Professional Documents
Culture Documents
The author conveys his heartfelt gratitude to the Director-Principal of IET BHADDAL college for the encouragement and unstinted support given by him.
The author would like to convey heartiest thanks to the CEO of the Company INFOWIZ for providing such an intensive and extensive training in the project undertaken by me.
Mr
Sarabhjit Singh Head of the Department of Computer Science, not only for this project but also in my overall career development.
Without the help, guidance and support of Ms. Rajvinder under whose supervision. I had the opportunity of working, it would have been absolutely impossible for me to complete the project. Her contribution is profusely acknowledged.
Moral, intellectual and very frequently required support from all the faculty members is also hereby acknowledged.
Lastly the author would also like to thank each and every person who contributed directly or indirectly for completion of this project.
1|P a g e
TABLE OF CONTENTS
Page No to the 4 -7 8 19 20 24 25-38 module 39 54 55-56 57-66 67 69 70-73 74
Signature
Introduction to the project Modular description of the project Detailed analysis (Snapshots) of individual
2|P a g e
1.4 PROFILE OF PROBLEM Problem Definition Problem Definition is an initial investigation, which defines the problem that led to user request. One must know what the problem is before it can solved. It states the objectives the user is trying to achieve and the result the result that the user wants to see. It gives more stress on logical requirements of the problem rather than the physical requirements. Need of the user is identified and the problem definition is the verification of the user requirements. So the user is asked to thoroughly explain the problem that is to solve. And an initial investigation is carried out. KEY QUESTION: What is the problem or opportunity? RESULT: Statement of scope and objective. In my project Online Test.Testsare a form of distance learning. The tests are portable and available where ever you are. You don't have to go anywhere to take the test, it comes to you. You can access an online test at the time and place, which is most convenient to you. You can move anywhere, and still access the online test. During the initial investigation the following problems were discovered: In manual system I have discovered that organization has to do lot of maintenance of student records with respect to different courses as well as packages. The second was that result is not out immediately after test. Most of the time spends in evaluation. The staff and infrastructure cost is very high. Large number of domains to handle. Many types of constraints are there like: Boundaries/cost/time constraints.
4|P a g e
To provide a consistent object-oriented programming environment whether object code is stored and executed locally, executed locally but Internet-distributed, or executed remotely. To provide a code-execution environment that minimizes software deployment and versioning conflicts. To provide a code-execution environment that guarantees safe execution of code, including code created by an unknown or semi-trusted third party. To provide a code-execution environment that eliminates the performance problems of scripted or interpreted environments. To make the developer experience consistent across widely varying types of applications, such as Windows-based applications and Web-based applications. To build all communication on industry standards to ensure that code based on the .NET Framework can integrate with any other code.
Common Language Runtime Despite its name, the runtime actually has a role in both a component's runtime and development time experiences. While the component is running, the runtime is responsible for managing memory allocation, starting up and stopping threads and processes, and enforcing security policy, as well as satisfying any dependencies that the component might have on other components. At development time, the runtime's role changes slightly; because it automates so much (for example, memory management), the runtime makes the developer's experience very simple, especially when compared to COM as it is today. In particular, features such as reflection dramatically reduce the amount of code a developer must write in order to turn business logic into a reusable component. Unified programming classes The framework provides developers with a unified, objectoriented, hierarchical, and extensible set of class libraries (APIs). Currently, C++ developers wee the Microsoft Foundation Classes and Java developers wee the Windows Foundation Classes. The framework unifies these disparate models and give Visual Basic and Script programmers access to class libraries as well. By creating a common set of APIs across all programming languages, the common language runtime enables cross-language
5|P a g e
inheritance, error handling, and debugging. All programming languages, from Script to C++, have similar access to the framework and developers are free to choose the language that they want to use.
ASP.NET ASP.NET builds on the programming classes of the .NET Framework, providing a Web application model with a set of controls and infrastructure that make it simple to build ASP Webapplications. ASP.NET includes a set of controls that encapsulate common HTML user interface elements, such as text boxes and drop-down menus. These controls run on the Web server, however, and push their user interface as HTML to the browser. On the server, the controls expose an object-oriented programming model that brings the richness of object-oriented programming to the Web developer. ASP.NET also provides infrastructure services, such as session state management and process recycling that further reduces the amount of code a developer must write and increase application reliability. In addition, ASP.NET uses these same concepts to enable developers to deliver software as a service. Using XML Web services features; ASP.NET developers can write their business logic and wee the ASP.NET infrastructure to deliver that service via SOAP. For more information, see Soap Community Links.
Figure 2.1 ASP.NET is the hosting environment that enables developers to wee the .NET Framework to target Web-based applications. However, ASP.NET is more than just a runtime host; it is a complete architecture for developing Web sites and Internet-distributed objects using managed code. Both Web Forms and XML Web services wee IIS and ASP.NET as the publishing mechanism for applications, and both have a collection of supporting classes in the .NET Framework. The application we will build is a simple data application with lookup and edit. We will build both a Windows and Web-based client to display the Authors table from the SQL Server Pubs sample database. For the Web portion, we will see the Web Forms Designer to create a Web page that is compatible with a standard HTML 3.2 browser. On the server, the Web Forms code will call an XML Web service to retrieve data that contains Authors information from the database. For the Windows portion, we will build a Windows application that will communicate with this same XML Web service to retrievea dataset containing the author information. Communication with the XML Web service is handled using HTTP and XML.
6|P a g e
ASP.NET is a managed framework that facilitates building server-side applications based on HTTP, HTML, XML and SOAP. To .NET developers, ASP.NET is a platform that provides onestop shopping for all application development that requires the processing of HTTP requests. ASP.NET is a compiled, .NET-based environment; you can author applications in any .NET compatible language, including Visual Basic .NET, C#, and JScript .NET. Additionally, the entire .NET Framework is available to any ASP.NET application. Developers can easily access the benefits of these technologies, which include the managed common language runtime environment, type safety, inheritance, and so on. ASP.NET is a web application framework developed and marketed by Microsoft to allow programmers to build dynamic web sites, web applications and web services. It was first released in January 2002 with version 1.0 of the .NET Framework, and is the successor to Microsoft's Active Server Pages (ASP) technology. ASP.NET is built on the Common Language Runtime (CLR), allowing programmers to write ASP.NET code using any supported .NET language.
Fig 2.1
7|P a g e
ASP.NET is based on the fundamental architecture of .NET Framework. Visual studio provides a uniform way to combine the various features of this Architecture.
Microsoft SQL Server is a full-featured relational database management system (RDBMS) that offers a variety of administrative tools to ease the burdens of database development, maintenance and administration. In this article, we'll cover six of the more frequently used tools: Enterprise Manager, Query Analyzer, SQL Profiler, Service Manager, Data Transformation Services and Books Online. 2.3.1 COMPONENTS OF SQL SERVER Enterprise Manager: It is the main administrative console for SQL Server installations. It provides you with a graphical "birds-eye" view of all of the SQL Server installations on your network.. Query Analyzer: It offers a quick and dirty method for performing queries against any of your SQL Server databases. It's a great way to quickly pull information out of a database in response to a user request, test queries before implementing them in other applications, create/modify stored procedures and execute administrative tasks. SQL Profiler: It provides a window into the inner workings of your database. You can monitor many different event types and observe database performance in real time. SQL Profiler allows you to capture and replay system "traces" that log various activities..
8|P a g e
Service Manager: It is used to control the MS-SQL Server (the main SQL Server process), MSDTC (Microsoft Distributed Transaction Coordinator) and SQL Server Agent processes. An icon for this service normally resides in the system tray of machines running SQL Server. You can use Service Manager to start, stop or pause any one of these services. Data Transformation Services (DTS): It provides an extremely flexible method for importing and exporting data between a Microsoft SQL Server installation and a large variety of other formats. Books Online: Itis an often overlooked resource provided with SQL Server that contains answers to a variety of administrative, development and installation issues. It's a great resource to consult before turning to the Internet or technical support.
Filename extension Internet media type Type code Type of format Extended from Extended to
HTML, an initialism of Hypertext Markup Language, is the predominant markup language for Web pages. It provides a means to describe the structure of text-based information in a document by denoting certain text as links, headings, paragraphs, lists, and so on - and to supplement that text with interactive forms, embedded images, and other objects. HTML is written in the form of tags, surrounded by angle brackets. HTML can also describe, to some degree, the appearance and semantics of a document, and can include embedded scripting language code (such as JavaScript) which can affect the behaviour of Web browsers and other HTML processors. Files and URLs containing HTML often have a .html or .htm filename extension.
9|P a g e
ADO.NET consists of two primary parts: Data provider: These classes provide access to a data source, such as a Microsoft SQL Server or Oracle database and OLEDB data provider. Each data source has its own set of provider objects, but they each have a common set of utility classes: Connection: Provides a connection used to communicate with the data source. Also acts as an abstract factory for command objects. Command: Used to perform some action on the data source, such as reading, updating, or deleting relational data. Parameter: Describes a single parameter to a command. A common example is a parameter to a stored procedure. Data Adapter: A bridge used to transfer data between a data source and a Dataset object (see below). Data Reader: Used to efficiently process a large list of results one record at a time. It allows records to be accessed in a read-only, forward-only mode, i.e., records have to be accessed in sequential order; they can neither be randomly accessed nor can a record which has been processed previously be accessed again. Datasets Dataset objects, a group of classes describing a simple in-memory relational database, were the star of the show in the initial release (1.0) of the Microsoft .NET Framework. The classes form a containment hierarchy: A DataSet object represents a schema (either an entire database or a subset of one). It can contain tables and relationships between those tables. A DataTable object represents a single table in the database. It has a name, rows, and columns. A DataView object "sits over" a DataTable and sorts the data (much like a SQL "order by" clause) and filters the records (much like a SQL "where" clause) if a filter is set. An in-memory index is used to facilitate these operations. All Data Tables have a default filter, while any number of additional Data Views can be defined, reducing interaction with the underlying database and thus improving performance. A DataColumn represents a column of the table, including its name and type.
10 | P a g e
A DataRow object represents a single row in the table, and allows reading and updating of the values in that row, as well as retrieving any rows that are related to it through a primary-key foreign-key relationship. A DataRowView represents a single row of a DataView. The distinction between a DataRow and Data Row View is important when iterating over a result set. A Data Relation is a relationship between tables, such as a primary-key foreign-key relationship. This is useful for enabling Data Rows functionality of retrieving related rows. A Constraint describes an enforced property of the database, such as the uniqueness of the values in a primary key column. As data is modified any violations that arise will cause exceptions.
It
is the process of developing specifications for a candidate system that meet the criteria
established in the system analysis. The plan of the project provides a review of the different modules in which the project is divided. The modules are designed and tested individually and then merged together to form an integrated project. ENTITIES 1) Fieldname with an asterix * shows the valid fields. 2) Fieldname underlined shows the foreign key usage
INTERFACES Interfaces are a common concept in object-oriented programming. From the Java documentation: In English, an interface is a device or a system that unrelated entities use to interact. According to this definition, a remote control is an interface between you and a television set, the English language is an interface between two people, and the protocol of behavior enforced in the military is the interface between people of different ranks. Within [an object-oriented] ... programming language, an interface ... is a device that unrelated objects use to interact with each other. An interface is probably most analogous to a protocol (an agreed on behavior). ...
11 | P a g e
You use an interface to define a protocol of behavior that can be implemented by any class anywhere in the class hierarchy. Interfaces are useful for the following: Capturing similarities among unrelated classes without artificially forcing a class relationship. Declaring methods that one or more classes are expected to implement. Revealing an object's programming interface without revealing its class. .NET provides an interface type that you can use to formally spell out a list of member signatures. Any class that implements an interface must implement the list of member signatures defined by the interface. This assists quality control by enforcing the class members to use the same names. It also assists flexibility by providing interface polymorphism, which is similar to polymorphism with base classes. Although an interface is similar to a base class, it is also very different. They are similar in that: Both provide structure to another class that uses them Both can be used for polymorphism Interfaces are different than base classes in that: A class can inherit only one base class, but it can implement many interfaces A base class can contain implementation, an interface cannot Interfaces can only contain Methods, Properties, Indexers, and Events. They cannot contain fields or constants (which are used for implementation)
CLASSES: One of the many benefits of object-oriented programming is that it allows for reuse of logic. For example, classes can be created that contain a base level of functionality. These base classes can then be extended through inheritance to create new classes that encompass the functionality of the base class along with any custom logic needed. The end result is that as a developer, once the base class has been created, you can extend and enhance the functionality of the base class with minimal effort. Since the .NET Framework is built upon the principles of object-oriented programming (OOP), it's no surprise that ASP.NET borrows heavily from the tenets of OOP, one such tenet being inheritance. The base functionality for all ASP.NET pages is spelled out by the Page class in the System.Web.UI namespace. This class defines the essential properties, methods, and events for an ASP.NET page, including such members as:
12 | P a g e
The intrinsic objects - Response, Request, Session, and so on, Common properties - IsPostBack, IsValid, and others, While all ASP.NET pages must be derived from the Page class, they need not be directly derived. That is, an ASP.NET page may extend a class that, itself, extends the Page class. In fact, when using the code-behind model for creating ASP.NET pages the actual ASP.NET page is derived from the code-behind class, with the code-behind class being derived from the Page class.
STORED PROCEDURES: Stored procedures are extremely similar to the constructs seen in other programming languages. They accept data in the form of input parameters that are specified at execution time. These input parameters (if implemented) are utilized in the execution of a series of statements that produce some result. This result is returned to the calling environment through the use of a record set, output parameters and a return code. That may sound like a mouthful, but youll find that stored procedures are actually quite simple.
STATE MANAGEMENT: Web form pages are HTTP-Based, they are stateless, which means they dont know whether the requests are all from the same client, and pages are destroyed and recreated with each round trip to the server, therefore information will be lost, therefore state management is really an issue in developing web applications. Mainly there are two different ways to manage web pages state: Client-side state management: There is no information maintained on the server between round trips. Information will be storedin the page or on the clients computer.
COOKIES: A cookie is a small amount of data stored either in a text file on the client's file system or inmemory in the client browser session. Cookies are mainly used for tracking data settings. Lets take an example: say we want to customize a welcome web page, when the user request the default web page, the application first detect if the user has login before, we can retrieve user information from the cookies.
13 | P a g e
HIDDEN FIELD
A hidden field does not render visibly in the browser, but you can set its properties just as you can with a standard control. When a page is submitted to the server, the content of a hidden field is sent in the HTTP Form collection along with the values of other controls. A hidden field acts as a repository for any page-specific information that you would like to store directly in the page. Hidden field stores a single variable in its value property and must be explicitly added it to the page. ASP.NET provides the Html Input Hidden control that offers hidden field functionality.
QUERY STRING Query strings provide a simple but limited way of maintaining some state information. You can easily pass information from one page to another, But most browsers and client devices impose a 255-character limit on the length of the URL. In addition, the query values are exposed to the Internet via the URL so in some cases security may be an issue. A URL with Query strings may look like this: http://www.examples.com/list.aspx?categoryid=1&productid=101
SESSION OBJECT Session object can be used for storing session-specific information that needs to be maintained between server round trips and between requests for pages. Session object is per-client basis, which means different clients generate different session object. The ideal data to store in sessionstate variables is short-lived, sensitive data that is specific to an individual.
Each active ASP.NET session is identified and tracked using a 120-bit Session ID string containing URL-legal ASCII characters. Session ID values are generated using an algorithm that guarantees uniqueness so that sessions do not collide, and Session IDs randomness makes it harder to guess the session ID of an existing session.
Session IDs are communicated across client-server requests either by an HTTP cookie or a modified URL, depending on how you set the application's configuration settings.
14 | P a g e
DATABASE Database enables you to store large amount of information pertaining to state in your Web application. Sometimes users continually query the database by using the unique ID, you can save it in the database for use across multiple request for the pages in your site.
JAVASCRIPT ASP.NET is a server-based platform, which means the code you write executes on the web server instead of in the client's browser. This approach ensures that your code is kept secure from prying eyes, and it sidesteps most browser-compatibility issues. However, it also introduces some unavoidable limitations. For example, the ASP.NET web page model doesn't provide any way to react to events, such as a user's mouse movements. In this case, the overhead of sending the page back to the server after every mouse movement would make the web page unworkably slow. Similarly, because your code can't interact directly with the browser, it can't display pop-up windows or manage multiple frames in a frameset in the same way a snippet of client-side JavaScript could. To compensate for these limitations, ASP.NET developers often need to mix a little JavaScript code into their ASP.NET web pages. This is most commonly the case with custom controls. For example, many menu controls allow the user to browse through multiple menu levels without forcing the page to be posted back to the server every time a new level is shown.
2.8 CONTROLS As you saw in the Hello World example, controls are the building blocks of the web pages graphical user interface (GUI). Some controls that you are probably familiar with include buttons, checkboxes, and listboxes.Controls allows a user to indicate a preference, enter data, or make selections. They can also provide support for validation, data manipulation, and security, or help to ensure a uniform look and feel to the application. There are several types of web controls:
HTML controls The original controls available to any HTML page, such as input (for entering data), a (anchor), div (for separating and applying format to a section), and more. These all work in ASP.NET exactly as they work in other web pages.
15 | P a g e
ASP.NET server controls Microsoft created the ASP.NET server controls to accomplish two complementary aims. The first was to normalize the HTML controls so that the programme would have a more consistent interaction with the control; the second was to add an extensive and rich set of powerful controls such as data grids, calendars, ad rotators, and more.
ASP.NET AJAX server controls ASP.NET AJAX server controls enjoy all the benefits of ASP.NET server controls, such as dragand-drop operation and a declarative programming model. However, they also include added client-side functionality, helping you to create a smooth and snappy user interface.
ASP.NET The heart of ASP.NET programming is the ASP.NET server control. With the exception of tables, the traditional HTML controls are replaced by their equivalent ASP.NET controls, both for convenience and flexibility. For example, instead of using a traditional HTML input control, you will use instead an ASP.NET TextBoxcontrol. In addition to standard form elements, such as text boxes, labels, buttons, and checkboxes, ASP.NET controls include several broad categories that provide rich functionality with very little code. These include: Validation controls Often, a given field requires a specific format or range of data to be valid. Many of these validation routines are similar and used in many placesMicrosoft provides a full range of built-in validation controls. Chapter 5 discusses these controls in detail. Data source controls Data binding to a variety of data sources, including Microsoft SQL Server and Access, and other relational databases, XML files, and classes implemented in code.
Data view controls Various types of lists and tables that can bind to a data source for display and editing. Login & security controls Allow users to personalize their view of a site, including rearrangement of the Page it. User information can be saved automatically and transparently.
16 | P a g e
3.2 REQUIREMENTS OF THE CLIENT: Man-less interface should be designed which can perform with directions all the time i.e. 24*7. The interface should be available to all with certain level of access restrictions like user cannot have access to the administrators data. Every single individual gets the knowledge according to the specified course and test only. Big organization can manage their users at their end. 3.3 KEY FEATURES OF SOLUTION: The solution designed for the client will be a web based portal accessible anywhere anytime and by anybody. The knowledge base should be unlimited. Restricted and facilitated access to all or selected i.e. some data is only accessible to administrator. Division of admin work at different organizations
17 | P a g e
3.4 DESIGN OF THE SOLUTION: While designing the solution according to the requirements of the client we make the following five modules of our project: ADMIN CONSOLE WEB INTERFACE ORGANIZATION LOGIN END USER LOGIN MIS(Management Information System) 3.4.1 ADMIN CONSOLE: This module provides the information used by the company. Admin console includes all the other modules like: a) Web content- It contains information about company policy, terms & conditions, mission/vision, contact of the company and feedback. b) Regional content- It contains information about countries, states, cities and educational organizations. c) Course content- It contains Q/A, videos, images, assignment sheets, tests of the respective courses and subjects. d) Packages The packages can be single organization package and test package(user packages). 3.4.2 WEB INTERFACE: This is the presentation or advertisement layer of the project and is accessible to all. It contains the following content: a) Homepage This page contains the list of offered courses , number of registered users , new courses added , new packages added link to demo/test/content. b) Information layer It contains about us page, company contact, mission/vision of the company. c) Content layer- It contains the index of countries, index of courses and tests, take a demo. d) Registration layer- It contains index of plans, payment methods, registration form. 3.4.3 ORGANIZATION LOGIN: This is the login of the organization on the company website. It contains: a) The number of unregistered users. b) The number of registered users and their validity period. c) Users registration. d) Links to all users content e) Group reporting i.e. student browsing history, test results, certificate generation and email results to users.
18 | P a g e
3.4.4 END USER LOGIN: This is the end user login i.e. the content available on the end-users page: a) Login valid up to (time period). b) c) d) e) f) g) h) i) Number of test credits available. Number of tests already appeared. New content added (links). Profile picture. Download option (related to user course and test). View contents (related to user added subjects). Appear for test (related subjects). View results history.
3.4.5 MIS: A management information system (MIS) is a system that provides information needed to manage organizations effectively.Management information systems are distinct from regular information systems in that they are used to analyze other information systems applied in operational activities in the organization. MIS consists of: a) Pi chart (max or min usage in countries etc, max or min usage of which course, test etc.) b) Bar chart (max or min usage in countries etc, max or min usage of course, test etc.)
3.5 TYPE OF TEST:3.5.1 Sample Test:This Test contains some questions which the students have to complete within 10 minutes and this test is also known as demo test. 3.5.2 Premium Test:In this the organization prepares the Test for the user in which he /she has to attempt within time duration fixed.
19 | P a g e
The time of starting and completion of Test can be recorded at the server and the student cannot manipulate the same Even for subjects that the actual Test that will not be conducted online students can be given extensive practice and training by holding online Mock Tests. Almost all competitive exams are multiple choice types and these can be easily conducted online, for example GCET - Goa Common Entrance Test held to shortlist candidates for medical and engineering courses.
20 | P a g e
21 | P a g e
Admin Panel Regions 1. 2. 3. 4. Country Setup State Setup City Setup Educational Organization Setup Course Setup Subject Setup Q/A Setup Tutorials Videos/Links
Web Portal
Organization Login
Pending User Pending/Unu Information sed Credits Register Users 1. 2. Assign User Assign Package Course Content Tests
About Access Packages and Courses 1. For Organization Packages 2. For User Packages 3. For Test Packages 4. For Downloads
Contents 1. 2. 3. 4. 5.
Professional Information 1. Linked Educational Organization List 2. Courses Offered List 3. Package Selection Help 4. Package Selection List 5. Registration Form Demo 1. Demo Content 2. Demo Test 3. Demo Videos/Links 4. Demo Tutorials
Packages 1. Organization Package 2. User Package 3. Test Package Web Content 1. 2. 3. 4. 5. 6. History Mission Expertise FAQs About Us Contact Us
1. Test View Records Selection of Registered List Users 2. Take Test About Content 1. Test 3. Test Result Check and and Tests Basis Marks 1. Acc. to 2. Content Obtained marks Record obtained in Videos/Tutor Basis tests by users ials Re-buy Download Package Previous Test History Renew Package
22 | P a g e
4.1.1 The proposal summarizes what is going to be done. It consists of the following:
a) STATEMENT OF THE PROBLEM: - The Result calculation which is being done manually at present. b) SUMMARY OF FINDINGS AND RECOMMENDATIONS: - The major objective while studying the problem undertaken, including finding about the working methodologies of the college.
4.1.2 Recommendations in my subject are A) The project would be very simple and user friendly package and would be easy to handle by an operator who does not have enough knowledge about the internal routines and procedures used. Also the depot would be able to use it for looking up for the details of the students including the information required by the any person and save its time. B) A backup would be maintained to be used incase of any failures of original data so there is no problem for the customer as well as the depot authorities. In the conduct of the feasibility study, the analyst will usually consider seven distinct, but interrelated types of feasibility. They are: 1. 2. 3. 4. 5.
23 | P a g e
Technical feasibility Operational feasibility Economic feasibility Social feasibility Management feasibility
6. 7.
4.1.2.1 Technical Feasibility This is concerned with specifying equipment and software that will successfully satisfy the user requirement. The technical needs of the system may vary considerably, but might include: The facility to produce outputs in a given time. Response time under certain conditions. Ability to process a certain volume of transaction at a particular speed. Facility to communicate data to distant location.
In examining technical feasibility, configuration of the system is given more importance than the actual make of hardware. The configuration should give the complete picture about the system's requirements: How many workstations are required, how these units are interconnected so that they could operate and communicate smoothly. What speeds of input and out- put should be achieved at particular quality of printing. This can be used as a basis for the tender document against which dealers and manufacturers can later make their equipment bids. Specific hardware and software products can then be evaluated keeping in view with the logical needs. At the feasibility stage, it is desirable that two or three different configurations will be pursued that satisfy the key technical requirements but which represent different levels of ambition and cost. Investigation of these technical alternatives can be aided by approaching a range ofsuppliers for preliminary discussions. Out of all types of feasibility, technical feasibility generally is the most difficult to determine. As in this system, we have to develop a client-server application on the web, so java is the best option for such an application. Here we can add no. of clients to the server without much affecting the speed of the system. 4.1.2.2 Operational Feasibility It is mainly related to human organizational and political aspects. The points to be considered are: What changes will be brought with the system? What organizational structures are disturbed? What new skills will be required? If not, can they be trained in due course of time?
Generally project will not be rejected simply because of operational infeasibility but such considerations are likely to critically affect the nature and scope of the eventual recommendations. This feasibility study is carried out by a small group of people who are familiar with in- formation system techniques, who understand the parts of the business that are relevant to the project and are skilled in system analysis and design process.
24 | P a g e
The Employee Management Matrix system is very easy to operate. It is very user friendly and no one will face any problem from switching manual system to this web based application. 4.1.2.3 Economic Feasibility Economic analysis is the most frequently used technique for evaluating the effectiveness of a proposed system. More commonly known as cost / benefit analysis; the procedure is to determine the benefits and savings that are expected from a proposed system and compare them with costs. If benefits outweigh costs, a decision is taken to design and implement the system. Otherwise, further justification or alternative in the proposed system will have to be made if it is to have achance of being approved. This is an ongoing effort that improves in accuracy at each phase of the system life cycle. 4.1.2.4 Social Feasibility Social feasibility is a determination of whether a proposed project will be acceptable to the people or not. This determination typically examines the probability of the project being accepted by the group directly affected by the proposed system change. As Employee Management Matrix system is very user friendly, so people will accept it without any problem. 4.1.2.5 Management Feasibility It is a determination of whether a proposed project will be acceptable to management. If management does not accept a project or gives a negligible support to it, the analyst will tend to view the project as a non-feasible one. The Employee Management Matrix System is very useful for the managerial level. They can come to know about the status of employees working on project by just clicking a link. Also they can check that they have what number of employees of a particular skill set. 4.1.2.6 Legal Feasibility Legal feasibility is a determination of whether a proposed project infringes on known Acts, Statutes, as well as any pending legislation. Although in some instances the project might appear sound, on closer investigation it may be found to infringe on several legal areas. 4.1.2.7 Time Feasibility Time feasibility is a determination of whether a proposed project can be implemented fully within a stipulated time frame. If a project takes too much time it is likely to be rejected.
25 | P a g e
26 | P a g e
4.2.1.2 Nonfunctional requirements In systems engineering and requirements engineering, non-functional requirements are requirements, which specify criteria that can be used to judge the operation of a system, rather than specific behaviors. This should be contrasted with functional requirements that specify specific behavior or functions. Non-functional requirements are often called qualities of a system. Other terms for non-functional requirements are constraints, quality attributes, quality goals and quality of service requirements. Non-functional requirements can be divided into two main categories. Execution qualities, such as security and usability, are observable at run time. Evolution qualities, such as extensibility and scalability, embody in the static structure of the software system.
4.3.2 Requirement Analysis The very purpose of the analysis is to identify the requirements in a complete, accurate, consistent, and unambiguous manner. Activities 1. 2. 3. Detect and resolve conflicts between requirements Discover the bounds of the software and how it must interact with its environment Elaborate system requirements to software requirements.
4.3.3 Requirement Specification Requirements specification typically refers to the production of a document, or its electronic equivalent, that can be systematically reviewed, evaluated, and approved. For complex systems,
27 | P a g e
particularly those involving substantial non-software components, as many as three different types of documents are produced: 1. 2. 3. Activities 1. Preparation of SRS from the requirements collected System definition, System requirements specification, and Software requirements specification.
4.3.4 Requirement Validation Requirements validation is concerned with the process of examining the requirements documents to ensure that they are defining the right system (that is, the system that the user expects). It is subdivided into descriptions of the conduct of requirements reviews, prototyping, and model validation and acceptance tests. Activities 1. 2. 3. Conduct Review Meetings Closing Issues identified in the review meeting Approval & Kick off
4.3.5 Changes Request Management On receive of any change list from the client or stakeholders that has to be discussed and reviewed with the team. Activities 1. 2. Analysis major and minor changes Made corrections in the SRS on approval of CCB.
data will be input to and output from the system, nor where the data will come from and go to, nor where the data will be stored (all of which are shown on a DFD). In the course of developing a set of levelled data-flow diagrams the analyst/designers is forced to address how the system may be decomposed into component sub-systems, and to identify the transaction data in the data model. There are different notations to draw data-flow diagrams, defining different visual representations for processes, data stores, data flow, and external entities.[ Data flow diagram ("bubble charts") are directed graphs in which the nodes specify processing activities and the arcs specify data items transmitted between processing nodes. Developing a data-flow diagram:
Figure 4.4.1
Figure 4.4.2. DFD is also a virtually designable diagram that technically or diagrammatically describes the inflow and outflow of data or information that is provided by the external entity.
29 | P a g e
Figure 4.4.3
30 | P a g e
Level -1 (DFD)
Figure 4.4.4
31 | P a g e
Level-2
Test Organization
Q/A
Tutorials
Syllabus
Company Policy
Subjects States
Course About us Contact 1.1 Web Content 1.2 Regional Content 1.3 Course Content Countries
Test
Validations
Renewals
Figure 4.4.5
32 | P a g e
Link to content New course s Previous courses List of courses Number of registered user
Feedback
Index of Plan
How to join
About us Mission
Registration layer
Information layer
Registration form
Payment Method
Index of countries
Index of subjects
Index of Syllabus
Figure 4.4.6
33 | P a g e
34 | P a g e
35 | P a g e
36 | P a g e
37 | P a g e
38 | P a g e
39 | P a g e
40 | P a g e
5.1.8 COURSE
41 | P a g e
5.1.9 SUBJECTS
42 | P a g e
43 | P a g e
44 | P a g e
5.1.12 PACKAGES
45 | P a g e
46 | P a g e
47 | P a g e
48 | P a g e
5.1.16 FEATURES
49 | P a g e
50 | P a g e
51 | P a g e
52 | P a g e
5.2.4 ABOUT US
53 | P a g e
54 | P a g e
5.2.9 TEST
55 | P a g e
5.2.10 COURSES
56 | P a g e
57 | P a g e
58 | P a g e
5.2.13 CONTACT US
59 | P a g e
60 | P a g e
6.2.6 HTTP endpoints You can easily create HTTP endpoints via a simple T-SQL statement exposing an object that can be accessed over the Internet. This allows a simple object to be called across the Internet for the needed data. 6.2.7 Multiple Active Result Sets(MARS) MARS allow a persistent database connection from a single client to have more than one active request per connection. This should be a major performance improvement, allowing developers to give users new capabilities when working with SQL Server. For example, it allows multiple searches, or a search and data entry. The bottom line is that one client connection can have multiple active processes simultaneously. 6.2.8 Dedicated administrator connection If all else fails, stop the SQL Server service or push the power button. That mentality is finished with the dedicated administrator connection. This functionality will allow a DBA to make a single diagnostic connection to SQL Server even if the server is having an issue 6.2.9 SQLServer Integration Services(SSIS) SSIS has replaced DTS (Data Transformation Services) as the primary ETL (Extraction, Transformation and Loading) tool and ships with SQL Server free of charge. This tool, completely rewritten since SQL Server 2000, now has a great deal of flexibility to address complex data movement. 6.2.10 Database mirroring It's not expected to be released with SQL Server 2005 at the RTM in November, but I think this feature has great potential. Database mirroring is an extension of the native highavailability capabilities.
61 | P a g e
62 | P a g e
7.2 COUNTRY
63 | P a g e
7.3 STATE
64 | P a g e
65 | P a g e
66 | P a g e
7.6 COURSE
67 | P a g e
7.7 SUBJECT
68 | P a g e
69 | P a g e
70 | P a g e
7.10 PACKAGES
71 | P a g e
7.11 ABOUT US
72 | P a g e
7.1 2 CONTACT US
73 | P a g e
CHAPTER-8 TESTING
PRODUCT: A product is universally applicable. APPLICATION: An application is user(s) or group(s) of user(s) specific. TESTING: To check / to verify the functionality and specifications. QUALITY: To Validate / to ensure / to certify that the product/application is free from bugs. 8.1 Black Box Testing (Opaque / Closed Box / Functional Behavioral) Testing without looking at the code of the application. Testing on the basis of functional specifications. Testing from end user point i.e. the real user. Testing when the application is in running mode.
8.2 White Box Testing (Glass / Structural / Open box) Code based testing of the Product / Application. Typically done by developers having the testing experience.
8.3 SOFTWARE TESTING LIFE CYCLE (STLC) Test effort estimation. : To study current process followed by client in development / testing. System Study / FRS (Functional and Requirement Specifications). Re estimation. : Re estimate the efforts which may differ from preliminary estimate. Test plan: Specifies testing methodologies / strategies / pass fail criteria / scope / stop resumption criteria / resources / scheduling / Risk Analysis. Design and document: To identify unit functions. Test Cases: Design test cases to cover functionality / Usability / Performance / Scalability / Security etc. Conduct tests and report defects / bugs: Tests are executed and identified defects are classified and reported using defect-tracking tool. To verify fix/failure of bugs: Reported bugs are verified as successfully fixed or not. Regression testing: Testing earlier logged and fixed bugs to verify if any of them is reopening or not and if the fixing of reported bugs has effected any other area/part/portion of the product / application. Or not.
74 | P a g e
Stress / Load testing: To test the functionality of the application/software under heavy stress/ load. Stability Analysis: Once the testing is complete, products stability and quality information is provided. Test summary reports: The report summarizes the testing efforts and outputs.
75 | P a g e
Second Way, regression testing is the counterpart of integration testing: when new code is added to existing code, regression testing verifies that the existing code continues to work correctly, whereas integration testing verifies that the new code works as expected. Regression testing can describes the process of testing new code to verify that this new code hasn't broken any old code. Usability Testing: This testing is also called as Testing for User-Friendliness. This testing is done if User Interface of the application stands an important consideration and needs to be specific for the specific type of user. Security Testing : Determine how well your system protects against unauthorized internal or external access or willful damage Stress Testing: The application is tested against heavy load such as complex numerical values, large number of inputs, large number of queries etc. which checks for the stress/load the applications can withstand. Load Testing: The application is tested against heavy loads or inputs such as testing of web sites in order to find out at what point the web-site/application fails or at what point its performance degrades. Recovery Testing: Recovery testing is basically done in order to check how fast and better the application can recover against any type of crash or hardware failure etc. Type or extent of recovery is specified in the requirement specifications.
76 | P a g e
CHAPTER-9 IMPLEMENTATION
9.1 INTRODUCTION:
Implementation is the stage in the project where the theoretical design is turned into the working system and is giving confidence to the new system for the users i.e. will work efficiently and effectively. It involves careful planning, investigation of the current system and its constraints on implementation, design of method to achieve the change over, an evaluation, of change over methods. A part from planning major task of preparing the implementation is education of users. The more complex system is implemented, the more involved will be the system analysis and design effort required just for implementation. An implementation coordinating committee based on policies of individual organization has been appointed. The implementation process begins with preparing a plan for the implementation for the system. According to this plan, the activities are to be carried out, discussions may regarding the equipment has to be acquired to implement the new system. Implementation is the final and important phase. The most critical stage is in achieving a successful new system and in giving the users confidence that the new system will work and be effective. The system can be implemented only after thorough testing is done and if it found to working according to the specification. This method also offers the greatest security since the old system can take over if the errors are found or inability to handle certain types of transaction while using the new system. At the beginning of the development phase a preliminary implementation plan is created to schedule and manage the many different activities that must be integrated into plan. The implementation plan is updated throughout the development phase, culminating in a change over plan for the operation phase. The major elements of implementation plan are test plan, training plan, equipment installation plan, and a conversion plan. There Are Three Types Of Implementation: 1. Implementation of a computer system to replace a manual system. 2. Implementation of a new computer system to replace an existing system. 3. Implementation of a modified application to replace an existing one, using the same computer. Successful implementation may not guarantee improvement in the organization using the new system, but improper installation will prevent it. It has been observed that even the best system cannot show good result if the analysts managing the implementation do not attend to every important detail. This is an area where the systems analysts need to work with utmost care.
77 | P a g e
TOOLS:
Post-implementation review Training Of Personnel Involved With System Even well designed system can succeed or fail because of the way they are operated and used. Therefore, the quality of training received by the personal involved with the system in various capacities helps or hinders and may even prevent the successful implementation of management information system. Those who are directly or indirectly related with the system development work must know in detail what must know in detail what their roles will be, how they can make efficient use of the system and what the system will or will not do for them. Both system operators and users need training. System Operators Training Running of the system successfully depend on the personnel working in the Computer Centre. They are Responsible for providing the necessary support. Their training must ensure that they are able to handle all possible operations, both routine and extra-ordinary in nature. If the system calls for the installation of new equipment, such as new computer system, special terminals or different data entry machines, the operators training should include such fundamentals as how to turn the equipment on and use it, how to power off and a knowledge of what constitutes normal operations. The operators should also be trained on different type of malfunctioning, how to recognize them and what steps should also be taken whenever they arise. User Training User may be trained on use equipment, particularly in the case where, e.g. a micro computer is in use and individual involved is both operator and user. In such cases, user must be given training on how to operate and user. In such cases, user must be given training on how to operator the system also. Questions that may be trivial to the analyst, such as how to turn on a terminal, how to insert a diskette into a micro-computer or when it is safe to turn off equipment with out danger of data loss are significant problems to new users who are not familiar. Inmost of the cases user training deals with the operation of the system itself, with proper attention given to data handling techniques. It is imperative that users be properly trained in methods of entering transaction, editing data, formulating inquiries, deleting and inserting of records. No training is complete without familiarizing users with simple systems
78 | P a g e
maintenance activities. Weakness in any aspect of training may lead of awkward situation that creates user frustration and error. Conversion Methods A conversion is the process of changing from the old system to the new one. It must be properly planned and executed. Four methods are common in use. They are Parallel Systems, Direct Conversion, Pilot System and Phase In method. Each method should be considered in the light of the opportunities that it offers and problems that it may create. In general, system conversion should be accomplished in shortest possible time. Long conversion periods create problems for all persons involved including both analysts and users. Parallel Systems: The most secure method of converting from an old to new system is to run both systems in parallel. This method is safest one because it ensures that in case of any problem in using new system, the organization can still fall back to the old system without the loss of time and money. The Disadvantages Of Parallel Systems Approach Are: It doubles operating costs. The new system may not get fair trial.
Direct Conversion: This method converts from the old system to new system abruptly, sometimes over a weekend or even overnight. The old system is used until a planned conversion day, when it is replaced by the new system. Pilot System: Pilot approach is often preferred in the case of the new system which involves new techniques or some drastic changes in organization performance. In this method, a working version of the system is implemented in one part of the organization, such as a single work area or department. Phase IN- method: This method is used when it is not possible to install a new system throughout an organization all at once.
79 | P a g e
9.3 POST IMPLEMENTATION REVIEW After the system is implemented and conversion is complete, a review should be conducted to determine whether the system is meeting expectations and where improvements are needed. A post implementation review measures the systems performance against predefined requirement. It determines how well the system continues to meet the performance specifications.
80 | P a g e
REFERENCES
I. II. III. Application Development Using C# and .NET, Prentice Hall Beginning ASP.NET 4 by Wrox Publication. Microsoft Sql server database design and implementation, prentice-hall of India publication IV. V. VI. RogerS Pressman, Software Engineering - A Practitioner's Approach. Fifth edition.The McGraw-Hill companies, Inc. PankajJalote, an Integrated Approach to Software Engineering Second Edition. VII. VIII. System Analysis and Design, Elias M. Awad Beginning ASP.NET 4.Wrox Publication
81 | P a g e