You are on page 1of 66

ONLINE PROMOTION EXAMINATION

Oil and Natural Gas Corporation Limited (ONGC) is an Indian state-owned oil and gas


company headquartered at New Delhi, India. It is a Fortune Global 500 company ranked 413, and
contributes 77% of India's crude oil production and 81% of India's natural gas production. It is the
highest profit making corporation in India, according to filings with the BSE of latest quarter
results External Link. It was set up as a commission on 14 August 1956. Indian government holds
74.14% equity stake in this company.

ONGC is Asia's largest and most active company involved in exploration and production of
oil. It is involved in exploring for and exploiting hydrocarbons in 26 sedimentary basins of India. It
produces about 30% of India's crude oil requirement. It owns and operates more than 11,000
kilometres of pipelines in India. It is one of the highest profit making companies in India. In 2010, it
stood at 18th position in the Platt’s Top 250 Global Energy Company Rankings.

ONGC, since 1959, has made its presence noted in most parts of India and in overseas territories.
ONGC found new resources in Assam and established the new oil province in Cambay basin
(Gujarat). In 1970 with the discovery of Bombay High (now known

as Mumbai High), ONGC went offshore. With this discovery and subsequent discovery of huge oil

fields in the Western offshore, a total of 5 billion tonnes of hydrocarbon present in the country was

discovered. The most important contribution of ONGC, however, is its self-reliance and development
of core competence in exploration and production activities at a globally competitive level.
ONLINE PROMOTION EXAMINATION

PROJECT REPORT

Submitted by

SHAIN BABRI

BACKGROUND:

ONGC every year conducts Promotion Examination for its staffs. There are two types of promotion
in ONGC, one for officers on merit basis and second for staff on examination basis. For merit basis
there is no promotion exam but for the second type an examination is conducted by an external
agency hired by ONGC, this results into lot of efforts and financial implication on the organization.
To minimize the financial implications and streamlining the process the requirement of the online
promotion examination was generated.
Online Promotion Examination is developed on SAP platform in ABAP programming language.
There are two user groups for the process. The user groups are identified by their authorizations.
1. Administrator (Examination Controller)
2. Candidate (Employees of ONGC)
Main steps for administrator:
 Upload the question bank
Administrator has to collect all questions in ‘.txt’ form with a proper format according to the
database table in which questions will be uploaded.
 Upload the correct answers
Administrator has to upload correct answer with corresponding question numbers. Answers will
be uploaded using a text file in the predefined format according to the database table.
 Validate master data of the candidates
They have to validate personnel number, date & time of examination and discipline of every
candidate.
 Prepare the final result
Administrator has to prepare the final result of the examination using predefined criteria of
evaluation i.e. marks for each question and negative marking.

Main steps for candidates :

 Registration for the examination


Candidates have to register with their personnel number before exam.
 Login for examination
After successful registration, candidate can login for exam by entering login id and assigned
password.
 Appear in demo examination
In login page candidate will find one DEMO button for demonstration of the exam so that before
actual examination candidate can practice and get the idea.
 Read instructions for main examination
Candidate can read the instruction in login page for his/her convenience and take and complete
the exam in a proper way.
 Appear in main examination
Using EXAM START button candidates can enter and appear for the main promotion exam.
 Access to own final result
After taking exam, candidate has to use SUBMIT button for access his/her final result.

There are two types of group so both have different function to do. After registration, if the
user registered as an administrator can create the questions and can conduct the exam and
publish the results and reports. . Already registered user can only register a new user as an
administrator. But those visitors who are not registered have to register as a candidate before
they login. If the user registered as a candidate and he/she can appear the exam. The Login
page contains several portions according to the candidate wants to go for demonstration of
exam or see the instructions or start the exam. Tests are created on a random basis per
candidate with a particular time limit during which they are to be answered.
TABLE OF CONTENTS

CHAPTER TITLE PAGE NO

1. INTRODUCTION 6
1. 1 ABOUT THE PROJECT 6
2. PROBLEM DEFINITION 7
2.1 EXISTING SYSTEM 7
2.2 PROPOSED SYSTEM 8
3. SYSTEM STUDY 9
3.1 SYSTEM ANALYSIS 9
3.2 PROJECT PLANNING 10
4. PRELIMINARY INVESTIGATION 12
5. IDENTIFICATION OF NEED 13
5.1 FEASIBILITY STUDY 13
5.1.1 Operation Feasibility 13
5.1.2 Technical Feasibility 14
5.1.3 Economic Feasibility 14

5.2 SOFTWARE REQUIREMENT SPECIFICATION 14

5.2.1 Hardware Requirements 15


5.2.2 Software Requirements 15
5.3 TECHNOLOGY SPECIFICATION 15
6. SYSTEM DESIGN 17
6.1 DATABASE DESIGN 17
6.2 USER INTERFACE DESIGN 19
6.3 OUTPUT DESIGN 19
6.4 DATA INTEGRITY AND CONSTRAINTS 20
6.5 MODULARISATION DETAILS 20
7. CODING 21
7.1 COMMENTS AND DESCRIPTION 21
7.2 CODE EFFICIENCY 21
7.3 ERROR HANDLING 23
7.4 VALIDATION CHECKS 23
CHAPTER TITLE PAGE NO

8. SYSTEM IMPLEMENTATION 32

8.1 IMPLEMENTATION METHODS 33


8.2 IMPLEMENTATION PLAN 33

9. SYSTEM SECURITY MEASURES 34

9.1 DATABASE SECURITY 34


9.2 CREATION OF USER ACCESS RIGHTS 35

10. SYSTEM TESTING 36

10.1 UNIT TESTING 37


10.2 MODULE LEVEL TESTING 37
10.3 INTEGRATION & SYSTEM TESTING 37
10.4 REGRESSION TESTING 38

11. ABOUT SAP 39


11.1 ABAP 39

12. MAINTENANCE 41

13. TABLES 42
13.1 REGISTRATIONS 42
13.2 QUESTIONPAPER 42
13.3 FINALRESULTS 42

14 FIGURES 43
14.1 LEVEL 0 DFD
14.2 LEVEL 1 DFD
14.3 LEVEL 2 DFD
14.5 LOGIN FORM
14.6 BEGIN DEMO
14.7 DEMO QUESTIONPAPER DETAILS
14.8 AFTER EXIT DEMO
14.9 INSTRUCTIONS
14.10 START MAIN EXAM
14.11 MAIN QUESTIONPAPER DETAILS
14.12 VIEW RESPONSE
14.13 VIEW FINAL RESULT
15 FUTURE SCOPE
61

16 REFERENCES 62
TA

8
CHAPTER 1

INTRODUCTION

1.1 ABOUT THE PROJECT

Online Promotion Examination helps the candidates for appearing the exam by online. Its
mission is to offer a quick and easy way to appear the exam and it also provide the result immediately
after the exam. Through partnerships with agencies\boards which are conducting the multiple choice
type examination, it can provide special advantages to the applicants/candidates that can't be found
anywhere else.

The working of the project is as follows.

This exam consist many procedure as if you are employee of ONGC then you have to login for exam

or enter your CPF number. After login, you will have many option whether you want to see the all

instructions related to this exam or want to take a look to the type of exam then you can go through its

demonstration session where you will get question number, question with five options and for preview

of next and previous question, two buttons are available with the NEXT and PREVIOUS name, one

more feature is available there for candidates convenience, candidates can go directly to any other

question of this exam and after getting it, you have to use EXITDEMO button for exit, or for

instruction you can use INSTRUCTION button and after getting all ideas, you can go for main exam

with the help of START EXAM button. The main exam format is same as demonstration of exam.

Candidates can access easily or give this exam in a proper way. You have some time limitation also

according to the administrator. If you have completed your exam then for getting your response, you

have to click SUBMIT button and then you will get your response with right answer and in last your

final result.

CHAPTER 2

6
PROBLEM DEFINITION

Online Promotion Examination is very helpful to users. The aim of this project is to provide quick,
immediate and easy way to appear the exam. It can provide special advantages to the
candidates/applicants that can't be found anywhere else through partnerships with agencies/boards that
are conducting the multiple choice type examination. Its working is that candidate allows registering
for the exam and administrator allows registering for conducting the exam. This will continue to grow
- ultimately providing a wide breadth of services for beneficial to the candidates.
Online promotion examination questions can be of different type .The online promotion examination
system makes provision for difficulty levels of items. A test can be compiled with questions from
different topics/libraries. Tests can be created on a random basis per candidate. The online promotion
examination system can automatically add the marks allocated in each question to determine the total
mark for the test. A time limit can be set for the test. The sequence of questions can be randomized.
Online Promotion Examination System allows jumping to specific questions based on the previous
answer. The options per question can be randomized. The online promotion examination system limits
the number of times a candidate can write a test. Candidates are not to be forced to go through all the
questions at least once, before exiting the test. Candidates allowed exiting the test before completing
all the questions.
Login module helps the user to login to the site. For that he/she must type the CPF number correctly.
The login provision in this page helps the already registered user to directly access the site and there is
a link for registration to a user who is new to this site.Candidate module is mainly for the candidates.
This helps the candidates to register for the exam and appear the exam. This will provide immediate
result after the exam according to correct and wrong answer.
Administrator module is mainly for the administrator. This will contain the creation of question paper,
preview of already created question paper, and the report of the administrator. For creating the
question paper he/she must enter Exam ID, No: of Series, No: of questions, No: of Options, Correct
answer. For showing the preview of already created question paper he/she must enter the correct Exam
id.

ADVANTAGES :

 It provide quick, immediate and easy way to appear the exam.


 It provide immediate result after the exam according to correct and wrong answer.
2.1 EXISTING SYSTEM
 candidates allowed to exit the test before completing all the questions.
 Candidates can go directly to any otter question within less time.

7
The existing system is manual entry of up keeping of the details of the persons who are registered
already. And it is very difficult for each person to come to the exam center. It is very difficult to the

candidates from far distance to reach the exam center. This system is required to prepare registration\
application form, question paper for the candidates and required to print a lot of number manually. To
calculate how many candidates registered, and verification of details of these candidates in a month by
hand is very difficult. This requires quite a lot of time and wastage of money as it requires quite lot of
manpower to do that. Another factor that takes into account that is the possibility of errors and which
requires verification and checking of data relating to various operations which is done manually. The
limitation of existing system is that it is not all personalized. It cannot be used for personal and quick
reference. Even the other staff members can make quick entries if the responsible person is not present.

ADVANTAGES:
 It is very easy to access or give exam.
 It is very secure and safe.
 It is reduces paper use in the exam.
 Easy to store all the result for future references.

2.2 PROPOSED SYSTEM


The modern computerized system is developed with the aim to overcome the drawbacks of existing
system. The proposed system has got many advantages. People from different parts of the world can
register very easily. The new system is more personalized. It is made in such a manner that all the new
users can understand all the options in it very easily. It is made in a quick and easy referential manner.

Access to all important matters are not always locked and can be opened easily at the time of urgency.
The advantages of proposed system are that security is maintained in the new system. Securities for all
important data are maintained confidentially.

ADVANTAGES :

 It is modern and easy accessible for candidates.


 It is easily understandable and user friendly.
 All important data are maintained confidentially
 Candidate would exit automatically after time completion.

CHAPTER 3
8
SYSTEM STUDY

The system study phase involves the initial investigation of the structure of the System, which is

currently in use, with the objective of identifying the problem and difficulties with the existing system.

The major steps involved in this phase included defining the user requirements and studying the

present system to verify the problem. The performance expected by the new system was also defined

in this phase in order to meet the user requirements. The information gathered from various documents

were analyzed and evaluated and the findings reviewed in order to establish specific system objectives.

In ordinary exam, we get many difficulties as to distribute the question paper to all candidates,

collect the answer sheets and then provide the result to them. In other side in online exam we do

not need to distribute the question paper separately and collect all the answer sheets after time

completion and provide the result. So in every manner online exam will have many facilities than

ordinary exam.

3.1 SYSTEM ANALYSIS

System analysis is the way of studying a system with an eye on solving its problem using computer. It
is the most essential part of the development of a project of a system analysis. System analysis consists
of system element, process and technology.

To analyze a system, has to study the systems in details. The analyst has to understand the functioning
and concept of the system in detail, before design the appropriate computer based system that will
meet all the requirements of the existing system. The system analyst has to carry out a customary
approach to use the computer for problem solving.

System analysis includes the following basic concepts


• Preliminary investigation
• Identification of Need
• Feasibility study
• Detailed investigation
9
• Drawing up of strategies

• Design and coding


• Testing and training
• Implementation

The above steps constitute the logical framework for the system analysis. After the preliminary
investigation and feasibility study, the scope of the defined and comparable items are set forth and
hence detailed investigation is executed. This allows the system analyst to comprehend the full scope
of the project. Soon after the implementation of the newly developed system, followed by the training
of the users, the system analysis is included.

3.2 PROJECT PLANNING:


week Plans
1st week I have studied about SAP .

2nd week I have made some program in ABAP.

3rd week I started coding for upload questions from system to the table
zemp_examstart.

4th week Have started to make tables for login and storing questions.

5th week Have done coding for displaying list of the questions.

6th week I have done the browse file portion.

7th week I have started the main program, where have to display the login
page and questions paper screen and at last show the result.

8th week Firstly made login screen where designed one block for login id,
one for current date,three push buttons. Have made module in
process before output for status and logo picture.

9th week Have started to make main exam paper design where inserted all
the requirements related to promotion exam.

10
10th week Made all the coding related to main exam screen.

11th week Have made report for showing the response of the candidates with
Final result.

12th week Have done the rest things of coding and created report in word pad
according to the given format.

CHAPTER 4
PRELIMINARY INVESTIGATION

A request to receive assistance from information system can be made for many reasons, but in case a
manager, employee or system specialist initiates the request. When that request is made, the first
system activity preliminary investigation begins. The activity has three parts
11
> Request clarification: the request from employee may not be well stated. Sometimes the
request may not be well defined. Therefore before any system investigation can be considered, the
project request must be examined to determine precisely the actual requirements of the organization.

> Feasibility study: the basic idea of feasibility study is to determine whether the requested
project is feasible.

> Request approval: all projects that are requested are not desirable or feasible .some
organization receive so many projects requests from employee that only a few of them can be pursued.
However those projects that are feasible and desirable should put into a schedule. The management
decides request that are most important. After a project request is approved the cost priority, the
completion time and the personal required are estimated. Once the request is approved, the collection
of data and determination of requirements can be started.

CHAPTER 5
IDENTIFICATION OF NEED

12
The primary goal of the system analyst is to improve the efficiency of the existing system. For
that the study of specification of the requirements is very essential. For the development of the new
system, a preliminary survey of the existing system will be conducted. Investigation done whether the
up gradation of the system into an application program could solve the problems and eradicate the
inefficiency of the existing system.

The main goal of this project is to save time and provide security for exam. No one else
can copy your answer or after time completion no one can modify the answer sheet. After exam
candidates get immediate result with submit button and get own marks.

5.1 FEASIBILITY STUDY

The initial investigation points to the question whether the project is feasible. A
feasibility is conducted to identify the best system that meets the all the requirements.
This includes an identification description, an evaluation of the proposed systems and
selection of the best system for the job The requirements of the system are specified
with a set of constraints such as system objectives and the description of the out puts.
It is then duty of the analyst to evaluate the feasibility of the proposed system to
generate the above results. Three key factors are to be considered during the feasibility
study.

5.1.1 Operation Feasibility

An estimate should be made to determine how much effort and care will go into the developing of the
system including the training to be given to the user. Usually, people are reluctant to changes that
come in their progression. The computer initialization will certainly affected the turn over, transfer and
employee job status. Hence an additional effort is to be made to train and educate the users on the new
way of the system.

In this project candidates have to access in a easy way.They have to


follow all the instruction for exam and give answers of questions one by one.

5.1.2 Technical Feasibility

The main consideration is to be given to the study of available resources of the organization
where the software is to be implemented. Here the system analyst evaluates the technical merits of the
system giving emphasis on the performance, reliability, maintainability.
13
By taking the consideration before developing the proposed system, the resources availability
of the organization was studied. The organization was immense computer facilities equipped with
sophisticated machines and the software hence this technically feasible.

5.1.3 Economic Feasibility


Economic feasibility is the most important and frequently used method for evaluating the
effectiveness of the proposed system. It is very essential because the main goal of the proposed system
is to have economically better result along with increased efficiency. Cost benefit analysis is usually
performed for this purpose. It is the comparative study of the cost verses the benefit and savings that
are expected from the proposed system. Since the organization is well equipped with the required hard
ware, the project was found to be economically.

5.2 SOFTWARE REQUIREMENT SPECIFICATION:


Non-Functional Requirements:

1. Usability
The system ability to provide search help is user friendly.
2. Performance
The client and server interaction and server resource uses is very efficient.
3. Security
The system verifies user identity at two places and uses object locking for data
integrity.
4. Supportability
The system ability to make easily to install and maintenance
5. Modifiability or Extensibility
The system ability to add (unspecified) future functionality
6. Composability
The system ability to compose systems from plug-and-play components
7. Reusability
The system ability to (re)use in future system

14
HARDWARE REQUIREMENTS:

SR NO. HARDWARE COMPONENTS MINIMUM REQUIREMENT


1. MOTHERBOARD 965-GV CHIPSET
2. HARD DISK 2 GB
3. RAM 512

SOFTWARE REQUIREMENTS:

SR NO. SOFTWARE COMPONENTS MINIMUM REQUIREMENT


1 OPERATING SYSTEM HP UNIX SERVER/WINDOWS FOR
CLIENT
2 APPLICATION SAP-ECC 6.0
3 ENVIRONMENT ABAP

5.3 TECHNOLOGY SPECIFICATION

o Client-Server Architecture
Typical client-server systems are based on the 2-tiered architecture, whereby there is a clear separation
between the data and the presentation/business logic. These are generally data driven, with the
application existing entirely on the client machine while the database server is deployed somewhere in
the organization.

o 2-Tier Architecture
In a traditional 2- Tiered application, the processing load is given to the client PC while the server
simply acts as a traffic controller between the application and data. As a result, not only does the
application performance suffer due to the limited resources of the PC, but the SAPwork traffic tends
increase as well.
o 3- Tier Architecture

In 3- Tier architecture an application is broken into three separate logical layers, each with a well
defined set of interfaces. The first tier is referred to as the presentation layer and typically consists of
graphical user interface of some kind. The middle tier, or business layer, consists of application or
business layer and the third layer- the data layer contains the data that is needed for the application.
The middle tier is basically the code that the user calls upon to retrieve the desired data. The
presentation layer then receives the data and formats it for display. This separation of application logic
from the user interface adds enormous flexibility to the design of application. The third tier contains
the data that is needed for the application.

15
o n- Tier Architecture

I n a n n - tier architecture the application logic is divided by function rather than physically. N - Tier
architecture then breaks down like this:

> A user interface that handle the user's interaction with the application; this can be web
browser running through a firewall, a heavier desktop application or even a wireless device
> Presentation logic that defines what the user interface displays and how a user's requests are
handled- depending on what user interfaces are supported we need to have slightly different versions
of the presentation logic to handle the client appropriately.
> Business logic that models the application's business rules, often through the interaction
with the application's data.
> Interface services that provide additional functionality required by the application
components, such as messaging, transactional support etc.
> The Data layer where the enterprise's data resides.

CHAPTER 6
SYSTEM DESIGN

System design is the solution to the creation of a new system. This phase is composed of several
systems. This phase focuses on the detailed implementation of the feasible system. It emphasis on

16
translating design specifications to performance specification. System design has two phases of
development logical and data integrity and constraints.

During database design phase the analyst describes inputs (sources), out puts (destinations), databases
(data sores) and procedures (data flows) all in a format that meats the uses requirements. The analyst
also specifies the user needs and at a level that virtually determines the information flow into and out
of the system and the data resources. Here the database design is done through data flow diagrams and
database design.

The data integrity and constraints is followed by data integrity and constraints or coding. Data integrity
and constraints produces the working system by defining the design specifications, which tell the
programmers exactly what the candidate system must do. The programmers write the necessary
programs that accept input from the user, perform necessary processing on accepted data through call
and produce the required report on a hard copy or display it on the screen.
6.1 DATABASE DESIGN

The overall objective in the development of database technology has been to treat data
as an organizational resource and as an integrated whole. DBMS allow data to be protected and
organized separately from other resources. Database is an integrated collection of data. The most
significant form of data as seen by the programmers is data as stored on the direct access storage
devices. This is the difference between logical and physical data.

Database files are the key source of information into the system. It is the process of
designing database files, which are the key source of information to the system. The files should be
properly designed and planned for collection, accumulation, editing and retrieving the required
information.

The organization of data in database aims to achieve three major objectives: -

• Data integration.
• Data integrity.
• Data independence.

The proposed system stores the information relevant for processing in the MS SQL SERVER database.
This database contains tables, where each table corresponds to one particular type of information. Each
piece of information in table is called a field or column. A table also contains records, which is a set of

17
fields. All records in a table have the same set of fields with different information. There are primary
key fields that uniquely identify a record in a table. There are also fields that contain primary key from
another table called foreign keys.

NORMALIZATION

Normalization is a technique of separating redundant fields and braking up a large table


in to a smaller one. It is also used to avoid insertion, deletion and updating anomalies. All the tables
have been normalized up to the third normal form. In short the rules for each of the three normal forms
are as below.

• First normal form

A relation is said to be in 1NF if all the under lying domain of attributes contain simple
individual values.

• Second normal form

The 2NF is based on the concept of full functional dependency. A relation said to be in
2NF if and only if it is in 1NF and every non-key attribute is fully functionally dependent on candidate
key of the table.

• Third normal form


The 3NF is based on the concept of transitive dependency. A relation in 2NF is said to
be in 3NF if every non-key attribute is non-transitively.

Login id Start date Duration Exam start time

6.2 USER INTERFACE DESIGN

The User Interface Design is the link between the information system and the user. It comprises the
developing specification and procedures for data preparation and those steps are necessary to put
transaction data into a usable form for processing data entry. The activity of putting data into the

18
computer for processing can be achieved by inspecting the computer to read data from a written or
printed document or it can occur by having people keying the data directly into the system.

The system needs the data regarding the asset items, depreciation rates, asset transfer, physical
verification for various validation, checking, calculation and report generation.. The error raising
method is also included in the software, which helps to raise error message while wrong entry of input
is done. So in User Interface Design the following things are considered.

What data should be given as input?


• How the data should be arranged or coded?
• The dialogue to guide the operating personnel in providing input.
• Methods for preparing input validations and steps to follow when error occur
• The samples of screen layout are given in the appendix.

6.3 OUTPUT DESIGN

Computer output is the most important and direct information source to the user. Output
design is a process that involves designing necessary outputs in the form of reports that should be
given to the users according to the requirements. Efficient, intelligible output design should improve
the system's relationship with the user and help in decision making. Since the reports are directing
referred by the management for taking decisions and to draw conclusions they must be designed with
almost care and the details in the reports must be simple, descriptive and clear to the user.

• Determine what information to present


• Arrange the presentation of information in an acceptable format
• Decide how to distribute the output to intended receipts
Depending on the nature and future use of output required, they can be displayed on the
monitor for immediate need and for obtaining the hardcopy. The options for the output reports are
given in the appendix.

6.4 DATA INTEGRITY AND CONSTRAINTS

The process of developing the program software is referred to as data integrity and
constraints. We have to design the process by identifying reports and the other outputs the system will

19
produce. Coding the program for each module with its logic is performed in this step. Proper software
specification is also done in this step.

6.5 MODULARISATION DETAILS

A software system is always divided into several sub systems that makes it easier for the development.
A software system that is structured into several subsystems makes it easy for the development and
testing. The different subsystems are known as the modules and the process of dividing an entire
system into subsystems is known as modularization or decomposition.

A system cannot be decomposed into several subsystems in any way. There must some logical
barrier, which facilitates the separation of each module. The separation must be simple but yet
must be effective so that the development is not affected.

The system under consideration has been divided into several modules taking in consideration the
above-mentioned criteria. The different modules are

1) Login Module
2) Registration Module.
3) Question paper creation Module.
4) Examination Module.
5) Candidate Module.
6) Administrator Module.

CHAPTER 7

CODING

7.1 COMMENTS AND DESCRIPTION

20
All ABAP programs reside inside the SAP database. They are not stored in separate external files like
Java or C++ programs. In the database all ABAP code exists in two forms: source code, which can be
viewed and edited with the ABAP Workbench tools, and generated code, a binary representation
somewhat comparable with Java bytecode. ABAP programs execute under the control of the runtime
system, which is part of the SAP kernel. The runtime system is responsible for processing ABAP
statements, controlling the flow logic of screens and responding to events (such as a user clicking on a
screen button); in this respect it can be seen as a Virtual Machine comparable with the Java VM. A key
component of the ABAP runtime system is the Database Interface, which turns database-independent
ABAP statements ("Open SQL") into statements understood by the underlying DBMS ("Native
SQL"). The database interface handles all the communication with the relational database on behalf of
ABAP programs; it also contains extra features such as buffering of tables and frequently accessed
data in the local memory of the application server.

7.2 CODE EFFICIENCY

A SAP business application generally consists of 3 layers: the persistence layer, the application layer,
and the front end layer.SAP undertakes a number of efforts to ensure that scalability is achieved on
different layers of software and hardware. Naturally, we emphasize the importance of code
optimization Performance typically results in two metrics: response time, i.e. the speed of task
completion and system throughput, i.e. the amount of work done in a given amount of time. The basis
for scalability and performance modeling is the measured resource consumption, which is influenced
by the following four KPIs:
 CPU time consumed
 Peak memory used
 Disk space
 Network load

RUNTIME ANALYSIS:

21
7.3 ERROR HANDLING
Exception handling is a programming language designed to handle the occurrence of
22
exceptions, special conditions that change the normal flow of program execution. For example,
division by zero leads to an exception in the ABAP runtime environment. It is possible to determine
this situation through a query in the ABAP program and to trigger an exception there. Before class-
based exceptions for Release 6.10, a distinction needs to be made between two different types of
exception. As of Release 6.10, exceptions and their handling are general based on exception classes.
This concept covers the functions of the preceding concepts, enhances them, and thus replaces them.

Exception in Function Modules and Methods


Raising Exceptions
There are two ABAP statements for raising exceptions. They can only be used in function modules.

RAISE except.

and
MESSAGE e007(AT) RAISING not_found.

If the calling program does not handle the exception


· The RAISE statement terminates the program and switches to debugging mode.
· The MESSAGE….. RAISING statement displays the specified message. Processing is continued in
relation to the message type.
If the calling program handles the exception, both statements return control to the program. No values
are transferred. The MESSAGE….. RAISING statement does not display a message. Instead, it fills
the system fields sy-msgid, sy-msgty, sy-msgno , and SY-MSGV1 to SY-MSGV4.

7.3 VALIDATION CHECKS

A common problem with computer system is that it is very easy to put incorrect data into them. So the
input data is validated to minimize errors and data entry. For certain data specific code has been given
and validations are done which enable the user to enter the required data and correct them if they have
entered wrong codes, e.g. you could mistype a link name or a URL in a database resulting in reports
being occurred in the wrong link name. if you put incorrect data into the computer system then you

will get incorrect results out of it. Processing incorrect inputs will produce incorrect outputs. This lead
to the acronym:
GIGO (Garbage In Garbage Out).

23
Sometimes incorrect data can actually cause a computer system to stop work
temporarily. This is a particular problem in batch processing systems when data may be
processed overnights. If incorrect data stops a batch processing systems for working then a
whole night processing time may be lost.People who develop computer systems go to a lot of
trouble to make it difficult for incorrect data to be entered.

The two main techniques used for this purpose are:

 VERIFICATION

 VALIDATION

FOR REGISTRATION:

24
FOR UPLOAD QUESTION FROM SYSTEM:

BROWSE FILE FROM C DRIVE:


25
FOR LIST THE QUESTIONS:

26
LIST OF THE QUESTIONS:

27
LOGIN PAGE FOR EXAM:

28
Here candidate will have three option.Whether he/she wants to see the demonstration of exam or see
the instructions for exam or start the main promotion exam. If he chosses ‘DEMO’ then next screen
will be:

DEMONSTRATION:

29
30
MAIN EXAM QUESTIONS:

CHAPTER 8

31
SYSTEM IMPLEMENTATION

Implementation includes all those activities that take place to convert from the old system to the
new. The old system consists of manual operations, which is operated in a very different manner
from the proposed new system. A proper implementation is essential to provide a reliable system
to meet the requirements of the organizations. An improper installation may affect the success of
the computerized system.

8.1 IMPLEMENTATION METHODS:

There are several methods for handling the implementation and the consequent conversion from
the old to the new computerized system.

The most secure method for conversion from the old system to the new system is to run the old and
new system in parallel. In this approach, a person may operate in the manual older processing system
as well as start operating the new computerized system. This method offers high security, because
even if there is a flaw in the computerized system, we can depend upon the manual system. However,
the cost for maintaining two systems in parallel is very high. This outweighs its benefits.

Another commonly method is a direct cut over from the existing manual system to the computerized
system. The change may be with in a week or with in a day. There are no parallel activities. However,
there is no remedy in case of a problem. This strategy requires careful planning.

A working version of the system can also be implemented in one part of the organization and the
personnel will be piloting the system and changes can be made as and when required. But this method
is less preferable due to the loss of entirety of the system.

8.2 IMPLEMENTATION PLAN:


The implementation plan includes a description of all the activities that must occur to implement
the new system and to put it into operation. It identifies the personnel responsible for the
activities and prepares a time chart for implementing the system.

32
The implementation plan consists of the following steps.

o List all files required for implementation.

o Identify all data required to build new files during the implementation.

o List all new documents and procedures that go into the new system.

The implementation plan should anticipate possible problems and must be able to deal
with them. The usual problems may be missing documents; mixed data formats between current and
files, errors in data translation, missing data etc.

33
CHAPTER 9

SYSTEM SECURITY MEASURES

The implementation of the proposed system includes the training of system operators. Training the
system operators includes not only instructions in how to use the equipment, but also in how to
diagnose malfunctions and in what steps to take when they occur. So proper training should be
provided to the system operators. No training is complete without familiarizing users with simple
system maintenance activities. Since the proposed system is developed in a GUI, training will be
comparatively easy than systems developed in a non-GUI. There are different types of training. We
can select off-site to give depth knowledge to the system operators.

Success of the system depends on the way in which it is operated and used. Therefore the quality of
training given to the operating person affects the successful implementation of the system. The training
must ensure that the person can handle all the possible operations.

Training must also include data entry personnel. They must also be given training for the installation
of new hardware, terminals, how to power the system, how to power it down, how to detect the
malfunctions, how to solve the problems etc. the operators must also be provided with the knowledge
of trouble shooting which involves the determination of the cause of the problem.

The proposed system requires trained personnel for operating the system. Data entry jobs must be done
utmost carefully to avoid errors. This will reduce the data entry errors considerably. It is preferable to
provide the person with some kind of operating manuals that will explain all the details of the system.

9.1 DATABASE SECURITY

As announced on January 12, 2011, SAP acquired security software, identity and access management
software, as well as relevant assets including development and consulting resources from SECUDE.
As a result of this transaction, SAP will acquire Secure Login and Enterprise Single Sign-On, and will
roll these into its product portfolio. This will enable SAP to provide customers secure client-server
communications without the need for third-party offerings.

34
9.2 CREATION OF USER ACCESS RIGHTS

We are very pleased that, in closing this transaction, SAP is not only in a position to satisfy our
customers’ security requirements, but also to expand the SAP NetWeaver Identity Management
component to include Secure Login Server and Enterprise Single Sign-On.

35
CHAPTER 10
SYSTEM TESTING

System testing is a critical aspect of Software Quality Assurance and represents the ultimate
review of specification, design and coding. Testing is a process of executing a program with the
intent of finding an error. A good test is one that has a probability of finding an as yet
undiscovered error. The purpose of testing is to identify and correct bugs in the developed
system. Nothing is complete without testing. Testing is the vital to the success of the system.

In the code testing the logic of the developed system is tested. For this every module of the program is
executed to find an error. To perform specification test, the examination of the specifications stating
what the program should do and how it should perform under various conditions.

Unit testing focuses first on the modules in the proposed system to locate errors. This enables to detect
errors in the coding and logic that are contained within that module alone. Those resulting from the
interaction between modules are initially avoided. In unit testing step each module has to be checked
separately.

System testing does not test the software as a whole, but rather than integration of each module in the
system. The primary concern is the compatibility of individual modules. One has to find areas where
modules have been designed with different specifications of data lengths, type and data element name.

Testing and validation are the most important steps after the implementation of the developed system.
The system testing is performed to ensure that there are no errors in the implemented system. The
software must be executed several times in order to find out the errors in the different modules of the
system.

Validation refers to the process of using the new software for the developed system in a live
environment i.e., new software inside the organization, in order to find out the errors.
The validation phase reveals the failures and the bugs in the developed system. It will be come to
know about the practical difficulties the system faces when operated in the true environment. By
testing the code of the implemented software, the logic of the program can be examined. A
specification test is conducted to check whether the specifications stating the program are performing
under various conditions. Apart from these tests, there are some special tests conducted which are
given below:

36
Peak Load Tests: This determines whether the new system will handle the volume of activities when
the system is at the peak of its processing demand. The test has revealed that the new software for the
agency is capable of handling the demands at the peak time.

Storage Testing: This determines the capacity of the new system to store transaction data on a disk or
on other files. The proposed software has the required storage space available, because of the use of a
number of hard disks.

Performance Time Testing: This test determines the length of the time used by the system to process
transaction data.

In this phase the software developed Testing is exercising the software to uncover errors and ensure
the system meets defined requirements. Testing may be done at 4 levels:

• Unit Level
• Module Level
• Integration & System
• Regression

10.1 UNIT TESTING

A Unit corresponds to a screen /form in the package. Unit testing focuses on verification of the
corresponding class or Screen. This testing includes testing of control paths, interfaces, local data
structures, logical decisions, boundary conditions, and error handling. Unit testing may use Test
Drivers, which are control programs to co-ordinate test case inputs and outputs, and Test stubs, which
replace low-level modules. A stub is a dummy subprogram.This testing we have done in validation
portion.

10.2 MODULE LEVEL TESTING


Module Testing is done using the test cases prepared earlier. Module is defined during the time of
design.
10.3 INTEGRATION & SYSTEM TESTING
Integration testing is used to verify the combining of the software modules. Integration testing
addresses the issues associated with the dual problems of verification and program construction.
System testing is used to verify, whether the developed system meets the requirements.

37
10.4 REGRESSION TESTING
Each modification in software impacts unmodified areas, which results serious injuries to that
software. So the process of re-testing for rectification of errors due to modification is known as
regression testing. Installation and Delivery
Installation and Delivery is the process of delivering the developed and tested software to the
customer. Refer the support procedures Acceptance and Project Closure Acceptance is the part of the
project by which the customer accepts the product. This will be done as per the Project Closure, once
the customer accepts the product; closure of the project is started. This includes metrics collection,
PCD, etc.
Module Name User Login Data Input
Test Case ID TAB_TRNG01
Prerequisites An user with valid user name, password
Test Description Login id and password is entered
Test Case -1

Should be accepted and home page corresponding to the


Expected Behavior
user of the wizard should be shown
Test behaviour Accepted and home page is shown
Remark Ok

Module Name User Login Data Input


Test Case ID TAB_TRN01
An user with invalid user name, password and user –
Prerequisites
type
Test case-2

Test Description User id and password is entered


Should be rejected and error message “ name and
Expected Behavior Password is incorrect Please re-enter“ is should be
shown
Test behaviour Error message is shown and user is rejected
Remark Ok

Module Name User Login Data Input


Test Case ID ULDI_3
Test Case _3

An user with (either valid or invalid) user name,


Prerequisites
Password and user type
Test Description User id field is left blank
Should be rejected and error message “Enter User
Expected Behavior
name“ is should be shown
Test behaviour Error message is shown and user is rejected
Remark Ok

CHAPTER 11
ABOUT SAP

38
SAP is a ERP package which stands for Systems, Applications and Products in data processing. It is a
software catering to the business needs of an enterprise beginning with finance, HR, supply chain,
production, sales, quality, maintenance, etc. It is written in SAP's proprietary language BAP(Advanced
business application program). SAP is the world’s leading provider of business software(*), offering
applications and services that enable companies of all sizes and in more than 25 industries

to become best-run businesses

ABAP:

ABAP stands for Advanced Business Application Programming.  It is a programming language


developed by SAP.  SAP is a German company that develops ERP (Enterprise Resource Planning
System) systems.  These systems are used by companies to track all information related to the business
integrating finance, sales, and materials data.  ABAP/4 is the programming language used for the
thousand tiny embedded programs called transactions that make up the application.  The /4 means it

is a fourth generation language.

ABAP is code written in an interpretive language similar to COBOL in syntax.  The language can be
coded to look almost like COBOL.  According to our text, it is a COBOL and Pascal cross-breed.  Its
use allows SAP customers to extend the functionality of the base product.

39
SAP is very flexible, it can be used for specific business functions rather than the whole enterprise and
can be modified for the companies specific needs.  Every SAP installation has its own specific
configuration and set of functions.  The cost of customizing is that when upgraded every customization
must be identified in the ABAP code and changes made.  This means upgrades are very costly. 
Customization should be avoided for easier upgrades in the SAP software.A work process connects
with the database and has an ABAP language Interpreter and processor. There are lots of jobs for
ABAP programmers.  There are many web sites of head-hunters and even

people's resumes.  There are also a lot of consulting companies with websites advertising they do SAP
work.

CHAPTER 12

40
MAINTENANCE

Maintenance is making adaptation of the software for external changes (requirements changes or

enhancements) and internal changes (fixing bugs). When changes are made during the maintenance

phase all preceding steps of the model must be revisited.

There are three types of maintenance:

1. Corrective (Fixing bugs/errors)


2. Adaptive (Updates due to environment changes)
3. Perfective (Enhancements, requirements changes)

41
CHAPTER 13
TABLES

Table 13.1 REGISTRATIONS

FIELD TYPE CONSTRAINT


S
MANDT CHAR PRIMARY KEY
USERNAME CHAR PRIMARY KEY
PASSWORD CHAR
DATE NUMBER
TIME NUMBER

The above table stores registration details.

Table 13.2 QUESTIONPAPER

FIELD TYPE CONSTRAINT


S
MANDT NUMBER PRIMARY KEY
QUIZ_NO VARCHAR2 PRIMARY
KEY
QUES_NO NUMBER PRIMARY KEY
ANS1 NUMBER
ANS2 NUMBER
ANS3 VARCHAR2
ANS4 NUMBER
CORRECT_A NUMBER

The above table stores the details of question paper.

Table 13.3 FINAL_RESULTS

FIELD TYPE CONSTRAINT


S
MANDT NUMBER PRIMARY KEY
LOGIN_ID CHAR PRIMARY KEY
QUIZ_NO DATE
QUES_NO NUMBER
RESPONSE CHAR

The above table stores the details of result.

42
CHAPTER 14

FIGURES

0-Level diagram(fig 14.1)

Online promotion
examinattion
Result Login

43
REGISTERED CANDIDATE

SELECT QUESTION PAPER

WRITE EXAM

Level 1 DFD (fig 14.2)

44
LEVEL 2 DFD (fig 14.3)

Question#
Candidate Generate
questions
Choose answer question
question

answers

RecordCorrect
answeranswer answer
result Candidate answer

candidate answer

Evaluate answer Correct answer

Correct answer

45
E-R Diagram 14.4

Employee register

receiver Emp_id

performance Registration
pwd

Emp_name

password Exam result result Examination

Applicable/not applicable Current maths


Multi choice
affairs

Login Screen(fig 14.5)

46
47
Going to start demo for exam(fig 14.6)

48
Demo questions(fig 14.7)

49
After Exit demo(fig 14.8)

50
Instructions for exam(fig 14.9)

51
AFTER EXIT FROM INSTRUCTIONS

52
Now start the main exam(fig 14.10)

53
First question of the exam(fig 14.11)

54
VIEW RESULT(fig 14.12)

55
FINAL RESULT VIEW(14.13)

56
Question uploading by administrator(fig 14.14)

57
BROWSE FILE FROM SYSTEM(fig 14.15)

58
LIST THE QUESTIONS(fig 14.16)

59
FOR EXECUTION(fig 14.17)

60
LIST OF THE QUESTIONS(fig 14.18)

61
Future scope

The developed system is flexible and changes can be made easily. The system is developed with
an insight into the necessary modification that may be required in the future. Hence the system can be
maintained successfully without much rework.

One of the main future enhancements of our system is to add a mail response from the
administrator to the user. So that the user can understand whether he/she is eligible for appearing the
exam, directly from the administrator.

62
REFERENCES

1. http://forums.sdn.sap.com
2. http://service.sap.com/notes
3. http://help.sap.com
4. http://www.abapcode.info
5. DivulgeSAP.com

63

You might also like