Professional Documents
Culture Documents
INTRODUCTION
Online college Magazine is a forum where college students and faculties can post and read various
articles, thus promoting literary insight. Articles can be searched by anybody in the world.
While examining technical feasibility, huge importance is given to the configuration of the proposed system.
The configuration should give the complete picture about the system’s requirement such that what kind of
1
hardware is required and how these units are interconnected so that they could operate and communicate
smoothly.
Configurations will be pursued that satisfies the key technical requirements but represent different levels of
ambition and cost.
Since cost plays quite an important role in deciding the new system, it must be identified and estimated
properly. So economic analysis is the most frequently used technique for evaluating the effectiveness
(economical feasibility) of a proposed system. To determine the economical feasibility of the system a
cost/benefit analysis is to make. This procedure is to determine the benefits and savings that are expected from a
proposed system and compare them with costs. Four facts that play an important role in deciding economical
feasibility of the proposed system are as follows:
Cost-saving benefits
Cost-avoidance benefits
Improved-performance benefits
Improved - information benefits.
Hence the proposed system is economically feasible.
It is mainly related to human organizational aspects. The points to be considered are:
What changes will be brought with the system?
What organizational structures are disturbed?
What new skills will be required?
Do the existing Employees members have these skills if not, can they be trained?
2
1.4 Purpose:
Creating and managing an Online College Magazine where college students and faculties can post and read
various articles, thus promoting literary insight. Articles can be searched by anybody in the world. Factors
behind the motivation of this system are:
1. Not all students make it to the printed magazine.
2. Creativity of students needs to be nurtured.
Creating a user-friendly interactive place where students/faculties can share their ideas.
1.5 Scope:
The Scope of the ONLINE COLLEGE MAGAZINE includes:
User must have a valid User Id and password to login to the system.
If a wrong password is given thrice in succession, that account will be locked and the
Customer will not be able to use it. When an invalid password is entered a warning is given
To the user that his account is going to get locked.
Search Engine for all the articles posted till date. Accessible by anybody.
Essential steps to be taken to prevent authenticity infringement.
Articles to be distributed in categories. Can overlap 2 or more categories. Articles to be associated with
suitable tags by the registered users at the time of posting, so that they are searchable.
The home page to consist of attractive essential features like: most read articles, editor’s pick, recently
posted articles, highest rated articles, article of the month, college news, etc.
Archives to be maintained.
Interactive feedback to be supported to enhance the user experience.
Guests can read articles, rate them and comment on them. They can also access other optional features
(amenities like Word of the day, etc.) but can’t post articles unless they sign in as registered users.
Automatic commenting on articles by spammers/automatic bots to be defied.
College Students/Faculties can only register as members (through unique IDs).
Alumni registration to be supported.
Registered members, Moderators and Administrators are allowed to post articles.
Articles can be downloaded in various formats.
Registered users, Moderators, and Admins will have their own profile, where they can edit info for the
world to see. Useful “updated” info related to their activities to be available at their profiles.
3
Chapter 2
REQUIREMENT ANALYSIS AND SPECIFICATION ANALYSIS
Requirements Analysis is the process of defining the expectations of the users for an application that is to
be built or modified. High - quality requirements are documented, actionable, measurable, testable, traceable,
helps to identify business opportunities, and are defined to a facilitate system design.
4
Description:
The admin can perform the functions which are displayed above. The admin takes care of the server
upgrade and maintenance, website security to prevent spamming and hacks. The admin also takes care of
the design and analysis of the website with the moderator. The role of selecting the moderators and
updating them is done by the administrator.
5
2.1.2 Alumni use case report
Description:
The alumni will enjoy limited functions on the website. The alumni can report articles, view
profile of professors, rate articles, and edit his own profile.
6
Description:
The guest does not enjoy all benefits like a registered user. The guest functions will be limited to
viewing articles and viewing the campus news. The guest cannot rate or comment on articles posted on the
online magazine website.
Description:
The moderator forms the centre of the entire scenario of the online magazine website. He has various
functions to perform. The moderator posts the word of the day on the website, updates the campus news and
events, posts thought of the day and update the library section. The moderator will also, confirm membership,
and will have the privilege of disabling a profile and renewing the password if required. The moderator can
block certain offensive articles of required. The final verdict of selecting the article or rejecting it lies with the
moderator. Hence the moderator forms the most important part of the use case model.
8
2.2 Class Diagram
9
2.3 Sequence Diagrams
2.4 2.3.1 Sign-up Sequence
Description:
A sequence diagram shows object interactions arranged in time sequence. It depicts the objects and
classes involved in the scenario and the sequence of messages exchanged between the objects needed to carry
out the functionality of the scenario. Sequence diagrams are sometimes called event diagrams or event scenarios
10
2.3.2 Report Article Sequence
Description:
A sequence diagram simply depicts interaction between objects in a sequential order i.e. the order in
which these interactions take place. We can also use the terms event diagrams or event scenarios to refer to a
sequence diagram. Sequence diagrams describe how and in what order the objects in a system function. These
diagrams are widely used by businessmen and software developers to document and understand requirements
for new and existing systems.
11
2.3.3 Article posting Sequence
12
The Administrator assigns new users when a new client joins the online
Bank. Also he can delete an account when any of the clients leave the bank organization.
Preconditions:
Administrator is already logged in.
Create account
Entrepreneur details
Details
Client details
13
Administrator is already logged in.
Name Of Use-Case: Generate Reports.
Description: The Administrator is responsible for checking the logs of different clients
For auditing and maintaining the integrity of the system.
Preconditions:
Administrator is already
Logged in.
2.4.2 Customer:
Ordinary customers have a user name & password with which they can login into their account.
Name of Use-Case: Login.
Description: Customer must provide a valid User Id and password to login to the system.
Preconditions:
Customer must have a valid User Id and password to login to the system.
2.5.3 Overview:
The SRS will include two sections, namely:
Overall Description: This section will describe major components of the system, interconnections, and
external interfaces.
14
Specific Requirements: This section will describe the functions of actors, their roles in the system and
the constraints faced by the system.
15
Fig 2.6. E-R DIAGRAM
16
2.7 Uuse-Case Diagram :
Description and the priority of this system when we consider the online college magazine in this we provide the
details of how to access the magazine without going to the bank through internet. When we consider the priority
of this project it is mainly of medium cost, efficient to user access data, provides the required data, safe and
secure one .we can know the details of our account.
A UML use case diagram is the primary form of system/software requirements for a new software program
underdeveloped. Use cases specify the expected behavior (what), and not the exact method of making it happen
(how). Use cases once specified can be denoted both textual and visual representation (i.e. use case diagram). A
key concept of use case modeling is that it helps us design a system from the end user's perspective. It is an
effective technique for communicating system behavior in the user's terms by specifying all externally visible
system behavior.
A use case diagram is usually simple. It does not show the detail of the use cases:
It only summarizes some of the relationships between use cases, actors, and systems.
It does not show the order in which steps are performed to achieve the goals of each use case.
As said, a use case diagram should be simple and contains only a few shapes. If yours contain more than 20 use
cases, you are probably misusing use case diagram. The figure below shows the UML diagram hierarchy and
the positioning of the UML Use Case Diagram. As you can see, use case diagrams belong to the family of
behavioral diagrams.
Use cases share different kinds of relationships. Defining the relationship between two use cases is the decision
of the software analysts of the use case diagram. A relationship between two use cases is basically modeling the
dependency between the two use cases. The reuse of an existing use case by using different types of
relationships reduces the overall effort required in developing a system.
The purpose of use case diagram is to capture the dynamic aspect of a system. However, this definition is too
generic to describe the purpose, as other four diagrams (activity, sequence, collaboration, and Statechart) also
have the same purpose. We will look into some specific purpose, which will distinguish it from other four
diagrams. Use case diagrams are used to gather the requirements of a system including internal and external
influences. These requirements are mostly design requirements. Hence, when a system is analyzed to gather its
functionalities, use cases are prepared and actors are identified.
17
18
Fig 2.7.1 Use Case Diagram
19
Chapter 3
IMPLEMENTATION
A programming language implementation is a system for executing computer programs. There are two
general approaches to programming language implementation: Interpretation: An interpreter takes as input a
program in some language, and performs the actions written in that language on some machine.
3.3 Interface
3.3.1 Software Interface:
User on Internet: Web Browser, Operating System (any).
Data Base Server : DB2
Network : Internet
Development Tools : WSAD (J2EE,Java,Servlets,HTML), DB2, OS(Windows),
20
CLIENT SIDE
SERVER SIDE
Web sphere Intel core I3 4 GB 1 TB
application server
V5.0
DB2 V8.1 Intel core I3 4 GB 1 TB
(Excluding data
size)
21
Registered users, and Admins will have their own profile, where they can edit info for the world to see. Useful
“updated” info related to their activities to be available at their profiles.
Moderators will have associated categories, according to which to-be-validated-articles will be posted to them
on their profiles. On rejection, he will have to provide a reason for the same, which will be forwarded to the
concerned user.
Mails to be sent on rejection/acceptance of articles.
3.6 Constraints:
Login and password is used for identification of customer’s account and there is no facility for non users to
login.
This system works only on a single server.
GUI is only in English
Limited to HTTP/HTTPS protocols
22
Fig 3.6.1 Activity diagram for overall system
23
3.6.2 User login Activity
Description:
The user enters a username and password. If the username and password is verified then the user
login is successful and user is redirected to the home-page. If the login is not successful then the user can
either renter his password and username (the user can do this for only a maximum of 3 times) or he can
click on forgot username/password. Then a security question is asked. If that is verified, then an email is
sent on the user's mail id else the request is forwarded to the admin.
24
3.6.3 Managing Accounts Activity
Description:
A registered user (admin, moderator, alumni, faculty, student) can manage their accounts by doing the following
Change password
Delete account
Edit details
25
3.6.4 Rate and comment activity
Description:
If a user is a registered user t hen he can comment or rate an article but if it is guest then he cannot
rate or comment an article. This shows that an alumni will not be able to comment or rate on an article
Description:
If the user is a registered user then he can report a comment. Then a notice is forwarded to
moderator to report the comment. The moderator can either remove the comment or ignore the
26
request to report that comment. In case the user is a guest then he cannot report a comment.
27
3.6.6 Registration Activity
Desciption :
Initially student/faculty is made to fill mandatory fields filled in registration form.once the user
clicks submit, the details are verified. If the details are incomplete then the user is informed to fill the
complete details and is redirected to the page where the details have to be filled. If the details that are filled
are complete then it is checked whether it’s a new user or already existing user. If it is an already existing
user then the user is asked to renter the details. If it is a new user then the user will create a username and a
password. Then if it is a valid username and password then he/she is registered and is redirected to the
home- page. If it is an invalid and password then the user is made to renter his/her username and password.
28
3.6.7 Submit Article Activity
Description:
If a user intends to post an article then he creates article and submits it in the appropriate
category. The article is then received by the moderator of that particular category in
which the article has been added . The moderator can
he can put the article in a different category if he feels the article is not apt for the category it
was submitted for. Then this is verified by the user who submitted the article. The user can
either verify the category change or submit the article or he does not verify the category
change and withdraws the article.
29
Chapter 4
A TEST CASE is a set of conditions or variables under which a tester will determine whether a
system under test satisfies requirements or works correctly. The process of developing test cases can also
help find problems in the requirements or design of an application.
The visitor’s web browser requests the web page using a standard URL.
The web server software (typically Apache) recognizes that the requested file is a PHP script, so the
server fires up the PHP interpreter to execute the code contained in the file.
Certain PHP commands (which will be the focus of this chapter) connect to the MySQL database and
request the content that belongs in the web page.
The MySQL database responds by sending the requested content to the PHP script.
The PHP script stores the content into one or more PHP variables, then uses echo statements to
output the content as part of the web page.
The PHP interpreter finishes up by handing a copy of the HTML it has created to the web server.
The web server sends the HTML to the web browser as it would a plain HTML file, except that
instead of coming directly from an HTML file, the page is the output provided by the PHP
interpreter. Connecting to MySQL with PHP Before you can retrieve content out of your MySQL
database for inclusion in a web page, you must know how to establish a connection to MySQL from
inside a PHP script. Back in Introducing MySQL, you used a program called mysql that allowed you
to make such a connection from the command prompt. Just as that program could connect directly to
a running MySQL server, so too can the PHP interpreter; support for connecting to MySQL is built
right into the language in the form of a library of built-in functions. Introducing PHP that PHP
functions usually return a value when they’re called. The mysqli_connect function, for example,
returns a link identifier that identifies the connection that has been established. Since we intend to
make use of the connection, we should hold onto this value. Here’s how we might connect to our
MySQL server: example of As described above, the values of the three function parameters may
differ for your MySQL server; at the very least, you’ll need to substitute in the root password you
established for your MySQL server. What’s important to see here is that the value returned
by mysqli_connect is stored in a variable named $link .As the MySQL server is a completely
separate piece of software from the web server, we must consider the possibility that the server may
be unavailable or inaccessible due to a network outage, or because the username/password
combination you provided is rejected by the server. In such cases, the mysqli_connect function
returns FALSE, instead of a connection identifier, as no connection is established. This allows us to
react to such failures using an if statement:
30
4.1 Database Design:
How to Write Test Cases: Sample Template with Examples
What is a Test Case?
A Test Case is defined as a set of actions executed to verify a particular feature or functionality of the
software application. A test case is an indispensable component of the Software Testing Life Cycle that
helps validate the AUT (Application under Test).
Test Scenario Verses Test Case
Test scenarios are rather vague and cover a wide range of possibilities. Testing is all about being very
specific.
For a Test Scenario: Check Login Functionality there many possible test cases are:
Test Case 1: Check results on entering valid User Id & Password
Test Case 2: Check results on entering Invalid User ID & Password
Test Case 3: Check response when a User ID is Empty & Login Button is pressed, and many more
This is nothing but a Test Case
Login
Field Name DataType Size Key Description
31
4.1.2 User table
users
id varchar 20 Name
4.1.3
Posts table
Posts
Title char 50
Author char 50
Postdate varchar 20
Image clob
Content varchar 150
32
Update_on date
status varchar 20
tag varchar
Chapter 5
TEST-CASE RESULT
A Test Case is defined as a set of actions executed to verify a particular feature or functionality of the
software application. A test case is an indispensable component of the Software Testing Life-Cycle that
helps validate the AUT (Application under Test).
Test Scenario Verses Test Case
Test scenarios are rather vague and cover a wide range of possibilities. Testing is all about being very
specific.
For a Test Scenario: Check Login Functionality there many possible test cases are:
Test Case 1: Check results on entering valid User Id & Password
Test Case 2: Check results on entering Invalid User ID & Password
Test Case 3: Check response when a User ID is Empty & Login Button is pressed.
Step 2) In order to execute the test case, you would need Test Data. Adding it below
Test Test Case Description Test Data
Case #
1 Check response when valid email and Email: ####@email.com Password:
password is entered lNf9^Oti7^2h
Identifying test data can be time-consuming and may sometimes require creating test data afresh. The reason
it needs to be documented.
Step 3) In order to execute a test case, a tester needs to perform a specific set of actions on the AUT. This is
documented as below:
33
Test Test Case Description Test Steps Test Data
Case #
Many times the Test Steps are not simple as above, hence they need documentation. Also, the author of the
test case may leave the organization or go on a vacation or is sick and off duty or is very busy with other
critical tasks. A recently hire may be asked to execute the test case. Documented steps will help him and also
facilitate reviews by other stakeholders.
Step 4) The goal of test cases is to check behavior the AUT for an expected result. This needs to be
documented as below
Test Test Case Description Test Data Expected Result
Case #
34
applies after the test case completes. For our test case, a post condition would be time & date of login is
stored in the database
Test Case ID 1 Test Case Description Test the login functionality in magazine
Created By pradeep Reviewed By sajjad Version 2.1
Tester's Name sajjad Date Tested September 8, 2019 Test Case Pass
and (Pass/Fail/Not
pradeep Executed)
Test Verify on entering valid userid and password, the customer can
Scenario login
Step # Step Details Expected Results Actual Results Pass / Fail / Not executed /
Suspended
1 Navigate to homepage window homepage pass
localhost/demo9
2 Enter Userid & Credential can be As Expected Pass
Password entered
3 Click Submit Cutomer is logged in As Expected Pass
4
Test Case ID 1 Test Case Test the post functionality in posts section
Description
Created By pradeep Reviewed By sajjad Version 2.1
Tester's Name sajjad and pradeep Date Tested October 8, 2019 Test Case Pass
(Pass/Fail/Not
Executed)
35
2 2 Pass = superadmin
3 3
4 4
Step # Step Details Expected Results Actual Results Pass / Fail / Not executed /
Suspended
2 Enter project desciption and title and posts shown on post posts shown on post window Pass
upload image window
3 Click Submit post displayed As Expected Pass
4
36
Conclusion
An online magazine stocks some functions with a blog and also with internet magazines, but can
usually be recognized by its approach to article management. Publications normally have publishers or
article forums who review distribution and perform a function to ensure that all material satisfies the
objectives of the marketers (those investing time or money in its production) and the audience. The College
Magazine where college students and faculties can post and read various articles, thus promoting. Articles
can be searched by anybody in the world. Factors behind the motivation of this system. In this all students
not make it to the printed magazine. Creativity of student needs to be nurtured and creating a user-friendly
interactive place where students/faculties can share their ideas.
37