Professional Documents
Culture Documents
Submitted
in the partial fulfillment of
Award of degree of
MASTER OF COMPUTER APPLICATION
(2005-08)
Under the supervision of
Mr. RAJESH RANJAN
Project Head
TECHPOWER Pvt. Ltd.
1
ACKNOWLEDGMENT
First and foremost I thank TECHPOWER Ltd, New Delhi for allowing me to complete my
Project Training successfully. I express my sincere gratitude to all those who initiated and
helped me in the successful completion of this project. Sincere thanks and profound gratitude
to my guide Mr.Rajesh Ranjan for helping me in carrying out the project work and for
many valuable and useful information while bringing out this project.
I also take this opportunity to express my in debtedness to Dr. V.B Dhawan, Head of
Department (M.C.A.), and to my respected teachers of I.T.S Mohan Nagar,Utter Pradesh
Technical University,Lucknow for their kind consent, expert guidance, valuable suggestion and
affectionate encouragement.
Last but not least, I am very thankful to my parents who are my source of inspiration in every
field of life.
- Manoj Kumar
Project
2
On
Quality Control
Certification Process
Team Members:
Manoj Kumar
Vikas
Anil Kumar
3
CONTENTS
Objective
Overview
Problem Description
Fact Finding
Platform Used
Bibliography
1: INTRODUCTION
4
What Is “Quality Control Certification Process”?
Quality Control Certification Process (QCCP) is the International Standards Organization. They
do not create standards but (as with ANSI) provide a means of verifying that a proposed standards
has met certain requirements for due process, consensus and other criteria by those developing the
standards.
The Quality Control Technology Awareness Certification has been developed to test
important concepts, skills and terminology related to Quality Control Technology.
5
SYSTEM BEHAVIOUR
Generally, the behavior of the system is decided on the basis of how accurately
It should work with least number of errors, how user friendly it is, and many
such factors. Thus, when we particularly talk about this system, it gives almost
all positive results for the above analysis. Positive results in the sense of
6
The Audi tee module contains three sub modules:
• Employee details
• Internal audit details
• Internal auditor details
1.1FEASIBILITY STUDY
This section basically deals with the central idea of what this system provides, which platforms it
works on, and what expenditure it requires to be built up or when it will be actually deployed and
many such factors. All these doubts can be cleared by the following explanation. . It is total user
friendly and compatible with quite data environments. It works over all versions of Windows
Operating Systems viz. Windows 2000, Windows XP and all related versions, from server side.
But when we talk about client side it can be operated on any O.S.
Thus, overall its compatibility is maintained very efficiently, that is Platform Independence is
complete of course from client side since its web-based system. Now, when we talk about cost
estimation, it can be divide into sub parts that its expenditure while developing it and at the time of
deployment. Since it is the R&D project related system, development have to be started from
scrap, thus collecting information, arranging it and developing it till we get desired output takes it
reasonable cost. During deployment phase, it depends on the customer and his needs.
i. Economic feasibility:
It includes an evaluation of development cost weighted against the ultimate income or
benefit derived from the developed system or product.
7
1.1 Operating Environment – hardware and software
Quality Control Certification Process (QCCP) requires SQL Server for the database
storage. Further it has been designed in .NET technology along with the code.
The connectivity is done in such a manner that it will be compatible to any system and need not to
change the properties all the time. It requires low maintenance and its requirements are also less.
1. Hardware Requirements:
High-speed communication network between client and server.
CPU Pentium IV
Memory 128 MB RAM
Display Options HTML, XML
Input Device Keyboard, Mouse
Network Interface Card Internet (64 kbps) LAN
Adapter
Table 1.1
2. Software Requirements:
Minimum Requirements to use this project are: ASP.NET, Windows
OS, SQL Server.
3. Technology Used:
Language / Tool: .NET 2.0 Framework.
4. Back End:
MS SQL Server
5. Sever:
IIS
8
1.5 Detail Description of Technology Used:
Features of ASP.Net:
ASP.Net provides the easy way of developing the web form. There are various versions of
ASP.Net as 1.0, 1.1, 2.0, and 3.0 and latest are 3.5. Here we used ASP.Net 2.0 for developing the
website. It has various features on previous version,
9
• Increase productivity by removing 70% of the code
• Use the same controls for all types of devices
• Provide a faster and better web server platform
• Simplify compilation and installation
• Simplify the administration of web applications
Security in ASP.Net:
Input/Data Validation:
• Do not rely on ASP.NET request validation
• Validate input for length, range, format, and type
• Validate input from all sources like QueryString, cookies, and HTML controls
• Do not rely on client-side validation
• Avoid user-supplied file name and path input
• Do not echo untrusted input
• If you need to write out untrusted data, encode the output
Authentication:
Forms Authentication:
• Use membership providers instead of custom authentication
• Use SSL to protect credentials and authentication cookies
• If you cannot use SSL, consider reducing session lifetime
• Validate user login information
• Do not store passwords directly in the user store
• Enforce strong passwords
• Protect access to your credential store
• Do not persist authentication cookies
• Restrict authentication tickets to HTTPS connections
• Consider partitioning your site to restricted areas and public areas
• Use unique cookie names and paths
Windows Authentication
• Choose Windows authentication when you can
• Enforce strong password policies
Authorization:
• Use URL authorization for page and directory access control
10
• Configure ACLs on your Web site files
• Use ASP.NET role manager for roles authorization
• If your role lookup is expensive, consider role caching
• Protect your authorization cookie
Data Access
• Encrypt your connection strings
• Use least-privileged accounts for database access
• Use Windows authentication where possible
• If you use Windows authentication, use a trusted service account
• If you cannot use a domain account, consider mirrored accounts
• When using SQL authentication, use strong passwords
• When using SQL authentication, protect credentials over the network
• When using SQL authentication, protect credentials in configuration files
• Validate untrusted input passed to your data access methods
• When constructing SQL queries, use type safe SQL parameters
• Avoid dynamic queries that accept user input
Exception Management
• Use structured exception handling
• Do not reveal exception details to the client
• Use a global error handler to catch unhandled exceptions
11
Impersonation/Delegation
• Know your tradeoffs with impersonation
• Avoid Calling LogonUser
• Avoid programmatic impersonation where possible
• If you need to impersonate, consider threading issues
• If you need to impersonate, clean up appropriately
• Avoid losing impersonation tokens
Parameter Manipulation
• Do not make security decisions based on parameters accessible on the client-side
• Validate all input parameters
• Avoid storing sensitive data in ViewState
• Encrypt ViewState if it must contain sensitive data
Sensitive Data
• Avoid plaintext passwords in configuration files
• Use platform features to manage keys where possible
• Do not pass sensitive data from page to page
• Protect sensitive data over the wire
• Do not cache sensitive data
Session Management
• Do not rely on client-side state management options
• Protect your out-of-process state service
• Protect SQL Server session state
12
• Instrument for unusual activity
• Instrument for significant business operations
• Consider using an application-specific event source
• Protect audit and log files
Deployment Considerations
• Use a least-privileged account for running ASP.NET applications
• Encrypt configuration sections that store sensitive data
• Consider your key storage location
• Block Protected File Retrieval by Using HttpForbiddenHandler
• Configure the MachineKey to use the same keys on all servers in a Web farm
• Lock configuration settings to enforce policy settings
Communication Security
• Consider SSL vs. IPSec
• Optimize pages that use SSL
Developer Productivity:
ASP.NET helps you deliver real world Web applications in record time.
• Easy Programming Model. ASP.NET makes building real world Web applications
dramatically easier. ASP.NET server controls enable an HTML-like style of declarative
programming that let you build great pages with far less code than with clDisplaying data,
validating user input and uploading files are all amazingly easy
13
• Flexible Language Options. ASP.NET lets you leverage your current programming
language skills. Unlike classic ASP, which supports only interpreted VBScript and JScript,
ASP.NET now supports more than 25 .NET languages (including built-in support for VB.NET, C#
and JScript.NET -- no tool required), giving you unprecendented flexibility in your choice
of language.
• Great Tool Support. You can harness the full power of ASP.NET using any text editor
-- even Notepad! But Visual Studio .NET adds the productivity of Visual Basic-style development
to the Web.
The Enterprise versions of Visual Studio .NET deliver life-cycle features to help organizations
plan, analyze, design, build, test and coordinate teams that develop ASP.NET Web applications.
Rich Class Framework. Application features that used to be hard to implement, or required a 3
rd-party component, can now be added in just a few lines of code using the .NET Framework.
The .NET Framework offers over 4500 classes that encapsulate rich functionality like XML, data
access, file upload, regular expressions, image generation, performance monitoring and logging,
transactions, message queuing, SMTP mail and much more!
• Compiled execution. ASP.NET is much faster than classic ASP, while preserving the "just
hit save" update model of ASP. However, no explicit compile step is required!
• Rich output caching. ASP.NET output caching can dramatically improve the performance
and scalability of your application. When output caching is enabled on a page, ASP.NET executes
the page just once and saves the result in memory in addition to sending it to the user. When
another user requests the same page, ASP.NET serves the cached result from memory without re-
executing the page.
• Web-Farm Session State. ASP.NET session state lets you share session data user-specific
state values across all machines in your Web farm.
Enhanced Reliability:
ASP.NET ensures that your application is always available to your users.
• Memory Leak, DeadLock and Crash Protection. ASP.NET automatically detects and
recovers from errors like deadlocks and memory leaks to ensure your application is always
available to your users.
14
Easy Deployment
ASP.NET takes the pain out of deploying server applications.
• Dynamic update of running application. ASP.NET now lets you update compiled
components without restarting the web server. In the past with classic COM components, the
developer would have to restart the web server each time he deployed an update.
• Easy Migration Path. You don't have to migrate your existing applications to start using
ASP.NET. ASP.NET runs on IIS side-by-side with classic ASP on Windows 2000 and Windows
XP platforms. Your existing ASP applications continue to be processed by ASP.DLL, while new
ASP.NET pages are processed by the new ASP.NET engine. you continue to use your existing
classic COM business components.
• XML Web Services. XML Web services allow applications to communicate and share data
over the Internet, regardless of operating system or programming language. ASP.NET makes
exposing and calling XML Web Services simple.
• Mobile Web Device Support. ASP.NET Mobile Controls let you easily target cell phones,
PDAs -- over 80 mobile Web devices -- using ASP.NET. What is the .NET Framework?
The .NET Framework is a development and execution environment that allows different
programming languages & libraries to work together seamlessly to create Windows-based
applications that are easier to build, manage, deploy and integrate with other networked systems.
15
The .NET Framework provides the basic infrastructure that Windows-based applications need to
make Microsoft's .NET vision of connecting information, people, systems and devices a reality:
Modern day web sites seem to be relying more and more on complex database systems. These
systems store all of their critical data, and allow for easy maintenance in some cases.
The Structured Query Language (SQL) is a very popular database language, and its standardization
makes it quite easy to store, update and access data.
16
• Fast Recovery
Microsoft SQL Server 2005 Express Edition Toolkit (SQL Server Express Toolkit) provides
additional tools and resources for SQL Server 2005 Express Edition and SQL Server 2005 Express
Edition with Advanced Services. The SQL Server Express Toolkit contains SQL Server 2005
Management Studio Express, a graphical management tool, and Business Intelligence
Development Studio, a creation and editing environment for reports using SQL Server Reporting
Services.
• SQL Server 2005 Management Studio Express Edition – Easily manage SQL Server 2005
Express Edition and SQL Server 2005 Express Edition with Advanced Services database instances
with this free, easy-to-use graphical management tool.
• Business Intelligence Development Studio (BIDS) – Create and edit reports for SQL Server
2005 Reporting Services (SSRS). BIDS provides the ability to create and edit Reporting Services
projects that are reporting on local relational data in local SQL Server Express databases.
Internet Information Services (IIS) 6.0 is a powerful Web server that provides a highly reliable,
manageable, and scalable Web application infrastructure for all versions of Windows Server 2003.
IIS helps organizations increase Web site and application availability while lowering system
administration costs. IIS 6.0 supports the Microsoft Dynamic Systems Initiative (DSI) with
17
automated health monitoring, process isolation, and improved management capabilities. Thinking
of upgrading? Read this: Should I Upgrade to IIS 6.0?
For information about other Windows Server technologies and services, see the complete list of
Windows Server 2003 Technology Centers.
Administrators and Web application developers demand a reliable, easily managed, high
performance, and secure Web server. IIS 6.0 and Microsoft Windows Server 2003 introduce many
new features for Web application server reliability and availability, management, scalability, and
security. The benefits of deploying IIS 6.0 include less planned and unplanned system downtime,
increased Web site and application availability, lower system administration costs, server
consolidation (reduced staffing, hardware, and site management costs), and a significant increase in
Web infrastructure security. This document provides a technical overview of IIS 6.0, the next
generation of Web infrastructure capabilities that are available in the Windows Server 2003 family
of products.
2. PROPOSED SYSTEM
18
Quality Control Certification Process (QCCP) is the International Standards Organization. They
do not create standards but(as with ANSI) provide a means of verifying that a proposed standards
has met certain requirements for due process, consensus and other criteria by those developing the
standards.
The Quality Control Technology Awareness Certification has been developed to test
important concepts, skills and terminology related to Quality Control Technology.
O SCOPE
The scope of the system is to develop an interface between the developers, testers & project
manager. With this system all the above stakeholders can interact and retrieve information about
the ongoing projects in the organization as per their security access.
To provide a user-friendly environment: GUI plays a very vital role in any website based
system. Till the time the interface with user is not convenient, system has no use. Thus, user should
be very comfortable while using any system and it is the case with this system. The path what the
user follows is very simple and he/she can return to the previous page very easily. Thus, even a
non-technical person can use the system efficiently and have their desired results very soon.
User environment:
Number of people involved in completing the task? Is this changing?
How long is a task cycle? Amount of time spent in each activity? Is this changing?
- Windows XP
19
(Future Systems)
- Unix Systems
What other applications are in use? Does your application need to integrate with them?
Info about all companies total resources,campus, architecture etc User Needs -:
1. There is no centralized repository of
- A centralized database is made available which contains all information about Standards, so
that quality can be tested on the basis of standards.
-To find total info about the company and keep them during complete process.
- The system contains PDA support, which enables to view reports while they are traveling or
are isolated without a computer.
20
Analysis:
The requirements gathering process is intensified and focused specifically on software.
Requirements for both the system and the software are documented and reviewed with the
customer.
System design:
Design is a meaningful engineering representation of something that is to be built. To solve actual
problems, a software engineer must incorporate a development strategy that encompasses the
process, methods and tools. This strategy is often called as a process model or software engineering
paradigm. Project model is based on nature of the project and its applications.
It can be traced to a customer’s requirements and at the same time assessed for quality against a set
of pre-defined criteria for “good” design.
Design focuses on four major areas of concern:
Data Structures
Software Architecture
Interface Representation
Procedural Details [1]
In context to our project, this phase is necessary to get an insight into the proposed work. Each of
the above mentioned four major areas of concern need to be given proper time during this phase so
as to be clear of the requirements which could probably arise later during the implementation
phase.
History has indicated that the conventional models (such as Waterfall, Incremental, RAD and
Spiral) have brought a certain amount of useful structure to software teams. This project can be
enhanced in increments, so the “Incremental” process model is chosen.
The incremental model combines elements of waterfall model (communication, planning,
modeling, construction, deployment) applied in an iterative fashion. Each iteration produces
deliverable “increments” of the software. When an incremental model is used, the first increment is
often a core product. As a result of use and/or evaluation, a plan is developed for next increment.
The plan addresses the modification of the core product to better meet the needs of the customer
21
and the delivery of addition features and functionality. This process is repeated following the
delivery of each increment, until the complete product is produced.
Analysis:
The requirements gathering process is intensified and focused specifically on software.
Requirements for both the system and the software are documented and reviewed with the
customer.
Design:
22
The design process translates requirements into a representation of the software that can be
assessed for quality before coding begins. Design is a multi-step process that focuses on: data
structure, software architecture, interface representations, and procedural detail.
Coding:
Coding Phase translates the design into machine-readable form. If design is performed in
detailed manner, code generation can be accomplished mechanistically.
Testing:
Testing process focuses on the logical internals of the software, ensuring that all statements have
been tested, and on functional externals; that is, conducting tests to uncover errors and ensure that
defined input will produce actual results that agree with the required results.
PROJECT DELIVERABLES:
The final outcome of the project is a modular application, called Defect Tracking System. It
provides functionality for fast & efficient project management.
23
• Function points (FP)
• Lines of source code (KLOC)
For our project, we use the sizing information in the form of Lines of source code (KLOC).
• Total lines of Code for our Project, KLOC
• Cost of each person per month, Cp (Cost per person-month)
Equations -:
• Equation for calculation of Efforts in person-months for the COCOMO model is:
E = a * (KLOC) b
Where,
a = 2.4
b = 1.05, for an organic project
E = Efforts in person-months.
• Equation for calculation of Duration of project in months for the COCOMO model is:
D = a * (E) b
Where,
a = 2.5
b = 0.38, for an organic project
D = Duration of project in months
Organic project:
Equation for calculation of Number of people required for completion of the project,
using the COCOMO model is:
N=E/D
Where,
N = Number of people required
E = Efforts in person-months
D = Duration of project in months.
• Equation for calculation of Cost of project, using the COCOMO model is:
24
C = D * Cp
A Data Flow Diagram is graphical technique that depicts informational flow and transforms that
are applied as data move from input to output. DFD provides additional information that is used
during the analysis of the information domain and serves as the basis for modeling of the function.
25
Fig: DFD LEVEL 0
LEVEL 1 DFD
user
Send
User Is user authenticated for notification
Identification Information gathering. About the
person
CLASS DIAGRAM:
A class diagram is a diagram that shows a set of classes, interfaces and collaborations and
their relationships. Generally, a class diagram is a collection of vertices and arcs. Classes are the
most important building block of any object-oriented system.
Class diagrams are usually used in one of the 3 ways:
1. To model vocabulary of the system.
2. To model simple collaboration.
3. To model a logical database scheme.
26
class diagra construct queries
m for project
query_id : integer
query_description
: string
user login
u_id : integer
u_pwd : string
log_res : bool
send_request
log_res()
load_page() request_type : integer
send_request()
send device_type()
Assign groups
mem_ids :
string
proj_ids :
string create new_user
u_id : string
u_pwd : string
adduser()
assignprofile()
27
Fig :CLASS DIAGRAM 2.
28
Fig : CLASS DIAGRAM 3.
29
class diagra send_request
m for tester
reque st_type : integer
send_request()
send_device_type()
download_file()
USECASE DIAGRAMS:
A use case diagram is a diagram that shows a set of use cases and actors and their relationships. A
use case specifies the behavior of a system or a part of a system and is a description of a set of
sequences of actions, including variants that a system performs to yield an observable result of
value to an actor. As mentioned below the use case diagrams are usually specified along with the
requirements analysis or can be used as an aid in the designing also at ten preliminary levels.
30
Fig : USE CASE DIAGRAM 1
31
Fig : USE CASE DIAGRAM 2
A sequence diagram is an Interaction Diagram that emphasizes the time ordering of the messages.
Thus it is a type of Interaction Diagram, which is used to model the dynamic aspects of the system.
Sequence diagram have two special features:
1. The object’s lifetime can be shown clearly in them and
2. The focus of control can also be shown.
32
Fig :SEQUENCE DIAGRAM 1.
G
r
ou
pM
a
n
ag
e
r D
a
t
ab
as
e
se
r
ve
r
1
.
En
et
rl
ogi
nna
m
ea
nd
p
as
s
wo
r
d
2
.
Ch
ec
k
va
l
i
di
ty
3
.
I
fv
al
i
d,e
x
ec
u
t
emo
d
ul
eel
se
4
.
Vi
ewp
r
o
je
ct
st
at
u
s
5
.
Di
spl
ays
t
at
u
svi
acr
y
st
alr
e
por
t
6
.
Se
nd
E
-m
a
iln
o
t
i
fi
ca
ti
on
33
D
e
ve
lo
p
er D
a
t
aba
s
ese
r
ve
r
1
.
Ent
erlo
g
in
na
me
an
dp
as
sw
or
d
2
.
Che
c
kv
alid
it
y
3
.
I
fva
lid
,
ex
ec
ut
emo
du
le
els
e
4
.
Che
c
kf
orb
ug
s
5
.
Dis
pla
yb
u
glis
t
6
.
Res
olv
eb
ug
an
dc
ha
ng
eit
's
7
.
Upd
a
te
da
t
aba
s
e
T
e
st
er D
a
ta
ba
se
se
rv
er
1
.
Ent
erlo
gin
na
mea
nd
pa
ss
wor
d
2
.
Che
ck
va
lid
it
y
3
.
Ifv
aid
,
exe
cu
t
e m
o
du
le
els
e
4
.
Che
ck
fo
rn
ewm
o
du
le
tot
est
5
.
Dis
pla
yn
ewm
o
du
le
lis
tif
6
.T
e
stm
o
du
le
an
dc
re
at
e n
ewb
ug
7
.
Mak
ene
wen
t
ery
34
3.7 Entity Relationship Diagram:
The Entity Relationship Data model was developed to facilitate database design by allowing
specification of an enterprise schema that represents the overall logical structure of a database, the
ER-Data model is one of the several semantic data models; the semantic aspect of the model lies in
its representation of the meaning of the data.
The ER-model is very useful in mapping the meanings and interactions of real-world
enterprises onto a conceptual schema.
user_id Name
Dept
Grp_id
Employe Design
Passwo ation
rd Is
a
Proj.Manag
er
Group Developer Tester
Manager
Cre
ate Vie
w Cre
Fix
Catego Rep ate
ry ort
Project Issue
Name
Locati
Platfor
Tester Issue_i on
m
d
Prj_id Status
35
3.8 Deployment Diagram:
Server
Machine
Client
Machine
Client
Machine
Client
Machine Client
machine
36
3.11 Test Procedures and Implementation:
Testing focuses primarily on the evaluation or assessment of product quality realized through a
number of core practices.
• Finding and documenting defects in software quality.
• Generally advising about perceived software quality.
• Proving the validity of the assumption made in design and requirement
specifications through concrete demonstration.
• Validating the software product functions as designed.
• Validating that the requirements have been implemented appropriately.
Any engineered product can be tested in one of two ways:
1. Knowing the specified function that a product has been designed to perform, test can be
conducted that demonstrates each function is fully operational while at the same time searching for
errors in same function;
2. Knowing the internal workings of a product, test can be conducted to ensure that internal
operations are performed according to specifications and all internal components have been
adequately exercised. The first test approach is Black Box testing and second is White-Box testing.
Unit Testing focuses on verification effort on the smallest unit of software design – the
software component or module. Using the component level design description as a guide, important
control paths are tested to uncover errors within the boundary of the module.
WHITE BOX:
37
4. Exercise internal structure to ensure their validity.
BLACK BOX:
Black box test also called as behavioral testing, focuses on the functional requirement of the
software. Black box testing attempts to find errors in the following categories:
1. Incorrect or missing functions,
2. Interface errors,
3. Errors in data structures or external database accesses,
4. Behavior or performance errors, and
5. Initialization and termination errors
By applying black-box testing we derive a set of test cases that satisfy the following criteria:
1. Test cases that reduce by a count that is greater than 1, the number of additional test cases
that must be designed to achieve reasonable testing.
2. test cases that tell us something about the presence or absence of classes of errors, rather than
an error associated only with the specific test at hand.
LOOP TESTING:
Loop testing is a white-box testing technique that focuses exclusively on the validity of loop
constructs. Four different classes of loop can be defined: Simple loops, concatenated loops, nested
loops and unstructured loops.
MANUAL TESTING:
Manual Testing involves a Tester’s efforts. In it test cases are written which involves Test Case ID,
Test Case Name, Pre-Conditions, Post-Conditions, Design Steps etc. Then Tester follows the
DESIGN STEPS written in test case and accordingly notes down whether each step is PASSED or
FAILED.
INTEGRATION TESTING:
Integration testing is the systematic technique for constructing the program structure while at the
same time conducting tests to uncover errors associated with interfacing. The objective is to take
unit tested components and build a program structure that has been dictated by design.
38
TOP-DOWN OR BOTTOM-UP TESTING:
Top-down testing is an incremental approach to construction of program structure. Modules are
integrated by moving downward through the control hierarchy, beginning with the main control
module
Bottom-Up testing involves testing the modules at the lower levels in the hierarchy and the
working up the hierarchy of modules until the final module is tested. Because components are
integrated from the bottom-up, processing required for components sub-ordinate to a given level is
always available and the need for stubs is eliminated.
REGRESSION TESTING:
Regression testing is the re-execution of some subset of tests that have already been conducted to
ensure that changes have not propagated unintended side effects. Regression testing may be
conducted manually, by re-executing a subset of all test cases or using automated capture/playback
tools.
VALIDATION:
Validation refers to a different set of activities that ensures, the software that has been built is
traceable to customer requirements. It is performed after coding by dynamic testing and also
confirms whether the software meets user requirement. Unit testing, integration testing, system
testing and acceptance testing are its examples.
ALPHA TESTING:
Acceptance testing is sometimes called alpha testing. The alpha testing process continues until the
system developed and the client agrees that the delivered system is an acceptable implementation
of the system requirements.
BETA TESTING:
When a system is to be marked as a software product, a testing process called beta testing is often
used. Beta testing involves delivering a system to a number of potential customers who agree to use
that system. They report problems to the system developers.
39
SYSTEM TESTING:
System testing is a series of tests whose primary purpose is to fully exercise the computer based
system. Although each test has a different purpose, all work to verify that system elements have
been properly integrated and perform allocated functions.
SECURITY TESTING:
Security testing attempts to verify that protection mechanisms built into a system will, in fact,
protect it from improper penetration.
It is process of attempting to demonstrate that a program or system does meet its original
requirement and objectives. It verifies operation from perspective of end user with the different
configuration. Following are the goals of security testing:
1. Usability testing
2. Performance testing
3. Load testing
4. Stress testing
5. Security testing
6. Configuration testing
7. Compatibility testing
8. Install ability testing
9. Recovery testing
PERFORMANCE TESTING
Performance testing is designed to test runtime performance of software within the context of an
integrated system. Performance testing occurs through all steps in testing process. Even at the unit
level, performance of the individual module may be accessed as white box tests are conducted. The
true performance can not be ascertained until all system elements are fully integrated.
40
5. DRAWBACKS AND LIMITATIONS
The system is tried up to the best to provide simplicity, capability and reliability to the user. As we
know nothing is perfect in world, and therefore my project also have some demerits in it.
Those demerits are as follows
• Application support new version of software.
• This project provides the group level accessing rights not the user level.
6. PROPOSED ENHANCEMENTS
• Quality control certification System provides fast & convenient way of quality
control.
• It provides user a facility to track variety of project-related issues.
• This system has separate access to different user of system.
• This system replaces manual processes with workflow automation
• This will be a very efficient Project Management Tool.
• Have good interfaces for user.
7. CONCLUSION
Quality control certification process provides user a facility to track variety of project-related
issues. This system replaces manual processes with workflow automation so that bugs are
automatically managed through their life cycle.
Development teams are not necessarily centralized so you need to support remote team
members. Quality control certification process using LAN setup also fulfills this requirement.
Quality control certification process provides LAN e-mail facility which gives user
quick way of communication with other members.
41
BIBLIOGRAPHY
42