JOB PORTAL SYSTEM

PROJECT DONE UNDER E J O B I N D I A The job portal system is a technological web

based system built to provide an easy interacting interface between the job seekers A T A D A M A S I N S T I T U T E O Fand the recruiters via internet.
PROJECT GUIDE-PRITAM TECHNOLOGY AUGUST 2011 TO JULY 2011

ISHITA CHAKRABORTY(TL) TWISHA BANNERJEE SHREEJA CHAKRABORTY NAIRITA PANJA KALPANA JHA SAHELI MUKHERJEE

Certificate of Originality
To Whom It May Concern
This is to certify that the Project Report entitled JOB PORTAL SYSTEM, submitted to EJOB INDIA PRIVATE LIMITED, in partial fulfillment of the requirement for the award of the degree of Bachelor of Information Technology, is an original work carried out by Ishita Chakraborty, Twisha Bannerjee, Shreeja Chakraborty, Nairita Panja, Kalpana Jha, Saheli Mukherjee under the guidance of Mr Pritam .

The matter in this project is a genuine work done by the student and has not been submitted elsewhere of any course of study.

Pritam

Ejob India Private Limited Industry Seal and Signature

Principal (ADAMAS INSTITUTE OF TECHNOLOGY)

ACKNOWLEDGEMEN T
Acknowledgement is not only a ritual but, also an expression of indebtedness to all those who help the process of project development. One of the most pleasant aspects in collecting the necessary information compiling it is the opportunity to think of those who actively contributed to it. I wish to express my heartfelt thanks to all those who assisted me during this project. My deepest thanks to Pritam, the guide of the project for guiding and correcting my project with attention and care. He had great pain in going through the project and make necessary corrections as and when needed. I express my thanks to the Principal of Adamas Institute of Technology, for extending his support. My deep sense of gratitude to ejobindia for their support. Mostly I would like to thank them for giving me the opportunity to prepare the project under their guidance. I would like to express my profound and deep sense of gratitude to my institution and faculty members for their invaluable help, guidance and suggestions without which this project would not have been successful. I offer my sincere thanks to all my batch mates for their unconditional help and inspiration at Adamas Institute of Technology .Lastly I would like to express my gratitude to all the staff, who helped me in their own way whenever I needed. We are thankful to Microsoft for developing softwares like Microsoft .Net Framework, Microsoft SQL Server, Microsoft Office for providing us with a platform to develop this software quite easily and comfortably. Last but not the least we would like to thank the reader for bearing with us. We would be grateful to them if they forgive us for our mistakes and help us to rectify them by filling up the provided feedback form.

Thanking you.

Table of Contents

We’re offering them a web based job portal by which the recuiters will be able to post their job and get the desired candidate. And the job seekers can very easily search their job accoding to their options. Provides a user id and password to every user and use that information to authenticate a user. 2.It is also difficult for the rectriuters to search among a huge number of people their desired candidate So here we’re providing those users to save their time as well as energy . these days people have insufficient time to go to the offices and submit their resume or search for their job with desired options . . We all know. The software helps the recruiters to post a job and find the people for the given post. let us narrate our thinking about the project. It helps he job seeker to search for their desired job 3.Introduction First. Some of the most important work that the software we are going to propose performs is as follows: 1. The job seekers can search items and apply for those online without wasting time and energy. which we are going to propose.

.

Why I choose this project .

TECHNOLOGIES USED Microsoft . and network communications. The framework's Base Class Library provides a large range of features including user interface.NET Framework execute in a software environment that manages the program's runtime requirements. cryptography. The class library is used by programmers. web application development.NET Framework The Microsoft . It includes a large library of coded solutions to common programming problems and a virtual machine that manages the execution of programs written specifically for the framework. Programs written for the . database connectivity. Also part of the . The CLR provides the appearance of an application virtual machine so that programmers need not consider the capabilities of the specific CPU that will execute the program. The .NET Framework is a software framework that can be installed on computers running Microsoft Windows operating systems. data access. numeric algorithms. this runtime environment is known as the Common Language Runtime (CLR). The .NET Framework. who combine it with their own code to produce applications.NET Framework is a Microsoft offering and is intended to be used by most new applications created for the Windows platform.

including Windows Mobile devices such as smart phones.NET Compact Framework. the .NET Framework provides means to access functionality that is implemented in programs that execute outside the . and can also be installed on Windows XP and the Windows Server 2003 family of operating systems.NET Framework family also includes two versions for mobile or embedded device use.NET Framework is included with Windows Server 2008 and Windows Vista. On April 12 2010. 3.InteropServices and System Enterprise Services namespaces of the framework.NET Micro Framework is targeted at severely resource constrained devices Principal Designing Features: Interoperability Because interaction between new and older applications is commonly required.NET Framework 4 release candidate. Microsoft released a . . the .NET Framework 4 was released. the final version of the . memory management.NET environment. access to other functionality is provided using the P/Invoke feature. In February 2010. The . and exception handling.NET Framework. the .CLR also provides other important services such as security. Version 3. Version 4 of the framework was released as a public beta on 20 May 2009.5.0 of the . The class library and the CLR together constitute the . The previous stable version of the framework. Additionally. is available on Windows CE platforms. Runtime . A reduced version of the framework. is included with Windows 7.

including file reading and writing.NET framework includes design features and tools that help manage the installation of computer software to ensure that it . database interaction. is a library of functionality available to all languages using the . Language Independence The . XML document manipulation and so on. Simplified Deployment The . part of the Framework Class Library (FCL). Base Class Library The Base Class Library (BCL). or CTS. All .NET Framework introduces a Common Type System. Because of this feature. and exception handling.NET Framework supports the exchange of types and object instances between libraries and applications written using any conforming . The CTS specification defines all possible data types and programming constructs supported by the CLR and how they may or may not interact with each other conforming to the Common Language Infrastructure (CLI) specification.NET framework. graphic rendering.NET programs execute under the supervision of the CLR.Common Runtime Engine The Common Language Runtime (CLR) is the virtual machine component of the . security. guaranteeing certain properties and behaviors in the areas of memory management.NET Framework. The BCL provides classes which encapsulate a number of common functions. the .NET language.

and the Common Intermediate Language).NET Framework allows it to theoretically be platform agnostic. Portability The design of the . the C# language. That is. Common Language Infrastructure (CLI) The purpose of the Common Language Infrastructure. garbage collection. Additionally. This makes it possible for third parties to create compatible implementations of the framework and its languages on other platforms. and that it conforms to security requirements. and thus cross-platform compatible. is to provide a language-neutral platform for application development and execution. Microsoft submits the specifications for the Common Language Infrastructure (which includes the core class libraries. Common Type System. a program written to use the framework should run without change on any type of system for which the framework is implemented. making them available as open standards.NET Framework within the scope of the CLR. including functions for exception handling. this functionality will not be tied to a single language but will be . or CLI. By implementing the core aspects of the . such as buffer overflows. that have been exploited by malicious software. security. and the C++/CLI language to both ECMA and the ISO. Security The design is meant to address some of the vulnerabilities.NET provides a common security model for all applications.does not interfere with previously installed software. and interoperability. .

available across the many languages supported by the framework. and public key token. Assemblies The CIL code is housed in .NET metadata. version number. Security .NET assemblies. Metadata contains information about the assembly. Metadata All CIL is self-describing through . common on the Windows platform for all DLL and EXE files. assemblies are stored in the Portable Executable (PE) format. A private key can also be specified known only to the creator of the assembly and can be used for strong naming and to guarantee that the assembly is from the same author when a new version of the assembly is compiled (required to add an assembly to the Global Assembly Cache). and validation and verification. Code Access Security is based on .NET Framework. The public key token is a unique hash generated when the assembly is compiled. The complete name of an assembly (not to be confused with the filename on disk) contains its simple text name. thus two assemblies with the same public key token are guaranteed to be identical from the point of view of the framework. and is also used to implement the reflective programming capabilities of . or CLR. The CLR checks the metadata to ensure that the correct method is called. Microsoft's implementation of the CLI is called the Common Language Runtime. As mandated by specification. Metadata is usually generated by language compilers but developers can create their own metadata through custom attributes.NET has its own security mechanism with two general features: Code Access Security (CAS). culture.

evidence that is associated with a specific assembly. Other code can demand that calling code is granted a specified permission. as faults or crashes in one AppDomains do not affect rest of the application. The algorithm used is quite conservative. if any assembly is not granted the permission a security exception is thrown. The verification mechanism checks to see if the code does anything that is 'unsafe'. Two such tests are validation and verification. This can help increase the security of the application by isolating potentially unsafe code. AppDomains can be created and code loaded into or unloaded from them independent of other AppDomains. When an assembly is loaded the CLR performs various tests. has to split the application into subdomains. Verification is not so exact. AppDomains can also be configured independently with different security privileges. Typically the evidence is the source of the assembly (whether it is installed on the local machine or has been downloaded from the intranet or Internet). The developer. Unsafe code will only be executed if the assembly has the 'skip verification' permission. . however. This helps increase the fault tolerance of the application. . hence occasionally code that is 'safe' does not pass. The demand causes the CLR to perform a call stack walk: every assembly of each method in the call stack is checked for the required permission. and whether the internal tables are correct. it is not done by the CLR.NET Framework uses AppDomains as a mechanism for isolating code running in a process. During validation the CLR checks that the assembly contains valid metadata and CIL. Code Access Security uses evidence to determine the permissions granted to the code. which generally means code that is installed on the local machine.

NET Framework includes a set of standard class libraries. The BCL classes are available in both . including Windows Forms. and XML document manipulation. It includes an expanded set of libraries. Most of the built in APIs are part of either System.NET. such as file reading and writing.NET Framework CLR frees the developer from the burden of managing memory (allocating and freeing up when done). ADO.The . Memory management The .dll are considered to be a part of the BCL. The FCL is much larger in scope than standard libraries for languages like C++.NET.NET Compact Framework.NET types (objects) is done .* or Microsoft.core. The .NET class libraries are available to all CLI compliant languages.dll and some of the classes in System. Windows Presentation Foundation.The Base Class Library (BCL) includes a small subset of the entire class library and is the core set of classes that serve as the basic API of the Common Language Runtime.NET Framework as well as its alternative implementations including . the memory allocated to instantiations of . ASP. and comparable in scope to the standard libraries of Java. These class libraries implement a large number of common functions. The classes in mscorlib.dll and System.* namespaces. instead it does the memory management itself. The class library is organized in a hierarchy of namespaces. among others. Microsoft Silverlight and Mono. The . graphic rendering. Windows Communication Foundation among others.NET Framework class library is divided into two parts: the Base Class Library and the Framework Class Library.NET Framework. Language Integrated Query. The Framework Class Library (FCL) is a superset of the BCL classes and refers to the entire class library that ships with . To this end. database interaction.

When there is no reference to an object. These include references to static objects and objects defined as local variables or method parameters currently in scope. it pauses the application. When the GC runs. Each . and then recursively walk them. The . It then enumerates all the objects on the heap (which were initially allocated contiguously) using reflection. As long as there exists a reference to an object. it recursively enumerates all the objects reachable from the root objects and marks them as reachable. a pool of memory managed by the CLR. the GC runs are nondeterministic. it still holds on to the memory allocated to it. this leaves chunks of free space between objects which were initially .NET metadata and reflection to discover the objects encapsulated by an object. However. the object is considered to be in use by the CLR. and for each object referred to in the root. which are pointers to objects on the managed heap (managed objects).NET application has a set of roots.NET Framework includes a garbage collector which runs periodically. it is considered free space. Since the memory held by garbage is not of any consequence. mark-and-sweep garbage collector.NET Garbage Collector (GC) is a non-deterministic. The GC runs only when a certain amount of memory has been used or there is enough pressure for memory on the system. on a separate thread from the application's thread. which might be either a direct reference to an object or via a graph of objects.contiguously from the managed heap. It uses . as well as objects referred to by CPU registers. and it cannot be reached or used. compacting. However. Since it is not guaranteed when the conditions to reclaim memory are reached. that enumerates all the unusable objects and reclaims the memory allocated to them. All objects not marked as reachable are garbage This is the mark phase. . it becomes garbage.

4 2 2005-1107 Visual Studio 2005 3.0 1. and the Generation 1 objects that survive another collection are Generation 2 objects. by using memcpy to copy them over to the free space to make them contiguous again.57 3 2003-0424 Visual Studio . The objects that survive a garbage collection are tagged as Generation 1.NET 1. as older objects tend to have a larger lifetime than newer objects.30 2006-1106 Windows Vista.1. Windows Server 2008 .1 1.4322.0.3705. fewer objects need to be checked and compacted.0. newly created objects belong to Generation 0. Higher generation objects are garbage collected less frequently than lower generation objects. Any reference to an object invalidated by moving the object is updated to reflect the new location by the GC.NET Framework Stack Versio n Version Number Release Date Visual Studio Default in Windows 1.0 3.4506. The objects are then compacted together.0 2002-0213 Visual Studio . The application is resumed after the garbage collection is over. The .NET Framework is actually generational. Objects are assigned a generation.NET 2003 Windows Server 2003 2.0 2. Thus. The GC used by .contiguous. by removing older (and thus more likely to survive a collection) objects from the scope of a collection run.NET Framework uses up to Generation 2 objects.50727. This helps increase the efficiency of garbage collection.0. The .

provides efficient access to relational databases and a variety of data sources.30319..NET.  DEBUGGING.  CODE SHARING.NET Framework simplifies debugging which support for Runtime diagnostics .NET components.NET all of the languages VB..  LANGUAGE INDEPENDENCE.0.21022. introducing the concept of the assembly. Windows Server 2008 R2 4. C#.5 3.NET Framework is entirely based on object-oriented principles right from the start.Each assembly can also contain built-in security information that can indicate precisely who or what category of user or process is allowed to call which methods on which class.0 4.NET has completely revamped the way that code is shared between applications. which is designed from the ground up in a highly intuitive way. J#. This means that languages are interoperable in a way that has not been seen before.5.  IMPROVED SECURITY.3. and managed C# compile to a common Intermediate Language. which replaces the traditional DLL.8 2007-1119 Visual Studio 2008 Windows 7.With .  GOOD DESIGN-A base class library.NET.The .A set of . collectively known as ADO.1 2010-0412 Visual Studio 2010 ADVANTAGES:  OOP.  EFFICIENT DATA ACCESS.

.

is a programming language designed for building a wide range of applications that run on the . designers. C# is simple. C# enables rapid application development while retaining the expressiveness and elegance of C-style languages. pronounced C sharp. a powerful and easy-touse debugger. code wizards. and other tools. project templates. well-designed classes that speed up the development cycle significantly. In most contexts. Visual Studio supports Visual C# with a full-featured Code Editor. All of these products are packaged with a graphical IDE and support rapid application development of Windows-based applications. type-safe. It is based on the ECMA/ISO specification of the C# language. Visual C# is by far the one most commonly used. an unqualified reference to "C#" is taken to mean "Visual C#. which Microsoft also created." The term Visual denotes a brand-name relationship with other Microsoft programming languages such as Visual Basic. The .Visual C#: Microsoft Visual C# 2005. While multiple implementations of the specification exist.NET Framework class library provides access to a wide range of operating system services and other useful. Microsoft Visual C# is Microsoft's implementation of the C# programming language specification. Visual J# and Visual C++. and object-oriented. Visual FoxPro. powerful. included in the Microsoft Visual Studio suite of products.NET Framework. . With its many innovations.

 C# implements the modern programming concepts of objectoriented language. C# is portable at the same time it is cross language compatible for all Microsoft Windows based language. .  C# provides the ability of code extension to the developer.ADVANTAGES:   C# supports effective and reusable components.

Both companies offer client-server DBMS products called SQL Server. 7.Microsoft SQL Server: Generically. server-based platform designed to support a wide variety of . When capitalized. 2000 and 2005. Microsoft SQL Server 2008 Reporting Services provides a complete. SQL Server uses an enhanced version of SQL called T-SQL. The Express Edition of SQL Server 2005 is used in the C+ + and C# tutorials. the term generally refers to either of two database management products from Sybase and Microsoft.5. any database management system (DBMS) that can respond to queries from client machines formatted in the SQL language. 6. Microsoft have released versions 6. Definition: SQL Server is a relational database developed and sold by Microsoft. Originally bought from Sybase.

reporting needs enabling organizations to deliver relevant information where needed across the entire enterprise.  They don’t have to pay time or money instantly.  Everyone can access the site and do shopping instantly online. . Top New Features: • Design reports with any structure by using the new unique layout capabilities of Flexible Report Layout • Benefit from enhanced performance and scalability to reach all Render reports into Microsoft Office Word format Integrate Reporting Services with Microsoft Office SharePoint Create reports with richly formatted text Display data graphically with enhanced visualization users throughout the enterprise • • Services for central delivery and management of business insight • • capabilities ADVANTAGES:  Through this kind of sites you one came to know now a days what kind of products are occupying the markets.  Everyone can get various information regarding any new item.

.

Microsoft word. Microsoft Power point. .  To build up a good interacting interface between the seeker and recruiter  To make myself familiar with the professional tools like Visual Studio 2008. Photoshop CS4 etc.Objectives We have the following objectives in our mind: To provide the better accessibility to the job seekers to search jobs and apply to the same To help the recruiters search for the people and save both time and energy. .Net.

The IDE used is Visual Studio 2008. To develop the website we would be using 3-tier architecture of .Category of the Project This proposed software would be a web application. The language used is C#. Therefore. The complete GUI will be designed with proper care. At the back end we are using SQL server.net. The GUI Tool which we use in the front end is ASP .net.net concept in my project . we will be using overall C# .

Problem Definition: Problem faced by an individual during searching for a job are as follows:  They have to spend their time as well as money and energy searching for a job with their desired options  It also becomes hectic and a difficult job for the recruiters to search for their desired candidate .

(SAD) The analysis of the role of a proposed system and the identification of the requirements that it should meet. data are collected on the available files and decisions points. transactions involve in the current system are noted. systems analysis) and producing a design. I am going to analyze the following user requirement as they face a lot of problem to operating a college management system. Now analyzing the minutes of discussion with the clients and summarizing the problem. During this analysis stage.Analysis:  Systems Analysis Definition . The last couple of years have witnessed an upsurge of interest in computer system. The term is most commonly used in the context of commercial programming.  In other words system analysis s a detailed study of the various performed by the system and their relationship within and outside of this system. Clear evidence of this is to be found in an unprecedented growth in the software.  In modern world computerized systems are used almost everywhere. The systems analysts are responsible for identifying requirements (i. Now one aspect of this analysis is defining the boundaries of the system and determining whether and how this system is interacting with the other related systems.e. where software developers are often classed as either systems analysts or programmers. The programmers are then responsible for implementing it. . SAD is the starting point for system design.

high-speed digital computer is one of the reasons for the recent growth in software. Many types of software are now available in the market to solve problems. voice recognition software etc. In fact. which can be used in any college. .  Software has its own strength depending on the power of the programmer.  In modern times faster lifestyles requires the job to be done quickly.Now lots of software’s are found for various works like Graphics software. and it is hard enough to do that job without the aid of the computer. The presented software is concerned with a college management system. banking software.

Tools and Platforms Used PLATFORM Windows 7 TOOLS Ultimate PURPOSE OS Platform Visual Studio 2008 RAD Tool C# Background Programs MS Word 2007 Typing and editing documents Documentation MS PowerPoint 2007 Slide Show Make presentation for Project MS Paint Photo Editing. . Screen shorts Support design.

It includes a set of use cases that describe all the interactions the users will have with the software. Product Perspective: 30 FRONT END BACK END . testing team and end users of the product. Non-functional requirements are requirements which impose constraints on the design or implementation (such as performance engineering requirements. or design constraints) Purpose: The specification document describes the capabilities and efficiency that will be provided by the SOFTWARE application “The Integrated System”. the SRS also contains nonfunctional (or supplementary) requirements.term. Use cases are also known as functional requirements.JOB PORTAL SYSTEM Requirement Analysis Software Requirement Specifications A Software Requirements Specification (SRS) is a complete description of the behavior of the system to be developed. In addition to use cases. The intended audience for this document is the development . It also states the various required constraints by which the system will be abide. quality standards.

JOB PORTAL SYSTEM 31 .

Windows 2000. or doing enterprise-level development. For information on the hardware requirements for other products that are included in some Visual Studio . Regardless of the application's location. specifically when running multiple applications. Windows NT 4. read their associated readme files. ensure that the above amount of space is available on your system drive regardless of the application's location. as listed above. and ensure that additional space.0.NET edition should meet the following system requirements. which is the drive that boots your system. However.NET editions. you can install the application on any drive. Windows XP Home does not support local Web application development. working with large projects. Performance has not been tuned for minimum system configuration. the installation process installs some files on your system drive. 32 .JOB PORTAL SYSTEM System Requirement: The computer on which you install your Visual Studio . Consequently.0 supports only the installation of remote components. You cannot install Visual Studio on Windows NT 4.NET installer. When you start the Visual Studio . Increasing your RAM above the recommended system configuration will increase your performance. local Web application development is only supported in Windows XP Professional. the default installation location is your system drive. and Windows Server 2003. is available on the drive on which you install the application.

0 Required 800 x 600. Require ment Processor Visual Basic PC with a Pentium II-class processor. Windows Server 2003. 160 MB for XP Home. 256 MB for XP Professional & Windows Server 2003 Visual C++ Same Visual C# Same Visual J# Same RAM Same Same Same Available Hard Disk Space Operating System 750 MB on system drive. 2. Windows XP Home — 96 MB. 256 colors Recommended: High Color 16-bit Microsoft Mouse or compatible pointing device Same Same Same Same Same Same CD-ROM or DVD-ROM Drive Video Mouse Same Same Same Same Same Same Same Same Same 33 . 256 MB for 2000 Server. Windows 2000 Server — 192 MB. Windows XP.5 GB installation drive Windows® 2000. Windows XP Professional & Windows Server 2003 — 192 MB Recommended: 128MB for 2000 Professional. or Windows NT 4.JOB PORTAL SYSTEM Microsoft Windows 2000 Datacenter Server is not a supported operating system. 600MHz Windows 2000 Professional — 96 MB. 450 MHz Recommended: Pentium III-class. The type of media provided with the product determines whether a CDROM or DVD-ROM is required.

It will be easy to incorporate new requirements in the individual modules. 34 .JOB PORTAL SYSTEM Specific Requirements: This section contains the software requirements to a level. Maintainability: The application will be designed in a maintainable manner. It can be installed in such a system which does not have .NET installed in it. sufficient to enable designers to design the system and testers to test the system. Portability: The application will be easily portable on any window-based system.

HARD DISK: 40 GB and above. B.6 GHz and above. MEMORY: 256 MB and above. SOFTWARE REQUIREMENT SPECIFICATIONS: 35 .JOB PORTAL SYSTEM SOFTWARE & HARDWARE SPECIFICATIONS:a. HARDWARE REQUIREMENT SPECIFICATIONS: PROCESSOR: 1. INPUT DEVICE: Multimedia Keyboard and Microsoft mouse or compatible pointing device. OUTPUT DEVICE: VDU (Color Monitor) OPERATING SYSTEM: Windows XP with Service Pack 2 or above.

computer applications are not always easy to use. However. Character user interface : 36 . Any applications have two parts: 11 User interface: This is the screen displayed by the application.Net Framework 3.5 Visual Studio 2008 Sql server Theoretical Background: One of the primary reasons for the immense popularity of computers is the speed with which they can accomplish specific tasks. A good user interface will be:  Easy to learn  Easy to use  Attractive There are two types of user interfaces: A. We interact with an application via the interface.JOB PORTAL SYSTEM Microsoft .

JOB PORTAL SYSTEM Here text is the medium of information exchange.interface. 37 . It also specifies the valid option. This is what goes out in the background. The application displays text.Such interfaces are very popular because they are more user friendly. The disadvantage with character user interface (CUI) is that. if any. B. Graphics user interface : Interfaces that use graphics is called graphics user interface (GUI). All interactions between the user and the application are performed via the user. A set of instructions to carry out a specified job is called a program. which prompted the user for the required information. The user then responded to these prompts by specifying the required information using text. it needs to have good user interface. They are very easy to use . with each new application.the user must be able to react intuitively to an interface presented in such because it emulates real life 1 Programming 1 : Computers need clear out instructions to tell them what to do and when to do. the user has to spend effort and time for getting used to the way it works. The user can identify with the graphics displayed on the screen. Thus. for any applications to be successful. The user interface makes the program easy to use.

JOB PORTAL SYSTEM Feasibility study A feasibility study is an evaluation of a proposal designed to determine the difficulty in carrying out a designated task. In other words. a feasibility study precedes technical development and project implementation. a feasibility study is an evaluation or analysis of the potential impact of a proposed project We can also say that a feasibility study is a detailed analysis of a company and its operations that is conducted in order to predict the results of a specific future course of action. Small business owners may find it helpful to conduct a feasibility study whenever they 38 . Generally.

This is the best way for one to grasp the impact of future decisions one may be considering. For example. a company might perform a feasibility study to evaluate a proposed change in location. The feasibility study will help one accurately anticipate what will and will not work in varied situations. the time required for each phase of the system and so on. In such situations. or the hiring of additional employees.JOB PORTAL SYSTEM anticipate making an important strategic decision. the acquisition of another company. The feasibility study provides one with objective information to evaluate existing services and strengths. Through feasibility study we gain an understanding of the competition and marketplace indicators that affect the business. a feasibility study can help a small business's managers understand the impact of any major changes they might contemplate. The feasibility study is the important step in any software development process. We will be able to determine what resources are essential to complete varied situations and gain an understanding of how to draw on our strengths. Steps in Conducting a Feasibility Study: 39 . a purchase of major equipment or a new computer system. If these important factors are not analyzed then definitely it would have impact on the organization and the development and the system would be a total failure. the introduction of a new product or service. This is because it makes analysis of different aspects like cost required for developing and executing the system.

By providing information on consumer needs and how best to meet them. whether or not it will work. For example. In some cases. If the proposed project is determined to be both feasible and desirable. the information provided in the feasibility study can prove valuable in implementation. primary customers. it should begin with an evaluation of the entire operation. it may be possible to improve a manual filing system rather than purchase an expensive new computerized database. It can be used to develop a strategic plan for the project. its position in the marketplace. • The second part of a good feasibility study should focus on the proposed plan of action and provide a detailed estimate of its costs and benefits. This sort of overview provides small business owners and managers with an objective view of the company's current situation and opportunities. a feasibility study can also lead to new ideas for strategic changes. a feasibility study may lead management to determine that the company could achieve the same benefits through easier or cheaper means. Although the core of the study is dedicated to showing the outcomes of specific actions. and its financial situation. For example. a good feasibility study would review a company's strengths and weaknesses. and any relevant industry trends. It would also include information on a company's major competitors.JOB PORTAL SYSTEM • The main objective of a feasibility study is to determine whether a certain plan of action is feasible—that is. and whether or not it is worth doing economically. translating general ideas into measurable 40 .

It is also important for small businesses to assign an internal person to help gather information for the feasibility study. a feasibility study should be performed by a qualified consultant in order to ensure its accuracy and objectivity. 41 . • Helps in identifying the risk factors involved in developing and deploying the system . In most cases. Throughout the process. . the feasibility study will show the various consequences and impacts associated with the plan of action.JOB PORTAL SYSTEM goals. The goals can then be broken down further to create a series of concrete steps and outline how the steps can be implemented. Advantages of making Feasibility study: There are many advantages of making feasibility study some of which are summarized below: • This study being made as the initial step of software development life cycle has all the analysis part in it which helps in analyzing the system requirements completely. To be able to provide a meaningful analysis of the data. the consultant should have expertise in the industry. The small business owner must be sure that those conducting the study have full access to the company and the specific information they need.

funding and other important decisions which is very essential for an organization to run profitably and for the system to run stable. Different Types of Feasibility: In the conduct of feasibility study. • So a feasibility study is a report which could be used by the senior or top persons in the organization. • factor related to the current system. . • helps the organization and system to run efficiently. . • Feasibility study helps in making plans for training developers for implementing the system. • proposed project will be acceptable to the people or not.JOB PORTAL SYSTEM • The feasibility study helps in planning for risk analysis Feasibility study helps in making cost/benefit analysis which . This is because based on the report the organization decides about cost estimation. This determination typically examines the probability of the project 42 . the analyst will usually consider seven distinct but inter-related types of feasibility. The different types of feasibility studies are as follows: • Technical feasibility study: It is used to determine the Schedule feasibility study: It is used to determine the time Social feasibility study: It is used to determine whether a requirements of technologies for the current system.

Secondly. • Legal feasibility study: It is used to determine the legal scrutiny Marketing feasibility study: It is used to determine the single and of the current system. Any user who knows simple English language can use this website. which are as follows: 1) Economic feasibility 2) Legal feasibility 3) Operational feasibility 4) Schedule feasibility 5) Is it technically feasible or not? The project is made with the help of a PC is easily available. The user does not need to be familiar with . the software used for encryption and decryption purpose is alo easily available. There are four types of marketing feasibility study. Windows XP. 43 . the other software used to develop this project can easily interface with each other and also compatible with Windows 2000. or Windows NT 4.net framework or SQL server to use this website.0 operating system. Finally. 6) Is it technically feasible or not?: This website is very user –friendly. • multi-dimensional market forces that affect the current system.JOB PORTAL SYSTEM being accepted by the group directly affected by the proposed system change. So we can conclude that the website is operationally feasible as doing any operation in this website is very simple and it does not involve any complicacy. Windows Server 2003.

So we can say that the s website is time feasible.0whose cost is minimal. 9) Is it socially feasible or not? Yes. or Windows NT 4. 8) Is it schedule feasible or not? The developer required only two month to develop this website. These two softwares will be installed automatically while installing our software. Windows XP.JOB PORTAL SYSTEM 7) Is it economically feasible or not? The project is economically feasible as to install this software we need the minimum hardware configuration that we require installing Windows 2000. Windows Server 2003. the developed website holds obviously social feasibility as this website does not perform any illegal operation and does not break our social law. now we can easily conclude that this software is economically feasible. So. 44 .

output formats and the major modules in the system and their specification are decided. design takes us towards how to satisfy the needs. This document is similar to a blueprint or plan for the solution and is used later during implementation. the internal logic of the modules specified in system design is decided. it has a major impact on the later phase. The output of this phase is the design document. particularly testing and maintenance. The design of a system is perhaps the most critical factor affecting the quality of the software. testing and maintenance. starting with what is needed. In other words. file formats. At the end of system design all the major data structures.system design and detailed design. which is sometimes also called top-level design.JOB PORTAL SYSTEM Screen Design The purpose of the design phase is to plan a solution of the problem specified by the requirement document. System design. During this phase further details of the data structures and algorithmic design of each of the modules is specified in a high-level design description language. The design activity is often divided into two separate phases. 45 . During detailed design. which is independent of the target language in which the software will eventually be implemented. aims to identify the modules that should be in the system. the specifications of these modules and how they interact with each other to produce the desired results. This phase is the first step in moving from the problem domain to the solution domain.

in system design the attention is on what components are needed. It also includes user interface design. Project design include the desired featured and operations in details. program structure. while in detailed design how the components can be implemented in software is the issue. schema design and normalized tables and date integrity and constraints. It should be included with the requirements given below: INTERFACE VALIDATION USER. In other words. Most methodology focuses on system design.JOB PORTAL SYSTEM In system design the focus is on identifying the logic for each of the modules. A design methodology is a systematic approach to creating a design by application of a set of techniques and techniques. TASK & ENVIRONMENT ANALY SIS 46 .

JOB PORTAL SYSTEM
IMPLEMENTATION INTERFACE DESIGN

47

JOB PORTAL SYSTEM

Flowchart :
A flowchart is a common type of diagram, that represents an algorithm or process, showing the steps as boxes of various kinds, and their order by connecting these with arrows. This diagrammatic representation can give a step-by-step solution to a given problem. Data is represented in these boxes, and arrows connecting them represent flow / direction of flow of data. Flowcharts are used in analyzing, designing, documenting or managing a process or program in various fields. A flow chart, or flow diagram, is a graphical representation of a process or system that details the sequencing of steps required to create output. A typical flow chart uses a set of basic symbols to represent various functions, and shows the sequence and interconnection of functions with lines and arrows. Flow charts can be used to document virtually any type of business system, from the movement of materials through machinery in a manufacturing operation to the flow of applicant information through the hiring process in a human resources department. Each flow chart is concerned with one particular process or system. It begins with the input of data or materials into the system and traces all the procedures needed to convert the input into its final output form. Specialized flow chart symbols show the processes that take place, the actions that are performed in each step, and the relationship between various steps. Flow charts can include different levels of detail
48

JOB PORTAL SYSTEM
as needed, from a high-level overview of an entire system to a detailed diagram of one component process within a larger system. In any case, the flow chart shows the overall structure of the process or system, traces the flow of information and work through it, and highlights key processing and decision points. Flow charts are an important tool for the improvement of processes. By providing a graphical representation, they help project teams to identify the different elements of a process and understand the interrelationships among the various steps. Flow charts may also be used to gather information and data about a process as an aid to decision making or performance evaluation. For example, the owner of a small advertising agency who hopes to reduce the time involved in creating a print ad might be able to use a flow chart of the process to identify and eliminate unnecessary steps. Though flow charts are relatively old design tools, they remain popular among computer programmers working on systems analysis and design. In recent years, many software programs have been developed to assist business people in creating flow charts.

49

JOB PORTAL SYSTEM

Types of Flowchart:
Sterneckert (2003) suggested that flowcharts can be modeled from the perspective of different user groups (such as managers, system analysts and clerks) and that there are four general types:

Document flowcharts, showing controls over a document-flow Data flowcharts, showing controls over a data flows in a system System flowcharts showing controls at a physical or resource Program flowchart, showing the controls in a program within a

through a system
 

level

system Notice that every type of flowchart focuses on some kind of control, rather than on the particular flow itself.

50

which is known as an activity or process symbol. two kinds of flowcharts are used in solution planning: system flowcharts and program flowcharts”. For example Andrew Veronis (1978) named three basic types of flowcharts: the system flowchart.JOB PORTAL SYSTEM However there are several of these classifications. systems flowcharts. In addition. which are sometimes referred to as terminal activities. Some of the main symbols that are used to construct flow charts include: • A round-edged rectangle to represent starting and ending activities. Each step or activity within a process is indicated by a single rectangle. 51 • • . such as UML activity diagrams. logic flowcharts. Constructing Flow Charts: Flow charts typically utilize specialized symbols. and the detailed flowchart. More recently Mark A. and process flowcharts are just a few of the different types of flowcharts that are used in business and government". the general flowchart. That same year Marilyn Bohl (1978) stated "in practice. A rectangle to represent an activity or step. product flowcharts. many diagram techniques exist that are similar to flowcharts but carry a different name. Fryman (2001) stated that there are more differences: "Decision flowcharts.

2) Identify project team members that are to be involved in the construction of the process flow diagram. The question to be answered or decision to be made is written inside the diamond. and 5) Use the flow diagram and continuously update it as needed. which is known as a decision symbol. 3) Define the different steps involved in the process and the interrelationships between the different steps (all team members should help develop and agree upon the different steps for the process). involving other concerned individuals as needed and making any modifications necessary. 52 . 4) Finalize the diagram. The answer determines the path that will be taken as a next step. Constructing a flow chart involves the following main steps: 1) Define the process and identify the scope of the flow diagram.JOB PORTAL SYSTEM • A diamond to signify a decision point. • Flow lines show the progression or transition from one step to another.

as well as its logical storage. A data flow diagram (DFD) is a significant modeling technique for analyzing and constructing information processes. As the name suggests. Data Flow Diagram (DFD) is an illustration that explicates the passage of information in a process. DFD literally means an illustration that explains the course or movement of information in a process. DFDs show the flow of data from external entities into the system. The technique exploits a method called top-down expansion to conduct the analysis in a targeted way. A DFD demonstrates business or technical process with the support of the outside data saved. A DFD can be easily drawn using simple symbols. DFD illustrates this flow of information in a process based on the inputs and outputs. free downloadable diagramming tools. A DFD can also be referred to as a Process Model. This analysis can be carried out to precisely the level of detail required. showed how the data moved from one process to another. complicated processes can be easily automated by creating DFDs using easy-touse.JOB PORTAL SYSTEM DFD (Data Flow Diagram): In the late 1970s data-flow diagrams (DFDs) were introduced and popularized for structured analysis and design (Gane and Sarson 1979). plus the data flowing from the process to another and the end results. A DFD can be referred to as a Process Model. Data flow diagrams can be used to provide a clear representation of any business function. 53 . The technique starts with an overall picture of the business and continues by analyzing each of the functional areas of interest. Additionally.

The direction of the data movement is represented by the arrow.JOB PORTAL SYSTEM Additionally. the data flowing from a process to another. and the results. Privilege Boundary: 54 . This basic DFD can be then disintegrated to a lower level diagram demonstrating smaller steps exhibiting details of the system that is being modeled. A DFD illustrates technical or business processes with the help of the external data stored. The task may process the data or perform an action based on the data. Process: The process shape represents a task that handles data within the application. External Entity: The external entity shape is used to represent any entity outside the application that interacts with the application via an entry point. The multiple process can be broken down into its sub processes in another DFD. Numerous levels may be required to explain a complicated system. Data stores do not modify the data. Multiple Processes: The multiple process shape is used to present a collection of sub processes. Data Flow: The data flow shape represents data movement within the application. a DFD can be utilized to visualize data processing or a structured design. Data Store: The data store shape is used to represent locations where data is stored. they only store data. A designer usually draws a context-level DFD showing the relationship between the entities inside and outside of a system as one single step.

Examples of Data Flow Diagrams :These examples demonstrate how to draw data flow diagram. and textual specs. McMenamin. It is easily integrated with data modeling. Used effectively. Often. It is simple and easy to understand by users and can be easily extended and refined with further 55 . Palmer. Alone. it is a useful and easy to understand modeling tool. however. It has broad application and usability across most software development projects. a problem could be cleared by simply opening and closing the access panel. Together with these. it provides analysts and developers with solid models and specs. When to use Data Flow Diagram :The DFD is an excellent communication tool for analysts to model processes and functional requirements.JOB PORTAL SYSTEM The privilege boundary shape is used to represent the change of privilege levels as the data flows through the application. Gane and Sarson. Before it was eventually replaced. a copy machine suffered frequent paper jams and became a notorious troublemaker. One of the primary tools of the structured analysis efforts of the 1970's it was developed and enhanced by the likes of Yourdon. workflow modeling tools. it has limited usability. Someone observed the situation and flowcharted the troubleshooting procedure used by most people. It is still considered one of the best modeling techniques for eliciting and representing the processing requirements of a system.

Functionally decomposed. Principle for Creating Data Flow Diagrams :Therefore. The different versions are Context Diagrams (Level 0).one level).JOB PORTAL SYSTEM specification into a physical version for the design and development teams. leveled sets of Data Flow Diagrams. Every subsystem in a DFD represents a process. In a DFD system. Once entered the data flows between processes. which in turn can be disintegrated into subsystems at a much lower level. Create a Data Flow Diagram :Data flow diagrams can be used to provide a clear representation of any business function. and so on and so forth. data is introduced into the system from the external environment. In this process or activity the input data is processed. Partitioned Diagrams (single process only -. Processes cannot be decomposed after reaching a certain lower level. Each process in a DFD characterizes an entire system. The technique starts with an overall picture of the business and continues by analyzing each of the functional areas of interest. This analysis can be carried out to 56 . And then the processed data is produced as an output or a result. the principle for creating a DFD is that one system may be disintegrated into subsystems.

migration to new technology. The result is a series of diagrams that represent the business activities in a way that is clear and easy to communicate. The level 1 diagram identifies the major business processes at a high level and any of these processes can then be analyzed further giving rise to a corresponding level 2 business process diagram. The process model is typically used in structured analysis and design methods. Each process transforms inputs into outputs. or refinement of an existing business process. 4 and so on. Using the context diagram together with additional information from the area of interest. Also called a data flow diagram (DFD). This is followed by a level 1 diagram. Don't worry about the symbols at this stage. This process of more detailed analysis can then continue C through level 3. which provides an overview of the major functional areas of the business. is an essential precursor to business process re-engineering. the level 1 diagram can then be drawn.JOB PORTAL SYSTEM precisely the level of detail required. it shows the flow of information through a system. However. The technique exploits a method called top-down expansion to conduct the analysis in a targeted way. Identifying the existing business processes. using a technique like data flow diagrams. these are explained shortly. most investigations will stop at level 2 and it is very unusual to go beyond a level 3 diagram. Initially a context diagram is drawn. A business model comprises one or more data flow diagrams (also known as business process diagrams). the level of detail required will depend on the type of change being considered. However. which is a simple representation of the entire system under investigation. 57 .

JOB PORTAL SYSTEM The model generally starts with a context diagram showing the system as a single flowchart connected to external entities outside of the system boundary. Many diagram levels may be needed to express a complex system. Primitive processes. This process explodes to a lower level DFD that divides the system into smaller parts and balances the flow of information between parent and child diagrams. are usually described in a connected textual specification. those that don't explode to a child diagram. 58 .

JOB PORTAL SYSTEM 59 .

JOB PORTAL SYSTEM ERD 60 .

JOB PORTAL SYSTEM screenshots 61 .

Validation refers to a different set of activities that ensure that the software has been built is traceable to customer requirements. 62 .JOB PORTAL SYSTEM Validation Check: Software testing is one element of a broader topic that is often referred to as verification and validation (V & V).  Boehm’s states this another way: Verification: “Are we building the product right?” Validation: “Are we building the right product?” The definition of V & V encompasses many of the activities that we have referred to as software quality analysis (SQA). Verification refers to the set of activities that ensure that software correctly implements a specific function.

scalability. A programmer makes an error (mistake). For example. 63 . A single defect may result in a wide range of failure symptoms. A defect can turn into a failure when the environment is changed. which results in a defect (fault.g. Software faults occur through the following processes. bug) in the software source code. A common source of requirements gaps is nonfunctional requirements such as testability. unrecognized requirements that result in errors of omission by the program designer. e. Not all defects will necessarily result in failures. in certain situations the system will produce wrong results. causing a failure. and security. defects in dead code will never result in failures. One common source of expensive defects is caused by requirement gaps. Examples of these changes in environment include the software being run on a new hardware platform. usability.. If this defect is executed. alterations in source data or interacting with different software. maintainability.JOB PORTAL SYSTEM Defects and Failure: Not all website defects are caused by coding errors. performance.

64 . In spite of that every time the user wants to login he has to give his user name and password which adds to the security of the project.JOB PORTAL SYSTEM System Security Measures This software itself being a security project provides some of the best software security measures. Security Issues of ISO 74982:  Authentication: It is any process by which a system verifies the identity of an user who wishes to access the resource stored in system. no unauthorized user cannot access it. all the data that are saved using this software are encrypted i. Moreover. In this website a user cannot login and use the features and facilities provided by the website without creating a user account.e.

 Non-repudiation:  This website will be user specific i.  Data Integrity: With the help of this website everyone can buy various product online.JOB PORTAL SYSTEM  Access Control: Access control is ability to permit or deny the use of a particular resource by particular entity. The project aims to provide the following security measures: Authentication Access Control This project is unable to provide the following security measures: Data Integrity Non-repudiation 65 . only some user can access specific commands buttons.e.  The website will use security policy which specifies who is authorized to do the task.

for the sake of completeness of the project proposal the following list we are proposing. 3) Details of personal information.JOB PORTAL SYSTEM List of reports The entire available repository can produce n number of reports. 66 . 2) Details of passwords. 1) Details of friends. The numbers of reports will definitely be increased over time.

JOB PORTAL SYSTEM 67 .

JOB PORTAL SYSTEM limitations 68 .

JOB PORTAL SYSTEM 69 .

3) By including a better security for the both the users 4) And by making the communication between the job seeker and the recruiter very easy. 70 . 2) More efficient and easier categorical search engine.JOB PORTAL SYSTEM Future Scope and Future Enhancement of the Project The initial focus of this project was developing a secured integrated system. This project will have a very bright future if the following can be incorporated: 1) Updating the software according the user’s needs. This website covers some of the activities needed by an individual for both his personal and professional uses.

when a page with the extension .htm. The default scripting language used for writing ASP is VBScript. although you can use other scripting languages like JAVA Script (Microsoft's version of JavaScript).asp instead of . This way all the ASP 71 .JOB PORTAL SYSTEM Glossary ASP: ASP stands for Active Server Pages Active Server Pages or Classic ASP. as it is more commonly known. is a technology that enables us to make dynamic and interactive web pages.asp is requested by a browser the web server knows to interpret any ASP contained within the web page before sending the HTML produced to the browser. ASP uses server-side scripting to dynamically produce web pages that are not affected by the type of browser the web site visitor is using. ASP pages have the extension .

XP Pro. no server. Vista. Internet Information Services (IIS). 2008. no active pages. it is this web server that ASP pages usually run best on. Windows 98 . including Windows 7. Any web pages containing ASP cannot be run by just simply opening the page in a web browser.PWS can be found under 'add-ons' on the Windows 98 CD.IIS can be found in 'Add/Remove Programs' in the 'Control Panel'. Lucky IIS or its micro version Personal Web Server (PWS) comes free with Windows.JOB PORTAL SYSTEM is run on the web server and no ASP will ever be passed to the web browser. The page must be requested through a web server that supports ASP. For those of one running Windows and wish to play around with ASP on their own system they need to install Microsoft's Internet Information Services (IIS). As ASP was first introduced by Microsoft on it's web server. 72 • . For Windows users we can find Internet Information Services (IIS) or Personal Web Server (PWS) in the following places: • Windows XP Pro/2003/2000 . this is why ASP stands for Active Server Pages. 2003. and Windows Server OS's like Windows 2000. that runs on all versions of Windows from NT4.

IIS and PWS are not supported on this operating system. • For those that do not wish to mess around attempting to install web servers on their own computer there are many hosting companies that supply Windows ASP Hosting including our own Free ASP Website Hosting Service.IIS and PWS are not supported on this operating system. CMMI: Capability Maturity Model Integration (CMMI) is a process improvement approach that provides organizations with the essential elements of effective processes that ultimately improve their performance.JOB PORTAL SYSTEM • Windows NT4/95 . Windows XP Home Edition . or an entire organization. CMMI in software engineering and organizational development is a trademarked process improvement approach that provides 73 . a division. CMMI can be used to guide process improvement across a project.One can get hold of IIS by downloading the NT4 Option Pack from Microsoft (don't be fooled by the name as it also runs on Windows 95). • Windows ME .

networking opportunities and marketing benefits available worldwide.JOB PORTAL SYSTEM organizations with the essential elements for effective process improvement.500 professionals from 658+ destination marketing organizations in more than 25 countries. 74 . and provide a point of reference for appraising current processes. students and educators — with educational resources. 2008). CMMI helps "integrate traditionally separate organizational functions." CRM: CRM(Customer Relationship Management) is a process or methodology used to learn more about customer’s need and behavior in order to develop stronger relationship with them. provide guidance for quality processes. set process improvement goals and priorities. industry partners. Destination Marketing Association International represents over 1. DMAI: Destination Marketing Association International (DMAI) is a professional organization representing destination marketing organizations and convention and visitor bureaus worldwide. According to the Software Engineering Institute (SEI. As the world’s largest resource for official destination marketing organizations (DMOs). They provide members — professionals.

professional certificates and designations (PDM. It is located in Geneva. an accreditation program and an official online travel portal: OfficialTravelGuide. the name is no longer considered an acronym and no longer uses full capitalization.JOB PORTAL SYSTEM They maintain an online bookstore and resource center.com. As a consequence. the meetings and convention database \ ECMA: Ecma International (Ecma) is an international. private (membershipbased) non-profit standards organization for information and communication systems. commonly referred to as "eBusiness" or "e-business". E. DMAI also owns the Meeting Information Network (MINT). when the European Computer Manufacturers Association (ECMA) changed its name to reflect the organization's international reach. CDME).BUSINESS: E. It acquired its name in 1994. The organization was originally founded in 1961 to standardize computer systems in Europe. market or develop computer or communication systems in Europe. Membership is open to companies that produce.Business (Electronic business). an e-mail discussion lists for members. may be defined as the utilization of 75 .

usually text. GPU: 76 .JOB PORTAL SYSTEM information and communication technologies (ICT) in support of all the activities of business. sent from one person to another via computer. An ERP system typically has modular hardware and software units and "services" that communicate on a local area network. of address.MAIL: Messages. Email (Electronic mail) can also be sent automatically to a large no. Commerce constitutes the exchange of products and services between businesses. ERP: Enterprise Resource Planning (ERP) is a term usually used in conjunction with ERP software or an ERP system which is intended to manage all the information and functions of a business or company from shared data stores. Electronic commerce focuses on the use of ICT to enable the external activities and relationships of the business with individuals. groups and individuals and can be seen as one of the essential activities of any business. E. groups and other businesses. The modular design allows a business to add or reconfigure modules (perhaps from different vendors) while preserving data integrity in one shared database that may be centralized or distributed.

GUI: GUI (Graphical user interface) is a user interface based on graphics (icons and pictures and menus) instead of text. Most computers sold today use an enhanced version of IDE 77 . More than 90% of new desktop and notebook computers have integrated GPUs. The IDE interface is based on the IBM PC Industry Standard Architecture (ISA) 16-bit bus standard. Modern GPUs are very efficient at manipulating computer graphics. It is used in embedded systems.JOB PORTAL SYSTEM A graphics processing unit or GPU (also occasionally called visual processing unit or VPU) is a specialized processor that offloads 3D or 2D graphics rendering from the microprocessor. a GPU can be present on a video card. or it can be on the motherboard. but it is also used in computers that use other bus standards. and their highly parallel structure makes them more effective than general-purpose CPUs for a range of complex algorithms. personal computers. In a personal Computer. IDE: IDE (Integrated Drive Electronics) is a standard electronic interface used between a computer motherboard's data paths or bus and the computer's disk storage devices. and game consoles. uses a mouse as well as a keyboard as an input device. which are usually far less powerful than those on a dedicated video card. mobile phones. workstations.

telecommunications. One of the more notable IEEE standards is the IEEE 802 LAN. It can have up to two physical drives. MAN group of standards which includes the IEEE 802. In today's computers. Information Technology (IT). and many more.3 Ethernet standard and the IEEE 802. The IDE (ATA) standard is one of several related standards maintained by the T10 Committee. In 2005. the IDE controller is often built into the motherboard. IEEE standards affect a wide range of industries including: power and energy biomedical and healthcare. transportation. with 500 standards under development. 1990. IEEE had close to 900 active standards. ISO: 78 . nanotechnology. configured as 'master' and 'slave' IDE was adopted as a standard by American National Standards Institute (ANSI) in November. IEEE: IEEE (Institute of Electrical. IEEE performs its standards making and maintaining functions through the IEEE Standards Association (IEEE-SA).JOB PORTAL SYSTEM called Enhanced Integrated Drive Electronics (EIDE). information assurance.11 Wireless Networking standard. It is a type of hard drive interface. Provided as standard on Risc PC motherboards. Electronics and Engineers) is one of the leading standards-making organizations in the world. The ANSI name for IDE is Advanced Technology Attachment (ATA).

"A Relational Model of Data for Large Shared Data Banks “and became the most widely used language for relational databases. SQL was one of the first languages for Edgar F. While ISO defines itself as a nongovernmental organization. Switzerland. makes it more powerful than most non-governmental organizations. Founded on 23 February 1947. the organization promulgates worldwide proprietary industrial and commercial standards. In practice. and originally based upon relational algebra. is a database computer language designed for managing data in relational database management systems (RDBMS). often referred to as Structured Query Language. QTP: 79 . SQL is not a Turing complete programming language. Cod’s relational model in his influential 1970 paper. Its scope includes data query and update.kjuːˈɛl/) . SQL: SQL (pronounced /ˌɛs. either through treaties or national standards.JOB PORTAL SYSTEM The International Organization for Standardization (Organization international de normalization). It has its headquarters in Geneva. schema creation and modification. is an international-standard-setting body composed of representatives from various national standards organizations. and data access control. its ability to set standards that often become law. ISO acts as a consortium with strong links to governments. widely known as ISO (pronounced / ˈalso/).

In the computer. 3D graphics and 3D visualization. width and height). it must be created as a 3D drawing in a 3D drawing program. 2D: 2Dimensional refers to visual objects that are constructed on two planes (X and Y. Y and Z). 80 . 3D: 3Dimensional refers to objects that are rendered visually on paper. however. It have a keyword view and Expert view. It is functionality testing tool and also advanced keyword driven test tool.JOB PORTAL SYSTEM QTP is quick test professional. film or on screen in three planes (X. It used to recording and playback method. Two-dimensional structures are used for 2D images and to simulate 3D images. a 2D drawing program can be used to illustrate a 3D object. in order to interactively rotate an object in all axes. For example: 3D modeling. 3D animation. It is easy to use more than win runner.

Morgan Skinner. Bill Evjen. NAME OF THE PUBLISHER Witey dreamtech. Karli Watson. Jay Glymn. Platinum Edition 81 Dreamtech Press . Given below are the names of some books. Allen Jones. NAME OF THE BOOKS Professional C# 2005 NAME OF THE AUTHORS Christian Nagel.JOB PORTAL SYSTEM Bibliography During the development of the project. which I have used during development and documentation of the project. Kogent Solutions INC. I have used many resources and for that I am grateful to all the people concerned. C# 2008 Programming Black Book.

Cryptography and Network Security Data Communication and Networking Atul Kahate William Stallings Dalton. Whitehead and Kogent Kogent Solutions INC Roger S. Pressman Dreamtech Press Dreamtech Press McGraw-Hill International Edition 82 .JOB PORTAL SYSTEM SQL Server 2005(Black Book) SQL Server 2008(Black Book) Software Engineering-a practitioner’s approach.

JOB PORTAL SYSTEM 83 .

JOB PORTAL SYSTEM 84 .

Sign up to vote on this title
UsefulNot useful