — 96 MB. 2.
Portability: The application will be easily portable on any window-based system. 34 . It can be installed in such a system which does not have . It will be easy to incorporate new requirements in the individual modules. sufficient to enable designers to design the system and testers to test the system. Maintainability: The application will be designed in a maintainable manner.JOB PORTAL SYSTEM Specific Requirements: This section contains the software requirements to a level.NET installed in it.
OUTPUT DEVICE: VDU (Color Monitor) OPERATING SYSTEM: Windows XP with Service Pack 2 or above. SOFTWARE REQUIREMENT SPECIFICATIONS: 35 . B. INPUT DEVICE: Multimedia Keyboard and Microsoft mouse or compatible pointing device. HARDWARE REQUIREMENT SPECIFICATIONS: PROCESSOR: 1.JOB PORTAL SYSTEM SOFTWARE & HARDWARE SPECIFICATIONS:a. HARD DISK: 40 GB and above. MEMORY: 256 MB and above.6 GHz and above.
However.JOB PORTAL SYSTEM Microsoft . Character user interface : 36 .5 Visual Studio 2008 Sql server Theoretical Background: One of the primary reasons for the immense popularity of computers is the speed with which they can accomplish specific tasks. A good user interface will be: Easy to learn Easy to use Attractive There are two types of user interfaces: A.Net Framework 3. Any applications have two parts: 11 User interface: This is the screen displayed by the application. computer applications are not always easy to use. We interact with an application via the interface.
All interactions between the user and the application are performed via the user.JOB PORTAL SYSTEM Here text is the medium of information exchange.the user must be able to react intuitively to an interface presented in such because it emulates real life 1 Programming 1 : Computers need clear out instructions to tell them what to do and when to do. They are very easy to use . the user has to spend effort and time for getting used to the way it works. The user interface makes the program easy to use. The application displays text. It also specifies the valid option. The user then responded to these prompts by specifying the required information using text.interface. which prompted the user for the required information. for any applications to be successful. B. Graphics user interface : Interfaces that use graphics is called graphics user interface (GUI). This is what goes out in the background.Such interfaces are very popular because they are more user friendly. 37 . with each new application. A set of instructions to carry out a specified job is called a program. Thus. it needs to have good user interface. if any. The disadvantage with character user interface (CUI) is that. The user can identify with the graphics displayed on the screen.
Generally.JOB PORTAL SYSTEM Feasibility study A feasibility study is an evaluation of a proposal designed to determine the difficulty in carrying out a designated task. Small business owners may find it helpful to conduct a feasibility study whenever they 38 . a feasibility study is an evaluation or analysis of the potential impact of a proposed project We can also say that a feasibility study is a detailed analysis of a company and its operations that is conducted in order to predict the results of a specific future course of action. a feasibility study precedes technical development and project implementation. In other words.
If these important factors are not analyzed then definitely it would have impact on the organization and the development and the system would be a total failure. We will be able to determine what resources are essential to complete varied situations and gain an understanding of how to draw on our strengths. the introduction of a new product or service. This is because it makes analysis of different aspects like cost required for developing and executing the system. the acquisition of another company. the time required for each phase of the system and so on. The feasibility study is the important step in any software development process. This is the best way for one to grasp the impact of future decisions one may be considering. The feasibility study will help one accurately anticipate what will and will not work in varied situations. or the hiring of additional employees. Steps in Conducting a Feasibility Study: 39 . In such situations. Through feasibility study we gain an understanding of the competition and marketplace indicators that affect the business. For example.JOB PORTAL SYSTEM anticipate making an important strategic decision. a feasibility study can help a small business's managers understand the impact of any major changes they might contemplate. a purchase of major equipment or a new computer system. a company might perform a feasibility study to evaluate a proposed change in location. The feasibility study provides one with objective information to evaluate existing services and strengths.
For example. the information provided in the feasibility study can prove valuable in implementation.JOB PORTAL SYSTEM • The main objective of a feasibility study is to determine whether a certain plan of action is feasible—that is. and whether or not it is worth doing economically. It can be used to develop a strategic plan for the project. • The second part of a good feasibility study should focus on the proposed plan of action and provide a detailed estimate of its costs and benefits. In some cases. it should begin with an evaluation of the entire operation. its position in the marketplace. By providing information on consumer needs and how best to meet them. primary customers. a feasibility study can also lead to new ideas for strategic changes. translating general ideas into measurable 40 . It would also include information on a company's major competitors. and its financial situation. a feasibility study may lead management to determine that the company could achieve the same benefits through easier or cheaper means. and any relevant industry trends. it may be possible to improve a manual filing system rather than purchase an expensive new computerized database. whether or not it will work. Although the core of the study is dedicated to showing the outcomes of specific actions. If the proposed project is determined to be both feasible and desirable. a good feasibility study would review a company's strengths and weaknesses. This sort of overview provides small business owners and managers with an objective view of the company's current situation and opportunities. For example.
To be able to provide a meaningful analysis of the data. the consultant should have expertise in the industry. In most cases. The small business owner must be sure that those conducting the study have full access to the company and the specific information they need. It is also important for small businesses to assign an internal person to help gather information for the feasibility study. Advantages of making Feasibility study: There are many advantages of making feasibility study some of which are summarized below: • This study being made as the initial step of software development life cycle has all the analysis part in it which helps in analyzing the system requirements completely. . 41 . The goals can then be broken down further to create a series of concrete steps and outline how the steps can be implemented.JOB PORTAL SYSTEM goals. a feasibility study should be performed by a qualified consultant in order to ensure its accuracy and objectivity. • Helps in identifying the risk factors involved in developing and deploying the system . the feasibility study will show the various consequences and impacts associated with the plan of action. Throughout the process.
• proposed project will be acceptable to the people or not. funding and other important decisions which is very essential for an organization to run profitably and for the system to run stable. The different types of feasibility studies are as follows: • Technical feasibility study: It is used to determine the Schedule feasibility study: It is used to determine the time Social feasibility study: It is used to determine whether a requirements of technologies for the current system. Different Types of Feasibility: In the conduct of feasibility study. This is because based on the report the organization decides about cost estimation. • helps the organization and system to run efficiently. . • So a feasibility study is a report which could be used by the senior or top persons in the organization. the analyst will usually consider seven distinct but inter-related types of feasibility. This determination typically examines the probability of the project 42 . • factor related to the current system. • Feasibility study helps in making plans for training developers for implementing the system. .JOB PORTAL SYSTEM • The feasibility study helps in planning for risk analysis Feasibility study helps in making cost/benefit analysis which .
Secondly. the software used for encryption and decryption purpose is alo easily available.0 operating system. Finally.JOB PORTAL SYSTEM being accepted by the group directly affected by the proposed system change. So we can conclude that the website is operationally feasible as doing any operation in this website is very simple and it does not involve any complicacy. Any user who knows simple English language can use this website. • Legal feasibility study: It is used to determine the legal scrutiny Marketing feasibility study: It is used to determine the single and of the current system. • multi-dimensional market forces that affect the current system. Windows XP. There are four types of marketing feasibility study. which are as follows: 1) Economic feasibility 2) Legal feasibility 3) Operational feasibility 4) Schedule feasibility 5) Is it technically feasible or not? The project is made with the help of a PC is easily available. the other software used to develop this project can easily interface with each other and also compatible with Windows 2000.net framework or SQL server to use this website. Windows Server 2003. or Windows NT 4. 6) Is it technically feasible or not?: This website is very user –friendly. 43 . The user does not need to be familiar with .
44 . 8) Is it schedule feasible or not? The developer required only two month to develop this website. These two softwares will be installed automatically while installing our software. the developed website holds obviously social feasibility as this website does not perform any illegal operation and does not break our social law. now we can easily conclude that this software is economically feasible. Windows Server 2003. 9) Is it socially feasible or not? Yes. So we can say that the s website is time feasible.0whose cost is minimal. Windows XP. or Windows NT 4.JOB PORTAL SYSTEM 7) Is it economically feasible or not? The project is economically feasible as to install this software we need the minimum hardware configuration that we require installing Windows 2000. So.
output formats and the major modules in the system and their specification are decided. particularly testing and maintenance. During detailed design. which is independent of the target language in which the software will eventually be implemented. System design. aims to identify the modules that should be in the system. At the end of system design all the major data structures. design takes us towards how to satisfy the needs. The design of a system is perhaps the most critical factor affecting the quality of the software. This document is similar to a blueprint or plan for the solution and is used later during implementation. In other words. 45 . it has a major impact on the later phase.system design and detailed design. During this phase further details of the data structures and algorithmic design of each of the modules is specified in a high-level design description language. which is sometimes also called top-level design. This phase is the first step in moving from the problem domain to the solution domain. the internal logic of the modules specified in system design is decided. starting with what is needed. testing and maintenance.JOB PORTAL SYSTEM Screen Design The purpose of the design phase is to plan a solution of the problem specified by the requirement document. the specifications of these modules and how they interact with each other to produce the desired results. file formats. The output of this phase is the design document. The design activity is often divided into two separate phases.
Most methodology focuses on system design. In other words. TASK & ENVIRONMENT ANALY SIS 46 . It also includes user interface design. schema design and normalized tables and date integrity and constraints.JOB PORTAL SYSTEM In system design the focus is on identifying the logic for each of the modules. A design methodology is a systematic approach to creating a design by application of a set of techniques and techniques. in system design the attention is on what components are needed. while in detailed design how the components can be implemented in software is the issue. program structure. It should be included with the requirements given below: INTERFACE VALIDATION USER. Project design include the desired featured and operations in details.
JOB PORTAL SYSTEM
IMPLEMENTATION INTERFACE DESIGN
JOB PORTAL SYSTEM
A flowchart is a common type of diagram, that represents an algorithm or process, showing the steps as boxes of various kinds, and their order by connecting these with arrows. This diagrammatic representation can give a step-by-step solution to a given problem. Data is represented in these boxes, and arrows connecting them represent flow / direction of flow of data. Flowcharts are used in analyzing, designing, documenting or managing a process or program in various fields. A flow chart, or flow diagram, is a graphical representation of a process or system that details the sequencing of steps required to create output. A typical flow chart uses a set of basic symbols to represent various functions, and shows the sequence and interconnection of functions with lines and arrows. Flow charts can be used to document virtually any type of business system, from the movement of materials through machinery in a manufacturing operation to the flow of applicant information through the hiring process in a human resources department. Each flow chart is concerned with one particular process or system. It begins with the input of data or materials into the system and traces all the procedures needed to convert the input into its final output form. Specialized flow chart symbols show the processes that take place, the actions that are performed in each step, and the relationship between various steps. Flow charts can include different levels of detail
JOB PORTAL SYSTEM
as needed, from a high-level overview of an entire system to a detailed diagram of one component process within a larger system. In any case, the flow chart shows the overall structure of the process or system, traces the flow of information and work through it, and highlights key processing and decision points. Flow charts are an important tool for the improvement of processes. By providing a graphical representation, they help project teams to identify the different elements of a process and understand the interrelationships among the various steps. Flow charts may also be used to gather information and data about a process as an aid to decision making or performance evaluation. For example, the owner of a small advertising agency who hopes to reduce the time involved in creating a print ad might be able to use a flow chart of the process to identify and eliminate unnecessary steps. Though flow charts are relatively old design tools, they remain popular among computer programmers working on systems analysis and design. In recent years, many software programs have been developed to assist business people in creating flow charts.
JOB PORTAL SYSTEM
Types of Flowchart:
Sterneckert (2003) suggested that flowcharts can be modeled from the perspective of different user groups (such as managers, system analysts and clerks) and that there are four general types:
Document flowcharts, showing controls over a document-flow Data flowcharts, showing controls over a data flows in a system System flowcharts showing controls at a physical or resource Program flowchart, showing the controls in a program within a
through a system
system Notice that every type of flowchart focuses on some kind of control, rather than on the particular flow itself.
systems flowcharts. That same year Marilyn Bohl (1978) stated "in practice. and process flowcharts are just a few of the different types of flowcharts that are used in business and government". A rectangle to represent an activity or step. and the detailed flowchart. Each step or activity within a process is indicated by a single rectangle. the general flowchart. which are sometimes referred to as terminal activities. 51 • • . two kinds of flowcharts are used in solution planning: system flowcharts and program flowcharts”. For example Andrew Veronis (1978) named three basic types of flowcharts: the system flowchart. which is known as an activity or process symbol. Some of the main symbols that are used to construct flow charts include: • A round-edged rectangle to represent starting and ending activities.JOB PORTAL SYSTEM However there are several of these classifications. Fryman (2001) stated that there are more differences: "Decision flowcharts. Constructing Flow Charts: Flow charts typically utilize specialized symbols. many diagram techniques exist that are similar to flowcharts but carry a different name. More recently Mark A. such as UML activity diagrams. In addition. logic flowcharts. product flowcharts.
and 5) Use the flow diagram and continuously update it as needed. Constructing a flow chart involves the following main steps: 1) Define the process and identify the scope of the flow diagram. 4) Finalize the diagram. The answer determines the path that will be taken as a next step. 2) Identify project team members that are to be involved in the construction of the process flow diagram. 52 . which is known as a decision symbol. 3) Define the different steps involved in the process and the interrelationships between the different steps (all team members should help develop and agree upon the different steps for the process). The question to be answered or decision to be made is written inside the diamond. • Flow lines show the progression or transition from one step to another. involving other concerned individuals as needed and making any modifications necessary.JOB PORTAL SYSTEM • A diamond to signify a decision point.
A data flow diagram (DFD) is a significant modeling technique for analyzing and constructing information processes. Additionally. A DFD can be easily drawn using simple symbols. Data Flow Diagram (DFD) is an illustration that explicates the passage of information in a process. free downloadable diagramming tools. A DFD demonstrates business or technical process with the support of the outside data saved.JOB PORTAL SYSTEM DFD (Data Flow Diagram): In the late 1970s data-flow diagrams (DFDs) were introduced and popularized for structured analysis and design (Gane and Sarson 1979). plus the data flowing from the process to another and the end results. This analysis can be carried out to precisely the level of detail required. 53 . showed how the data moved from one process to another. as well as its logical storage. Data flow diagrams can be used to provide a clear representation of any business function. A DFD can also be referred to as a Process Model. DFD illustrates this flow of information in a process based on the inputs and outputs. The technique starts with an overall picture of the business and continues by analyzing each of the functional areas of interest. The technique exploits a method called top-down expansion to conduct the analysis in a targeted way. DFD literally means an illustration that explains the course or movement of information in a process. DFDs show the flow of data from external entities into the system. complicated processes can be easily automated by creating DFDs using easy-touse. As the name suggests. A DFD can be referred to as a Process Model.
Data Store: The data store shape is used to represent locations where data is stored. a DFD can be utilized to visualize data processing or a structured design. The direction of the data movement is represented by the arrow. the data flowing from a process to another. Privilege Boundary: 54 . The multiple process can be broken down into its sub processes in another DFD. they only store data. Data Flow: The data flow shape represents data movement within the application. Numerous levels may be required to explain a complicated system. This basic DFD can be then disintegrated to a lower level diagram demonstrating smaller steps exhibiting details of the system that is being modeled. A DFD illustrates technical or business processes with the help of the external data stored. Process: The process shape represents a task that handles data within the application.JOB PORTAL SYSTEM Additionally. External Entity: The external entity shape is used to represent any entity outside the application that interacts with the application via an entry point. The task may process the data or perform an action based on the data. and the results. Multiple Processes: The multiple process shape is used to present a collection of sub processes. Data stores do not modify the data. A designer usually draws a context-level DFD showing the relationship between the entities inside and outside of a system as one single step.
It is simple and easy to understand by users and can be easily extended and refined with further 55 . Gane and Sarson. however. Used effectively. it is a useful and easy to understand modeling tool. Before it was eventually replaced. Alone. a copy machine suffered frequent paper jams and became a notorious troublemaker. Palmer. Together with these. workflow modeling tools. Someone observed the situation and flowcharted the troubleshooting procedure used by most people. It is easily integrated with data modeling. it provides analysts and developers with solid models and specs. One of the primary tools of the structured analysis efforts of the 1970's it was developed and enhanced by the likes of Yourdon. it has limited usability. When to use Data Flow Diagram :The DFD is an excellent communication tool for analysts to model processes and functional requirements. McMenamin. and textual specs.JOB PORTAL SYSTEM The privilege boundary shape is used to represent the change of privilege levels as the data flows through the application. It is still considered one of the best modeling techniques for eliciting and representing the processing requirements of a system. It has broad application and usability across most software development projects. Often. Examples of Data Flow Diagrams :These examples demonstrate how to draw data flow diagram. a problem could be cleared by simply opening and closing the access panel.
The different versions are Context Diagrams (Level 0). Processes cannot be decomposed after reaching a certain lower level. data is introduced into the system from the external environment. and so on and so forth. And then the processed data is produced as an output or a result. Create a Data Flow Diagram :Data flow diagrams can be used to provide a clear representation of any business function. Principle for Creating Data Flow Diagrams :Therefore.one level). leveled sets of Data Flow Diagrams. Once entered the data flows between processes. In a DFD system. the principle for creating a DFD is that one system may be disintegrated into subsystems. The technique starts with an overall picture of the business and continues by analyzing each of the functional areas of interest. This analysis can be carried out to 56 . Every subsystem in a DFD represents a process. Functionally decomposed. Partitioned Diagrams (single process only -. In this process or activity the input data is processed. which in turn can be disintegrated into subsystems at a much lower level. Each process in a DFD characterizes an entire system.JOB PORTAL SYSTEM specification into a physical version for the design and development teams.
Each process transforms inputs into outputs.JOB PORTAL SYSTEM precisely the level of detail required. Also called a data flow diagram (DFD). most investigations will stop at level 2 and it is very unusual to go beyond a level 3 diagram. 57 . The result is a series of diagrams that represent the business activities in a way that is clear and easy to communicate. the level 1 diagram can then be drawn. Using the context diagram together with additional information from the area of interest. which is a simple representation of the entire system under investigation. the level of detail required will depend on the type of change being considered. The technique exploits a method called top-down expansion to conduct the analysis in a targeted way. However. This is followed by a level 1 diagram. Don't worry about the symbols at this stage. The process model is typically used in structured analysis and design methods. is an essential precursor to business process re-engineering. these are explained shortly. which provides an overview of the major functional areas of the business. or refinement of an existing business process. 4 and so on. Initially a context diagram is drawn. However. The level 1 diagram identifies the major business processes at a high level and any of these processes can then be analyzed further giving rise to a corresponding level 2 business process diagram. This process of more detailed analysis can then continue C through level 3. it shows the flow of information through a system. using a technique like data flow diagrams. Identifying the existing business processes. migration to new technology. A business model comprises one or more data flow diagrams (also known as business process diagrams).
Many diagram levels may be needed to express a complex system. are usually described in a connected textual specification. Primitive processes.JOB PORTAL SYSTEM The model generally starts with a context diagram showing the system as a single flowchart connected to external entities outside of the system boundary. 58 . This process explodes to a lower level DFD that divides the system into smaller parts and balances the flow of information between parent and child diagrams. those that don't explode to a child diagram.
JOB PORTAL SYSTEM 59 .
JOB PORTAL SYSTEM ERD 60 .
JOB PORTAL SYSTEM screenshots 61 .
Verification refers to the set of activities that ensure that software correctly implements a specific function. Validation refers to a different set of activities that ensure that the software has been built is traceable to customer requirements. Boehm’s states this another way: Verification: “Are we building the product right?” Validation: “Are we building the right product?” The definition of V & V encompasses many of the activities that we have referred to as software quality analysis (SQA).JOB PORTAL SYSTEM Validation Check: Software testing is one element of a broader topic that is often referred to as verification and validation (V & V). 62 .
Not all defects will necessarily result in failures. in certain situations the system will produce wrong results. unrecognized requirements that result in errors of omission by the program designer. usability.JOB PORTAL SYSTEM Defects and Failure: Not all website defects are caused by coding errors. bug) in the software source code. and security. e. performance. 63 .g. One common source of expensive defects is caused by requirement gaps. Software faults occur through the following processes. defects in dead code will never result in failures. For example. scalability. which results in a defect (fault. maintainability. A single defect may result in a wide range of failure symptoms.. Examples of these changes in environment include the software being run on a new hardware platform. causing a failure. If this defect is executed. A common source of requirements gaps is nonfunctional requirements such as testability. A programmer makes an error (mistake). alterations in source data or interacting with different software. A defect can turn into a failure when the environment is changed.
no unauthorized user cannot access it. 64 . In spite of that every time the user wants to login he has to give his user name and password which adds to the security of the project. Security Issues of ISO 74982: Authentication: It is any process by which a system verifies the identity of an user who wishes to access the resource stored in system. Moreover.e.JOB PORTAL SYSTEM System Security Measures This software itself being a security project provides some of the best software security measures. In this website a user cannot login and use the features and facilities provided by the website without creating a user account. all the data that are saved using this software are encrypted i.
The website will use security policy which specifies who is authorized to do the task. only some user can access specific commands buttons. Non-repudiation: This website will be user specific i.e. The project aims to provide the following security measures: Authentication Access Control This project is unable to provide the following security measures: Data Integrity Non-repudiation 65 .JOB PORTAL SYSTEM Access Control: Access control is ability to permit or deny the use of a particular resource by particular entity. Data Integrity: With the help of this website everyone can buy various product online.
JOB PORTAL SYSTEM List of reports The entire available repository can produce n number of reports. 66 . for the sake of completeness of the project proposal the following list we are proposing. 2) Details of passwords. 3) Details of personal information. The numbers of reports will definitely be increased over time. 1) Details of friends.
JOB PORTAL SYSTEM 67 .
JOB PORTAL SYSTEM limitations 68 .
JOB PORTAL SYSTEM 69 .
3) By including a better security for the both the users 4) And by making the communication between the job seeker and the recruiter very easy.JOB PORTAL SYSTEM Future Scope and Future Enhancement of the Project The initial focus of this project was developing a secured integrated system. 70 . 2) More efficient and easier categorical search engine. This project will have a very bright future if the following can be incorporated: 1) Updating the software according the user’s needs. This website covers some of the activities needed by an individual for both his personal and professional uses.
and Windows Server OS's like Windows 2000. Windows 98 . 72 • . For those of one running Windows and wish to play around with ASP on their own system they need to install Microsoft's Internet Information Services (IIS). Lucky IIS or its micro version Personal Web Server (PWS) comes free with Windows. no active pages. The page must be requested through a web server that supports ASP. Any web pages containing ASP cannot be run by just simply opening the page in a web browser. 2008. As ASP was first introduced by Microsoft on it's web server. Vista. this is why ASP stands for Active Server Pages. For Windows users we can find Internet Information Services (IIS) or Personal Web Server (PWS) in the following places: • Windows XP Pro/2003/2000 . XP Pro.PWS can be found under 'add-ons' on the Windows 98 CD. no server. that runs on all versions of Windows from NT4. including Windows 7. 2003.JOB PORTAL SYSTEM is run on the web server and no ASP will ever be passed to the web browser. Internet Information Services (IIS). it is this web server that ASP pages usually run best on.IIS can be found in 'Add/Remove Programs' in the 'Control Panel'.
Windows XP Home Edition . a division. or an entire organization.One can get hold of IIS by downloading the NT4 Option Pack from Microsoft (don't be fooled by the name as it also runs on Windows 95).IIS and PWS are not supported on this operating system. • For those that do not wish to mess around attempting to install web servers on their own computer there are many hosting companies that supply Windows ASP Hosting including our own Free ASP Website Hosting Service.JOB PORTAL SYSTEM • Windows NT4/95 .IIS and PWS are not supported on this operating system. CMMI in software engineering and organizational development is a trademarked process improvement approach that provides 73 . • Windows ME . CMMI can be used to guide process improvement across a project. CMMI: Capability Maturity Model Integration (CMMI) is a process improvement approach that provides organizations with the essential elements of effective processes that ultimately improve their performance.
provide guidance for quality processes. DMAI: Destination Marketing Association International (DMAI) is a professional organization representing destination marketing organizations and convention and visitor bureaus worldwide.500 professionals from 658+ destination marketing organizations in more than 25 countries. According to the Software Engineering Institute (SEI." CRM: CRM(Customer Relationship Management) is a process or methodology used to learn more about customer’s need and behavior in order to develop stronger relationship with them. They provide members — professionals. As the world’s largest resource for official destination marketing organizations (DMOs). Destination Marketing Association International represents over 1. networking opportunities and marketing benefits available worldwide. CMMI helps "integrate traditionally separate organizational functions.JOB PORTAL SYSTEM organizations with the essential elements for effective process improvement. 74 . and provide a point of reference for appraising current processes. industry partners. 2008). students and educators — with educational resources. set process improvement goals and priorities.
DMAI also owns the Meeting Information Network (MINT). Membership is open to companies that produce. may be defined as the utilization of 75 . CDME). when the European Computer Manufacturers Association (ECMA) changed its name to reflect the organization's international reach.JOB PORTAL SYSTEM They maintain an online bookstore and resource center. the meetings and convention database \ ECMA: Ecma International (Ecma) is an international. private (membershipbased) non-profit standards organization for information and communication systems.BUSINESS: E. market or develop computer or communication systems in Europe. commonly referred to as "eBusiness" or "e-business".Business (Electronic business). The organization was originally founded in 1961 to standardize computer systems in Europe. an accreditation program and an official online travel portal: OfficialTravelGuide.com. E. It acquired its name in 1994. It is located in Geneva. professional certificates and designations (PDM. the name is no longer considered an acronym and no longer uses full capitalization. As a consequence. an e-mail discussion lists for members.
usually text. E. GPU: 76 . Email (Electronic mail) can also be sent automatically to a large no. An ERP system typically has modular hardware and software units and "services" that communicate on a local area network. Commerce constitutes the exchange of products and services between businesses.JOB PORTAL SYSTEM information and communication technologies (ICT) in support of all the activities of business. Electronic commerce focuses on the use of ICT to enable the external activities and relationships of the business with individuals. ERP: Enterprise Resource Planning (ERP) is a term usually used in conjunction with ERP software or an ERP system which is intended to manage all the information and functions of a business or company from shared data stores. sent from one person to another via computer. groups and other businesses. The modular design allows a business to add or reconfigure modules (perhaps from different vendors) while preserving data integrity in one shared database that may be centralized or distributed.MAIL: Messages. of address. groups and individuals and can be seen as one of the essential activities of any business.
but it is also used in computers that use other bus standards. which are usually far less powerful than those on a dedicated video card. It is used in embedded systems. Most computers sold today use an enhanced version of IDE 77 . Modern GPUs are very efficient at manipulating computer graphics. workstations. mobile phones. uses a mouse as well as a keyboard as an input device. In a personal Computer. GUI: GUI (Graphical user interface) is a user interface based on graphics (icons and pictures and menus) instead of text. a GPU can be present on a video card. More than 90% of new desktop and notebook computers have integrated GPUs. The IDE interface is based on the IBM PC Industry Standard Architecture (ISA) 16-bit bus standard. and their highly parallel structure makes them more effective than general-purpose CPUs for a range of complex algorithms.JOB PORTAL SYSTEM A graphics processing unit or GPU (also occasionally called visual processing unit or VPU) is a specialized processor that offloads 3D or 2D graphics rendering from the microprocessor. IDE: IDE (Integrated Drive Electronics) is a standard electronic interface used between a computer motherboard's data paths or bus and the computer's disk storage devices. or it can be on the motherboard. and game consoles. personal computers.
IEEE standards affect a wide range of industries including: power and energy biomedical and healthcare. The IDE (ATA) standard is one of several related standards maintained by the T10 Committee. telecommunications. IEEE: IEEE (Institute of Electrical. IEEE performs its standards making and maintaining functions through the IEEE Standards Association (IEEE-SA).3 Ethernet standard and the IEEE 802. IEEE had close to 900 active standards.JOB PORTAL SYSTEM called Enhanced Integrated Drive Electronics (EIDE). In today's computers. with 500 standards under development. configured as 'master' and 'slave' IDE was adopted as a standard by American National Standards Institute (ANSI) in November. It can have up to two physical drives. Information Technology (IT). transportation. In 2005. information assurance. Provided as standard on Risc PC motherboards. One of the more notable IEEE standards is the IEEE 802 LAN. The ANSI name for IDE is Advanced Technology Attachment (ATA). MAN group of standards which includes the IEEE 802. ISO: 78 . 1990. the IDE controller is often built into the motherboard. Electronics and Engineers) is one of the leading standards-making organizations in the world. nanotechnology. It is a type of hard drive interface.11 Wireless Networking standard. and many more.
the organization promulgates worldwide proprietary industrial and commercial standards. and data access control. It has its headquarters in Geneva. Its scope includes data query and update. makes it more powerful than most non-governmental organizations. SQL was one of the first languages for Edgar F. In practice. Founded on 23 February 1947. schema creation and modification. While ISO defines itself as a nongovernmental organization. is a database computer language designed for managing data in relational database management systems (RDBMS). often referred to as Structured Query Language. Cod’s relational model in his influential 1970 paper. widely known as ISO (pronounced / ˈalso/).kjuːˈɛl/) . SQL: SQL (pronounced /ˌɛs. either through treaties or national standards. SQL is not a Turing complete programming language. "A Relational Model of Data for Large Shared Data Banks “and became the most widely used language for relational databases. is an international-standard-setting body composed of representatives from various national standards organizations. QTP: 79 . Switzerland.JOB PORTAL SYSTEM The International Organization for Standardization (Organization international de normalization). and originally based upon relational algebra. its ability to set standards that often become law. ISO acts as a consortium with strong links to governments.
it must be created as a 3D drawing in a 3D drawing program.JOB PORTAL SYSTEM QTP is quick test professional. a 2D drawing program can be used to illustrate a 3D object. It used to recording and playback method. It is easy to use more than win runner. 80 . 3D graphics and 3D visualization. film or on screen in three planes (X. in order to interactively rotate an object in all axes. It have a keyword view and Expert view. 2D: 2Dimensional refers to visual objects that are constructed on two planes (X and Y. however. width and height). For example: 3D modeling. It is functionality testing tool and also advanced keyword driven test tool. Y and Z). 3D: 3Dimensional refers to objects that are rendered visually on paper. In the computer. Two-dimensional structures are used for 2D images and to simulate 3D images. 3D animation.
Karli Watson. Given below are the names of some books. I have used many resources and for that I am grateful to all the people concerned.JOB PORTAL SYSTEM Bibliography During the development of the project. Jay Glymn. Allen Jones. Bill Evjen. NAME OF THE BOOKS Professional C# 2005 NAME OF THE AUTHORS Christian Nagel. Kogent Solutions INC. C# 2008 Programming Black Book. Morgan Skinner. Platinum Edition 81 Dreamtech Press . NAME OF THE PUBLISHER Witey dreamtech. which I have used during development and documentation of the project.
Pressman Dreamtech Press Dreamtech Press McGraw-Hill International Edition 82 . Cryptography and Network Security Data Communication and Networking Atul Kahate William Stallings Dalton.JOB PORTAL SYSTEM SQL Server 2005(Black Book) SQL Server 2008(Black Book) Software Engineering-a practitioner’s approach. Whitehead and Kogent Kogent Solutions INC Roger S.
JOB PORTAL SYSTEM 83 .
JOB PORTAL SYSTEM 84 .
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue reading from where you left off, or restart the preview.