gensan-buy.

com
Online shopping, fastest, safest and the easiest way, RIGHT TO YOUR DOORS

ORGANIZATION PROFILE
 Gensan-buy.com is an all Filipino website developed to cater needs of Generals and its patrons in terms of shopping needs by linking shoppers and shop owners through the web.  Provides quick access to service providers, shop owners and business men through advertising and easy guide to their valued shoppers and patrons.  Provides quick reference for shoppers and patrons for a wise buy. A great deal to budgeting people.  Provides access to freebies, gigs and discounts through promotion.

TOP CLIENTS (Shop Owners):
• • • • • • • • • • G’sano General Santos XCC Mall of General Santos PD Plaza General Santos Pitmart Mall of General Santos Hotel Dolres Tropican Beach Resort ZM South Mall Bobinson Mall Gensan Arcadia ENCOR Appliance Center

1

II.

ABSTRACT

Objective:  As a non-profit organization, gensan-buy.com is dedicated to provide the most convenient access to Generals shoppers and patrons in promotions, discounts, gigs, and quick reference to budget-conscious people.  This website has been developed to provide the most convenient way for shoppers in which, they can access real time pricing of commodities in different service providers of General Santos City and neighboring municipalities, cities and regions.

Specific Objective of the site:
Objective of doing this project is to enhance knowledge in the field of e-commerce using mainly php and html as a frontend and MySQL as the backend. Applying System Analysis and Design principle through basic application and guidelines. Addressing clients’ requirement and objectives of this site as follows: • • • • • • To increase the business of Client/s. To benchmark for a potential global advertising. To act as a middle men connecting Shoppers and Service Providers User can search for different options available. User can do on-line inquiry for basic price of commodities. User can use search engine to look for different services, discounts, promotions,

available etc. So these are some of the objectives which we have to accomplish. Features of the site: It has the features of providing all the information online (through the net). About the commodity prices, Shop Owners promotion, discounts, sales, gigs, freebies and About the price comparison, if there is.

2

The site includes

the search engine which gives both users easy way to find the products and promotions for a post. • middle-ware for the Shoppers and Service Providers. The site acts as a

III. Modules of project:
The project can be divided in to two main modules. • • Registration module Shoppers and Shop Owners Administration module

Module 1: Registration module, are divided into: • • • • • • • Shoppers Registration. Service Provider Registration. Change Password for Shoppers. Change Password for Service Provider. Forget Password for Shoppers. Forget Password for Service Provider. Login for both Shoppers and Service Provider.

3

discounts. gigs. discounts of different service providers. This is a free site for Shoppers. freebies. gigs with administrator’s approval. discounts. Can inquire promotions. Company can post promotion. gigs and freebies from different service providers. Service Providers • • • Add products Update Pricing of Commodities Post for available promotions. freebies. Site Working: Case A Shoppers: • • • • Shoppers has to register him self with the site. promotion. sales. freebies. After success full Login Service Providers can register various products with equivalent price (itemized). After success full Log in Shoppers can view products and equivalent price available. discounts and sales. sales. This needs administrator’s verification.Module 2: • Shoppers and Shop Owners Administration module are divided into two categories: o Shoppers Panel o Service Providers Panel Shoppers • Search for product pricing. gigs. Case B Service Providers: • • • Service Providers has to register itself. 4 .

At the time of hiring the companies policy says that the only those companies can hire who are registered with SEEKJOB. Some times it is very difficult to know about some special highlights of the job seeker. IV. This seams a critical task Limitations The current system have all the problems which generally in count in the manual system such as wastage of time.• Company can contact administrator for support and additional services. wastage of money. if the responsible person wants the full information of the total sale of various models of the vehicles at various center at the evening then he/she can not get it. because the information is stored on the paper and it is not clear that due to human error or by some other means this paper is lost and the information is now not in the hands of the company. when the company has so many employers. It also 5 . SYSTEM ANALYSIS Existing System When the requirement of this system is putted before the team they was willing to know that how the employee of the company is working. There is extra requirement of employee who have to check that the requesting person is an registered employer. All that the company needs to store about the job seekers must be written on the paper. All the documentation is done by the employee of the company. So it is critical task to find out the registered employer. A lot of works have to be done before the candidates are placed in an organization. Then the study is done it gives the result that all the work is done manually and there is nothing that help the employee to save the time and do the work with the system. Because the current system work manually and it is very slow same as if he/she wants the total production then it take time. more efforts to work etc. The current system can not give the fast response as needed.

It may be late and this process is time consuming and generally the administrators receive the relevant information next day which is the major limitation of existing system. Now jobseekers are able to apply online also. The jobseekers can also contact the company officials through email or his contact numbers but first they have to register themselves as a member by filling up a registration form which can be filled online. that too online by sitting at home within a fraction of a second by a flick of a button. This project is developed after a Through study of the existing manual system & the jobseekers requirements. He has the right to know the details of the jobseekers. Even the customer’s passwords and hidden details are accessible by the administrator. Through this system all works are done through computer so it results in fast service provider. Proposed system: This site is an attempt to make the task of administrator as well as jobseekers easier. This project ensures the consistency by enabling the jobseekers to register themselves and to find the desired information of jobs. If he/she wants the information regarding the total stock at various warehouses at his\her office then using current system he\she can not get it. get them involved with the jobsite and can access the different services provided by the jobsite. Once registered. so that.does not keep records of grievances of the faults in the vehicles in various parts of the country. jobseekers can access this jobsite and register for any services being provided by seekjob. Aim of this project is to provide an environment helpful for administrator and jobseekers as well. 6 . The administrator has the right to know everything.com. they find it easy to implement it without any harassment for the jobseekers also. has the right to change any service that the jobsite is currently providing or can add services which are not being provided currently. He\she can not get the full information on time. Requirement analysis is concerned with identifying the basic function of software component in a hardware & software system.

The personal cost like salaries of employees hired are also nominal. Helps the management to find out the current trend in industries as well as current manpower pool. an evaluation of candidate system and the selection of best system for he job. The benefits of this project include four types: Cost – saving benefits 7 . RELATED STUDY Feasibility Study: A feasibility study is conducted to select the best system that meets performance requirement. because working in this system need not required a highly qualified professional.Features of proposed system: • • • • • The features of the proposed system are as follows. Provide the full information of total vacancies at various regions at one site. the identification of specific system objective and a description of outputs. The less time involved also helped in its economical feasibility. This entails an identification description. The operating-environment costs are marginal. The key consideration in feasibility analysis are: Economic feasibility The proposed system is economically feasible because the cost involved in purchasing the hardware and the software are within approachable. The system required performance is defined by a statement of constraints. V. Provide the full information of employees/employer at various places at one site. Provide the full information of total vacancies of various industries/companies at one site.

2. VI. Time-saving-benefits It saves lots of time and provides the same result in a far lesser period of time. Because of the reduction in the use of paper. use of labors the cost also reduces. Improve-service-level benefits Proposed system improves the system’s performance because the current system is based on manual processing while the proposed system is based on computer processing.This project reduces the administrative and operational cost. SYTEM REQUIREMENT Te c hnic a l Fe a s ibility HARDWARE & SOFTWARE REQUIREMENT SPECIFICATIONS Hardware requirement for development Hardware Configuration   Processor Memory  RAM  Hard Disk  Mouse : : : 256 MB DDR 40 GB SATA : Intel Pentium 4 CPU.66GHz Quantum 8 . Improve-information-level benefits It provides better information in the stipulated space and time for decision-making.

Dreamweaver.8 GHz Pentium Processor 1024 * 768. Floppy drive : HP-Laser printer Hardware requirement for Implementation  Processor:  Minimum  Memory:  RAM  Hard Disk    Display Mouse Keyboard : : : : : 64 MB 4 GB : 1. XAMMP Behavioral Feasibility Employees of the company are habitual of working with manual system and don’t have the knowledge of working in a computer application based environment that is used in their intranet and are generally resistant to make changes in their working attitude. Software requirement for development Software Configuration    Operating System Front End Back End : : : Windows XP Professional PHP. JSP MySQL. HTML. 9 . Navicat for MySQL.   Keyboard Drive Printer : Samsung (Multimedia Supported) : CD-RW. True Type Color-32 Bit Any Normal Mouse. Any window Supported Keyboard.

Data store 10 . 2. One way data flow.People are inherently resistant to change and computers have been known to facilitate changes. So the front end has been made user friendly for both the jobseekers and the employees. VII. An estimate should be made of how strong a reaction the staffs are likely to have towards the development of an online computerized system because now this may lead to expulsion of some of the staffs from their jobs. So a system has to be chosen which will provide them much more facilities and less mental disturbance to check weather correct entry is entered and that too at its right place. The System will provide them automatic reporting and checks on entries while storing as well as entering. SYSTEM DESIGN Symbols Used:In order to create DFD’s we used following symbols:Input/Output Data Processing Flow of data 1. Two way data flow.

DATA FLOW DIAGRAM EMPLOYEE/CONSULTANT Give Give details JOBSEEKER/USER Give applicant details Give job Opening Get vacancy detail Get emp.Database VIII. details Get vacancy Details JOBSEEKER MANAGEMENT Selection process status Resume status Report of selected applicants 0-Level Data Flow Diagram 11 .

User ID Logi n If New Passwor d New User User ID Location If valid User Password New User Password 12 .

Employer 2-Level data Flow Diagram 13 .User Id & password Seeker login Process Valid Id & password Registration details Job Section New Job seeker Job details Job search User Search job & news New Employer login Seeker details Get details Registrati on details News letter Employer Login process Job details Jobs EMPLOYER Id & Passwor d Job seeker Com info.

ER-DIAGRAM Qualificatio n LName Fname High Degree Speci. Com. Jobseeker Experience Skills Has Check User Emp_i d Job location Password Username Job Seek Control Name Email Job Exp Job loc. Jobs Registration Email id Maintain Username Jobseeker Manageme nt News letter Password Userna me Registration Employer Emil Company name Location Site login Site map login Reference_no Remark User name 14 .IX. Job cat.

A data dictionary is a structured repository of data about data . they do not dive details .So following DFD. processes and data store.It is a set of rigorous definitions of all DFD data elements and data structures .The data dictionary for the current system has been given as under: Tables for Project: Employer: This table maintains details of Employer Field Name User name Password company-name company-location company email Data Type Text Text Text Text Text Jobs: This table maintains details of Jobs Field name username Job company Job category Job location Job_exp Job email emp_phone emp_email Data type Text Text Text Text Text Text Text Text 15 .THE DATABASE DATABASE DESIGN Employer Check Passwor d Emp control In our data flow diagram. processes and data stores. our interest is to build some details of the contents of data flows. Although the names are descriptive of data. we give names to data flows.

Vacancy: This table maintains detail of jobs for which vacancies are open Field Name User name Password fname lname email jobloc prfjobloc exp jcat key skills highest degree specialization Data Type Text Text Text Text Text Text Text Text Text Text Text Text Newsletter: This table stores and maintains status news Field Name Name email Data Type Text Text Site admin: This table stores and maintains status site admin Field Name Username Password Data Type Text Text 16 .

17 .

Main Form 18 .

Jobseeker login 19 .

New Jobseeker Signup 20 .

Employer login 21 .

New Employer Signup 22 .

Site administrator login 23 .

Tips 24 .

Interview Tips for Professionals 25 .

Resume Tips for Professionals 26 .

Job Fair List 27 .

Contact us 28 .

Newsletter Subscription 29 .

Hot Vacancies 30 .

IT JOBS Openings 31 .

New JOBS This Week 32 .

SeekJOBs.com success stories 33 .

JOBS For Disabled people 34 .

Job Fair list 35 .

36 .

in edition to the error introduced during coding phase. In the project Monthly Materialization Report System we used the unit testing and functional testing. The goal here is to test the system design. In structural testing. and cause effect graphing are examples of methods for selecting test cases for functional testing. design and requirement fault also appear in the code. boundary analysis. Testing is used to detect these errors. the entire System is tested.Due to the limitation of the verification method for the previous phases. Testing of a system involves hardware device testing and debugging of computer programs and testing information processing procedures. The goal here is to test the requirement themselves. Testing can be done with test 37 . Due to this testing the failure of the system can be observed. During integration testing modules are combined into sub-system. the internal logic of the system under testing is not considered and the test cases are decided from the specification or the requirements. Testing is a dynamic method for verification and validation. separate activities have to be performed to identify the faults. Equivalence class partitioning. Unit testing are used to test a module or a small collection of modules and the focus is on detecting coding errors in modules. Structural testing can be used for unit testing while at higher level mostly functional testing is used. As the goal of testing is to detect any errors in the programs different flavor of testing are often used. However. from which the presence of fault can be deduced. which are then tested.Testing Testing plays a critical role in quality assurance for software . There are two method of testing: functional and structural. In functional testing. where the system is to be tested is executed and behavior of the system is observed. In system testing and acceptance testing. the test cases are decided entirely on the internal logic of the program or module being tested. System testing is a critical phase in systems implementation. It is often called “Black Box Testing”.

38 . Those resulting from the interaction between modules are initially avoided. as defects are component testing. The plane for testing are prepared and then implemented. IUT is generally white box oriented which is predicted on the close examination of procedural detail. White box testing exercises internal data structure to assure their validity. This enables the tester to detect errors in coding and logic that are contained within that module alone. to locate errors.data. which attempts to simulate all possible conditions that may arise during processing. discovered at any one stage. independently of one another. the sequence of testing activities is However. In general. integration testing then user testing. SYSTEM TESTING Here the system testing involved is the most widely used testing process consists of five stages as shown in the figure. The testing methods adopted in the testing of the system were Independent Unit Testing and System Testing Independent Unit Test (IUT) IUT focuses first on the modules. they required program modifications to correct them and this may required other stages in the testing process to be repeated. executes all loops at their boundaries and within their operational bounds and checks whether the required validations have been met. It exercises all the logical decisions on their true and false side.

39 . Testing performs a very critical role for quality assurance and for ensuring the reliability of the software.Unit testing Module testing Subsystem testing System testing Acceptanc e testing (Component testing) (Integration testing) (User testing) Testing is the process of detecting errors. The results of testing are used later on during maintenance also.

Unfortunately. 2. We needed to know if the code compiled with the design or not? Whether the code gave the desired outputs on given inputs? Whether it was ready to be installed on the user’s computer or some more modifications were needed? Through the web applications are characteristically different from there software counterparts but the basic approach for testing these web applications is quite similar. Effective testing early in the process translates directly into long term cost savings from a reduced number of errors. This creates two problems: 1. In adequate testing or non-testing leads to errors that may not appear until months or even years later (Remember the New York three day power failure due to a misplaced ‘Break’ statement). The following are the steps. A small error can conceivably explode into a much larger problem. we undertook: 40 . The best program is worthless if it does not meet the user requirements. Another reason for system testing is its utility as a user oriented vehicle before implementation. The time lag between the cause and the appearance of the problem.Testing is vital to the success of the system. The time interval effect of the system errors on files and the records on the system. System testing makes a logical assumption that if the parts of the system are correct. the user’s demands are often compromised by efforts to facilitate program or design efficiency in terms of processing time or design efficiency. Thus in this phase we went to test the code we wrote. These basic steps of testing have been picked from software engineering practices. the goal will be successfully achieved.

1. The content of the Intranet site is reviewed to uncover Content errors. Content Errors covers the typographical errors, grammatical errors, errors in content consistency, graphical representation and cross referencing errors 2. The design model of the web application is reviewed to uncover the navigation errors. Use cases, derived as a part of the analysis activity allows a web designer to exercise each usage scenario against the architectural and navigational design. In essence these non-executable tests help to uncover the errors in navigation. 3. When web applications are considered the concept of unit changes. Each web page encapsulates content navigation links, content and processing elements (Forms, Scripts, JSP’s as in our case). It is not always possible to test each of these individually. Thus is the base of the web applications the unit to be considered is the web page. Unlike the testing of the algorithmic details of a module the data that flows across the module interface, page level testing for web applications is driven by content, processing and links encapsulating the web page.

4. The Assembled web application is tested for overall functionality and content delivery. The various user cases are used that test the system for errors and mistakes. 5. The Web application is tested for a variety of environmental settings and is tested for various configurations and upon various platforms. The modules are integrated and integration test are conducted. 1. Thread based testing is done to monitor the regression tests so that the site does not become very slow is a lot of users are simultaneously logged on. 2. A controlled and monitored population of end users tests Intranet application, this all comprises of the User Acceptance Testing.

41

Because web application evolves continuously, the testing process is an ongoing activity, conducted by web support staff in our case the Organization’s IS people who will finally update and manage the application. PSYCHOLOGY OF TESTING The aim of testing is often to demonstrate that a program works by showing that it has no errors. The basic purpose of testing phase is to detect the errors that may be present in the program. Hence one should not start testing with the intent of showing that a program works, but the intent should be to show that a program doesn’t work. Testing is the process of executing a program with the intent of finding errors. TESTING OBJECTIVES: The main objective of testing is to uncover a host of errors, systematically and with minimum effort and time. Stating formally, we can say, 1. intent of finding an error. 2. undiscovered error. 3. finding error, if it exists. 4. errors. 5. reliable standards. LEVELS OF TESTING The software more or less confirms to the quality and The tests are inadequate to detect possibly present A good test case is one that has a high probability of A successful test is one that uncovers an as yet Testing is a process of executing a program with the

42

In order to uncover the errors present in different phases, we have the concept of levels of testing. The basic levels of testing are Client Needs Acceptance Testing

Requirements

System Testing

Design

Integration Testing

Code

Unit Testing

Unit testing Unit testing focuses verification effort on the smallest unit of software i.e. the module. Using the detailed design and the process specifications, testing is done to uncover errors within the boundary of the module. All modules must be successful in the unit test before the start of the integration testing begins. In this project each service can be thought of a module. There are so many modules like Login, HR Department, Interviewer Section, etc. Each module has been tested by giving different sets of inputs. When developing the module as well as finishing the development, the module works without any error. The inputs are validated when accepting them from the user. Integration Testing After unit testing, we have to perform integration testing. The goal here is to see if modules can be integrated properly, the emphasis being on testing interfaces between

43

44 . the internal logic of program is not emphasized. where a unit will be taken at a time and tested thoroughly at a statement level to find the maximum possible errors. and the goal is to see if software meets its requirements.modules. WHITE BOX TESTING This is a unit testing method. Here entire ‘HRRP’ has been tested against requirements of project and it is checked whether all requirements of project have been satisfied or not. ACCEPTANCE TESTING Acceptance Testing is performed with realistic data of the client to demonstrate that the software is working satisfactorily. When integrating all the modules I have checked whether the integration effects working of any of the services by giving different combinations of inputs with which the two services run perfectly before Integration. Test cases should be selected so that the largest number of attributes of an equivalence class is exercised at once. The testing phase is an important part of software development. In this project the main system is formed by integrating all the modules. It is the process of finding errors and missing operations and also a complete verification to determine whether the objectives are met and the user requirements are satisfied. The reference document for this process is the requirements document. SYSTEM TESTING Here the entire software system is tested. Testing here is focused on external behavior of the system. This testing activity can be considered as testing the design and hence the emphasis on testing module interactions.

makes use of program graphs (or graph matrices) to derive the set of linearly independent test that will ensure coverage. BLACK BOX TESTING This testing method considers a module as a single unit and checks the unit at interface and communication with other modules rather getting into details at statement level. Test cases are derived to ensure that all statement in the program control structure. deriving test cases by partitioning the input and output domain of a program in manner that provides through test coverage. taking care that every statement in the code is executed at least once. Output for a given set of input combinations are forwarded to other modules. Black-box test are designed to uncover errors functional requirement without regard to the internal workings of a program. Test cases are derived to ensure that all statement in the program control structure. I have generated a list of test cases. which is used to check all possible combinations of execution paths through the code at every module level. A blackbox test examines some fundamental aspect of a system with little or no regard for the integral logical structure of the software. sample data. Condition and data flow testing further exercising degrees of complexity. The blackbox test is used to demonstrate that software functions are operational. Graph based testing methods explore the relationship between and behavior of program objects. Basis path testing. White-box test focuses on the program control structure. a white box technique. Black-box testing techniques focus on the information domain of the software. and that the integrity of external information is maintained. Test cases are derived to ensure that all statement in the program has been executed at least once during testing and that all logical conditions have been exercised. The white box testing is also called Glass Box Testing. Equivalence partitioning divides the input classes of data are likely to 45 . Here the module will be treated as a block that will take some input and generate output. that input is properly produced.I tested step wise every piece of code.

ensuring that it functions properly as unit. where the focus is on designed the construction of the software architecture. Considering the process from a procedural point of view. we spiral out along stream lines that broaden the scope of testing with each turn. we arrive at system testing. Finally. To test computer software. Boundary values analysis probes the program’s ability to handle data at the limits of acceptability. Initially. tests focus on each component individually. Hence. testing within the context of software engineering is actually a series of four steps that are implemented sequentially. where requirements established as part of software requirements analysis are validated against the software that has been constructed. TEST INFORMATION FLOW A strategy for software testing may also be viewed in the context of the spiral. The steps are shown in Figure. exercising specific paths in module’s control structure to ensure complete coverage and maximum error detection. Taking another turn outward on spiral. Testing progresses moving outward along the spiral to integration testing. System Testing Validation Testing Integration Testing Validation testing Code 46 System Engineering Design .exercise specific software function. the name unit testing. where the software and other system elements are tested as a whole. we encounter validation testing. Unit testing begins at the vortex of the spiral and. Unit testing makes heavy use of white-box testing techniques. component of the software as implemented in source code. concentrates on each unit.

Data security:There are basically two problems associated with data security:1. To overcome these difficulties the following access facilities has been provided:i) Identification:Unique Ids for the different users have been provided. 2. water logging. 2.For overcoming these difficulties the replica of the data are automatically stored at various networks and for environmental conditions Air conditioning environment is created. flooding.System Security SYSTEM SECURITY There are basically two types of security associated with this system:1. fire hazards. Physical security:Damage due to natural causes like earth tremor. ii) Authentication:- 47 . Data becoming available to the unauthorized person. atmospheric or environmental conditions etc. Data not being available to the authorized person at the time of need.

iii) Authorization:The access control mechanism to prevent unauthorized logging to the system.System checks the password under the particular user identification. 48 . The computer permits the various resources to the authorized person.

successful implementation may not guarantee improvement in the organization using the new system (that is a design question) . 49 . replacing an existing manual or automated system. proper implementation is essential to provide a reliable system to meet organization requirements .but improper will prevent it. The new system may be totally new. The various tests are performed and the system is approved only after all the requirements are met and the user is satisfied. or it may a major modification to an existing system.IMPLEMENTATION System implementation is the stage when the user has thoroughly tested the system and approves all the features provided by the system. In the either case.

Depending on the size of the organization that will be involve in using the application and the risk involved in its use. Aspects of implementation:The two aspects of implementation are: • • Training Personnel Conversion Procedures Training:Even well designed and technically elegant systems can succeed or fail because of the way they are used. they will run both old and new system in parallel way to compare the results. system developer may choose to test the operation in only one area of the firm with only one or two persons. the successful implementation of an information system. train users. Therefore the quality of the training received by the personnel involved with the stem in various ways helps or hinders.1. Since 50 . This phase is less creative than system design. and may event prevent. database server and deployment directory for the project. The implementation of the web based or LAN base network project has some extra steps at the time of implementation. In steel other situations.Implementation is the process of having systems personal cheek out and put new equipment to use. We need to configure the system according the requirement of the software. For the project we need to install and configure weblogicserver8. Some times. install the new application and construct any files of data needed to use it. system developers stop using the old systems one day and start using the new one the next.

51 .

The system requires maintenance as there may be changes and requirements in the organizational needs. hardware and software environment etc. This is a typically a 52 . Once the system is delivered and installed there is a brief warranty period during which time the vendor is responsible for maintenance. often small system deficiencies are found as a system is brought into operation and changes are made to remove them. Often the maintenance need arises to capture additional data for storage in a database or in transaction files or perhaps it may be necessary to add error detection features to prevent system users from in adversely taking an unwanted action. System requirements may be revised as a result of system usage or changing operational needs.MAINTENANCE Software maintenance is the last phase in the software Engineering process that eliminates errors in the working system during its work span and to tune the system to any variations in its working environment. Perhaps oversight that occurred during the development process needs to be corrected. Maintenance of the system after it is installed is concerned with an additional factor in hardware. government policies.

Maintenance source excepting vendor is also available from companies specializing in providing the service. System and organization are in constant state of flux. routine debugging. Changes in the external environment.  Pre effective User 53 . it is generally used for long period. with the eldest applications often is used for over 10 years. The greatest amount of maintenance work is for user enhancement. About 60% of all maintenance is for this purposed. files and database.90 day period after that time the purchaser has the option of acquiring maintenance from various sources.com CATEGORY  Corrective ACTIVITY Emergency fixes. Following table summarized the broad classes of maintenance found in development of sekkjob. called third party maintenance companies. Approximately 20% of all maintenance work is performed to accommodate changes in report. improved documentation and recording system components or greater efficiency. When the system is installed.  Adaptive Accommodation of changes to data and to hardware and software. The average life of system is 4-6 years. The need for debugging and correcting errors or failure on an emergency basic is comparatively low: less than 20% of the task of correction. therefore the maintenance of the system also involved adoptions for earlier version of software.

improved documentation recording of computational efficiency.enhancement. user recommendation s for new capabilities. future maintainability reliability enhancement. 54 . Maintainable Design The points to reduce the needs for maintenance are:  More accurately defining the user’s requirements during the system development assembling better system documentation.  Preventive Routine service of cleaning and adjusting the equipment to prevent breakdowns. recovering design information to improve the overall quality.

55 . Using more effective methods for designing process logic and communicating it to project team members. The maintenance for Integrated Advertising System was performed with the abovementioned points as the underlying principles and according to the demands of the users.  Managing the system engineering process effectively.  Making better use of existing tools and techniques.

Who gave a lot of good programming skills and so many company related skills that will help me in the future? I am also thankful to all my friends and team members. 56 . I am very thankful to Mr.CONCLUSION This is a well defined job of our team that has taken six weeks to analyze the situation in which this project will work and the environment of the company that will use this project. Mohd Gurfan khan. It was a good experience for us to work in a company that has a very friendly environment and learning atmosphere.

• At present days every organization is using web technology for their proper functioning. thus.FUTURE SCOPE OF THIS PROJECT • In future this project can be treated as product according to specification and needs of any organization. Therefore Jobs seeker Process will be of great help in carrying out recruitment process smoothly and effectively. so this web based project is all in all important from market aspects. success over a long period of time and reliance of organization over recruitment is going to be one of the most considered topic for any organization. 57 . • Furthermore if this project will be uploaded. it can be used as Jobs site and any organization can register their self on the site to carry out their recruitment process making this site as Jobs seeker. • Since Jobseeker plays key role in any organization.

Also it doesn’t have different kind of access feature for different users. avoid traversing multiple links or methods. We can update it next version.LIMITATIONS Since. SOFTWARE SCOPE • Reusability: Reusability is possible as and when we require in this application. • Extensibility: This software is extended in ways that its original developers may not expect. The following principles enhance extensibility like Hide data structure. Although it includes every kind of features but it can’t be used in a huge organization where number of networks are very large. every system has some limitations so our proposed system is also not untouchable in this regard. We follow up both types of reusability: Sharing of newly written code within a project and reuse of previously written code on new projects. which increases the likelihood that the code is correct. coding and testing cost by amortizing effort over several designs. because the data base used in this system is an average one. • Robustness: 58 . Reducing the amount of code also simplifies understanding. Avoid case statements on object type and distinguish public and private operations. Reusable software reduces design.

• Understandability: A method is understandable if someone other than the creator of the method can understand the code (as well as the creator after a time lapse). Optimize after the program runs. 59 .Its method is robust if it does not fail even if it receives improper parameters. • Cost-effectiveness: Its cost is under the budget and make within given time period. We use the method. Scope of this document is to put down the requirements. It is desirable to aim for a system with a minimum cost subject to the condition that it must satisfy all the requirements. which small and coherent helps to accomplish this. clearly identifying the information needed by the user. the source of the information and outputs expected from the system. There are some facilities like Protect against errors. validating arguments and Avoid predefined limits.

60 .

ddj.google.com 2. http://www.  J2EE by Allamaraju & Buest (Apress Publications). http://www.com 6.  JSP & Servlets by Marty Hall (SUN Microsystems)  SYSTEM ANALYSIS AND DESIGN by ELIAS M AWAD. http://www.com 4.SITES REFERRED: 1.coreservlets. http://www.com 3.com BOOKS:  J2EE by GARRY CORNELL.com 5.com 7. http://www.w3schools.webopedia. http://www.  SOFTWARE ENGINEERING by IAN SOMMEVILLE. http://www. 61 .sun.serverside.

62 .

APPENDIX-A Backend remains on server side and has two components i. Client Server Technology. It gives some internet related features. Hence because of these features we are using Oracle as a back end technology. Data Base.e. oracle 8i Enterprise edition. We will be using RDBMS (Relational Database Management System) in our project i. DBMS. Why we are using Oracle (RDBMS)? Some of the merits of using Oracle (RDBMS) are as under:• • • • • • • Centralization of database. Server side program 2.e. 63 . Data base is the most important thing in this universe as data base gives identity to a thing without data base existence of a thing is impossible while working on a project first step is to design a database.e. RDBMS. in row and columns. Relationship. Data Base can be divided into two parts:1. Security. 2. 1. What is data base? Data Base is a collection of tables and table is a collection of records in a tabular form i. Transaction Processor. Normalization of Data Base.

ABOUT ORACLE 8i Oracle 8i contains all the features of previous version. It also supports some new features & enhancement to some existing features. Large Database & Space Management Control Many Concurrent Database Performances High Transaction Processing Performance High Availability Controlled Availability Industry Accepted Standards Manageable Security Database Enforced Integrity Distributed Database System Portability Compatibility Connectivity NEW FEATURES OF ORACLE 8i Improved Scalability Improved Security Improved Performance Via Partition Enhanced Support for Database Replication Capability To Handle a Much Larger Number Of Concurrent Users New & Improved Data Types 64 . Oracle servers provide deficient & effective solution for the major features.

It is a platform for distributed computing – a development and run-time environment that contains built-in support for the World Wide Web. His Objective was to create a common development environment for consumer electronic devices which was easily portable from one device to another. Middle ware provides:1. This effort evolved into a language. Multiple Client access. It remains on server side and it has all the logical building. Perl and many others. third-generation programming language. James Gosling did not design java for the Internet. Because we are working on Distributed Application Based Project we need platform independent Language:Technology Used Introduction to Java Java is a high level. but is simpler and more platform independent. 2. like C. Centralized business logic in case of distributed application. History of Java Java development began at Sun Microsystems in 1991.e. Fortran. instead of putting logic on each and every client machine we put logic on a centralized server hence middle ware is nothing but a server side program where all your business logic and business methods reside. code named Oak and later renamed Java that retains much of the syntax and power of c++.APPENDIX-B What is Middle Ware? Middle Ware is a concept. Java’s creator. Java Features Some of the important features of Java are as follows: • Simplicity 65 . Middle Ware provides centralization of business logic i. the same year the World Wide Web was conceived.

Garbage Collection. One of the most important features of Java is Platform Independence which makes it famous and suitable language for World Wide Web.• • Orientation Platform Independence • • • • • Security High Performance Multi Threading Dynamic linking. The interpreter is a part of a lager program called the JVM. Client Side Interface: In client side interface we are using:Servlet / JSP – In Internet Based Application. Java Virtual Machine (JVM) The client application or operating system must have a java byte-code interpreter to execute byte-code instructions. 2. JdbcOdbc Bridge Driver. Native Driver. Connectivity using JDBC There are four kinds of drivers available in Jdbc:1. 66 . The JVM interprets the byte code into native code and is available on a platform that supports java. 4. Why java is Platform Independent? Java is Platform Independent because of Java Virtual Machine (JVM). Partly Java Driver. 3. Pure Java Driver.

the J2EE architecture also provides a uniform means of accessing platform-level services via its runtime environment. and the service APIs for building our applications. and the runtime onto which applications could be deployed. Apart from specifying a set of standard APIs. while leveraging the runtime for all infrastructure-related services. database access. messaging etc. or components to implement complex database transactions. The J2EE specification doesn’t specify how a J2EE runtime should or could be built. multithreading etc. Typical services include transaction processing. A run time infrastructure for hosting and managing applications. This results in a clear demarcation between applications and the runtime infrastructure. The J2EE APIs Used Distributed applications require access to a set of enterprise services. or even java applets. J2EE specify roles and interfaces for applications. Instead. The J2EE platform is essentially a distributed application-server environment. Such service includes distributed transactions.a java environment that provides the following: • • A set of java extension APIs to build applications. The J2EE Runtime While J2EE bundles together APIs that have been in existence in one form or another for quite sometime. These APIs define a programming model for J2EE applications. J2EE application developers could just focus on the application logic and related service. The applications that we could develop with the above may be programs to drive web pages. all distributed across the network. J2EE specifies both the infrastructure for managing our applications. The 67 . security. perhaps its most significant aspect is the abstraction of the runtime infrastructure. As a result.J2EE Framework and Architecture J2EE is one of the best solutions that we have had so far for meeting the demand of today’s enterprise. This is the server runtime in which our applications resides. messaging. This demarcation allow the runtime to abstract most of the infrastructure services that enterprise developers have traditionally attempt to build on their own.

There are various API specification in J2EE framework which enable us to create an application at great speed with minimum effort. and sql data types are also availabl 68 . transaction isolation. This allow JDBC connectivity to be provided in a consistent way for any database. executing statements and prepared statements. JDBC includes following packages for the means of database accessing and provides various features of the database. scrollable result sets. Advanced functions such as batch updates. placed in the java. However. execute structured query language statements. and processes the result of those statements. JDBC generalizes the most common database access functions by abstracting the vendor specific detail of particular database. The result is set of classes and interface. and running batch queries.sql Package: This package contains classes and interfaces designed with traditional client/server in mind. Its functionality is focused primarily on basic database programming services such as creating connections. APIs Used To Build the Software 1.J2EE architecture unifies access to such services in its enterprise service APIs. It also means that with a little care to ensure the application confirms to the most commonly available database features. developers can create a client (which can be anything from an applet to an EJB) that can connect to a database.sql package. which can be used with any database that has an appropriate JDBC drive. instead of having to access these service through proprietary or non standard interfaces. The API provides connectivity and data access across the range of relational databases. The packages are as follows: • java. It can do this because it provides a set of generic database access methods for sql compliant relational databases. application programs in J2EE can access these APIs via the container. Using the JDBC API. an application can be use with a different database simple by switching to a different JDBC driver. JDBC API The JDBC API provides developers with a way to connect to relational data from within java code.

and legacy connectivity. cookies. and other such tasks. executing an RMI or CORBA call.. this involves embedding the information inside an HTML page. or even in a compressed format like gzip that is layered on top of some other underlying format. but could also come from a Java applet or a custom HTTP client program. Java Servlets: Servlets are Java technology’s answer to Common Gateway Interface (CGI) programming. This process may require talking to a database. 2. Generate the results. This document may be sent in text format (HTML). Many client requests can be satisfied by 69 . or computing the response directly. In most cases. setting cookies and caching parameters. Format the results inside a document. binary format (GIF images). This means telling the browser what type of document is being returned (e.sql package. and so forth.sql Package: This package introduces sum major architectural change to JDBC programming compared to java. They are programs that run on a Web server. This information includes details about browser capabilities. the host name of the requesting client.• javax. This package also introduces container-managed connection pooling. Their job is to: Read any data sent by the user. This data is usually entered in a form on a Web page. Set the appropriate HTTP response parameters. and provides better abstractions for connections management. acting as middle layer between a requests coming from a Web browser or other HTTP client and databases or applications on the HTTP server. distributed transactions. Look up any other information about the request that is embedded in the HTTP request.g. invoking a legacy application. distributed transactions. and row sets. HTML). Send the document back to the client.

static HTML with dynamically generated content from servlets. JSP is portable to other operating systems and Web servers. however. The Advantages of JSP JSP has a number of advantages over many of its alternatives. Parts that are generated dynamically are marked with special HTML-like tags and mixed right into the page. you aren’t locked into Windows NT/2000 and IIS.returning pre-built documents and these requests would be handled by the server without invoking servlets. But most CGI variations. Java Server Pages: Java Server Pages (JSP) technology enables you to mix regular. with the parts that change limited to a few small locations. The advantages of JSP are twofold. Second. Versus Pure Servlets JSP doesn’t provide any capabilities that couldn’t in principle be accomplished with a servlet. a static result is not sufficient. even though most of it is always the same.1 gives an example. not VBScript or another ASP-specific language. Here are a few of them. First. Listing 1. In fact. In many cases. Versus Active Server Pages (ASP) ASP is a competing technology from Microsoft. Many Web pages that are built by CGI programs are primarily static. except for a small welcome message giving the visitor’s name if it is known. which is passed to the visitor unchanged. JSP lets you create the two parts separately. make you generate the entire page via your program. with JSP you can use Java and are not tied to a particular server product. so it is more powerful and better suited to complex applications that require reusable components. including servlets. the dynamic part is written in Java. For example. and a page needs to be generated for each request. the initial page at most on-line stores is the same for all visitors. Most of the page consists of regular HTML. You could make the same argument when comparing JSP to ColdFusion. JSP documents are automatically translated into servlets behind the 70 .

so static HTML pages cannot be based upon user input or server-side data sources. cannot contain dynamic information. used extensively on the World Wide Web. by separating the presentation from the content. Versus Static HTML Regular HTML. and the like. make database connections. Plus. But it is more convenient to write (and to modify!) regular HTML than to have a zillion println statements that generate the HTML. 71 . SSI is really intended only for simple inclusions. Besides. Previously. APPENDIX-C What is HTML? HTML (Hyper Text Markup Language): A markup language used to structure text and multimedia documents and to set up hypertext links between documents. JSP is better because you have a richer set of tools for building that external piece and have more options regarding the stage of the HTTP response at which the piece actually gets inserted. HTML is a display language. Versus Server-Side Includes (SSI) SSI is a widely supported technology for inserting externally defined pieces into a static Web page. of course. JSP is so easy and convenient that it is quite reasonable to augment HTML pages that only benefit slightly by the insertion of dynamic data. the difficulty of using dynamic data precluded its use in all but the most valuable instances.scenes. HTML is a markup language (the ML in HTML) that uses a fixed set of markup tags. not a programming language. you can put different people on different tasks: your Web page design experts can build the HTML using familiar tools and leave places for your servlet programmers to insert the dynamic content. not for “real” programs that use form data.

Link into other locations. The markup tag tells the Web browser how to display the page. It’s a display-only technology. The “language” HTML is really only a collection of predefined tags which . in another web page. in the same document. video sequence. An HTML file can be created using a simple text editor. APPENDIX-D What is JAVASCRIPT? JavaScript is a compact. or even on another computer (Server). object-based scripting language. • • HTML is a programming language in that an HTML document is a program that.It was originally developed by Brendan Each of Netscape Communications. and hyperlinks. or sound clip into the displayed document. when “run” by a browser. validate from data. tell a web browser how to: a. b. or d.• HTML itself is the set of customizable “markup” tags that are inserted into HTML document govern its format. The language is most well known for its use in wesites. but not as powerful and deals mainly with 72 . It can provide interactive web pages. • • • • • An HTML file is a text file containing small markup tags. c. Format the document and its text. and make your web page clearer. Features of HTML:HTML stands for Hyper Text Markup Language. Incorporate i. multimedia content. which are otherwise static. when inserted into regular text. JavaScript or other languages (called CGI applications). Link to other programs written in Java. JavaScript is easier to use than Java. displays its text as hypermedia (multimedia with hyperlinks). It adds interactive functions to HTML pages. Any HTML viewer can display such documents but they are normally viewed usinga Web browser. insert a graphic image. JavaScript is a lightweight interpreted scripting language. An HTML file must have an htm or html file extension.e.

All major browsers. A JavaScript is an interpreted language (means that script execute without preliminary compilation). Features of JavaScript:• • • • • JavaScript was designed to add interactively to HTML pages. On the Server.the elements on the Web page. it is compiled into byte code (intermediate language). 73 . JavaScript is a scripting language-a scripting language is a lightweight programming language. similar to Java programs. Functions of JavaScript:JavaScript gives you the ability to perform the following functions: • • • • • • • Control document appearance and content Control the browser Interact with document content Interact with the user Read and write client state with cookies Interact with applets Manipulate Embedded Images Limitations of JavaScript:• • • • JavaScript does not have any graphics capabilities Client-side JavaScript can not read or write files JavaScript does not support networking of any kind JavaScript doesn’t have any multithreading capabilities. A JavaScript is usually embedded directly in HTML pages. On the client. like Netscape and Internet Explorer. JavaScript is maintained as source code embedded into an HTML page. support JavaScript.

74 .

Data Base: A store of integrated data capable being directly addressed for multiple user. DBMS: The software that determines how data must be structured to produce the user’s view. Data Flow: Moment of data in a systems from appoint of origin to specific destination indicated by a line and arrow. Cost/Benefit Analysis: The purpose of the comparing the projected savings and benefits to projected to costs to decide whether the system change is justified. it is organized so that various files can be accessed through a single referenced based on the relationship among records in the file rather than the physical location. Attribute: A data item that characterizes an object. and maintain update the system.Analysis: Breaking a problem into successively manageable parts for individual study. Data Security: 75 .

modification or destruction. disclosure.a phase that focuses on user training. the object is true derive sample file with no redundant elements.Protection of data from loss. Maintenance: Restoring to its original condition. File: Collection related records organized for a particular purpose also called a data set. Design: Process of devolving the technical and operational specification of a candidate system for implementation. Flow Chart: A graphic picture of the logical steps and sequence involved in a procedure or a program. Normalization: A process of replacing a given file with its logical equivalent. site preparation and file conversion for installing a candidate system. Password: Identity authenticator a key that allow access to a program system or procedure. Implementation: In system development. a group of data elements handled as a unit. Operating System: In data base machine based software that facilitates the availability information or reports through the DBMS. Form: A physical carrier of data of information. Pert: 76 . Data Structure: Logically related set of data that can be decomposed into lower level data elements. Feasibility Study: A procedure that identifies describes and evaluates candidate systems and selects the best system for implementation.

checking the quality of software in both simulated and live environment 77 . Unit Testing Validation: Testing changes made in an existing or new programs. System Design: Detailed concentration on the technical and other specification that will make the new system operational. a group of components necessary to some operation. Source code: A procedure or format that allow enhancement on a software package. System Development Life Cycle: A structured sequence of phases for implementing an information system. Record: A collection of aggregates or related item of data treated as a unit. System Testing: Testing the whole system by the user after major programs and sub systems have been tested.A flow system model used to manipulate various values as a basis for determining the critical path to interpret this relationship and to relate them back to the real world as a control technique. System: A regular or orderly arrangement of components or parts in a connected and interrelated series or whole.

Sign up to vote on this title
UsefulNot useful