Professional Documents
Culture Documents
Job Portal Full Version
Job Portal Full Version
BE Semester –VIII
Prepared at
ISO 9001:2008
ISO 27001:2005
Gandhinagar
Prepared By
Sidsar Campus,
CERTIFICATE
This is to certify that the project report compiled by Gajera Jimesh G., Patel
Pritesh R., Der Vipul L. students of 8th Semester B. E. (IT) from Shantilal Shah Engineering
College, have completed their final semester project satisfactorily. To the best of our
knowledge this is an original and bonafide work done by them. They have worked on web-
based application “Job Portal”, starting from January 1st ,2010 to April 13th,2010.
During their tenure at this Institute, they were found to be sincere and meticulous
in their work. We appreciate their enthusiasm & dedication towards the work assigned to
them.
The project would help in effective and systematic record keeping that is storing
and retrieving of useful data. Project will be able to give the report so that
management can make decisions on the basis of those reports.
2. SCOPE OF STUDY:-
Today Internet is the fast way of transferring Data and Information over
wide area, hence I have used internet as a way for exchanging information.
It has the features of providing all the information online (through the net)
about our site.
The site also includes the electronic mail facility for the users who have
registered themselves.
The site acts as a middle-ware for the Job Seeker and Job Provider.
The site has the facility to inform the Seeker and Company about the job and
candidate.
1. BACKGROUND:-
Since its foundation, the Institute has experienced extensive growth in the spheres
of space technology and geo-informatics. The objective with which BISAG was
established is manifested in the extent of services its renders to almost all
departments of the State. Year after year the institute has been endeavoring to
increase its outreach to disseminate the use of geo-informatics up to grassroots
level. In this span of eleven years, BISAG has assumed multi-dimensional roles
and achieved several milestones to become an integral part of the development
process of the Gujarat State.
2. PROFILE:-
BISAG’s Roles
Academic Activities
Technology Development
SATCOM Facility
Research & Development
in Geo-informatics
Applications Transfer of Technology
Further reinforcing its functions, BISAG has achieved ISO 9001:2008 and ISO
27001:2005 certifications for quality management and security management
services respectively. This has led to an organized and systematic development of
its services and outputs.
3. ACTIVITIES OF BISAG:-
BISAG’s activities are multi-fold and have expanded in a big way and focused on
the following:
Satellite Promoting and facilitating the use of satellite broadcasting networks for
Communication distant interactive training, education and extensions
Value Added For providing services which can be customized as per the needs of the
Services users.
BISAG initially set up to carry out Space Technology applications, has evolved
into an Academic Institute, a Centre for Research and Technology Innovations,
a Facility Provider, a Technology Developer and a Facilitator for transferring
technology to the grass root level. BISAG is the first such State Centre having
such multifarious activities with ISO certification. BISAG has gradually
progressed over the years and has grown into several units. Each unit focuses on
specific functions and objectives to ensure efficiency in over all activities of the
institute.
ACADEMY
ACADEMY OF
OF CENTRE
CENTRE FOR
FOR
GEO-
GEO-
INFORMATICS
INFORMATICS
BISAG
BISAG
GEO-
GEO-
INFORMATICS
INFORMATICS
SCHOOL
SCHOOL OF
OF DISASTER
DISASTER
SUSTAINABLE
SUSTAINABLE MANAGEMENT
MANAGEMENT
DEVELOPMENT
DEVELOPMENT INFORMATION
INFORMATION
STUDIES
STUDIES CELL
CELL
SOFTWARE
SOFTWARE
DEVELOPMENT
DEVELOPMENT
Centre for Geo-Informatics Applications: The Centre for Geo-informatics
provides services for the developmental and planning activities pertaining to
Agriculture, Land and Water Resources Management, Wasteland/ Watershed
development, Forestry, Disaster Management, and Infrastructure etc.
Software Development: For wider usage of geo-spatial applications,
customized software are developed by the Software Development Team. The
institute has provided many indigenous software solutions in the field of
Geographic Information Systems, Decision Support Systems and Image
Processing.
Academy of Geo-informatics: The Academy for Geo-informatics carries out
Education, Research and Training activities.
Disaster Management Information cell: BISAG works closely with the
Gujarat State Disaster Management Authority (GSDMA), for assessment of
existing situation through integrated analysis and for planning appropriate
preventive and preparatory measures, providing necessary support through
data generation and analysis.
5. INFRASTRUCTURE DEVELOPMENT:-
The laboratories are equipped with state-of the art technology with latest
Hardware and Software required for executing its activities. BISAG also has
a rich satellite data archive, which includes Satellite data of different spatial,
spectral and temporal resolutions.
6. COLLABORATIONS OF BISAG…Creating A Sense Of Ownership:-
BISAG works with almost all Government Departments and Organizations. Each
of these Departments/Organization contributes in preparation of the respective
projects. With strong Government support and proactive efforts on part of the
staff of BISAG, the list of Collaborators is expanding and increasing.
COLLABORATORS OF BISAG
GOVERNMENT
DEPARTMENTS
PUBLIC
Rural Development SECTOR
Panchayats
Revenue NATIONAL
Urban Development
Agriculture SSNNL
Narmada & Water GSDMA INTER-NATIONAL
Resource GWSSB
Forest and GIIC Department of
Environment GUDM Space
Industries and mines GPCB Census Operations
Ports and Fisheries GMB IGNOU WHO
Health & Family BAOU CPCB World Bank
Welfare GWRDC Salt UNDP
Education GIDC Commissionerat UNICEF
Planning GSHSEB e
Labour
Through User
Departments
Project Aim: To allow Employee to check client and Call the client
for interview.
1. HARDWARE CONFIGURATION:-
Memory
Mouse : Quantum
Processor:
Memory:
RAM : 64 MB
Hard Disk : 4 GB
SOFTWARE CONFIGURATION:-
1. EXISTING SYSTEM:-
When the requirement of this system is putted before the team they was
willing to know that how the employee of the company is working. Then the
study is done it gives the result that all the work is done manually and there is
nothing that help the employee to save the time and do the work with the system.
All the documentation is done by the employee of the company. A lot of works
have to be done before the candidates are placed in an organization.
All that the company needs to store about the job seekers must be written
on the paper. Some times it is very difficult to know about some special
highlights of the job seeker, because the information is stored on the paper and it
is not clear that due to human error or by some other means this paper is lost and
the information is now not in the hands of the company.
At the time of hiring the companies policy says that the only those
companies can hire who are registered with SEEKJOB. So it is critical task to
find out the registered employer, when the company has so many employers.
The current system have all the problems which generally in count in the
manual system such as wastage of time, wastage of money, more efforts to work
etc. if the responsible person wants the full information of the total sale of
various models of the vehicles at various center at the evening then he/she can
not get it. Because the current system work manually and it is very slow same as
if he/she wants the total production then it take time. The current system can not
give the fast response as needed. It also does not keep records of grievances of
the faults in the vehicles in various parts of the country. If he/she wants the
information regarding the total stock at various warehouses at his\her office then
using current system he\she can not get it.
He\she can not get the full information on time. It may be late and this
process is time consuming and generally the administrators receive the relevant
information next day which is the major limitation of existing system.
3. PROPOSED SYSTEM:-
2.Improve-service-level benefits
Proposed system improves the system’s performance because the current
system is based on manual processing while the proposed system is based on
computer processing.
3.Improve-information-level benefits
It provides better information in the stipulated space and time for decision-
making.
4.Time-saving-benefits
It saves lots of time and provides the same result in a far lesser period of
time.
6. BEHAVIORAL FEASIBILITY:-
Registration module
Job Employer section
Job Administration section
Module 1:
Module 2:
Module 3:
Actor1
UseCase 1
Associations are used to link actors with Use cases, and indicate that an
actor Participates in the use case in some form. Associations are depicted by a
line connecting The actor and the use case.
INSERT DATA
UPDATE DATA
CALL THE
INTERVIEWER
CALL IN THE
COMPANY
SNAPSHOTS
HOME PAGE:-
SIGNUP PAGE:-
FORGOT PASSWORD PAGE:-
FORGOT PASSWORD 1 PAGE:
PROFILE PAGE:
YESTERDAY’S FOLLOW UP PAGE:
DETAILS PAGE:
NEW DETAILS PAGE:
ADMIN FEEDBACK PAGE:
EMPLOYEE FEEDBACK PAGE:
4. DATABASE DESIGN:-
In our data flow diagram, we give names to data flows, processes and data stores.
Although the names are descriptive of data, they do not dive details .So following
DFD, our interest is to build some details of the contents of data flows, processes
and data store. A data dictionary is a structured repository of data about data .It is
a set of rigorous definitions of all DFD data elements and data structures .The
data dictionary for the current system has been given as under:
The implementation of the web based or LAN base network project has
some extra steps at the time of implementation. We need to configure the system
according the requirement of the software.
Training Personnel
Conversion Procedures
Training:-
Even well designed and technically elegant systems can succeed or fail
because of the way they are used. Therefore the quality of the training received
by the personnel involved with the stem in various ways helps or hinders, and
may event prevent, the successful implementation of an information system.
Since
MAINTENANCE
Software maintenance is the last phase in the software Engineering
process that eliminates errors in the working system during its work span and to
tune the system to any variations in its working environment. The system
requires maintenance as there may be changes and requirements in the
organizational needs, government policies, hardware and software environment
etc. often small system deficiencies are found as a system is brought into
operation and changes are made to remove them. System requirements may be
revised as a result of system usage or changing operational needs. Perhaps
oversight that occurred during the development process needs to be corrected.
Often the maintenance need arises to capture additional data for storage in a
database or in transaction files or perhaps it may be necessary to add error
detection features to prevent system users from in adversely taking an unwanted
action.
Maintenance of the system after it is installed is concerned with an
additional factor in hardware. Once the system is delivered and installed there is
a brief warranty period during which time the vendor is responsible for
maintenance. This is a typically a 90 day period after that time the purchaser has
the option of acquiring maintenance from various sources. Maintenance source
excepting vendor is also available from companies specializing in providing the
service, called third party maintenance companies.
When the system is installed, it is generally used for long period. The
average life of system is 4-6 years, with the eldest applications often is used for
over 10 years. The need for debugging and correcting errors or failure on an
emergency basic is comparatively low: less than 20% of the task of correction.
System and organization are in constant state of flux; therefore the maintenance
of the system also involved adoptions for earlier version of software.
Approximately 20% of all maintenance work is performed to
accommodate changes in report, files and database. The greatest amount of
maintenance work is for user enhancement, improved documentation and
recording system components or greater efficiency. About 60% of all
maintenance is for this purposed.
Following table summarized the broad classes of maintenance found in
development of sekkjob.com
CATEGORY ACTIVITY
Corrective Emergency fixes, routine debugging.
Adaptive Accommodation of changes to data and to hardware
and software, Changes in the external environment.
Pre effective User enhancement, improved documentation
recording of computational efficiency, user
recommendations for new capabilities.
Preventive Routine service of cleaning and adjusting the
equipment to prevent breakdowns, future
maintainability reliability enhancement, recovering
design information to improve the overall quality.
Maintainable Design
The points to reduce the needs for maintenance are:
More accurately defining the user’s requirements during the system
development assembling better system documentation.
Using more effective methods for designing process logic and
communicating it to project team members.
Making better use of existing tools and techniques.
Managing the system engineering process effectively.
Who gave a lot of good programming skills and so many company related skills
that will help me in the future?
Since, every system has some limitations so our proposed system is also not
untouchable in this regard. Although it includes every kind of features but it can’t
be used in a huge organization where number of networks are very large, because
the data base used in this system is an average one. Also it doesn’t have different
kind of access feature for different users.
SOFTWARE SCOPE
Reusability:
Extensibility:
This software is extended in ways that its original developers may not
expect. The following principles enhance extensibility like Hide data structure,
avoid traversing multiple links or methods, Avoid case statements on object type
and distinguish public and private operations.
Robustness:
Its method is robust if it does not fail even if it receives improper
parameters. There are some facilities like Protect against errors, Optimize after
the program runs, validating arguments and Avoid predefined limits.
Understandability:
A method is understandable if someone other than the creator of
the method can understand the code (as well as the creator after a time lapse). We
use the method, which small and coherent helps to accomplish this.
Cost-effectiveness:
Its cost is under the budget and make within given time
period. It is desirable to aim for a system with a minimum cost subject to the
condition that it must satisfy all the requirements.
Scope of this document is to put down the requirements, clearly identifying the
information needed by the user, the source of the information and outputs
expected from the system.
BIBLIOGRAPHY
SITES REFERRED:
1. www.codeproject.com
2. www.c#dotnet.com
3. www.c#corner.com
4. www.codeproject.com
5. www.msdn.microsoft.com
6. www.csharp.com
7. www.gotdotnet.com
8. www.aspnextgen.com
9. www.andymcm.com/dotnetfaq.htm
10.www.pacestar.com
11.www.123aspx.com
12.www.411asp.net
13.www.dotnetwire.com
14.www.ibuyspy.com
BOOKS:
1) Software Engineering-R.P.Ppress.
2) Information System Analysis & Design-Penn
APPENDIX-B
MICROSOFT.NET FRAMEWORK
objectives:
The .NET Framework has two main components: the common language
runtime and the .NET Framework class library. The common language runtime is
the foundation of the .NET Framework. You can think of the runtime as an agent
that manages code at execution time, providing core services such as memory
management, thread management, and remoting, while also enforcing strict type
safety and other forms of code accuracy that ensure security and robustness. In
fact, the concept of code management is a fundamental principle of the runtime.
Code that targets the runtime is known as managed code, while code that does not
target the runtime is known as unmanaged code. The class library, the other main
component of the .NET Framework, is a comprehensive, object-oriented
collection of reusable types that you can use to develop applications ranging from
traditional command-line or graphical user interface (GUI) applications to
applications based on the latest innovations provided by ASP.NET, such as Web
Forms and XML Web services.
The .NET Framework can be hosted by unmanaged components that load
the common language runtime into their processes and initiate the execution of
managed code, thereby creating a software environment that can exploit both
managed and unmanaged features. The .NET Framework not only provides
several runtime hosts, but also supports the development of third-party runtime
hosts.
The runtime enforces code access security. For example, users can trust
that an executable embedded in a Web page can play an animation on screen or
sing a song, but cannot access their personal data, file system, or network. The
security features of the runtime thus enable legitimate Internet-deployed software
to be exceptionally feature rich.
While the runtime is designed for the software of the future, it also
supports software of today and yesterday. Interoperability between managed and
unmanaged code enables developers to continue to use necessary COM
components and DLLs.
A feature called just-in time (JIT) compiling enables all managed code to
run in the native machine language of the system on which it is executing.
Meanwhile, the memory manager removes the possibilities of fragmented
memory and increases memory locality-of-reference to further increase
performance.
Console applications.
Windows GUI applications (Windows Forms).
ASP.NET applications.
XML Web services.
Windows services.