You are on page 1of 92

E-Tender System

A
System Development Project
On

E-Tender System
A
DISSERTATION SUBMITTED FOR
THE PARTIAL FULFILLMENT TOWARDS

Submitted By:

Patel Smit

J.G.College of Computer Application Page 1


E-Tender System

Index

Part I Introduction

1. Preface
2. About organization
3. Project Profile
4. Tools & Platform

Part II System Analysis and Design

5 Analysis
5.1 Requirement Analysis
5.2 E-R Diagram
5.3 Data Flow Diagram (DFD)

6 Design
6.1 Data Dictionary
6.2 User Interface Design

Part III Testing & Quality Assurance

7 Unit Testing
8 Integrity Testing

Part IV Conclusion

9 Future Enhancement
10 Bibliography

J.G.College of Computer Application Page 2


E-Tender System

Part 1

Introduction

1. Preface
2. About organization
3. Project Profile
4. Tools & Platform

J.G.College of Computer Application Page 3


E-Tender System

PREFACE

It gives us great pleasure in placing in the hands of ower


esteemed Faculties this individual report which, We believe, will
go through the documentation of the project work done by us.

The objective of this report is to provide both a conceptual


understanding of the system as well as working guide.

Surely no other technology the Information Technology is


proven as the driving force of the Nation. I.T. not only decides
the present but also the future. The need for software
development today is a competence in a G.U.I based front-end
tool as far as the database programming is concerned.

In highly competitive world of today all the business have


to be alert and advance in order to survive in the market and for
this, company has to be on constant look out for changing
trends and technology in the market.

A typical scenario today involves an application consisting


of a visual front end for presenting data and reporting options to
the enterprise users, and a connection to a database for piping
data to controls such as text boxes, tables, and list boxes.

Moreover We have found DBMS/RDBMS to be the most


exciting environment to work with, especially when the G.U.I
Tool like Visual Basic .NET.

J.G.College of Computer Application Page 4


E-Tender System

About organization

Virtual Softech And InfoTech. Is established in


Ahmadabad. Virtual is a enable services company providing
most efficient and cost effective solution. Virtual Softech and
InfoTech. Brings together world-class resources and expertise to
help create valuable relationships between clients, their users
and their employees. It located in Ahmadabad One of the fastest
growing industrial cities in Western India with a population base
of 4.4 million.

Virtual Softech And InfoTech. will carry on business of


developing, analyzing, testing, improving, importing, modifying,
customizing, exporting, buying, selling, distributing,
transferring, altering and converting all kinds of scalable internet
architectures and performance measurements and each and
every kind of information management activities.

 To work with leading edge technologies.


 Providing internet marketing, online branding, data
entry etc.
 To use our expertise to the benefit of our clients and
partners through an open, collaborative approach.

J.G.College of Computer Application Page 5


E-Tender System

PROJECT PROFILE

Project Title : E-Tender System.

Develop at/for : Virtual Softech & InfoTech.

Team members : Patel smit.

Front-End : Asp.Net 2005.

Back-End : SQL Server, JAVA script.

J.G.College of Computer Application Page 6


E-Tender System

A Salient Feature

The purpose of the E –Tender System is to provide the


interface between the Tender buyers and the sellers on the
internet. It is the online website to make an advertise about.
 Commercial Tender
 Government Tender
 Global Tender

So this system is going to be used for making the advertise


about Tender You want to sale and if You want to purchase any
Tender then this website is the best resource to get the Tender
alerts and To find the Tender as per the requirements.

New System:

The new of the E – Tender system is to provide the


interface between the Tender buyers and the sellers on the
internet. It is the website to make an advertise about Tender and
this system will be more help full to get the better scope for
Tender advertisement.

So because of the Drawbacks of the current manual


system the company has decided to automate the current system
into the computer application as the Website.

J.G.College of Computer Application Page 7


E-Tender System

Saving the time:

Here as we know there is not the manual system. And so it


becomes more faster than the manual system and so there is
less amount of paper work. Because when a customer Request
for the Tender then there will be the online system in which a
user have to first of all go through the registration process. And
as soon as the user becomes the registered then he will be able
to advertise and buy the Tenders. So paper work doesn’t require.
And so process for Registration and the searching the property
becomes easy and fast. So the system helps to save the time at
the both Side. As well as for company and for customer also.

Human resources can be managed properly:

Here the system is Computer generated so the work


Becomes fast and most of the paper Work becomes half. As an
example there is no need of an employee for creating the reports.
And as the paper work requires more no. of the Employees to
handle the database and the information. And there is easy to
maintain database by computer system. And accuracy also can
be achieved by the automated System.

J.G.College of Computer Application Page 8


E-Tender System

Easy to manage the database:


Because of the automated system the employees are not
responsible for managing the data base manually and so
followings are the benefits of it.
Here data management accuracy can be maintained...
Data consistency can be maintained...
Data reports can be prepared properly...
Data updating can be managed properly...

Easy for accessing data:


Here also the data can be easily accessed. Because we
know that here the system is responsible to manage the data.
Management becomes easy. And the data can be fetched and
accessed as soon as the user request for particular information.
Because data are stored in the proper format. And also if
employee want to search for any record. Then the employee
would not have to go through each and every record
sequentially. So it is easy to manage and get the data easily.

Fast service:
And so because of not being Time consuming and being
Easy in managing the data and being easy in accessing the data
the service becomes very fast and comfortable. And because of
fast service it becomes to give the service to the large no. of the
customers. And results of the fast service become beneficial for
the organization as well as the Customer also. These are the
benefits of having the computer System.

J.G.College of Computer Application Page 9


E-Tender System

TOOLS & PLATFORM

 Front End Tools

Front End tools support the development of graphical


method of system and process

 Asp.net – Microsoft Visual Studio 2005


 Adobe Photoshop 8.0

1 Introduction To ASP.NET :

ASP.net is more than the next version of Active server


pages (ASP); it is unified web development platform that provide
the services necessary for developers to build enterprise-class
based web Application. While Asp.net is largely syntax
compatible with ASP, it also provides the new programming
model and instruction for more secure, scalable and stable
application. You can feel free to augment your existing ASP
applications by incrementally adding ASP.NET functionality to
them.

ASP.NET is compiled, NET-based environment; you can


author application in any NET Compatible language, including
Visual Basic.Net, C# and Jscript NET. Additionally, the entire
NET Framework is available to any ASP.NET application.
Developers can easily access the benefits of these technologies,
Which include the managed common language runtime
environment, type safety, inheritance, and so on.

J.G.College of Computer Application Page 10


E-Tender System

ASP.NET has been designed to work seamlessly with HTML


editors and other programming tools, including Microsoft Visual
studio NET. Not only does this make web development easier,
but it also provides all the benefits that these tools have to offer,
including the GUI that developers can use to drop server
controls onto a web page and fully integrated debugging support.
Developers can use web forms or XML web services when
creating an ASP.NET application, or combine these in any way
they see fit. Each supported by the same infrastructure that
allow you to use authentication schemes, cache frequently use
data, or customize your application configuration to name only a
few possibilities

Web forms allow you to build powerful forms-based Web


pages. When building these pages, you can use ASP.NET server
control to create common UI elements, and program them for
common tasks. These controls allow you to rapidly build a Web
form out of reusable build-in or custom components, simplifying
the code of a page.

An XML Web services provides the means to access server


functionality remotely. Using XML Web services, businesses can
expose programmatic interface to their data or business logic,
which in turn can be obtained and manipulated by client and
server application XML Web services enable the exchange of data
in client-server or server-server scenarios, using standards like

J.G.College of Computer Application Page 11


E-Tender System

HTTP and XML Messaging to move data across firewalls. XML


Web services are not tied to a particular component technology
or object-calling convention. As a result, programs written in any
language using any component model, and running on any
operating system can access XML Web services.

Each of these models can take full advantage of all


ASP.NET features, as well as the power of the NET Framework
and NET Framework common language runtime. These features
and how you can use them are outlined as follow if you have ASP
development skills, the new ASP.NET programming model will
seem very familiar to you. However, the ASP.NET object model
has changed significantly from unfortunately, this means that
ASP.NET ids not fully backward compatible; almost all exciting
ASP pages will have to be modified to some extend in order to
run under ASP.NET

Accessing database from ASP.NET application is often use


technique for displaying data to Web site visitors. ASP.Net makes
it easier than ever to access database for this purpose it also
allows to manage the database from your code.
ASP.NET provides a simple model that enables Web developers
to write logic that runs at the application level. Developers can
write this code in the global Ajax text or in a compiled class
deployed as an assembly.

ASP.NET provides easy-to-use application and session-


state facilities that are familiar to ASP developers and are readily
compatible with all other.NET Framework APIs.

J.G.College of Computer Application Page 12


E-Tender System

The NET Framework and ASP.NET provide default


Authorization and authentication schemes for Web application.
You can easily remove, add to, or replace these schemes,
depending upon the needs of your application.

ASP.net configuration setting are stored in XML-based


which are human readable and writable. Each of your
application can have a distinct configuration file and you can
extend the configuration scheme to suit your requirements.

Application are said to be running side by side when they


are installed on the same computer but use different versions of
the NET Framework.

IIS 6.0 uses a new process model called worker process


isolation mode, which a different from the process model used in
previous versions of 11S ASPNET uses this process model by
default when running on windows server 2003.

J.G.College of Computer Application Page 13


E-Tender System

 ELEMENTS OF ASP.NET WEB APPLICATION

Creating ASP.NET Web application involves working with


many of the same elements you use in any desktop of client-
server application. These include:

 Project Management features

When creating an ASP.NET Web application, you need to


keep track of the files you need, which ones need to be compiled,
and which need to be deployed.

 User Interface

Your application typically presents information to users, in


an ASP.NET Web application the user interface is presented in
Web forms pages, which send output to a browser. Optically, you
can create output tailored for mobile devices or other Web
application.

 Components

Many applications include reusable elements container


code to perform specific tasks. In Web applications, you c,' create
these components as XML Web services, which make them
callable across the Web from a web application, another XML
Web services, or a Window Form, for Example.

J.G.College of Computer Application Page 14


E-Tender System

 Data
Most applications require some form of data access.
ASP.NET Web application you can use ADO.NET, the data
services that are part of the NET Framework. Security,
performance, and other in structure feature.

As in any application, you must implement security


prevent unauthorized use, test and debug the application, tune
its performance, and perform other tasks not directly related to
the application function.

The following diagram provides an overview of how the


pieces of ASP.NET Web applications fit together and fit into the
broader context of the NET Framework of ASP.NET.

J.G.College of Computer Application Page 15


E-Tender System

2. Adobe Photoshop 8.0

Photoshop, or simply Photoshop, is a graphics editor


developed and published by Adobe Systems. It is the current
market leader for commercial bitmap and image manipulation,
and is the flagship product of Adobe Systems.

Photoshop can utilize the color models RGB, lab, CMYK,


grayscale, binary and bitmap. Photoshop has the ability to read
and write raster and vector image formats such as: .EPS, .PNG,
.GIF, .JPEG, Fireworks, etc.

J.G.College of Computer Application Page 16


E-Tender System

 Back End Tools :

Back End tools support the development of Database of system

 Microsoft Sql Server 2005


 C#

1. Microsoft Sql Server 2005:

 Advantages of SQL Server 2005

Because It Is built on the new SQL Server 2005 relational


database engine, SQL Server 2005 Express provides some
important advantages over MSDE, which is based on the older
SQL Server 2000 technology. In addition to the core database
engine enhancements that SQL Server 2005 Express inherits
from the SQL Server 2005 family, SQL Server 2005 Express has
been redesigned; some core database capabilities and
characteristics have changed.

 Increased maximum database size

One of the most important advantages that SQL Server


2005 Express has over MSDE Is the increased database size.
MSDE is limited to a maximum database size of 2 GB. SQL
Server 2005 Express effectively doubles this by bumping up the
maximum database size to 4 GB. It's Important to note that the

J.G.College of Computer Application Page 17


E-Tender System

4-GB limitation Is per database not per instance. For example,


you can have multiple 4-GB databases on one SQL Server 2005
Express instance, all of which can be online simultaneously.

 No workload governor
Another Important advantage that SQL Server 2005
Express has over MSDE is that it does not have the MSDE
workload governor. The MSDE query governor is a widely
misunderstood MSDE feature that was intended to limit the type
of workloads that MSDE could be used for. The MSDE query
governor throttles performance by stalling a user connection for
a few milliseconds each time the connection requests a read or
write operation on a database when there are more than eight
concurrent connections.

 SQL Server 2005 Management Studio Express Edition

The graphical user Interface tools for SQL Server 2005


Express makes it easy for even novices to use the database
functionality in SQL Server 2005 Express. The new SQL Server
2005 Management Studio Express (SSMSE) Is available as a
separate Web download. It is also included In SQL Server 2005
Express Edition with Advanced Services and the SQL Server
2005 Express Edition Toolkit. SSMSE allows easy database
management and query analysis capabilities, and is
redistributable with SQL Server 2005 Express.

J.G.College of Computer Application Page 18


E-Tender System

However, that doesn't mean that you should replace all of


your Transact-SQL stored procedures with new CLR-based objects.
Transact-SQL Is stills the best choice for data-centric stored
procedures and functions.

By default, CLR support In SQL Server 2005 Express Is


turned off because not all applications require CLR support. To
enable CLR support in SQL Server 2005, you can use the SQL
Server 2005 Surface Area Configuration tool.

 New data types

Another important advantage over MSDE that SQL Server


2005 Express inherits from SQL Server 2005 is support for the new
SQL Server 2005 data types. SQL Server 2005 has a new XML data
type as well as a new varbinary (max) data type. The new XML data
type provides support for typed and untyped XML documents. In
both cases, the SQL Server relational database engine ensures that
the data inserted into the XML data type is well-formed XML. In the
case of typed XML documents, SQL Server will only store the XML
data if it complies with the associated XSD (Extensible Schema
Definition).

Like the earlier image data type that is supported by SQL


Server 2000 and MSDE, the new varbinary (max) data type can
store up to 2 GB of data and is primarily intended to store large
binary objects like bitmaps, jpegs, and other large binary objects.

J.G.College of Computer Application Page 19


E-Tender System

However, unlike the older image data type where the application
needed to use an entirely different data access mechanism to read
and write the binary data, the new varbinary (max) data type
enables applications to access the data stored in the same way as
the other SQL Server data types.

 User Instance support

Another Important advantage that SQL Server 2005 Express


has over MSDE is support for user instances. MSDE supports only
server Instances-it does not provide support for user Instances.
User Instances simplify the ability to deploy database applications
that are built on the NET Framework. A user instance is similar to a
normal server instance. However, user Instances are created on
demand unlike standard SQL Server instances, which are created
only during setup. The user does not need to be an administrator to
dynamically attach to the database. A user instance is created when
the User Instance keyword is used as a part of the Native SQL
Client connection string. In addition, the Attach DB Filename
keyword is used to specify the name and path of the SQL Server
mdf database file that is enabling the application to connect to the
target database. The following connection string illustrates using
the user Instance support in SQL Server 2005 Express. "Data
source=.\SQLExpress; integrated security=true;
Attachdbfilename=|DataDirectory|mydb.mdf; user instance=true;"
The application connects to a user instance of SQL Server 2005
Express that is running as the user who opened the connection.
This is a feature only available in SQL Server 2005 Express.

J.G.College of Computer Application Page 20


E-Tender System

 Reporting Services

Like MSDE, SQL Server 2005 Express does not possess


business intelligence (BI) features such as Analysis Services,
Integration Services, or data mining. However, SQL Server 2005
Express does provide support for Reporting Services. While the
Initial version of SQL Server 2005 Express did not include
support for Reporting Services, It is now available via separate
downloads. SQL Server 2005 Express Edition with Advanced
Services provides the Report Server. The SQL Server 2005
Express Toolkit provides the Business Intelligence Development
Studio.

SQL Server 2005 Express can act as a data source for


relational data that is on your local server for Reporting Services.
Plus, Reporting Services in SQL Server 2005 Express can render
reports in Excel, PDF, Image, Print, and DHTML formats. The
Report Manager utility In SQL Server 2005 Express manages
reports. Reporting Services reports used in SQL Server 2005
Express are completely compatible with the Reporting Services
In the other SQL Server 2005 editions.

 SQL Service Broker

A new SQL Server 2005 development feature that is


supported by SQL Server 2005 Express and has no counterpart
in MSDE is support for the new SQL Server Service Broker. The
SQL Server 2005 Service Broker Is an application development
framework that supports the creation of asynchronous
Messaging applications.

J.G.College of Computer Application Page 21


E-Tender System

SQL Server 2005 Express can act as a Client to SQL Server


Service Broker applications running on the other editions of SQL
Server 2005. This is useful In scale-out scenarios where multiple
applications running on a distributed set of SQL Server 2005
Express systems all connect Into a central SQL Server 2005
system running one of the other editions of SQL Server 2005. It
should be noted that SQL Server 2005 Express also supports
Intra-instance SQL Server Service Broker messaging, which can
be used to replace some of the job scheduling functionality that
SQL Agent provides for MSDE and the other editions of SQL
Server 2005. You can find more information on using SQL Server
Service Broker to manage tasks at
http://wwwmicrosoft.com/technet/technetmag/issues/2005/05
/ServiceBroker/default.aspx on Microsoft TechNet.

 Full-text search

Support for full-text search is another feature that wasn't


present in the initial release of SQL Server 2005 Express.
However, it is available in the SQL Server 2005 Express Edition
with Advanced Services download. As in the other editions of
SQL Server 2005, the full-text search feature of SQL Server 2005
Express allows fast and flexible indexing for keyword-based
queries of text data stored in a SQL Server database. Unlike the
LIKE predicate, which only works on character patterns, full text
search operates on words and phrases based on the rules of a
particular language. Full-text search indexes can be built on

J.G.College of Computer Application Page 22


E-Tender System

Columns using the char, varchar, marcher, varbinary (max) and


Image data types. However, one limitation of full-text search with
SQL Server 2005 Express is that it doesn't work in user
instances.

 Enhanced security

Another important advantage that SQL Server 2005


Express has over MSDE is the enhanced security that Is built
into the product. SQL Server 2005 Express is installed securely
by default. Network connections are disabled. Likewise, support
for the CLR is turned off. You need to explicitly enable these
features in order to use them. In addition, like the other
members of the SQL Server 2005 product line, SQL Server 2005
Express has the ability to encrypt database data, thereby
ensuring that sensitive data can be accessed only by users who
have the appropriate permissions. SQL Server 2005 Express
supports both symmetric and asymmetric data encryption.

J.G.College of Computer Application Page 23


E-Tender System

2. C#

C# is an object-oriented programming language


developed by Microsoft as part of the .NET initiative and later
approved as a standard by ECMA (ECMA-334) and ISO (ISO/IEC
23270).

C# is the programming language that most directly


reflects the underlying Common Language Infrastructure (CLI).
Most of C#'s intrinsic types correspond to value-types
implemented by the CLI framework.

C# language specification does not state the code


generation requirements of the compiler: that is, it does not state
that a C# compiler must target a Common Language Runtime
(CLR), or generate Common Intermediate Language (CIL), or
generate any other specific format.

J.G.College of Computer Application Page 24


E-Tender System

HARDWARE AND SOFTWARE ENVIRONMENT

1. SOFTWARE REQUIREMENTS OF THE SYSTEM

Along with the hardware, used in the system it


requires software to make a system as well as to run a system
with the computer hardware. Collection of different types of
hardware into a specific type can form a computer but it can not
execute different process on its own. For efficient and proper
working of any system software must be installed. This
software’s may be in the form of operating system or application
software. To make the system one also needs to use software.

The software’s used in the proposed system are the latest


versions of them and can give up-to-date and perfect result of
every process in the system. This software comprises operating
system and application software used in the system.

Visual Studio 2005


Microsoft SQL Server2005

J.G.College of Computer Application Page 25


E-Tender System

2. HARDWARE REQUIREMENTS OF THE SYSTEM

This phase of the software development process deals


with a brief study of different hardware used in the computerized
system. There is a list of hardware materials used during the
making and also during the use of the proposed system. As the
new system to be made into a computerized functional system,
requirement of a computer is must. All the hardware needed
here are generally the basic configuration of a typical office
computer. A list of the hardware requirement used in the system
given below:

1. 2.80 GHz Pentium(R) D2processor or other compatible.


2. Intel 81x Chipset Motherboard.
3. 512 GB SD-RAM.
4. 160 GB-Hard-Disk.
5. 52x Compact Disc drive or faster.
6. Color Monitor. [1024 * 768 Display]
7. Keyboard.
8. Mouse.

J.G.College of Computer Application Page 26


E-Tender System

Part 2

SYSTEM ANALYSIS & DESIGN

5 Analysis
5.1 Requirement Analysis
5.2 E-R Diagram
5.3 Data Flow Diagram (DFD)

6 Design
6.1 Data Dictionary
6.2 User Interface Design

J.G.College of Computer Application Page 27


E-Tender System

ANALYSIS

J.G.College of Computer Application Page 28


E-Tender System

Requirement Analysis

Analysis of system is the process of gathering facts, solution of


problem and to decide over all constitution of desired system. In
system analysis, we have to analyze all the process related
features, required functions, available sources and the time
which should be specified for the analysis stage.

System analysis's broad outline decides how the problems in


outside the world can be related to a computer. It is the
examination of the problem. It is concerned with identifying all
the constraints and influences. System analysis deals with data
collection and a detailed evaluation of present system. It portrays
logical modal of the system through Data Flow Diagram and
Data Dictionaries.

J.G.College of Computer Application Page 29


E-Tender System

ENTITY-RELATIONSHIP DIAGRAM

 About E –R Diagram

The Entity Relationship Model Is a collation of basic


Objects, called entitles and relationship among these objects. An
Entity is a "thing" or "object" in the real world that is
distinguishable from other objects Entities are described in
database by a set of attributes. Relationship is association
among several entities. The overall logical structure of a
database can be expressed graphically by Entities Relationship
Diagram.

J.G.College of Computer Application Page 30


E-Tender System

 Symbol for E – R Diagram

For Entities

For attributes

For Relation

For Direction

For ISA Relation

J.G.College of Computer Application Page 31


E-Tender System

User
Is A

UPID

UPName
Visitor UPLoginID
1
1 1
1 Register
User M

Can
Subscrib UPID FBID
e

Gives
M
Feedback
M

FTID

1
Free Register M
User
1

Can
Can Approve
Replay orRejected
Or Quary

Can
Search & Download

Can Can
Search Search

A B C D

J.G.College of Computer Application Page 32


E-Tender System

A B C D
Can
upload

TenderNo
TenderID
M M
M M

TenderMast

DID
OrgName
DLoginId

Data eatery 1
Operator

DName

AID ALoginId

Addmin 1

J.G.College of Computer Application Page 33


E-Tender System

DATA FLOW DIAGRAM

☼ General rules for drawing data flow diagram:

 All data flows that appeared on the previous diagram


explaining the process are included in the lower level
diagram
 New data flows and data stores are added if they are used
internally in the process to link processes introduced for
the first time in the explosion at this level.
 Data flows and data stored that originate within the
process must be shown.
 No entries should contradict the descriptions of the higher
level data flow diagram( and if they do one or the other is
either incorrect or incomplete and a change must be
introduced)
 In general we should go as far as necessary to understand
the details of the system and the way it functions, taking
care to verify all aspects with knowledgeable users.

J.G.College of Computer Application Page 34


E-Tender System

☼ Guidelines for drawing DFD:

 Explode Processes for more details :


In large systems a single process can be exploded many
times until an adequate amount of detail is described
for analysts to understand the process.
 Maintain consistency between processes :
The inputs and outputs of the processes should match
at last. No one should be missing for consistency.
 Allow Meaningful Leveling conventions :
Leveling refers to the handling of local files (Those that
are used within a process).The details that Pertain
only to a single process on a particular level should be
held within the process. Data stores and data flows
that are relevant only to the inside of a process are
concealed until that process is exploded into greater
detail.
 Add Control on lower level diagrams only :
The logical data flow diagram developed to this Point
does not include control information. No mention has
been made of how to handle errors or exceptions, such
as processing incoming invoices that are incomplete.
The earlier stages did not include such exceptions as
unsigned invoices or invoices without authorized

J.G.College of Computer Application Page 35


E-Tender System

purchase orders. Yet these conditions are important in


correct invoice processing.

 Assign meaningful Labels :


The descriptions assigned to data flows and processes
should tell the reader what is going on.

 Data flow naming :


The names assigned to data flows should reflect the
data of interest to the analysts.

 Process naming :
Use the proper action verb and an object to receive the
action is most appropriate. E.g.: Instead of ‘Inventory
control’ use ‘Adjust Quantity on hand’. Also avoid the
vague process names such as PROCESS, REVIEW,
ASSEMBLE, HANDLE, And ORGANIZE.

J.G.College of Computer Application Page 36


E-Tender System

Symbol for Dataflow Diagram:

Direction of data flow

Processes

Source or destination

Data Stores

J.G.College of Computer Application Page 37


E-Tender System

CONTEXT LEVEL DIAGRAM FOR TENDER SYSTEM

Free Register
User

Search View Free


Tender Tender Notice &
Notice Get Free Alerts
In Detail

Search Tender Upload Tender Data


Visitor
View Tender Notice Give Error To The Entry
Request for Free Trial Duplication Of Data Operator
Or Registration
Request Accept / Rejected

E – Tender
Search Tender
Notice in Detail System
Get Tender Notice As
per Required / Search
Manage Accounts
Gives Feedback Manage Query

Gets Alerts As per plan


Register
User Download Tender Get feedback
Administer
Replay for Feedback

J.G.College of Computer Application Page 38


E-Tender System

FIRST LEVEL DATA FLOW DIAGRAM FOR TENDER SYSTEM

Search Criteria Search Criteria Free


Visitor Search Result 1.0 Search Result Register
Search User
Search Criteria
Gives Message Search Result
Dataentry
Operator
Input Gives Tender List
2.0
Visitor detail Gives Data Entry
Operator Give Admin Info Tender
Registration Info Master
Free Register
Gives Detail Admin
User Details
Register Master User
User Details Gives Detail Personal
User Id / Password
Gives Detail Gives Detail Login Id and Password
Give Message Register
Free User
Trial User
Personal 3.0 View
Login Id and Password Profile /
Payment detail
Give Message Log-in
Data Eatery Payment
master Gives
Operator Payment Detail Update
profile
Upload Give wrong Update
Tender Entry Or Error User Profile
Message Personal 4.0
Login Id and Password Give Profile
Detail
Utility
5.0 Give Message update plan

Plan master Give Plan


Data Entry Detail
6.0 Register user
Query Detail Feedback
Management Give Query Query
Tender Info
Tender Master
info Give Account
Detail
Detail Manage feedback
Update Feedback
Tender
Administrator
Manage Feedback Details
Master Query
7.0
Gives Feedback Gives Feedback
Feedback

J.G.College of Computer Application Page 39


E-Tender System

SECOND LEVEL DATA FLOW DIAGRAM FOR SEARCH

TenderMaster

1.1

Quick Search
Search Tender Using
Keyword

1.3
Registor User Or
Visitor Generate Tender List Tender List

Search Tender Using


Date, Price etc By 1.2
Advance Search
Advance
Search

TenderMaster

J.G.College of Computer Application Page 40


E-Tender System

SECOND LEVEL DIAGRAM FOR TENDER SYSTEM

Register User

Request view or view utility


update utility

4.1

Utility
Process

Update profile
Show profile Show payment info
Show feedback
Show
Gives Feedback Submit
Query
Query

4.3 4.4 4.5 4.6

My My My My
Profile Feedback Query Payment
Store feedback
View previous

Submit Query

GivesPayment
change Profile

feedback
View Profile

View Query

Detail

User
Personal Feedback Query master Payment Master

J.G.College of Computer Application Page 41


E-Tender System

SECOND LEVEL DIAGRAM FOR TENDER SYSTEM

Administer View query,


account Detail 6.1

Manage account, Management


query

Request For Manage account

Give Message Manage Query


Give account Detail

6.2
6.3

ACCOUNT
Query
Free Trial user

Qurey Detail
Give Info

Query Info
User Account
Detail

Give Info

Detail

User QueryMaster
Free trial personal

J.G.College of Computer Application Page 42


E-Tender System

DESIGN

J.G.College of Computer Application Page 43


E-Tender System

DATA DICTIONARY

The data dictionary of any system is an integral component


of structure analysis, since data flow diagrams by themselves do
not fully describe the subject under investigation about the
system.
A data dictionary is a catalog – a repository – of the
elements in the system. These elements center on data and the
way they are structured to meet user requirements and
organization needs. This step of creating a data dictionary is
simultaneous with the process of making data flow diagram(s).
Here all the data fields in their respective tables are allotted so
as to access these data in the system. The data tables are
created in a back-end tool like Microsoft Access, Oracle, FoxPro,
etc…. Here in the Billing system for Book stall we using tables
created in Access as it are the back-end tool used in the system.
The data dictionary consists of different major elements like Data
Elements, Data Store [Tables Used], Data Flow, Processes and
other External entities used in the system. The data dictionary
stores details and description of these elements.
It is developed during data flow analysis and assists the
analysts involved in determining the system requirements.
Analysts use data dictionary for the following important reasons:
 To manage the details in large system.
 To communicate a common meaning for all system elements.
 To document the features of the system.

J.G.College of Computer Application Page 44


E-Tender System

To facilitate analysis of the details in order to evaluate the


characteristics and determine where system changes should be
made. To locate errors and omissions in the system. The data
dictionary contains different types of descriptions for the data
flowing through the system.

Data Elements is the most fundamental level which is also


considered as the building block for all other data in the system.
It refers to all the different data used like fields, data item, etc. to
make the system fully functional irrespective to the table used in
the system. Here all the different type of fields used to make
table are written sequentially without referring to the tables. This
process helps in the process of Normalization of tables.
Next to Data Elements comes the Data Storage which
provides the information of where and how each data element is
stored in which table and it also give information of any
constraints if there. This step also gives knowledge of different
data types used for different field and their size. All the
normalized tables are showed in data storage.
Data Flow stage shows the flow of data in the system. This
step is can be already seen in the data flow diagrams above in
this document. This step refers to all the data flow paths were
transactions are done in the computerized system.
The data flow step also includes different processes used in
the system and it is followed by External Entities used in the
system.

J.G.College of Computer Application Page 45


E-Tender System

TABLE: - UserPersonal
DISCRIPTION: This table shows Register User detail

Field Data type CONSTRAINS Allow Description


Null
UPID Int Primary Key No Auto Increment
UPName Varchar(100) No Name ofRegister
user
UPLoginID Varchar(50) Unique No Login ID.
Password Varchar(50) No Hash
Email Varchar(100) No Emailed of user
Alter _email Varchar(100) Yes AlterNet Emailed
of user
Address Varchar(250) No Address of user
Phone Varchar(30) Yes Phone No.
Fax Varchar(30) Yes Fax No.
Mobile Varchar(20) Yes Mobile No.
City Varchar(50) Forgin Key of No City Name
City Detail
State Varchar(50) Forgin Key of No State Name
City Detail
Country Varchar(50) Forgin Key of No Country Name
City Detail
PlanID Int Forgin Key of No Plan id of user.
plan Masters
Amount Numeric(7,2) No Amount of pay.
BankName Varchar(50) Yes Bank Name
Payment Mode Varchar(50) No Pay mode cash or
cheque.
dd_ck_no Varchar(50) No Dd or cheque no.
Registration Date Time No Date of
Date Registration
Activate Varchar(50) No User active or not

J.G.College of Computer Application Page 46


E-Tender System

Activation Date Date Time No User active date


Expiry Date Date Time No Expire Date
question Varchar(50) No Security Question

Answer Varchar(50) No Answer


PaymtId int Forging Key of No Payment Id
Payment Master

TABLE: OrganizationMaster
DISCRIPTION: This table shows all organization detail.

Filed name Data Type Constrains Allow Description


Null

OrgId Int Primary Key NO Organization id


OrgName Varchar(250) No Organization
name
CatgoryName Varchar(50) NO Category Name

TABLE: City Detail


DISCRIPTION: This table shows all city and id detail

Filed Data type CONSTRAINS Allow Description


Null
Id int PrimaryKey No Auto Increment
City Varchar(100) No Name of City

State Varchar(100) No Name of State

Country Varchar(100) No Name of Country

Region Varchar(100) No Name of Region

J.G.College of Computer Application Page 47


E-Tender System

TABLE: QueryMaster
DISCRIPTION: This table shows all Query detail.
Filed name Data Type Constrains Allow Description
Null
QueID Int PrimaryKey No Auto Increment
UPID Int Forgin Key of No User Personal Id
UserPersonal
QueDetail Varchar(100) No Query Detail
QueDate DateTime No Query Date
Status varchar(50) No Query Status

TABLE: PlanMaster
DISCRIPTION: This table shows all Plan detail

Filed name Data Type Constrains Allow Null Description


PlanID Int Primary Key NO Plan id
PlanName Varchar(50) NO Plan Name
Price Numeric(7,2) NO Plan amount

TABLE: LoginMaster
DISCRIPTION: This table giving information about user login and logout

Filed name Data Type Constrains Allow Description


Null
Id Int Primary Key NO AutoIncrement

J.G.College of Computer Application Page 48


E-Tender System

UPID Int Forgin Key of NO Id of user


UserPersonal personal
Password Varchar2(50) NO Password

TABLE: CategoryMaster
DISCRIPTION: This table giving information about and category

Filed name Data Type Constrains Allow Null Description


CategoryID Int PrimaryKey NO Auto Increment
CategoryName Varchar(50) No Road,water etc.

TABLE: TenderMaster
DISCRIPTION:This table giving Tender information

Filed name Data Type Constrains Allow Description


Null
TenderId Int PrimaryKey NO Auto Increment
TenderNo Varchar(100) NO TenderNo
OrgName Varchar(250) NO Organize Name
Address Varchar(500) NO Address of
company
NoticeType Varchar(50) NO Auction,Tender
City Varchar(50) NO Name of City
State Varchar(50) NO Name of State
Country Varchar(50) NO Name of Country
Region Varchar(50) NO Name of Region

CatName Varchar(50) NO Category Name

TenderBrief Varchar(5000) NO Brief Detail of


Tender
TenderDetail Varchar(500) NO Short Detail of
Tender
TenderValue Float NO Price of Tender
DocFees Float Yes Document Fees

J.G.College of Computer Application Page 49


E-Tender System

EMD Float Yes Early Money


Deposite
OpeningDate DateTime NO Openig date

ClosingDate DateTime NO Closing date


InfoSource Varchar(50) NO Information source
Name

TABLE: Free Trial


DISCRIPTION: This table giving free trial user information

Filed name Data Type Constrains Allow Null Description


FTID Int PrimaryKey No Auto Increment
Name Varchar(100) No Name Of User
Address Varchar(100) No Address Detail
City Varchar(100) No Name of city
State Varchar(100) No Name of State
Country Varchar(500) No Name of Country
Phone nchar(15) Yes Phone No.
FaxNumber nchar(15) Yes Fax No.
Mobile Varchar(50) Yes Mobile No.
Email varchar(100) No EmailId of user
KeyWord Varchar(100) No Keyword ,which
get a alert.
ActivationDate datetime No Activation Date
ExpiryDate datetime No Expiry Date
Activate Varchar(50) No User active or
not.

TABLE: FeedBack
DISCRIPTION: this table giving user Feedback information

J.G.College of Computer Application Page 50


E-Tender System

Filed name Data Type Constrains Allow Description


Null
FBID Int PrimaryKey No Auto Increment

UPID Int Forgin Key of No Id of user


UserPersonal
FeedBackDetail Varchar(500) No Detail of feedback
FeedBackDate DateTime No Feed Back Date

TABLE: PaymentMaster
DISCRIPTION: This table giving user Pymt information

Filed name Data Type Constrains Allow Description


Null
PaymtID Int PrimaryKey No Auto Increment
UPID Int Forgin Key No Id of user
UserPersonal
Amount Numeric(7,2) No Amount of user Pay
DDno Varchar(20) Yes Demand Draft NO
BankName Varchar(50) Yes Name of Bank

J.G.College of Computer Application Page 51


E-Tender System

TABLE: Admin
DISCRIPTION:This table giving Admin information

Filed name Data Type Constrains Allow Description


Null
AID Int Primary Key No Auto Increment
ALoginID Varchar(50) No Admin Login id
Password Varchar(50) No Password
AName Varchar(50) No Admin Name
Address Varchar(100) No Address
Phone Varchar(50) Yes Phone No.
Email Varchar(50) No Email Id of admin

TABLE: DataentryOperator
DISCRIPTION: This table shows data entry operator detail

Filed Data Type Constrains Allow Null Description


name
DID Int PrimaryKey No Auto Increment id
DLoginID Varchar(50) No Operator Login Id
Password Varchar(50) No Operator Password
DName Varchar(50) No Operator Name
Address Varchar(100) No Operator Address
Phone Varchar(50) Yes Phone No.

J.G.College of Computer Application Page 52


E-Tender System

Email Varchar(50) No Email Id of Data


Entry Operator

TABLE:InfoSourceMaster
DISCRIPTION: This table shows InformationSource detail

Filed name Data Type Constrains Allow Description


Null
InfosourceId Int PrimaryKey No Auto
Increment
Infosource Varchar(50) Contain Info
source where
tender Detail
get.

J.G.College of Computer Application Page 53


E-Tender System

USER INTERFACE
DESIGN

J.G.College of Computer Application Page 54


E-Tender System

Home Page

In Home Page, display a simple detail of the tender.

J.G.College of Computer Application Page 55


E-Tender System

User click different link to go other page of website.


User can also search tender using tender search.

Login Form

In Login Page, you must enter the user name & password.

J.G.College of Computer Application Page 56


E-Tender System

If user is not register, Click subscribe now link and fill Detail.

Advance Search Form

Advance search page, user can search more different Tender


J.G.College of Computer Application Page 57
E-Tender System

using Category, Date, city, Value etc…

Forgot Password Form

J.G.College of Computer Application Page 58


E-Tender System

If user forgot his password, to get his password using forgot


password form.

Free Alert Form

J.G.College of Computer Application Page 59


E-Tender System

User get a free alert for15 Day of tender after register free alert
form.

Subscribe Now Form

J.G.College of Computer Application Page 60


E-Tender System

User can member of the website after his register with


subscribe now form.
About Us Form

About us form contains basic information of the website.

J.G.College of Computer Application Page 61


E-Tender System

Information Source Form

Information source page contain formation of news paper


were tender notices is give

J.G.College of Computer Application Page 62


E-Tender System

Privacy Policy Form

rivacy Policy page contain formation of policy notice of


website.

J.G.College of Computer Application Page 63


E-Tender System

Services Form

Services page contain payment detail of different plan.

J.G.College of Computer Application Page 64


E-Tender System

Support Form

Support page contain customer care support detail.

J.G.College of Computer Application Page 65


E-Tender System

Term of Usage Form

Term of usage page contain term and condition of use


website.

J.G.College of Computer Application Page 66


E-Tender System

Add With Us Form

Add with us page contain Detail of advertisement.

J.G.College of Computer Application Page 67


E-Tender System

Contact Us Form

Contacts us page contain contact detail of company.

J.G.College of Computer Application Page 68


E-Tender System

Register User Home Form

Register user home page contain full detail of tender.

J.G.College of Computer Application Page 69


E-Tender System

Register User Change Password Form

Using change password page user can change his password.

J.G.College of Computer Application Page 70


E-Tender System

Register User Profile Form

My profile page contains register user detail.


User also modifies his profile.

J.G.College of Computer Application Page 71


E-Tender System

Register User Query Form

My query page, user sends his query to customer care.

User can also see his previous query.

J.G.College of Computer Application Page 72


E-Tender System

Register User Plan Form

My Payment page, user see his payment.

User can also see his current plan.

J.G.College of Computer Application Page 73


E-Tender System

Register User Feedback Form

My Feedback form, user can send feedback.

User can also see his previous feedback.

J.G.College of Computer Application Page 74


E-Tender System

Admin Login Form

Using Login Page, Addmin can Login.

J.G.College of Computer Application Page 75


E-Tender System

Admin Query Management Form

Query management page display query which send by user or


it is approve or not.

J.G.College of Computer Application Page 76


E-Tender System

Admin account Management Form

Account management page display Number of user which is


activate or not and also admin can activate the user.

J.G.College of Computer Application Page 77


E-Tender System

Data-Entry Login Form

In Data Entry Login Page, Data entry must enter the user
name & password.
If user is not register, Click subscribe now link and fill Detail.

J.G.College of Computer Application Page 78


E-Tender System

Data-Entry Form

Data Entry page, Data-Entry operator add, update and delete


tender detail.

J.G.College of Computer Application Page 79


E-Tender System

Data-Entry Category Form

In category page, Data-Entry operators add, update and


delete category of the tender.

J.G.College of Computer Application Page 80


E-Tender System

Data-Entry Add City Form

In New city page, Data-Entry operators add, update and


delete city detail.

J.G.College of Computer Application Page 81


E-Tender System

Data-Entry Information Source Form

In Information Source page, Data-Entry operators add,


update and delete information-source of the tender.

J.G.College of Computer Application Page 82


E-Tender System

Data-Entry Organization Form

In Organization page, Data-Entry operators add, update and


delete Organization.

J.G.College of Computer Application Page 83


E-Tender System

Part 3

Testing & Quality Assurance

7 Unit Testing

8 Integrity Testing

J.G.College of Computer Application Page 84


E-Tender System

IMPORTANCE OF TESTING

In today’s competitive business environment, companies


are intensely concerned with the quality of their products and
services. A successful organization constantly must improve
quality in every area, including its information systems. Top
management must provide the leadership, encouragement, and
support needed for high quality IT resources.
No matter how carefully a system is designed and
implemented, some problem can occur, especially in a complex
system. Rigorous testing catches errors in the final stages, but it
is much less expensive to correct mistakes earlier in the
development process. The main objective of quality assurance is
t avoid problems, or to detect them as soon as possible. Poor
quality can result from inaccurate requirements, design
problems, coding errors, faulty documentation, and ineffective
testing.
In an effort to achieve high standards of quality, software
systems developers should consider software engineering
concepts and internationally recognized quality standards.
Testing the application
After coding, a programmer must test the program to make
sure that it functions correctly. Later, programs are tested in
groups, and finally the programmer must test the entire system.
The first step is to compile the program using a CASE tool or a
language compiler. This process detects syntax errors, which are

J.G.College of Computer Application Page 85


E-Tender System

language programmer errors. The programmer corrects the


errors until the program executes properly.
Next, the programmer desk checks the program. Desk
checking is the process of reviewing the program code to spot
logic errors, which produce incorrect results. This process can be
performed by the person who wrote the program or by other
programmers. Many organizations require a more formal type of
desk checking called a structured walkthroughs, or code review.
Typically, a group of three to five IT staff members
participate in code review. The group usually consists of project
team members and might include other programmers and
analysts who did not work on the project. The objective is to
have a peer group identify errors, apply quality standards, and
verify that the program meets the requirements of the system
design specification. Errors found during a structured
walkthroughs are easier to fix while coding is still in the
developmental stages.
In addition to analyzing logic and program code, the project
team usually holds a session with users called a design
walkthrough, to review the interface with a cross-section of
people who will work with the new system. This is a continuation
of the modeling and prototyping effort that began early in the
systems development process.
The next step in application development is to initiate a
sequence of unit testing, integration testing, and system testing.

J.G.College of Computer Application Page 86


E-Tender System

UNIT TESTING

The testing of an individual program or module is called


unit testing. The objective is to identify and eliminate execution
errors that could cause program to terminate abnormally, and
logic errors that could have been missed during desk checking.

Test data should contain both correct data and erroneous


data and should test all possible situations that could occur.
For example, for a field that allows a range of numeric values,
the test data should contain minimum values, maximum values,
values outside the acceptable range, and alphanumeric
characters. During testing, programmers can use software tools
to determine the location and potential causes of program errors.

During unit testing, programmers must test programs that


interact with other programs and files individually, before they
are integrated system. This requires a technique called stub
testing. In stub testing, the programmer simulates each
programs outcome or result and displays a message to indicate
whether or not the program executed successfully. Each stub
represents and entry or exit point that will be linked later to
another program or data file.

J.G.College of Computer Application Page 87


E-Tender System

To obtain an independent analysis, someone other than the


programmer who wrote the program usually creates the test data
and reviews the results. Systems analysis frequently create
details products that specify how and when the testing will ne
performed, who will participate, and what test data will be used.
A comprehensive test plan should include scenarios for every
possible situation the program could encounter.

Regardless of who creates the test plan, the project


manager or a designated analyst also reviews the final test
results. Some organizations also require users to approve final
unit test results.

J.G.College of Computer Application Page 88


E-Tender System

INTEGRITY TESTING

Testing one or more programs that depend on each other is


called integration testing, or link testing.
For example, consider an information system with a
program that checks and validates customer credit status, and a
separate program that updates data in the customer master file.
The output from the validation program becomes input to the
master file update program. Testing the programs independently
does not guarantee that the data passed between them is
correct. Only by performing integration testing for this pair of
programs can you make sure that the programs work together
properly. Notice that a program can have membership in two or
more groups.

Systems analysts usually develop the data they use in


integration testing. As is the case with all forms of testing,
integration test data must consider both normal and unusual
situations.

For example, integration testing might include passing


typical records between two programs, followed by blank records,
to simulate an unusual event or an operational problem. You
should use test data that simulates actual conditions because
you are testing the interface that links the programs. A testing
sequence should not move to the integration test stage unless it
has performed properly in all unit tests.

J.G.College of Computer Application Page 89


E-Tender System

Part 4

Conclusion

9 Future Enhancement

10 Bibliography

J.G.College of Computer Application Page 90


E-Tender System

FUTURE ENHANCEMENT

Even though the project was completed to the original


requirements, there are a few features that we could add or
improve on, if time allowed. The file system implementation
should be revised. We could look at other DBMS file systems to
get a better idea on how to design a more efficient and space
conserving system.

Security is the most important feature of the system. In


this some security measures are taken to avoid the mishandling
of the database. So, we can add more powerful security to
system.

These are the some of the addition that We are fill that can
be added to the system.

 Login Time Limitation.

 Different Type of Reports is can be added.

 Modules like Register User and Admin can be expanded


further.

J.G.College of Computer Application Page 91


E-Tender System

BIBLIOGRAPHY

Bibliography means that we have refer while doing project


like, which sites we gone through and which books we have
referred or which magazines we have seen to implements this
project. We are referring many books and websites that can help
us proper guild line to implements our system in the right
direction.

Reference Book

Unleashed ASP.NET 2.0


Addison-Wesley - C # Developer's Guide to ASP.NET
Wrox.Professional ASP.NET

Reference Website

www.google.com
www.cuil.com
www.codeguru.com
www.codeplex.com
www.asp.net

J.G.College of Computer Application Page 92

You might also like