Documente Academic
Documente Profesional
Documente Cultură
Chapter 1
Software Requirement Specification
8th CE
Page 1
E-DIARY
1.1 Introduction
This project is developed based on the Java and the phpMyAdmin database engine. Java is part
of the Open Source framework, which is an integrated and managed environment for the
development and execution of native code. Java is a platform for creating web applications that
run on any servers using the Xampp & Apache servers and web browsers.
1.1.1 Purpose: The purpose of the project is to secure the users all documents like marksheets,legel papers
etc.
User can see the all documents of them.
User can download the documents to other.
Just register yourself in our website and add all your document in safe side.
User can also see the news blog about some facts of india.
If user have any query than mail on our email address.
The scope of my system is to provide efficient and easy way to get details.
This system is developed to provide convenience to user for download the documents online.
This system is also developed for to provide the details about news blog.
User can see government recruitment details
User can get details of event which is organized by government.
1.1.3 Project Planning:Our development of this project is divided into two parts one is analysis and one is the
implementation, as our curriculum is divided into two parts means in two semesters. So in first
phase of the application we have analyzed all the aspects of the system and requirements and
efforts for the system.
8th CE
Page 2
E-DIARY
We are developing this project with the Spiral Development approach because it provides us flexibility to
move from any stage to any other stage, and this system is totally changeable at any instance of time, thus
to avoid the wastage of time and efforts it is most convenient to use spiral development approach for our
system.
Spiral Model:SDLC spiral Model includes the iterative nature of the prototyping model and the linear nature of the
waterfall model.
We can change requirements and stages in the even time of the development, means if we found
something wrong in any of the development stages then we can easily go backward and correct the logical
implementation as well as the codeIn each iteration of the spiral approach, software development process
follows the phase-wise linear approach. At the end of first iteration, the customer evaluates the software
and provides the feedback. Based on the feedback, software development process enters into the next
iteration and subsequently follows the linear approach to implement the feedback suggested by the
customer.
This approach is ideal for developing software that is revealed in various versions. Spiral model diagram
image is shown in the figure below:
Fig.1.1-Spiral Model
8th CE
Page 3
E-DIARY
The process of iteration continues throughout the life of the software.An example of the spiral
model is the evolution of Microsoft Windows Operating system from Windows 3.1 to windows
2003. We may refer to Microsoft windows 3.1 Operating System as the first iteration in the spiral
approach.
The product was released and evaluated by the customers, which include the market large. After
getting the feedback from customers about the windows 3.1, Microsoft planned to develop a new
version of windows operating system. Windows95 was released with the enhancement and
graphical flexibility. Similarly, other versions of windows operating system were released.
1.2.1 Project Introduction:E-diary is your online personal documents diary. It is a system in which you can upload your
documents and other important legal papers. With e-diary you can securely upload, view, update
and share. With this website, you can see all the details of your documents whenever you want.
By unique id you can access your account. First you have to login with your id, upload your
documents, share the documents with other social networking sites. The project consists of two
modules:- 1. Administrator User 2. Registered User
8th CE
Page 4
E-DIARY
Admin User :This type of user will be responsible to manage whole site & also content that will be published in site.
This type of users will be given special training for doing this if required. Admin user can post
the details of any government event, news blog and government recruitment details. Admin can
response to the complaint and feedback.
Registered User :This type of user will be able to visit our site and navigate to different pages to get information
they will not be able to change any content on website .They will be able to give feedback for
improvement of website. They can also post complaint to the system. Registered user can upload,
view, share and update their documents.
:
:
E-Diary
This project Web application provides functionalities for
both user and admin members. The user can browse the web
site with security and they can upload and see their
documents,legel papers etc. For the admin members, a
security issue is added. They need to create an account in the
system and every time he logs in. He can then delete any of
these, and he can add new ones.
Varsha G.Tank
Team Size
Hardware Configuration
512 MB RAM
Disk space: 2 GB
Processor Intel Pentium or higher
Front-End tool
JAVA,JSP,SERVLET
Back-End tool
XAMPP SERVER
8th CE
Page 5
E-DIARY
Software System Attribute:There are a number of attributes of software that can serve as requirements. It is important that
required attributes by specified so that their achievement can be objectively verified. The
following items provide a list of software system attributes.
Reliability:Specify the factors required to establish the required reliability of the software system at time of
delivery.
Availability:The tool we use shall be available, up and running for 24*7 throughout the year except due to
the routine maintenance activities.
Security:Site Administrator and Users with valid credentials will be able to log in to the Web tool. Site
Administrator will have access to the database structures at back-end. Site Administrator will
have the rights for modifications as well as any Updation work for the datasets and website.
Access to the various subsystems will be protected by a user log in screen that requires a user
name and password.
Maintainability:-
8th CE
Page 6
E-DIARY
The Web used tool is being developed using Open-Source technology. Therefore, minimal efforts
shall be required during the O&M activities through-out its life cycle and shall be easy to
maintain.
Portability:The Web tool shall run in any computer environment (such as, Microsoft Windows) which is
having Web Browser and Internet connection, as mentioned in section 2.1.1 i.e., System
Interfaces.
1.4.3 Implementation Requirements:It requires good skill for implementation of project. As this project is using 3-tier business
architecture. All the classes, functions, procedures and objects are created in the system wise
architecture. The three tiers are given below.
GUI
Business Logic Layer
Data Access Layer
8th CE
Page 7
E-DIARY
Entire coding will be done using Eclipse and My SQL Workbench . Soft copy for the
documentation is provided in Microsoft Word Format. Entire coding would not be shown to the
client for any reasons. Implementation does not require any more software support without as
mentioned below in the system requirements.
1.4.4 Standards Requirements:Industry standards will be followed by us in any negotiation or deal related to the product
software. Coding, Documentation and final product delivery will be followed by the
standards.
1.5.2 Legislative Requirements: Privacy Requirements: Privacy of any particular things and strategy will be served based on
Page 8
E-DIARY
1.7.1.1 Technical Feasibility:My website is developing in Java language. And we are using eclipse software for it. So, technically
development of website is feasible.
1.7.1.2 Operational Feasibility:-The project will be user friendly. And it will be meet all
the
1.7.2 Features of the new system:1.7.2.1 SAFETY AND SECURITY CONSIDERATION: This project is a component of a larger project
This project will deliver only the web services part of the larger project
We expected to complete the project within one year. This project will use resources in the
form of time and effort that will be spent developing the project.
The data available from the socket server is authentic and reliable
8th CE
Page 9
E-DIARY
Minimum Requirement
Windows XP,Vista etc.
Java,Jsp,Servlet,Html,Css,JavaScript
XAMPP Server,Apache Tomcat 7.0
Operating System
Front-End
Back-End
Server,Web Browser
Table 1.2-Software Requirements
8th CE
Page 10
E-DIARY
Software project planning involves estimation of Money, - Effort, - Resources and Time it will
take to build a specific software base system.
PROJECT DEVELOPMENT APPROACH AND JUSTIFICATION:For the project development, we have chosen the spiral model. The Spiral Model is an
evolutionary software process model that couples the iterative nature of prototyping with the
controlled and systematic aspects of the Linear Sequential Model. It provides the potential for
rapid development of incremental versions of the software. Using the spiral model, software is
developed in a series of incremental releases. A spiral model is divided into a number of
framework activities, also called task regions. Typically, there are between three and six task
regions. Figure shows a Spiral model that contains six task regions:
User communication:-tasks required to establish effective communication between
developer and user
Planning:- tasks required to define resources, timelines,
Risk analysis:-tasks required to assess both technical and management risks.
Engineering:-tasks required to build one or more representations of the application.
Construction and release:-tasks required to construct, test, install, and provide user support
(e.g., documentation and training).
released in 1996. To
Java
Java is loosely based on C++ syntax, and is meant to be Object-Oriented Structure of java is
midway between an interpreted and a compiled language. The java compiler into Byte Codes,
which are secure and portable across different platforms, compiles Java programs. These byte
codes are essentially instructions encapsulated in single type, to what is known as a java virtual
8th CE
Page 11
E-DIARY
machine (JVM), which resides in standard browser.JVM verifies these byte codes when
downloaded by the browser for integrity. Jvms are available for almost all OS. JVM converts
these byte codes into machine specific instructions at runtime.
Features of Java
Java is portable architecture neutral that is java programs once compiled can be executed on
any machine that is enabled.
Overview of JSP
The JSP technology will be used to interface HTML with Java. The JSP technology provides a
seamless connection with Java and presents an easy to use, Java-like programming constructs
that can be scripted within HTML files. Java Server Pages is a technology for developing web
pages that include dynamic content. A JSP page contains standard markup language elements,
such as HTML tags, just like a regular web page. A JSP page also contains special JSP elements
that allow the server to insert dynamic content in the web page.
Advantages of JSP
JSP pages can be used in combination with servlets that handle the business logic.
High Security.
8th CE
Page 12
E-DIARY
Features
Java script is embedded into HTML documents and is executed with in them.Java script is
browser dependent.
JavaScript is an interpreted language that can be interpreted by the browser at run time. Java
script is loosely typed language
Java script is an Event-Driven language and supports event handlers to specify the
functionality of a button.
The Struts framework provides the flexibility to develop the much less coupled applications.
It generalizes and strictly implements MVC-model View Controller Architecture. That is the
basic need of our architecture.
Page 13
E-DIARY
for configuration and management, but canalso be configured by editing XML configuration
files.
Overview of MySQL
MySQL is a multithreaded, multi-user SQL database management system (DBMS) which has,
according to Mysql AB, more than 10 million installations .Mysql is owned and
single for-profit firm, the Swedish company Mysql AB, which holds the
sponsored by a
copyright to most of
the codebase.
Libraries for accessing Mysql databases are available in all major programming languages with
language-specific APIs.In addition, an ODBC interface called MyODBC allows additional
programming languages that support the ODBC interface to communicate with a Mysql
database, such as ASP or Coldfusion. The Mysql server and official libraries are mostly
implemented in ANSI C.
8th CE
Page 14
E-DIARY
Chapter 2
Data Dictionary
8th CE
Page 15
E-DIARY
2.1 Introduction
A Data Dictionary is Catalog-Responsibility of the Element in a System. As the Name
Suggests, these Element are Structured around Data in a Way to Meet the Use and the
Organization Requirements.
A Data Dictionary is a List of Elements that composes all the Data Flow Process through the
System. It Stores Detail and Description of Data Flow, Data Store and Processes. If Analysts
Wants to Know by What Other Means is a Table or a Data Item Referenced in the System or
where it is Being Used the Answers are Properly Developing the Data Dictionary. The
Dictionary Id Developed during Data Flow Analysis Assists the Analysts involved in
Requirements. However its Content is used during System Design as Well.
A data dictionary, or metadata repository, as defined in the IBM Dictionary of Computing, is
a "centralized repository of information about data such as meaning, relationships to other
data, origin, usage, and format." The term can have one of several closely related meanings
pertaining to databases and database management systems (DBMS).
Technically, it is a database about a database. There is no one set standard in terms of layout
or the level of detail to which a data dictionary should be written. A data dictionary defines
the structure of the database itself (not that of the data held in the database) and is used in
control and maintenance of large databases. Among other items of information, it records (1)
what data is stored, (2) name, description, and characteristics of each data element, (3) types
of relationships between data elements, (4) access rights and frequency of access. Also called
system dictionary when used in the context of a system design.
8th CE
Page 16
E-DIARY
such as validation. The main purpose of the data dictionary is to provide metadata, or
information about data.
The Volume of Data in Most Information System is Substantial More than a Single Analyst
Can Easily Keep Track of the same. When the Teams of Analyst Work on Assistance the Task
of Co-Coordinating Data Definition Becomes More Complex. Individual Depends on the
Information provided by others with their Assumption and the Specification made by them.
Data Dictionary is Integral component of Structured Analysis. Since Data flow diagram by
them do not fully describe the subject of the Investigation. The Data Dictionary provides
additional information about system.
Super Key :Super Key is defined as a set of attributes within a table that uniquely identifies each record
within a table. Super Key is a superset of Candidate key.
An attribute or a combination of attribute that is used to identify the records uniquely is known
as Super Key. A table can have many Super Keys.
Candidate Key :Candidate keys are defined as the set of fields from which primary key can be selected. It is an
attribute or set of attribute that can act as a primary key for a table to uniquely identify each
record in that table.
Primary Key :Primary key is a candidate key that is most appropriate to become main key of the table. It is a
key that uniquely identify each record in a table.
Composite Key :Key that consist of two or more attributes that uniquely identify an entity occurrence is called
Composite key. But any attribute that makes up the Composite key is not a simple key in its own.
Page 17
E-DIARY
The candidate key which are not selected for primary key are known as secondary keys or
alternative keys.
Foreign key :a foreign key (FK) is a field or group of fields in a database record that points to a key field or
group of fields forming a key of another database record in some (usually different) table.
Usually a foreign key in one table refers to the primary key (PK) of another table. This way
references can be made to link information together and it is an essential part of database
normalization
Table Name
: registration
Table Description : This table is used to register a user and to store the information of user.
Table 2.1 registration
Field name
Registration_id
Firstname
Middlename
Lastname
Birthdate
Gender
Email
Contact
Address
City
pincode
Username
Password
Securityque
Datatype
Int(10)
Constraint
Primary key,Auto
Description
User Registrations id
Varchar(15)
Varchar (15)
Varchar (15)
Varchar(15)
Varchar(10)
Varchar(15)
Varchar (10)
Varchar(50)
Varchar(10)
Varchar (10)
Varchar(15)
Varchar(20)
Varchar(20)
Increment
Not null
Not null
Not null
Not null
Not null
Not null
Not null
Not null
Not null
Not null
Not null
Not null
Not null
as per entry
Users first name
Users middlename
Users lastname
Users bithdate
Users gender
Users email
Users contact no.
Users address
Users city
Users pincode
Users username
Users password
Users security
Not null
question
Users security
Securityans
Varchar(10)
Status
Tinyint(1)
8th CE
Not null
Table 2.1
answer
Users status(0 or 1)
Page 18
E-DIARY
Table Name
: document
Datatype
Int (10)
Constraint
Primary key,Auto
Description
Upload id as per entry
Varchar (15)
Varchar(15)
Varchar(30)
Increment
Not null
Not null
Not null
in table.
Users Name
Documents Title
Documents Pic or
Not null
File
Documents Status(0
Tinyint(1)
or 1)
Table 2.2
Table Name
: contact_us
Table Description : This table is used to provide information from user to admin for some error
or any suggestions.
Table 2.3 contact_us
Field name
Contactusid
Fullname
Contact
Email
Msg
8th CE
Datatype
Int(10)
Constraint
Primary key,Auto
Description
Contatct_Us id as per
Varchar (30)
Varchar(15)
Varchar(15)
Varchar(50)
Increment
Not null
Not null
Not null
Not null
entry
Users name
Users Number
Users Email
Users message
Page 19
E-DIARY
Table 2.3
Table Name
: content
Datatype
Int (10)
Constraint
Primary key,Auto
Description
Contentid as per entry
Varchar (15)
Text
Increment
Not null
Not null
Contents Title
Description of
Content
Table 2.4
Table Name
: admin_login
Field name
Loginid
Username
Password
Datatype
Int(10)
Varchar (15)
Varchar (30)
Constraint
Primary key,Auto
Increment
Not null
Not null
Table 2.5
Description
Admins id as per
entry
Admins name
Admins password
Table Name
: news
8th CE
Page 20
E-DIARY
Table Description : This table is used to store the information of news that can add by admin.
Table 2.6 news
Field name
Newsid
Datatype
Int(10)
Constraint
Primary key,Auto
Description
Newss id as per entry
Title
News_by
Date
Shortdes
Varchar (100)
Varchar (15)
Varchar(15)
Text
Increment
Not null
Not null
Not null
Not null
Newss title
Who write the news?
Newss date
Newss
Not null
ShortDescription
Newss
Longdes
Text
Photo
Varchar(30)
Table Name
Not null
Table 2.6
LongDescription
Newss Pic
: recruitment
Table Description : This table is used to store the information of news that can add by admin.
Table 2.7 recruitment
Field name
Recruitmentid
Datatype
Int(10)
Constraint
Primary key,Auto
Description
Recruitments id as
Title
Recruitment_by
Date
Shortdes
Varchar (100)
Varchar (15)
Varchar(15)
Text
Increment
Not null
Not null
Not null
Not null
per entry
Recruitments title
Who write this blog?
Recruitments date
Recruitments short
Longdes
Text
Not null
Description
Recruitments long
Photo
8th CE
Varchar(30)
Not null
Table 2.7
Description
Recruitments Pic
Page 21
E-DIARY
Chapter 3
Diagrams
8th CE
Page 22
E-DIARY
Page 23
E-DIARY
is more important than static behaviour. In UML there are five diagrams available to model
dynamic nature.
List of UML Diagrams Shown are as follows:
1.
2.
3.
4.
5.
8th CE
Page 24
E-DIARY
ADMIN
8th CE
Page 25
E-DIARY
Log In
[ meet criteriaSuccess
]
Post News
Post Recruitment
Response to Feedback
Post event
Response to Complaint
Log Out
8th CE
Page 26
E-DIARY
Do Registration
Log in
Suc
Upload Documents
View Document
Share Document
Upload document
Post complaint
Post feedback
Log Out
Page 27
E-DIARY
8th CE
Page 28
E-DIARY
user
admin
Checks validity
Does registration
Request for login
Log in
Request for process
Checks
user
Upload
view
Share
Update
Post News
Display News
Display Recruitment Detalis
Display Upcoming Event Details
Recruitment
Event
8th CE
Page 29
E-DIARY
Page 30
E-DIARY
8th CE
Page 31
E-DIARY
gender
middlename
Ur_id
Is A
lastname
a_id
birthdate
*
1
firstname
User
state
Admin
can
address
a_password
a_name
city
username
password
r_id
n_id
n_title
r_title
Upload_id
upload
* posts
recruitment
news
n_date
Upload_pic
n_description
r_date
n_pic
r_description
*
event
e_description
c_id
gives
e_id
e_pic
e_title
Complaint
c_name
e_place
c_complaint
e_date
Feedback
f_id
f_feedback
f_name
Page 32
E-DIARY
The external entities are the sources and destinations of a systems input and output. They are
objects that are not within the system, but with which the system interacts. Data Storage
represents entities in the system in which the data is stored. Examples include databases and
files. Process represents an action taken on the data. This may include a calculation,
conversation, or other task performed. Process can send and receive control signals that help to
explain the control over the data flowing through the system. Data Flows represent the
movement of information through the system. Control signals connect control transforms to
other objects on the diagram and represent control over data.
Page 33
E-DIARY
Post news
Registration
Request for login
Valid user
E-Diary
User
Log in
Admin
Post Recruitment details
Upload documents
view documents
Post event
share documents
Update documents
8th CE
Page 34
E-DIARY
1.0.1
Verify admins details
Enter login details
admin_login
1.0
Open form
1.0.1
registration
User
2.0
login
user_registration
8th CE
Page 35
E-DIARY
DFD level 2 :-
8th CE
Page 36
E-DIARY
Admin
can
1.1
Post news
Current news
news
2.2
Post
event
Event information
Post recruitment
2.3
Post recruitments
event
details
recruitment
can
User
2.1
Upload document Save documents
2.2
Post complaints
Post complaints
upload
complaint
Page 37
E-DIARY
System flowchart describes the data flow for a data processing system. It provides a logical
diagram of how the system operates. It represents the flow of documents, the operations
performed in data processing system. It also reflects the relationship between inputs, processing
and outputs.
A graphical representation of the sequence of operations in an information system or program.
Information system flowcharts show how data flows from source documents through the
computer to final distribution to users. Program flowcharts show the sequence of instructions in a
single program or subroutine. Different symbols are used to draw each type of flowchart.
Following are the features of system flowcharts:
The source from which data is generated and device used for this purpose.
Various process steps involved
The intermediates and final output prepared and the device used for this storage.
8th CE
Page 38
E-DIARY
Chapter 4
System Design
Page 39
E-DIARY
It is admins LogIn Page. After entering right username and password he/she can access the
admin panel.
Page 40
E-DIARY
It is homepage of admin panel. Here admin can navigate to other pages and changes the user
contents and insert/delete/update the new details.
Page 41
E-DIARY
Admin can insert news details which are shown to the users.
Page 42
E-DIARY
Admin enter the government recruitments details which shown to the user.
Page 43
E-DIARY
Admin can add content details to the title and description field.It will see at user side.
Page 44
E-DIARY
News are shown in proper manner to the admin. In which admin can edit or delete the news
information.
Page 45
E-DIARY
Recruitments are shown to admin in proper manner. In which admin can edit or delete the
recruitment information.
8th CE
Page 46
E-DIARY
It is content details which are shown in proper manner at admin side.In which admin can edit or
delete the content information.
Page 47
E-DIARY
Page 48
E-DIARY
This page shows the user details to admin which are register in eDiary.
Page 49
E-DIARY
8th CE
Page 50
E-DIARY
This page shows the number of active users on the site to the admin.
Page 51
E-DIARY
Page 52
E-DIARY
This page show the all documents of users to the admin. Admin can see and give approval or
rejection.
Page 53
E-DIARY
This is homepage of the user. User can see the news blog at TODAYS INDIA section and see
the recruitment details. After login they can also upload the documents.
Page 54
E-DIARY
8th CE
Page 55
E-DIARY
This page shows the contact details of the members who invented this site. User also send the
message related to the website to the admin.
Page 56
E-DIARY
Page 57
E-DIARY
Page 58
E-DIARY
This is User registration page. In which user add their details and register themselves to the
eDiary.
8th CE
Page 59
E-DIARY
This is User logIn page. In which user enter username and password. After authentication they
can access to eDiary.
Page 60
E-DIARY
This is welcome page of user side.In which user navigate to the other pages and add,see and
download the documents.
Page 61
E-DIARY
Page 62
E-DIARY
This is the manner wise list of users documents shown to the user which can approved by the
admin.
8th CE
Page 63
E-DIARY
Chapter 5
Implementation
8th CE
Page 64
E-DIARY
8th CE
Page 65
E-DIARY
The files created in the project are named in such a way that all letters are in small. The files in
the same module are grouped together in a folder with appropriate name. This makes it easier for
the developer to navigate to the appropriate file. Thus it is a good coding technique that enables
faster access to the files.
Creating Source Code:The regions are used to describe a module or function and are given a specific name. This makes
it quite easier for any user to understand and debug the code in case of any errors.
The region names are descriptive and thus describe the working of the function. This makes it
quite clear to any person who needs to understand the code. This feature also allows testing and
debugging easier. It can help to find errors faster and with lesser effort.
We have also used try catch feature in our coding. This enables the debugging easier and
efficient. The catch module will generate any sort of messages related to an error that occurred
during the execution. This technique helps a developer to find error in code during
unit testing.
Identifier Standard:The object instance must itself give an idea what it describes and also must start with a
underscore.
8th CE
Page 66
E-DIARY
Chapter 6
Testing
8th CE
Page 67
E-DIARY
Testing is a process of executing a program with the intend of finding the errors.
A good test case is one that has a high probability of finding undiscovered errors.
A successful test on the other hand is one that uncovers all the undiscovered errors.
Testing is set of activities that can be planned in advance and conducted systematically to
carry out the testing procedures of the proposed system.
Testing is generally done at two levels- Testing of individual screens and testing of the entire
system. Testing is the process of executing a program with the explicit intention of finding errors,
which makes the program fail. The tester is actually trying to make the program fail. A successful
test is the one that find an error. During Systems testing, the system is used experimentally to
ensure that the software does not fail, i.e. that it will run according to its specifications and in the
way users expect.
A test case is a set of data that the system will process as normal input. However, the data are
created with the express intend of determining whether the system will process them correctly or
not.
Following features are tested:8th CE
Page 68
E-DIARY
All the functional features specified in the System Requirement specification are tested.
System level integration for the various screens that were developed has been done.
Performance testing has been done for acceptable response and correctness of data.
Functional Testing :The testing technique that is going to be used in the project is black box testing. In black box
testing the expected inputs to the system are applied and only the outputs are checked. The
working or the other parameters of the functionality are not reviewed or tested on the black box
testing technique. There is a specific set of inputs for each and every module which is applied
and for each set of inputs the result or the output is verified and if found as per the system
working this testing is termed or result is declared as pass.
If the set of inputs that are provided to each module are not giving the outputs as per the
expected results from the module then the result of that testing is to be declare failed. Moreover
the bottom up integration of the modules is applied herein so that each module can be verified at
the initial stage and if it is found that the independent module is perfectly alright, only then it is
going to be integrated with other related modules otherwise the module is checked for flaws and
then if it satisfies all the specific requirements of the module, is integrated to other related
modules to form and incorporate a system.
In the black-box testing approach, test cases are designed using only the functional specification
of the software, i.e. without any knowledge of the internal structure of the software. For this
reason, black-box testing is known as functional testing.
Structural Testing:In the white-box testing approach, designing test cases requires thorough knowledge about
the internal structure of software, and therefore the white-box testing is called structural
testing.
8th CE
Page 69
E-DIARY
8th CE
Page 70
E-DIARY
Unit testing :The starting point of testing is unit testing. In this, each and every module is tested separately
and is often performed by the developer himself simultaneously along with the coding of the
form. Each and every in the software is tested for consistency and attempt is made to make the
software error free. In the Login Form it is checked that the user exist and the password entered
is correct, otherwise the error message is developed and the system waits for the correct input.
Proper messages are displayed on occurrence of errors.
In each and every form it is checked that the information provided by the user is valid and
complete, otherwise it will display proper message and system waits for the correct input. Proper
messages are displayed on occurrence of errors. In every form it is checked that if the user has
rights to perform the specific action and if user doesnt have rights then that action will not be
performed.
Integration testing :After unit testing the forms are gradually integrated into subsystems which are then integrated to
eventually form the entire system. During integration of forms, integration testing is performed
to detect design errors by focusing on testing the interconnection between forms. After linking of
each forms integration testing is performed. In this testing it is checked that the user can not
directly visit the forms, which cant be visited without login. E.g. User cant view, Inert, Update
or verify entries without login into the system.
Security testing :This is testing which is conforms that the program can restrict access authorized personal and
that authorized personal can access the function available to that level. User cannot visit or
perform action for which he is not given access rights. As the system is role based so security is
provided based on role.
Compatibility testing :Compatibility Testing is testing whether software is compatible with other element of a system
with which it should operate. Ex. Browser, hardware or Operating Systems. Compatibility testing
is performed by running it on different browsers. Here it is verified that the display or
functionality of controls is not changed when used in other projects.
8th CE
Page 71
E-DIARY
Unreachable code
Unconditional branches into loops
Interface analysis
Unassigned pointers
Pointer arithmetic
6.3.2 DEFECT TESTING:Intended to find inconsistencies between a program and its specification. These inconsistencies
are usually due to program faults or defects.
We have tested our functions of component to check the specification of our
components.
We selected input set to test the components like in query process we gave the
different kinds of inputs to examine their output.
We test software with sequences that have only a single value.
We used different sequences of different sizes in different tests.
8th CE
Page 72
E-DIARY
Derived tests so that the first, middle and last elements of the sequence and accessed
to reveal the problems at partition boundaries.
Black Box Testing:Black box testing alludes to test that are conducted at the software interface. Although they are
design to uncover errors, black box tests are used to demonstrates that software functions are
operational, that input is properly accepted and output is correctly produce, that the integrity of
external information is maintained. Black Box Testing, also called behavioral testing, focuses on
the functional requirements of the software. That is, black box testing enables the software
engineer to derive sets of input conditions that will fully exercises all functional requirements for
a program. Black Box Testing is not an alternative to White Box techniques. Black- Box testing
attempts to find errors in the following categories:
White Box Testing:White box testing of software is predicted on close examination of procedural detail. Logical
parts through the software are tested by providing test cases that exercises specific sets of
conditions and /or loops. The Status of the program may be examined at various points to
determine if the expected or asserted status corresponds. White-Box testing sometimes called
Glass-Box testing; it is a test case design method that uses the control structure of the procedural
design to derive test cases. Using white-Box testing methods, the software engineer can derive
test cases that: Guarantee that all independents paths within a module have been exercised at
least once.
Exercise all logical decisions on their true and false sides.
Execute all loops at their boundaries and within their operational bounds.
Exercise internal data structures to ensure their validity.
Test Case : 1
Module Name : Login form
Test Title
Description
8th CE
Page 73
E-DIARY
Description
Input
Expected Result
Actual Result
Status
Username
Naman1995
Password
naman@123
Control passes to
password field.
Control passes
successfully to
user home page if
status is also 1.
PASS
Control passes to
password field.
Verify inputs
PASS
Post Conditions: User is validated with database and successfully login to account. The account
session details are logged in database.
Test Case : 2
Module Name : SignUp form
Test Title
Description
Description
Firstname
Input
Naman
Expected Result
Actual Result
Statu
Control passes
s
PASS
Middlename Field
to the
Middlename
8th CE
Middlename
Lastname
Birthdate
Gender
Shashikantbhai
Zinzuvadiya
27Jan 1995
Male
Field
Control passes
Lastname field
to the
Lastname field
Control passes
Birthdate field
to the
Birthdate field
Control passes
Gender field
to the Gender
field
Control passes
Address Field
to the Address
PASS
PASS
PASS
PASS
Page 74
E-DIARY
6
7
Address
Khodaldham
Field
Control passes
City
Soc.,Liliya Road
Amreli
City field
Control passes to the
Pincode field
to the Pincode
field
Control passes
EmailID field
to the EmailID
Pincode
365601
EmailID
field
Control passes
8@gmail.com
to the
ContactNo field
PASS
PASS
PASS
ContactNo
10
ContactNo
8980704168
field
Control passes
Username field
to the
PASS
Username
11
12
Username
naman1995
Password
naman@123
field
Control passes
Password field
to the
Password field
Control passes
SecurityQuestion
to the
Field
SecurityQuesti
PASS
PASS
on
13
SecutityQuesti
Who Is Your
Field
Control passes
on
Favourite Heroine?
SecurityAnswer field
to the
PASS
SecurityAnsw
14
SecurityAnsw
er
Behaty Prinsloo
er field
Account will
PASS
user login
page is
displayed.
8th CE
Page 75
E-DIARY
Post Conditions: User is validated with database and successfully account is created if admin
will approve his/her status.
8th CE
Page 76
E-DIARY
Chapter 7
Limitations and
Future Enhancement
LIMITATION: Software or application can be error free but never be failure free i.e. software of application can
be syntactically correct but semantically it can have some shortcomings. Failure is not only
concerned with the syntax error of our program, but is also concerned with our logical error or
requirement omission.
8th CE
Page 77
E-DIARY
FUTURE ENHANCEMENTS:As we have discussed earlier in previous section, software or application is continuously
changing entity. Software or application should be reflected with new features whenever new
requirements emerge. Evolution and Enhancement are big phases in any softwares or application
lifecycle. We have to project towards some newly emerged and previously ignored functionality
in way to enhance the system.
Once system is implemented and installed into its essential environment, we have to examine
newly emerging requirements, misinterpretation of older requirements, impact due to omission of
some important requirements, and failure of some features.
Try to remove all above limitation from our project.
I will also keep in touch with the citizens and government so that I can understand the
new
demands of them try to apply that features in to my system.
I will try to add more functionality in my system so that user can easily operate this
system with security.
We will also develope an OTP(one time password) code for user login. This will provide
more security to the web application.
8th CE
Page 78
E-DIARY
Chapter 8
Conclusion
Conclusion
Making this project is a good way to possess knowledge. Though this way I got to know many
things on eDiary. eDiary helps people to add their documents (For Example, Legel Papers,
Driving License, Marksheets etc.) and download it anytime anywhere with the help of internet
access. In future, User will have to aceess by OTP(One Time Password). OTP will provide
maximum security to the system. And I want to thank my internal guide for giving me a
knowledge about this project and i am sure that the knowledge I gained from this project will
help me further. I have tried my best to make this project easy and understandable, but still I
apologize for any kind of discrepancies. Thank you.
8th CE
Page 79
E-DIARY
Chapter 9
Reference
8th CE
Page 80
E-DIARY
REFERENCES
BOOKS REFERRED:Title
1.Object Oriented Design
Author
James Rambaugh
Description
Study of activity & state
transition diagram
2.Software Engineering
Pressman
3.Database Design
Korth
Study of Entity
Relationship Diagram
James Rambaugh
5.Language Reference
Ivar Jacobson
Manual
6.UML in an Instance
Thomas . A. Pendar
To study SQL
Implementations
Ivan Bayross
8th CE
Page 81
E-DIARY
Schildt
WEBSITES VISITED:www.hitech-in.com
www.edccts.com/in/platforms-and-products/products
www.telegraph.co.uk/
electronic-diary.software.informer.com
www.caclubindia.com
www.lucasheigh-h.schools.nsw.edu.au/e-learning
www.ncbi.nlm.nih.gov/pubmed
8th CE
Page 82