Ebazaar
Ebazaar
Ebazaar
A Project Report
This is to further certify that the student has attended the United
Institute of Management, Allahabad and CUBE INFONEXUS PVT.
LTD. for the 6 months after the fifth semester theory exams. Her work has
been satisfactory and commendable.
Date: College
name:-
Mr. Awaneesh Gupta United Institute
of Management
HOD( MCA) Department Naini,
Allahabad
Place: Allahabad
ACKNOWLEDGEMENT
I take this opportunity to express my sincere thanks and deep gratitude to all
those people who extended their wholeh co-operation and helping me in
completing this project
First of all, I would like to thank Mr. Mukesh Nigam , Director (Cube InfoNexus
Pvt. Ltd.) for creating opportunity to undertake me in the esteemed
organization.
Special thanks to Mr. Mukesh Nigam Project Manager for all the help and
guidance extended to me by him.
In all I find a congenial work environment in Cube InfoNexus Pvt. Ltd. And this
project will mark a new beginning for me in the coming days.
Praise to God, the beneficial it is he no one else who has given us all the
boundaries, which we see, in the world and given courage to complete this
project.
DECLARATION
Name:
Roll No:
CERTIFICATE OF ORIGINALITY
This is to certify that the project entitled Ebazaar being submitted for the
partial fulfillment of degree of MCA, session 2009-2010, is a record of work carried
out by Ms Deepmala Raghuvanshi under my guidance and supervision.
This is to further certify that the student has attended the CUBE
INFONEXUS PVT.LTD, NOIDA for the 6 months after the fifth semester theory
exams. Her work has been satisfactory and commendable.
Date:03/06/2010
Place: Noida
CONTENTS
1. Introduction
Company Profile
2. Project Detail
a. Introduction
b. Overall project description
3. System Development methodologies
4. Initial Investigation and System Requirements
a. System Study and Problem Formulation
b. Project Category
c. Platform(Technologies/Tools)
d. Front-end and Back-end Tools
e. Software and Hardware Used
5. Feasibility Study
6. System Design
a. Data Flow Diagrams
b. E-R Diagrams
c. Data Base Design
7. Module Description
8. Web Pages(Input/Output Screens)
9. Testing and System Security
10. Quality Assurance
11. Implementation and maintenance
12. Evaluation
13. Conclusion
14. Bibliography
COMPANY PROFILE
and SME (small and mid sized companies) is USTECH CRM. This software
solution takes care of Sales, Support, Client Management, Lead Management,
Sales process flow, Campaigns management and office process
automation for a company. But this is just a start, which is a part of the
targeted comprehensive ERP package.
• US TECH CRM
• Pay Bill Reporter Software Package
• Web applications development.
• Software Training and Consultancy.
• Web Designing
• Product lifecycle management
• Relational database management and research
• Customized Software Development
• Software Sales
• CAD-CAM
• Character Modeling
• 3D Animations & Walkthroughs
Our Services
Technologies
Following are the tools and technologies that we use as building blocks in
Application Development:
Web Technologies
· VB.Net, C#.Net, ASP.Net, XML.net
· J2EE, Cold Fusion, ASP, Java (JSP, Servelet, EJB & Applet), JavaScript, PHP,
XML, VoiceXML, WAP.
Web Servers
· All popular web servers.
Database
· Oracle, MS SQL & Access, Cache.
Platforms
· NT, Linux, UNIX.
Tools
· Cold Fusion Studio, Visual Interdev, Jbuilder, Visual Age for Java.
Web Application Server
· Cold Fusion Application Server, Jrun. · HTML, Editors
· Macromedia Dreamweaver, 'Microsoft FrontPage. Multimedia / Animation
· Flash, Director, 3DX Player, 3D Studio Max, Illustrator, Sound Forge, Adobe
Premier, ULead Media Studio & More.
E-Commerce
This is the fastest moving development on the Internet, which makes selling
your products over the web easy.
Multimedia Presentation
Corp Presentation
CD Authoring
How can our CD-ROMs give your company a competitive edge in the
marketplace? Let's take an example of a software company. CUBE
INFONEXUS can create CD-ROMs for software companies who are looking
for a way to actually demonstrate their software.
But with a CD-ROM, CUBE INFONEXUS can show your clients live
demonstrations of your programs and can package those demonstrations
with sleek, elegant graphics and interactivity. It really is important to show,
not tell. We look forward to creating a CDROM for your organization. We can
also web enable the complete CD-ROM presentation and incorporate it
within your corporate web site.
PRODUCTS
PBR
Preparation of Pay bill Inner Sheet
Preparation of Pay bill Outer Sheet
Preparation of All Schedules:
Acquaintance Rolls
Pay Slips
Last pay Certificate
History Vision (Privilege to see and to take printouts of the past records).
ITAX
Preparation of Tax Calculation Sheets Preparation of Form 16.
Preparation of Form 24.
Penal interest calculation
Tax planning
ARREAR
Long term Arrears of Pay and Allowances IV Pay Commission (i.e. 1986)
Onwards.
Reports available are: -
Due drawn statement month wise Inner Sheet
Outer Sheet
Dearness Allowance Arrear
Reports available are: -
Due drawn statement individually Inner Sheet
Outer Sheet
Acquaintance roll
PENSION
Preparation of Death Pension
Preparation of Family Pension
Calculation of last ten months working service.
Commutation
GPF
Preparation of GPF Ledger
Preparation of GPF Broad Sheet
Preparation of GPF Annual Card
Preparation of GPF statement
GPF Interest calculation
BUDGET
Preparation of Budget statements, which includes all 11 statements
Budgetary Control
Preparation of Bill register
FORMS
G.A.R. Forms
Pension Forms
G.F.R Forms
G.P.F. Forms
HBA Forms
Advances Forms
Inventory
Vendor Masters
Item Masters
Receipt &. Issue
Department Masters
Reports
Delhi: -
- Director General of Security, Cabinet Secretariat
- General Administration Department
- Sales Tax Department
- Office of Labor Commissioner
- Office of Divisional Commissioner (New Delhi Distt.)
- Department of Social Welfare
- Directorate of Information and Publicity
- Registrar of Cooperative Societies
- Land and Building Dep't.
- Transport Department
- Directorate of Agricultural Marketing
- Legislative Assembly
Goa: -
- Office of Resident Commissioner
Chandigarh: -
- I. G. Of Police
INTRODUCTION
OBJECTIVE
DESCRIPTION
INTRODUCTION
The Application is a working demonstration of how to use blueprints principles
in a real application design. This document is an online guide to the design
and the implementation of the application with web technology.
Objective
SYSTEM CONCEPTUALISATION
The software will be hosted on web to cater to User anywhere they may be.
They will be able to access the desired information to which he/she has been
given access to. The user of the application will login remotely and hence
remains always in touch with the latest critical information. Keep track of
how many hours it will be in use may be on daily basis. It is secured as only
team members will be able to access this application based on UserID and
Password issued to particular team member by Administration.
TRAINING REQUIREMENT
The users of this application must be made proficient in accessing the web
application via Web Browsers. The application is descriptive to an extent to
take care of proper Navigation throughout the use of entire application. The
labels/buttons are very descriptive of the task they are going to perform. All
the Client side validations are done using JavaScript to stop any wrong data
being feed into the Database, it specifies on the data types/Range within
which values that are expected from the user.
Functional Requirements
INPUT/OUTPUT
The input being given to the application varies at various levels. The input is
given inform of various values i.e.
PROCESSING
The request made by the user varies according to different options that
he/she has to choose from, based on which user gives data values which are
being processed.
VALIDATION
All the valid users will have a UserID and a Password; the user will be
given access to the application only after matching these values. Login
will be denied if the user is not validated after matching UserID and
Password from the Database. Appropriate message will be given to the
user. It will ensure the application is secure as only Registered
Employees will be given Access, to protect application, from being
accessed by any Invalid user and hence ensuring important data from
being accessed or even tampered.
EXCEPTION CONDITION
SECURITY
SEQUENCE OF OUTPUTS
PHASES:
Initiation Phase
Planning Phase
Design Phase
The physical characteristics of the system are designed during this phase.
The operating environment is established, major subsystems and their
inputs and outputs are defined, and processes are allocated to resources.
Everything requiring user input or approval must be documented and
reviewed by the user. The physical characteristics of the system are
specified and a detailed design is prepared. Subsystems identified during
design are used to create a detailed structure of the system. Each
subsystem is partitioned into one or more design units or modules.
Detailed logic specifications are prepared for each software module.
Development Phase
Implementation Phase
Disposition Phase
SDLC Objectives
Key Principles
This guidance document refines traditional information system life cycle
management approaches to reflect the principles outlined in the following
subsections. These are the foundations for life cycle management.
The establishment of an Integrated Product Team (IPT) can aid in the success of
a project. An IPT is a multidisciplinary group of people who support the Project
Manager in the planning, execution, delivery and implementation of life cycle
decisions for the project. The IPT is composed of qualified empowered individuals
from all appropriate functional disciplines that have a stake in the success of the
project. Working together in a proactive, open communication, team oriented
environment can aid in building a successful project and providing decision
makers with the necessary information to make the right decisions at the right
time.
The Project Manager has responsibility for the success of the project and
works through a project team and other supporting organization
structures, such as working groups or user groups, to accomplish the
objectives of the project. Regardless of organizational affiliation, the
Project Manager is accountable and responsible for ensuring that project
activities and decisions consider the needs of all organizations that will be
affected by the system. The Project Manager develops a project charter to
define and clearly identify the lines of authority between and within the
agency’s executive management, program sponsor, (user/customer), and
developer for purposes of management and oversight.
SDLC Steps
System Requirements
Software Requirements
Software Requirements
Review & Validation
Preliminary Design
Review & Validation
Detailed Functional Specifications
Testing
Testing
Review & Validation
Maintenance
From the description of the present system and problems with the
existing system one can gauge the manpower wasted in these activities
even then it is difficult to gain access to different information. Addition,
updating, viewing, searching is very easy in the computerized system.
Just on the click of fingers different data can be accessed. So, here lies
the need for a change from the old system.
1. Contains all the forms for the new connection and generates
customer identification no by the system itself.
2. Checks all the details and existing connections for some facilities
for the telephone like safe custody, transfer and shifting cases.
Requirement Analysis
Interview
Questionnaires
Record inspection
On-site observation
IDENTIFICATION OF NEED
In the world we are growing for globalization day by day with the
development in IT resources and advancement, by using latest
technologies every organization wants to beat its competitors and want to
grow. Enterprise Resourceful Planning is the need of today’s organization.
Survival on manual system is difficult so, that’s why organization of the
corporate world wants to computerize their departments. The modules
should be complete database driven and interactive that should provide
the proper information about the Placement and Training Organization.
Success of any system depends up to a large extent on how accurately a
problem is defined, thoroughly investigated and properly carried out to
the choice of solution. Analysis is the only phase in which the
requirements for the new system are identified.
Gathered all facts about the present system from the employees.
In order to reduce the time, there is a need for computerized system that cans
retrieve data, insert data, update existing data or delete existing data. These
modules are developed wit the aim of reducing time, reducing manpower,
reducing cost so that the records can be easily maintained. The volume of work
and complexity are increasing year by year. This system reduces complexity and
workload.
PRELIMINARY INVESTIGATION
A request to take assistance from information system can be made for many
reasons, but in each case some one in the organization initiate the request.
When the request is made, the first system activity the preliminary investigation
begins. This activity has three parts:
Request clarification
Feasible Study
Request approval
Many requests from employees and users in the organization are not clearly
defined. Therefore, it becomes necessary that project request must be examined
and clarified properly before considering systems investigation.
The feasibility study is carried out by a small group of people who are
familiar with information system techniques, understand the parts of the business
or organization that will be involved or affected by the project, and are skilled in the
system analysis and design process.
• Request Approval:
It is not necessary that all request projects are desirable or feasible. Some
organizations receive so many projects request from employees that only a few
of them can be purchased. However, those projects that are feasible and
desirable should be put into a schedule.
Each building block forms a foundation for the next, with tools sitting as
the top of the heap. It is interesting to note that the foundation for
effective CASE environment has relatively little to do for software
engineering tools themselves. Rather, successful environments
appropriate hardware and systems software. In addition, the environment
architecture must consider the human work patterns that are applied
during the software engineering process.
Gathered all facts about the present system from the employees.
Studied strength and weakness of the current system.
In order to reduce the time, there is a need for computerized system that
cans retrieve data, insert data, update existing data or delete existing
data. These modules are developed wit the aim of reducing time,
reducing manpower, reducing cost so that the records can be easily
maintained. The volume of work and complexity are increasing year by
year. This system reduces complexity and workload.
PRELIMINARY INVESTIGATION
A request to take assistance from information system can be made for many
reasons, but in each case some one in the organization initiate the request.
When the request is made, the first system activity the preliminary investigation
begins. This activity has three parts:
Request clarification
Feasible Study
Request approval
Many requests from employees and users in the organization are not clearly
defined. Therefore, it becomes necessary that project request must be examined
and clarified properly before considering systems investigation.
The feasibility study is carried out by a small group of people who are
familiar with information system techniques, understand the parts of the business
or organization that will be involved or affected by the project, and are skilled in the
system analysis and design process.
• Request Approval:
It is not necessary that all request projects are desirable or feasible. Some
organizations receive so many projects request from employees that only a few
of them can be purchased. However, those projects that are feasible and
desirable should be put into a schedule.
PROJECT CATEGORY
PROJECT CATEGORY
Project category:
2-tier application software using c#.net as front end and MS-SQL Server
2005 as RDBMS .
Category of this project is RDBMS based, n-tier architecture, Distributed
environment project with server-side components.
Local Area Network projects are those projects where application has to be
incorporated in the Local area network of the client i.e within its premises
only. In case of LAN, server is not remotely located and client accesses the
application through the network. Here the question of platform
independence does not arise and we can use the technologies like: Visual
Basic, Fox pro, D2k or C, C++, etc.
Hardware Specification:-
It is recommended that the minimum configuration for clients is as
appended below:-
Suggested Configuration of Windows clients:-
Microprocessor: - Pentium-2 class processor,450 megahertz (MHz)
Ram: - 128 MB of RAM
Hard Disk: - 2.5 gigabytes (GB) on installation drive, which
Includes 500 MB on system drive.
CD ROM Drive: - 52 X CD ROM Drive
Software Specifications:-
Operating System: Windows 2000XP/Windows 2000 NT
RDBMS: SQL Server 2005
Microsoft Visual Studio.NET
Improved Reliability
Windows 98 includes tools that help your computer run faster than Windows
95 with out adding new hardware. Window 98 includes a suite of programs
designed to optimized you’re web.
Integration
Windows 98 Explorer and Internet Explorer integrate local and Web-based resources
DESIGN
The most creative and challenging phase of the system life cycle is system
design. The term design describes a final system and the process by which it
is developed. It refers to the technical specifications that will be applied in
implementing the candidate system.The first step is to determine how the
output is to be produced and in what format. Samples for the output (and
input) are also presented.
The second step is input data and master files (data base) have to be
designed to meet the requirements of the proposed output. The operational
(processing) phases are handled through program construction and testing
including a list of the programs needed to meet the system’s objective and
complete documentation. Finally, details related to justification of the system
on the user and the organization are documented and evaluated by
management as a step toward implementation. To design the system we
must note the following points:
To identify the Software Components which satisfy the System Design?
To design and document the Software Components and their linkage.
In this component the software components and relevant interfaces such as,
interactions with existing internal and external systems, network connections, and
standard input an output formats are to be identified.
Program Specification
From Analysis
Detailed Cost
System Justification
Output Documentation and
Design Candidate
design
Input Design
Design submitted to
management
for approval
File
Design
Design
accepted Abandon project
Processing
Design No
Yes
Test
Programs
S T E P S I N S YS T E M D E S I G N
A database can be of any size and of varying complexity. For example, the
list of names and addresses referred to earlier may consist of only a few
hundred records, each with simple structure. On the other hand the card
catalog of a large library may contain half a million cards stored under
different categories by primary author’s last name, by subject, by book title
with each category organized in alphabetic order.
With the advent of the graphical operating system like windows, the world of
imputing went through a dramatic change. It opened up a whole new world
of graphics. Interfaces that use graphics came to known so graphical user
interface (GUI). These became very popular because the users could identify
with images than words. Mention tile word print to a person and it invokes
the image of a printer. The primary requirements for an interface are that it
is easy to use. We must be able react intuitively to an interface presented to
us. This is possible if the interface presented is such that is it emulates real
life.
Feasibility Study
1. Economic Feasibility:
2. Technical Feasibility:
3. Operational Feasibility:
Economical feasibility:-
Economic analysis is the most frequently used technique for evaluating the
effectiveness of a proposed system. More commonly known as cost/benefit
analysis; the procedure is to determine the benefits and savings that
expected from a proposed system and compare them with costs. If benefits
outweigh costs, a decision is taken to design and implement the system.
Otherwise, further justification or alternative in the proposed system will
have to be made if it is to have a chance of being approved. This is an
ongoing effort that improves in accuracy at each phase of the system life
cycle.
This feasibility also depends upon quality of staff hired and the proposed
duration of time taken in this project sometimes it might be possible due to
extension of time duration may fall the project under loss. The study of
feasibility changes from phase to phase of the project development.
In this project although this feasibility study doesn’t matter much in the case
new setup of project because we start according to client specification but on
the other hand if we have to modify over existing system we must take care
of our existing resources and must analyze specially the working condition of
hardware like server quality etc.
• Software Cost :
• Manpower Cost :
The results obtained from technical analysis from the basis for another
go/on-go decision on the test system. If technical risks are severe, if the
models indicate that the desired function cannot be achieved, if the
pieces just won’t fit together smoothly- it’s back to the drawing board.
Duration of Project:-
Time Duration
Behavioral Feasibility
Introduction
System design provides the understandings and procedural details
necessary for implementing the system recommended in the system
study. Emphasis is on the translating the performance requirements into
design specifications. The design phase is a transition from a user-
oriented document (System proposal) to a document oriented to the
programmers or database personnel.
1) Logical Design
2) Physical Design
A data flow diagram shows the logical flow of the system. For a system it
describes the input (source), output (destination), database (data stores)
and procedures (data flows) all in a format that meets the user’s
requirement. When analysis prepares the logical system design, they
specify the user needs at a level of detail that virtually determines the
information flow into an out of the system and the required data
resources. The logical design also specifies input forms and screen
layouts.
The activities following logical design are the procedure followed in the
physical design e.g., producing programs, software, file and a working
system. Design specifications instruct the user about what the system
should do.
Logical and Output Design:
• When and how often output and their format is needed. While designing
output for project based Attendance Compilation System, the following
aspects of outputs designing were taken into consideration.
• The outputs (i.e., well formatted table outputs in the screen itself)
designed are simple to read and interpret.
These were a few major designing issues, which were taken into
consideration, while deciding the output specifications for the system. As
direct beneficiary of reports is the user community, they were consulted
constantly at every level. Formats and screen design for various reports
were identified, taking into account the user requirements. Before
finalizing these were given to users for any improvement and
suggestions. End users issues taken into consideration were Readability,
Relevance and Acceptability.
Once all the output reports to be generated by ACS system were
identified, they were given to users for their acceptance. For prototyping
various outputs, final outputs models were created with dummy data,
before they were finalized.
Output Sources:
• Tabular contents
• Graphic format
• Using Icons
Output Definition:
Types of outputs
The name given to each data item should be recorded and its
characteristics described clearly in a standard form:
• Number of characters
Input Design:
The input design is the link that ties the information system into the
user’s world. Input specifications describe the manner in which data
enters the system for processing. Input design features can ensure the
reliability of the system and produce results from accurate data, or they
can result in the production of erroneous information.
Input stages several activities have to be carried out as part of the overall
input process. They include some or all of the following.
The purpose of this phase is to plan a solution for the problem specified
by the requirement document. This is first step in moving from the
problem domain to solution domain.
a) System Design
It aims to identify the modules that should be in the system, the
specification of these modules and how they interact with each other to
produce the desired result.
b) Detailed Design
The internal goal of each of the modules specified in the system design is
decided
DATABASE DESIGN
CODE DESIGN
• Uniqueness
• Versatility
• Stability
• Simplicity
• Consciousness
The code should be adequate for present and anticipated data processing
for machine and human use. Care was taken to minimize the clerical
effort and computer time required to continue operation
.
PROCESS DESIGN
The process can be conceptualized in such a way to keep the methodology of
main module process along with some auxiliary task, which will run concurrently
with the main program.
DATAFLOW DIAGRAM
Details that is not shown on the different levels of the data flow diagram
such as volumes, timing, frequency, etc. is shown on supplementary
diagrams or in the data dictionary. For example, data store contents may be
shown in the data dictionary.
Data Flow Diagram also known as ‘Bubble Chart’ is used to clarify system
requirements and identifying the major transformations that will become
programs in system design. So it is the starting point of the design phase
that functionally decomposes the requirements specifications down to the
level of details.
Square
Arrow
information flows.
Circle
A circle or a bubble represents is a process that transforms incoming data flow into
Open Rectangle
User
ebazaar
Admin
DFD Level 0
User LOGIN
ORDER
GENERATE PURCHASE
CREDIT
CARD
VERIFICATI
ON
DFD Level 1
E R DIAGRAM
Personal
Details/Contact Update Product
Details ADMIN
Customers
Updating item
Get Product
Prices
Details
Get Item
Pricing
Get Offers &
Scheme Details Customers order
ebazaar wish list,
Select Item to Buy registration &
details
ER Diagram
Passwor
d
First_Nam Last_Nam
e e
User_Typ
e
User_Id
Address
User_Id
Emai
l
Mobile_N
o
Contact_No
User to
Purchase
MODULE DESCRIPTION
Product_I Product_Type_
Name Id
d
Price
Product_Master Categor
y Product_type_Master
Product_Typ
Quantit e
y
Name Desc
Product_Desc
MODULE DESCRIPTION
Each ebazaar module has different requirements from the others. This section describes the
requirements, design, and implementation of each module.
Control module
The control module dispatches requests to business logic, controls screen flow, coordinates
component interactions, and activates user sign on and registration. The control module is
implemented by the WAF and application-specific WAF extensions.
The shopping cart tracks the items a user has selected for purchase.
Sign on module
The Sign on module requires a user to sign on before accessing certain screens, and manages the
sign on process.
Messaging module
The messaging module asynchronously transmits purchase orders from the pet store to the OPC.
Catalog module
The catalog module provides a page-based view of the catalog based on user search criteria.
Customer module
The customer module represents customer information: addresses, credit cards, contact
information, and so on.
Control Module Requirements
• The module must handle all HTTP requests for the application. This
module controls a Web application, and interacts with a user who
sends HTTP service requests. The control module is responsible for
classifying and dispatching each of these requests to the other
modules.
• HTTP responses may be of any content type. Web application
developers do not want to be limited to just textual content types. The
control module must also be able to produce binary responses.
• Business logic must be easily extensible. Enterprise applications are
always changing and growing as business rules and conditions change.
A developer familiar with the control module should be able easily to
add new functionality with minimal impact on existing functions.
• New views must be easy to add. Most business logic changes imply
new user
SCREEN SHOT:-
HOME PAGE
LOGIN PAGE
PRODUCTS
• TESTING
• SYSTEM
TESTING
Testing plays a critical role in quality assurance of the software. Testing is a
dynamic method for verification and validation. With the help of testing we
observe the failure of the system in terms of logical and runtime errors. The
testing process can deduce the presence of fault in the system; however,
separate activities have to be performed to identify the faults.
As the goal of testing is to detect any errors in the programs, different flavor
of testing are often used. Unit testing are used to test module or a small
collection of modules and the focus is on detecting coding errors in modules.
During integration testing modules are combined into sub-system, which are
then tested. The goal here is to test the system design. In system testing and
acceptance testing, the entire system is tested. The goal here is to test the
fulfillment of the requirement. Structural testing can be used for unit testing
while at higher level mostly functional testing is used.
The objective for test case design is to derive asset of test that has the
highest likelihood for uncovering errors in the software. To accomplish this
objective, two different categories of test case design techniques are used.
White-box testing and black-box testing.
White-box test focuses on the program control structure. Test cases are
derived to ensure that all statement in the program control structure. Test
cases are derived to ensure that all statement in the program control
structure. Test cases are derived to ensure that all statement in the program
has been executed at least once during testing and that all logical conditions
have been exercised. Basis path testing, a white box technique, makes use
of program graphs (or graph matrices) to derive the set of linearly
independent test that will ensure coverage. Condition and data flow testing
further exercising degrees of complexity.
Evaluatio
n
Software Test Results
Configuration
Error
Rate Data
Expected Results
Testing
Reliability
Model Debug
Test Configuration
Predicated Reliability
Correction
A strategy for software testing may also be viewed in the context of the
spiral. Unit testing begins at the vortex of the spiral and, concentrates on
each unit, component of the software as implemented in source code.
Testing progresses moving outward along the spiral to integration testing,
where the focus is on designed the construction of the software architecture.
Taking another turn outward on spiral, we encounter validation testing,
where requirements established as part of software requirements analysis
are validated against the software that has been constructed. Finally, we
arrive at system testing, where the software and other system elements are
tested as a whole. To test computer software, we spiral out along stream
lines that broaden the scope of testing with each turn.
Considering the process from a procedural point of view, testing within the
context of software engineering is actually a series of four steps that are
implemented sequentially. The steps are shown in Figure. Initially, tests
focus on each component individually, ensuring that it functions properly as
unit. Hence, the name unit testing. Unit testing makes heavy use of white-
box testing techniques, exercising specific paths in module’s control
structure to ensure complete coverage and maximum error detection.
System Testing
Validation Testing
System Engineering
Integration Testing
Unit Testing
Code
Design
Requirements
Implementation is the process of having systems personnel check out and put new
equipment into use, train users, install the new application and construct any files
of data needed to use it. This phase is less creative than system design. Depending
on the size of the organization that will be involved in using the application and the
risk involved in its use, systems developers may choose to test the operation in only
one area of the firm with only one or two persons. Sometimes, they will run both old
and new system in parallel way to com-pare the results. In still other situations,
system developers stop using the old system one day and start using the new one
the next.
Evaluation
EVALUATION
The evaluation phase ranks vendor proposals and determines the one best
suited, Evaluation of the system is performed to identify its strengths and
weaknesses. The actual evaluation can occur along any of the following
dimensions:
Operational Evaluation: Assessment of the manner in which the
system functions, including case of use, response time, overall
reliability and level of utilization.
Organizational Impact: Identification and measurement of benefits
to the organization in such areas as financial concerns, operational
efficiency and competitive impact.
User Manager Assessment Evaluation of the attitudes of senior and
user manager within the organization, as well as end-users.
Development Performance: Evaluation of the development process
in accordance with such yardsticks as overall development time and
effort, conformance to budgets and standards and other project
management criteria.
Maintenance
MAINTENANCE
The maintenance of existing software can account for over 30 percent of all
effort Expended by a development organization, and the percentage
continues to rise as more software is produced. Uninitiated readers may ask
why so much maintenance is required and why so much effort is expended.
Much of the software we depend on today is on average 10 to 15 years old.
Even when these programs were created using the best design and coding
techniques known at the time and most were not, they were created when
program size and storage space were principle concerns. They were then
migrated to new platforms, adjusted for changes in machine and operating
system technology and enhanced to meet new user needs-all without
enough regard to overall architecture.
The result is the poorly designed structures, poor coding, poor logic, and
poor documentation of the software systems we are now called on to keep
running. The ubiquitous nature of change underlies all software work.
Change is inevitable when computer-based systems are built; therefore, we
must develop mechanisms for evaluating, controlling, and making
modifications.
Software maintenance is, of course, far more than “fixing mistakes.” We may
define maintenance by describing four activities that are undertaken after a
program is released for use. There are four different maintenance activities:
collective maintenance, adaptive maintenance, perfectly maintenance or
enhancement, and preventive maintenance or reengineering. Only about 20
percent of all maintenance work is spent “fixing mistakes”. The remaining 80
percent is spent adapting existing systems to changes in their external
environment, making enhancements requested by users, and re engineering
an application for future use. When maintenance is considered to encompass
all of these activities, it is relatively easy to see why it absorbs so much
effort.
SCOPE AND L
FUTURE SCOPE
Since using Object Oriented programming has generated this system, there
are every chances of reusability of the codes in other environment even in
different platforms. Also its present features can be enhanced by some
simple modification in the codes so as to reuse it in the changing scenario.
LIMITATIONS
Though it was planned, that the system developed will absolutely error free
but there certain limitations in the system. Following may be the drawback of
this system.
Since every time interaction is with the database so the load is more.
So the system tends to be bit slow.
CONCLUSIONS
Analysis Breaking a problem into successively manageable
arrow.
or destruction.
Data structure A logically related set of data that can be
implementation.
implementation.
called a dataset.
redundant elements.
Operating System In database – machine based software that facilitates
DBMS.
PERT (Project Evaluation & Review Technique) A flow system model used to
technique.
treated as a unit.
software package.
operational.
programs.
Data base is the most important thing in this universe as data base gives
identity to a thing without data base existence of a thing is impossible
while working on a project first step is to design a database.
1. RDBMS.
2. DBMS.
• Centralization of database.
• Client Server Technology.
• Security.
Sql Server 2005 contains all the features of previous version. It also
supports some new features & enhancement to some existing features.
Oracle servers provide deficient & effective solution for the major
features.
Large Database & Space Management Control
Many Concurrent Database Performances
High Transaction Processing Performance
High Availability
Controlled Availability
Industry Accepted Standards
Manageable Security
Database Enforced Integrity
Distributed Database System
Portability
Compatibility
Connectivity
Improved Scalability
Improved Security
Improved Performance via Partition
Enhanced Support for Database Replication
Capability to Handle a Much Larger Number of
Concurrent Users
New & Improved Data Types
REFERENCES REFRENC
BIBILIOG
FUTURE SCOPE
BIBLIOGRAPHY
REFERENCES
Websites visited:
www.codeguru.com
www.microsoft.com
www.3gschool.com