Professional Documents
Culture Documents
1. SYNOPSIS
3. PROBLEM ANALYSIS
6. CONCLUSSION
7. APPENDIX
SCREEN LAYOUTS
CODE LIST
REPORTS
Synopsis
CVS stores individual file history. It can run scripts which you can supply to log CVS
operations or enforce site-specific polices.
Several Techniques and technology have been developed and many research and
development were still on the way to provide a better quality.
Proposed System:
The Problems in the IT industry regarding the configuration details can be solved by our
project. The management of features and assurances through control of changes made to
hardware, software, firmware, documentation, test, test fixtures and test documentation of
an automated information system, throughout the development and operational life of a
system. Source Code Management or revision control is part of this project.
The control of changes, including the recording thereof, that are made to the hardware,
software, firmware, and documentation throughout the system lifecycle. The control and
adaptation of the evolution of complex systems. It is the discipline of keeping evolving
software products under control, and thus contributes to satisfying quality and delay
constraints. .After establishing a configuration, such as that of an IT or computer system,
the evaluating and approving changes to the configuration and to the interrelationships
among system components.
This project contains following modules:
ADMINISTRATOR MODULE:
This module helps the administrator to get the source code from the user and
register it into the server database. Depending on the information given by the data
management group the data or code would be stored in the system. If the client wants to
know the status of their files then they can get it from the administrator. The
Administrator would get the requested data from quality analyst’s database.
Login (Cryptography)
This module is used for authentication purpose. Any registered employee who is
trying to enter his work area is checked for his id and password .If he is authorized then
he would be allowed to enter into his work area.
Token Rising
The main motivation of this module each employee should contain task and other
employee not allow doing same task... The project leader assigns each task by the tokens.
Each employee gets the task based on the token raised and the status of the token. Each
token will be allocated to the employee as per the previous work allocated and time
duration of the work and the work details of the employee.
Task Allocation
This module helps the employee to track the current status of the project on which
a employee operator is working on. Task will be allocated on a concurrent basis to the
employee as per the work completion criteria and work duration criteria. Any updates in
the new task will be updated as per the process and this will be updated before assigning
the work to the specific employee. This module also ensures that the same task should not
be shared with some other employee so as to reduce the communication gap between the
employee and to complete the work within the time frame and ensure error free
completion. Each task allocated to the employee will be monitored and updates in the
work will be notified and recorded for further tracking.
This module ensures that the work allocated should not be altered after assign of
work to the employee to re-assign to some other employee as it may cause critical errors
in the project. Only with the redundant situations the task may be re-assigned to some
other employee but make ensure that the work assigned to the new employee is in the
same technology and with having the knowledge of the given work so has to avoid
confusion and critical errors in the project.
Database sharing
Report Generation
Reports will be generated for the each stage of the project based on the
requirement. Reports for the permanent database will be created and generated on the
task and criteria basis.
Software Requirements:
The data flow diagram (DFD) is one of the most important tools used by system analysts.
Data flow diagrams are made up of a number symbols, which represent system
components. Most data flow modeling methods use four kinds of symbols. These
symbols are used to represent four kinds of system components. Processes, data stores,
data flows and external entities. Processes are represented by circles in DFD. Data Flow
represented by a thin line in the DFD and each data store has a unique name and square
or rectangle represents external entities.
Unlike detailed flowchart, Data Flow Diagrams do not supply detailed description of the
modules but graphically describes a system’s data and how the data interact with the
system.
Arrow
Circles
Open End Box
Squares
An arrow identifies the data flow in motion. It is a pipeline through which information is
flown like the rectangle in the flowchart. A circle stands for process that converts data
into information. An open-ended box represents a data store, data at rest or a temporary
repository of data. A square defines a source or destination of system data.
Login Request
Concurrent Version
USER Schema Administrator
Authenticate Response
Permanent Database
ADMINISTRATOR DFD
Level 1
Admin Login
valid
Client
Client Report Store Requiremen
t
Invalid Project
Project Detail Store
Detail
Client
Requir
Schedul
e Project scheduling
Project details
Manager save
view
Report
Level 2
Project Manager
Detail
Detail
Report
Invalid
Level 3
Team Leader
valid Allocate
Authenticat Task
Team Leader
Login ion Proj
Data
Developer
Allocation Emp
Invalid
Data
Task detail
View
ENTITY RELEATIONSHIP DIAGRAM:
Pname Databas
Report e Language
ProjName
Tlid
Code
EmpNam
Project Pmid Employee
Duration e
Register Report Allocation
TokenN
Empid o
Task
Pid Result
Task
Allo Allocation Allo
cate cate
d d
Pid Tokeni
Empid d Task
Token Set
Token
TokenN
1 oO Task
Project
Get Name
Task
Result Source
Empid Code
1 1
Task
TokenN
oO
Task Store
Complete code
Table Design:
EmpAlloc
EmployeeMaster
NewEmployee
NewPm
NewTl
PMMster
project_registr
project_registrattion
Tlallocation
TLMster
TokenSet
Cost Estimation an Scheduling
Estimating Cost
There are many factors to consider when estimating the total cost of a
project. These include labor, hardware and software purchases or rentals, travel
for meeting or testing purposes, telecommunications (e.g., longdistance phone
calls, video-conferences, dedicated lines for testing, etc.), training courses, office
space, and so on.
Exactly how you estimate total project cost will depend on how your
organization allocates costs. Some costs may not be allocated to individual
projects and may be taken care of by adding an overhead value to labor rates ($
per hour).
Often, a software development project manager will only estimate the labor
cost and identify any additional project costs not considered “overhead” by the
organization. The simplest labor cost can be obtained by multiplying the project’s
effort estimate (in hours) by a general labor rate ($ per hour). A more accurate
labor cost would result from using a specific labor rate for each staff position
(e.g., Technical, QA, Project Management, Documentation, Support, etc.). You
would have to determine what percentage of total project effort should be
allocated to each position. Again, historical data or industry data models can help.
Project Scheduling
INPUT TYPES
It is necessary to determine the various types of inputs can be categorized as
follows:
External inputs, which are prime inputs for the system
Internal inputs, which are user communication with the system.
Operational, which are computer department’s communication to the
system
Interactive, which are inputs entered during a dialogue
INPUT MEDIA
At this stage choice has to be made the input media. To conclusion about the input
media consideration has to be given to:
Type of output
Flexibility of format
Speed
Accuracy
Verification methods
Rejection rates
Ease of correction
Storage and handling requirements
Security
Easy to use
Portability
Keeping in view the above description of the input types and input media, it can
be said that most of the inputs are of the form of internal and interactive. As input data is
to be the directly keyed in by the user, the keyboard can be considered to be the most
suitable input device.
ERROR AVOIDANCE
As this stage care is to be taken to ensure that input data remains accurate form
the stage at which it is recorded up to the stage in which the data is accepted by the
system. This can be achieved only by means of careful control each time the data is
handled
ERROR DETECTION
Even though every effort is make to avoid the occurrence of errors, still a small
proportion of errors are always likely to occur, these types of errors can be discovered by
using validation to check the input data.
DATA VALIDATION
Procedures are designed to detect error in data at a lower level of detail. Data
validations have been included in the system in almost every area where there is a
possibility for the user to commit errors. The system will not accept invalid data.
Whenever an invalid data is keyed in, the system immediately prompts the system will
accept the data only if the data is correct. Validations have been included where
necessary.
The system is designed to be a user friendly one. In other words the system has
been designed to communicate effectively with the user. The system has been designed
with pop up menus.
COMPUTER-INITIATED INTERFACE
The following computer-initiated were used:
The menu system for the user is presented with a list of alternatives and
the user chooses on: of alternatives.
Question –answer type dialog where the computer asks question and takes
action based on the basis of users reply.
Right form the start the system is going to be menu driven; the opening menu
displays the available options. Choosing one option gives another popup menu with more
option. In this way every option leads the users to data entry where the user can key in
the data
PERFORMANCE REQUIREMENT
Performance is measured in terms of report generation weekly and monthly.
Requirement specification is play important parts in the analysis of the system. Once the
requirement specifications are properly given, it is possible to design the system, which
will fit into the required environment. It rests largely in the par of the user of existing
system to give the requirement specification because they are the people who finally use
the system. This is because the requirements have to be known during the initial stages
so that the system can be designed according to those requirements. It is very difficult to
change the system once it has been designed and on the other hand designing a system,
which does not cater to the requirements of the user, is of no use. Stage as given bellow:
The system to able to interface with the existing system
The system is to be accurate
The system to be better than the existing system
The existing system is completely dependent on the staff to perform all duties.
OUTPUT DEFINITION
The output should be defined in terms of the following points:
Type of the output
Content of the output
Format of the output
Location of the output
Frequency of the output
Volume of the output
Sequence of the output
It is not always desirable to print to display data as it is held on a computer. It
should be decided as which form of the output is the most suitable.
OUTPUT MEDIA
In the next stage it is to be decided that which medium is the most appropriate for
the output. The main consideration when deciding about the output media are:
PROJECT TESTING
Testing is the most important phases in the software development activity. In software
development life cycle (SDLC), the main aim of the testing process in the quality, the
developed software is tested against attaining the required functionality and performance.
During the testing process the software is worked with some particular test case and
the output of the test cases are analyzed whether the software is working according to the
expectations or not.
The success of the testing process in determining the error is mostly depends upon the
test case criteria, for testing any software we need to have a description of the expected
behavior of the system and method of determining whether the observed behavior confirmed
to the expected behavior.
LEVEL OF TESTING
Since the error in the software can be injured at any stage. so, we have carry out the testing
process at different levels during the development. The basic levels of testing are
Unit Testing
Integration Testing
System Testing
Acceptance Testing.
The Unit Testing is carried out on coding.here different modules are tested against the
specification produced during design for the modules .In case of integration testing different
tested are combined into sub system and tested in case of the System testing the full software
is tested and in the next level of testing the system is tested with user requirement document
prepared.
UNIT TESTING
Unit testing mainly focused first in the smallest and low level modules, proceeding one at a
time. Bottom-up testing was performed on each module. As developing a driver program, the test
modules by developed or used. But for the purpose of testing modules themselves were used as
stubs, to print verification of the actions performed. After the lower level modules were tested, the
modules that the next higher level those make use of the lower modules were tested
Each module was tested against required functionality and test cases were developed to test
boundary values.
The unit testing has been tested with sample data and adequate corrections were made as per
the user requirement, such that login module was tested with user id and code and appropriate error
messages are provided for errors like data entry error, id error,etc.
INTEGRATION TESTING
Integration testing is a systematic technique for constructing the program structure, while at
the same time conducting tests to uncover error associated with interfacing. As the system consists
of the number the edges of the two modules. The software tested under this incremental bottom-up
approach.
Bottom-up approach integration strategy was implemented with the following steps.
Low modules were combined into clusters that perform specific software sub function
The clusters were tested
TESTING PROCESS
A number of activities must be performed for testing software. Testing start with test
plan. Test plan identifies all testing related activities that need to be performed along with the
schedule and guide lines for testing. The plan also specified the levels of testing that need to be
done, by identifying the different testing units. For each unit specified in the plan first the test
cases and reports are produced. These report are analyzed.
TEST PLAN
Test plan is a general document for entire project, which defines the scope, approach to be
taken and the personal responsible for different activities of testing. The inputs for forming test
plan are
Project Plan
Requirements Document System Design
EXECUTION TESTING
This program was successfully loaded and executed. Due to programming there were no
execution errors as fall as possible
QUALITY ASSURANCE
Quality assurance defines the objectives of a project and reviews
the overall activities so that error are corrected early in the development process.
TESTING
In system testing a common view is to eliminate program errors. This is
extremely difficult and time consuming. Since designers cannot prove 100% accuracy. A
successful test, then, is one that find errors.
VALIDATION
It checks the quality of the software in both simulated and live
environments. In the Simulated approach the developers test the product on their
workplace to make the products meet its requirements. In the Live Environment phase
the product is given to the customer to evaluate the product’s functionality.
Validation refers to the different set of activities that ensure that software
correctly implements a specific function and the software that been built is
traceable to customer requirements. Verification and validation can be defined in a
way like:
Verification
Validation
Software validation is achieved through a series of black-box test that demonstrate
conformity with requirement. After each validation check a test has been conducted, one
of the two possible condition exists
The beta testing is conducted at one or more customer site by the end user of the
software. Unlike software testing the developer is generally not present. Therefore beta
test is live application of the software in an environment that cannot be controlled by the
developer
VALIDATION CHECK APPLIED IN THE PROJECT
The files entered in the project must only have the doc extension
The data entered must have only one format
One should not make a enter into without checking the password
The qc must enter into the status column only accepted or not accepted
File which are already be registered should not be registered once again or
other time
Qc can’t enter the file which are not entered by the dc
Qc should enter the file into corresponding filenames registered by the dc
Files which are registered and not accepted for the first time should not be
registered again but the reentry of date and status should be done only
CERTIFICATION
Certification is to certify that the program or software package is correct
and confirms to standards. With growing trend towards purchasing ready to use software,
certification has become more important.
System Security
Software integrity has become increasingly important in the age of hackers and
firewalls. This attributes measures a system ability to withstand attacks (both accidental
and intentional) to its security. Attacks can be made on all three components of software
program, data, and documents
To measure integrity, two additional attributes must be defined
o Thread
o Security
THREAD
Threat is the probability (which can be derived or estimated from empirical
evidence) that an attack of specific type occur with in a specific time.
SECURITY
Security is the probability (which can be estimated or derived from empirical
evidence) that attack on the specific type will be repelled.
SECURITY TESTING
Any computer based system that manages sensitive information or causes action
that can improperly harm(or benefit) individuals is the target for improper or illegal
penetration. Penetration spans a board range of activities; hackers who penetrate system
for sport; disgruntled employee who attempt to penetrate for revenge; dishonest
individual who penetrate for illicit personnel gains
Security testing to verify that protection mechanism built into a system will
in fact provide proper protection form improper penetration. During system testing, the
tester plays the role of the individual who desires to penetrate the system. Anything goes!
The tester may attempt to acquire password through external clerical means; may attack
the system with custom software designed to break down any defenses that have been
constructed may overwhelm the system thereby denying the service to other; may
purposely cause system errors.
IMPLEMENTATION
MAINTENANCE
After the system has successfully implemented maintenance activity may require
continuous involvement of the developers. Provision must be made for environmental
changes, which may affect either the computer, or other parts of computer based system:
such activity is normally called maintenance. It includes both the improvement of system
functions and the correction of faults that arise during the operation of a system.
This maintenance work will help to ensure that the system works smoothly as
predicted in the open environment. Whenever a maintenance work arises, the work has to
be properly carried out with proper documentation. This is to avoid any form of changes
in the structure of the system.
For every maintenance work an amendment notification is to be issued. This notification
will have the required changes and also authenticated. On receipt of the amendment
notification the amendment log is prepared which records these courses of action that has
been planned to be taken. It also records the estimated and the actual completion of each
of the activities.
Generic Risks
A risk is an unwanted event that has negative consequences. Project managers will
engage in risk management to understand and control the risks on their projects. We can
distinguish risks from other project events by looking for three things:
The generic risks such as the Product size risk, business impact risks, Customer–Related
risks, Process risks, Technology risks, Development environment risks, Security risks etc.
for this project are analyzed and documented by the senior staffs in the organization. This
project is developed by considering these issues and with the constant support from
senior staffs in the organization.
System Implementation
The method of implementation and the time scale to be adopted are found out
initially. Next the system is tested properly and the same time users are trained in the
new procedures.
Implementation Procedures
Implementation of software refers to the final installation of the package in its real
environment, to the satisfaction of the intended users and the operation of the system. In
many organizations some one who will not be operating it, will commission the software
development project. The people unaware that the software is meant to make their job
easier. In the initial stage, they doubt about the software but we have to ensure that the
resistance does not build up as one has to make sure that
- The active user must be aware of the benefits of using the system
- Their confidence in the software is built up
- Proper guidance is imparted to the user so that he is comfortable in using the
application.
Before going ahead and viewing the system, the user must know that for viewing the
result, the server program should be running in the server. If the server object is not up
running on the server, the actual processes won’t take place.
User Training
To achieve the objectives and benefits expected from computer based system, it is
essential for the people who will be involved to be confident of their role in the new
system. As systems become more complex, the need for education an training is more
and more important.
Education is complementary to training. It brings life to formal training by
explaining the background to the resources for them. Education involves creating the
right atmosphere an motivating user staff. Education sections should encourage
participation from all staff with protection for individuals for group criticism. Education
should start will before any development work to enable users to maintain or to regain the
ability to participate in the development of their system.
Education information can make training more interesting and more
understandable. The aim should always be to make individual feel that they can still make
all important contributions, to explain how they participate in making system changes,
and to show that the computer and computer staff do not operate in isolation, but are of
the same organization.
Operational Documentation
Once the implementation plan is decided, it is essential that the user of the system
is made familiar and comfortable with the environment. Education involves right
atmosphere & motivating the user. A documentation providing the whole operations of
the system is being developed. The system is developed in such a way that the user can
work with it in a well consistent way. The system is developed user friendly so that the
user can work the system from the tips given in the application itself. Useful tips and
guidance is given inside the application itself to help the user. Users have to be made
aware that what can be achieved with the new system and how it increases the
performance of the system. The user of the system should be given a general idea of the
system before he uses the system.
System Maintenance
The maintenance phase of the software cycle is the time in which a Software
product performs useful work.
After a system is successfully implemented, it should be maintained in a proper
manner. System maintenance is an important aspect in the software development life
cycle. The need for system maintenance is for it to make adaptable to the changes in the
system environment. There may be social, technical and other environmental changes,
which affects a system, which is being implemented. Software product enhancements
may involve providing new functional capabilities, improving user displays and mode of
interaction, upgrading the performance characteristics of the system. So only through
proper system maintenance procedures, the system can be adapted to cope up with these
changes.
Software maintenance is of course, far more than “finding mistakes”. We may
define maintenance by describing four activities that are undertaken to after a program is
released for use.
The first maintenance activity occurs because it is unreasonable to assume that
software testing will uncover all latent errors in a large software system. During the use
of any large program, errors will occur and be reported to the developer.
The process that includes the diagnosis and correction of one or more errors is
called corrective maintenance.
The second activity that contributes to a definition of maintenance occurs because
of the rapid change that is encountered in every aspect of computing. Therefore, adaptive
maintenance- an activity that modifies software to properly interfere with a changing
environment is both necessary and commonplace.
The third activity that may be applied to a definition of maintenance occurs when
a software package is successful. As the software is used, recommendations for new
capabilities, modifications to existing functions, and general enhancements are received
from users. To satisfy requests in this category, perfective maintenance is performed.
This activity accounts for the majority of all effort extended on software maintenance.
The fourth maintenance activity occurs when software is changed to improve
future maintainability or reliability, or to provide a better basis for future enhancements.
Often called preventive maintenance, this activity is characterized by reverse engineering
and techniques.
Screen Shots: