Documente Academic
Documente Profesional
Documente Cultură
Chapter No: 1
INTRODUCTION
PURPOSE SCOPE TECHNOLOGY AND LITERATURE RIVEW
P age |1
1.1 PURPOSE
The main goal of the computerized on Line Job Search System is developed to facilitate the General administration system to manage the various information of the Job Seeker and Job Provider and the processes involved in a placement company. So, that organization can access accurate information quickly and easily as and when required, thereby improving its operational efficiency & effectiveness. In Present era,NET technology is very legendary and C# is Object Oriented, so the main objective behind this project is we can vigor knowledge of internet application and aware of web technology.
1.2 SCOPE
In future there will be much population, but not necessary that all can get the proper jobs with charming income. There will be some people anywhere in the world who everyday finding the working opportunities at their home. Such system can help them to find and get information about these kinds of home based jobs to earn more only by one click.
P age |2
The .NET Framework is language neutral. Currently it supports C++, C#, Visual Basic, JScript (The Microsoft version of JavaScript) and COBOL. Third-party languages like Eiffel, Perl, Python, Smalltalk, and others - will also be available for building future .NET Framework applications. The new Visual Studio.NET is a common development environment for the new .NET Framework. It provides a feature-rich application execution environment, simplified development and easy integration between a number of different development languages. The .NET Framework Architecture ASP.NET is based on the fundamental architecture of .NET Framework. Visual studio provide a uniform way to combine the various features of this Architecture.
Fig 1.1
Architecture is explained form bottom to top in the following discussion. At the bottom of the Architecture is Common Language Runtime. NET Framework common language runtime resides on top of the operating system services. The common language runtime loads and executes code that targets the runtime. This code is therefore called
P age |3
managed code. The runtime gives you, for example, the ability for cross-language integration. .NET Framework provides a rich set of class libraries. These include base classes, like networking and input/output classes, a data class library for data access, and classes for use by programming tools, such as debugging services. All of them are brought together by the Services Framework, which sits on top of the common language runtime. The 4th layer of the framework consists of the Windows application model and, in parallel, the web application model. The Web application model-in the slide presented as ASP.NET comes with built-in Web Forms controls, which are responsible for generating the user interface. They mirror typical HTML widgets like text boxes or buttons. If these controls do not fit your needs, you are free to create your own user controls. Web Services brings you a model to bind different applications over the Internet. This model is based on existing infrastructure and applications and is therefore standard-based, simple. Web Services are software solutions delivered via Internet to any device. Today, that means Web browsers on computers, for the most part, but the device-agnostic design of .NET will eliminate this limitation. One of the obvious themes of .NET is unification and interoperability between various programming languages. In order to achieve this; certain rules must be laid and all the languages must follow these rules. In other words we cannot have languages running around creating their own extensions and their own fancy new data types. CLS is the collection of the rules and constraints that every language (that seeks to achieve .NET compatibility) must follow.
The CLR and the .NET Frameworks in general, however, are designed in such a way that code written in one language can not only seamlessly be used by another language. Hence ASP.NET can be programmed in any of the .NET compatible language whether it is VB.NET, C#, Managed C++ or JScript.NET.
P age |4
KEY BENEFITS OF .NET Ease of Use Object-oriented model Everything is an object Namespace and Framework structure Easier to comprehend and use Naming scheme of namespace reflects the underlying functionality
Freedom to choose The language that meet your needs. The development tool that is best for you The feature and functionality to plug in to
Security Restricting or containing the illegal memory reference Comprehensive security model Assembly specific System wide Code inspection through MSIL
Deployment and Management Deployment: Code is Assembled and Run Securely Maintenance: Version Maintenance Simplified
Web Services The web the Way You Want It Anywhere Anytime On any device
P age |5
ASP.NET
.NET provides a complete environment for building, deploying and running .NET Web application. FEATURE OF ASP.NET ASP.NET has better language support, a large set of new controls, XML based Components and better user authentication. ASP.NET provides increased performance by running compiled code. ASP.NET code is not fully backward compatible with ASP.
NEW IN ASP.NET Better language support Programming controls Event-driven programming XML based components User authentication, with accounts and roles Higher scalability Increased performance Compiled code Easier configuration and deployment Not fully ASP compatible
LANGUAGE SUPPORT ASP.NET uses the new ADO.NET. ASP.NET supports full, not VBScript. ASP.NET supports C#(C sharp) and C++. ASP.NET supports JScript as before
ASP.NET CONTROLS ASP.NET contains a large set of HTML controls; almost all HTML elements on a page can be defined as ASP.NET controls objects that can be controlled by scripts.
ASP.NET also contains a new set of object oriented input controls, like programmable list and validation controls. A new data grid control supports sorting, data paging, and everything you expect from dataset controls.
P age |6
EVENT AWARE CONTROLS All ASP.NET object on a Web page can expose events that can be processed ASP.NET code. Load, click and change events handled by code, makes coding much simpler And much better organized ASP.NET COMPONENTS ASP.NET components are heavily based on XML, Like the new AD Rotator , That uses XML to store advertisement information and configuration. USER AUTHENTICATION ASP.NET components forms based user authentication, including cookies management and automatic redirecting of unauthorized logins. You can still do your custom login page and custom user checking.
USER ACCOUNTS AND ROLES ASP.NET allows for user and roles, to give each user (with a given role) access to different server code and executables. COMPILED CODE The first for an ASP.NET page on the server will compile the ASP.NET code and keep a cached copy in memory. The results of this is greatly increase performance. EASY DEPLOYMENT No more server restart to deploy compiled code. ASP.NET simply redirects all new request to the new code.
P age |7
We have User SQL Server as backend. There are many reasons for the SQL Server to be chosen as backend. Maximum database size roughly 1,000,000 Terabytes. To put that in perspective we could store 100 megabytes in a single SQL Server Database.
Up to 16 simultaneous instances of SQL Server can run on single computer. This helps in running complex Internet Site. It has support for up to 32 processors in single instance. Support for up to 64 Gigabytes of physical RAM. Built in support for Extensible Markup Language XML. Indexed Views. Cascading referential integrity. Data mining support in analysis services.
Basically with the depth and range of it, it is Enterprise-level database server.
P age |8
Chapter No: 2
PROJECT MANAGEMENT
PROJECT PLANNING RISK MANAGEMENT ESTIMATION
P age |9
P a g e | 10
Objectives
To provides a framework that enables the job seekers to search the particular jobs and get Email notification after the membership. To provide the companies to post the ads for the growth of their business.
P a g e | 11
2.2RISK MANAGEMENT
Risk management involves anticipating risks that might affect the project schedule or the quality of the software being developed and taking action to avoid these risks. Effective risk management makes it easier to cope with problems and ensure that these do not lead to unacceptable schedule slippage. There are three main categories of risks can be defined. Project Risks are risks, which affect the project schedule or resources. Product Risks are risks, which affect the quality or performance of the software being developed. Business Risks are risks, which affect the organizations developing.
P a g e | 12
Risk Identification
Risk Identification is first stage of risk management. It is concerned with the discovering possible risks to the project. The types of risks to our project are as follows: Technology Risk: The database used in the system cannot process as many data per second accepted. People Risk: During the development of project if one partner is not available due to some reasons then it will create the risk to the project. Requirement Risk: Changes to requirements, which require major design rework, are proposed. Estimation Risk: The time required to develop the software is underestimated. Tool Risk: The required case tool is not available.
2.3 ESTIMATION
Software measurement is concern with deriving a numeric value for some attributes of a software product or a software process. By comparing these values to each other and to standards which apply across on organization it is draw conclusion about the quality of software or process. Software project estimation in todays era may result in companies profit and loss, thus a small error in estimating have large impact on project and company itself. But then too its also true that estimation can never be exact, particularly in software we have many variablehuman, technical, political etc. Cost and efforts estimation can be done using any of these four techniques. Along with the ways to estimate justifications are given to state why that strategy was not selected. Delay estimation until late in the project. Base estimation on similar projects that have already been completed. Use relatively simple decomposition techniques to generate project cost and effort estimates. Use one or more empirical models for software cost and effort estimation. First was very simple and provides accurate results but, it was not possible to delay cost of software until end as it could increase risk of project, Second was not preferable in our company as it was not possible to find resemblance and estimated cost of project using some other previous projects Obvious choice remaining were third and fourth out of which third was given more priority and was worked on.
P a g e | 13
Decomposing project in small parts and estimating was at consensus. FP- Based Estimation was used for estimation cost and effort.
P a g e | 14
Chapter No: 3
P a g e | 15
These actors can access the system according to their authorities. 1. Administrator: Administrator can do the following activities: Update or delete any user Add new tasks Delete tasks Assign authority to tasks Add new status Delete status Add new application Delete existing application Add new modules for particular application Delete existing modules of particular application Add new functions for particular module Delete existing functions of particular module Allow employers to post the ads Delete any post Delete particular post from web site
P a g e | 16
2. Job seeker:
Job seeker can do the following activities: Search the job by category vise Search the job by city vise Search the job by country vise Create his/her profile Update his/her profile Change password Re-set password Get the email notification for the jobs of his interest.
3. Employer:
Employer can do the following activities: Create his own account Update his account Change password Re-set password Add new Post Delete existing post
Web Browser: Any browser e.g. Internet Explorer, Opera, Google Chrome, Mozilla Firefox.
Hardware specification
Client Side: Any GUI based terminal having at least b800 * 600 screen resolution and 512 MB RAM Server Side: RAM: 512 MB or higher Processor: Celeron or higher Clock speed: 900 MHz
3.3 CONSTRAINTS
The ad can only be posted on site after the administrator gives the permission. The ad can also be deleted when the admin delete it.
Hardware limitations
The installation of Microsoft Visual Studio .NET requires that the RAM cannot be less than 512 MB as recommended in Hardware Requirements.
Reliability requirements
The main reliability requirement is the validation used. Without proper validation the System does not allow to enter that the value into the database. For e.g. in the email id, the user cannot enter any dummy value, the validation checks that weather there is @ or . symbol in that. Also any null value is not allowed in place of compulsory fields.
P a g e | 18
Chapter No: 4
SYSTEM ANALYSIS
Problem Definition Fact Finding Techniques Need For Computerization Process Model Requirement Analysis Feasibility Study Requirement Validation
P a g e | 19
Definition:
Web Job search system is to develop an e-searching site, which is a modern way for the employers to advertise the latest job openings in their organization over the internet. This site also facilitates the job seekers to search for these jobs online. This system will provide the employers to post the ads free of cost for the companies to best fit their job requirements. The administrator of the website can delete any existing user, can delete any existing job, and manages the websites. The administrator can also backup and restore the database. Job seeker has the facility for viewing the jobs online with optimal details a jobseeker would require, view employer information, copy and paste. Employer has the facility to post the ad, update it and delete it. This project also includes many features like career center, resume maker, advertisements, CMS for creating and maintaining sitemaps.
P a g e | 20
SQIRO
Reading We aim to understand the business. We look at reports, manuals, job descriptions, catalogues, Internet, stocks and shares etc. Advantages helps us to understand the business before we interview employees and start designing new systems . Disadvantages written documents may be out of date or not reflect what actually happens . Interviewing We try to understand what actually happens from the managers, the users and the customers point of view Advantages personal contact can allow us deeper insight into what actually happens Disadvantages 1. can be time consuming and costly 2. the people being interviewed may feel uncomfortable and un-cooperative 3. interview notes need writing up immediately after the event 4. requires skill and expertise
P a g e | 21
Observation
We see with our own eyes what actually happens. Advantages 1. we get first-hand experience of how the system works 2. we can compare what we see with what we have been told Disadvantages 1. people do not like being watched and may change their behaviour from what they normally do 2. we may not be allowed to see personal data
Sampling
We look at forms, reports, screens, records, Advantages we can see what data is involved, and how much
Questionnaires
We reach people we could not interview Advantages 1. we can get information from a large number of people for the least possible cost 2. results can be read by machine and therefore easy to analyse Disadvantages 1. good questionnaires are hard to design 2. people often do not tell the truth or do not bother returning the questionnaire
P a g e | 22
The introduction of computerized accounting systems provide major advantages such as speed and accuracy of operation, and, perhaps most importantly, the ability to see the realtime state of the companys financial position. In my experience I have never seen a business that has upgraded to a computerized accounting system return to paper based accounting systems. Computerized accounting programs can provide instant reports for management, for example: The main advantages of a computerized system are listed below: Speed data entry onto the computer with its formatted screens and built-in databases of customers and supplier details and stock records can be carried out far more quickly than any manual processing. Automatic document production fast and accurate invoices, credit notes, purchase orders, printing statements and payroll documents are all done automatically. Accuracy there is less room for errors as only one accounting entry is needed for each transaction rather than two (or three) for a manual system. Up-to-date information the accounting records are automatically updated and so account balances (e.g. customer accounts) will always be up-to-date. Availability of information the data is instantly available and can be made available to different users in different locations at the same time. Management information reports can be produced which will help management monitor and control the business, for example the aged debtors analysis will show which customer accounts are overdue, trial balance, trading and profit and loss account and balance sheet. Legibility - the onscreen and printed data should always be legible and so will avoid errors caused by poor figures. Efficiency better use is made of resources and time; cash flow should improve through better debt collection and inventory control. Staff motivation the system will require staff to be trained to use new skills, which can make them feel more motivated. Further to this with many off-the-shelf packages like MYOB the training can be outsourced and thus making a particular staff member less critical of business operations. Cost savings computerized accounting programs reduce staff time doing accounts and reduce audit expenses as records are neat, up-to-date and accurate. Reduce frustration management can be on top of their accounts and thus reduce stress levels associated with what is not known.
P a g e | 23
The ability to deal in multiple currencies easily many computerized accounting packages now allow a business to trade in multiple currencies with ease. Problems associated with exchange rate changes are minimized.
our web site. Which types of validation criteria are there and how it can be formed in object oriented programming.
Fig-4.1 Fourth Step:- Construction First of all we made a database in SQL server and connected it to our web site. According to the database design we made the forms to fill up the tables. Also we put the date grid view to see all the rows together. After that we started the coding of the application. In each every form we did the database connectivity. We put up the conditions to necessary constrains. Fifth Step:- Completion At the end of coding we made setup file and put all the necessary guidelines to handle the software.
P a g e | 25
Advantages
Generates working software quickly and early during the software life cycle. More flexible - less costly to change scope and requirements. Easier to test and debug during a smaller iteration. Easier to manage risk because risky pieces are identified and handled during its iteration.
Disadvantage Each phase of an iteration is rigid and do not overlap each other. Problems may arise pertaining to system architecture because not all requirements are gathered up front for the entire software life cycle.
Requirement and specification are very important components in the development of any project. Requirement analysis is the first step in the system design process, where a users requirements should be clarified and documented to generate the corresponding specifications. While it is a common tendency for designers to be anxious about starting the design and implementation, discussing requirements with the customer is vital in the construction of safety-critical systems. For activities in the first stage has significant impact on the downstream results in the system life cycle. For example, errors developed during the requirements and specifications stage may lead to errors in the design stage. This leads not only to more time wasted but also the possibility of other requirement add specification Therefore, it is necessary that the requirements are specified correctly to generate clear and accurate specifications.
P a g e | 26
time works specially for them who want to earn more with current jobs or study like house wives, students etc. Also the employees can post the ad to enlarge their business like MLM. So, requirement is having the one place from where one can get all the details of any company. User Requirements After studying the enterprise flow, the system should have basically 3 types of users: Administrator Job seekers Employers
Technical Feasibility:
Project is technically feasible. Here the study of available resources, project partners staff and existing software technology are to be considered. We had sufficient resources like computers. Also we had enough staff experience and guidance to develop the modules of the project. The software tools were also available. So there was no need to acquire any new resources or softwares tools. A study of resources availability may affect the ability to achieve an acceptable system. It is essential that the process analysis and definitions be
P a g e | 27
conducted in parallel with an assessment of technical feasibility. You have to just manage your database and registration on the application. Technical feasibility tries to answer the following questions to make the software feasible to develop. The software or tools necessary for building or running the application are easily available or not? The compatibility amongst software exists or not? Are developers aware of these technologies?
Economical Feasibility:
Project is also economically Feasible. This doesnt require any costly software or any hardware tools.
Operational Feasibility:
Our application has such a user friendly GUI that any person having a sound knowledge of computer can operate the system.
Implementation Feasibility:
Under the study of implementation feasibility, Ive got to draw the finger to the certain issues, like: 1. Is it possible to install the software within the given environment? 2. Will organization management and users support for the installation of the software? 3. Will proposed system cause any harm to the operation of the organization?
P a g e | 28
Chapter No: 5
SYSTEM DESIGN
Data Flow Diagram E-R Diagram Use Case Diagram Activity Diagram Sequence Diagram
P a g e | 29
Job seekers
Employers
Update Profile
Get Details
Administrator
P a g e | 30
2. 1-level DFD
Ad management
Admin
Email notification
Database
P a g e | 31
3. 1-level DFD
Ad Details
Profile Details
Job Ad
User
Log In
Portal
Employer
New User
P a g e | 32
Match Profile
Company Profile
Send Email
Update record
Email Addreass
P a g e | 33
P a g e | 34
-End2
LogIn
* *
-End9
-End4 -End1
-End11
Email-Notification
*
-End10
extends
-End6
-End13
Job seeker
*
Insert/Update
Admin
-End8
-End15
Search
P a g e | 35
System
LogIn
-End2 * * -End11
ad post request
-End4 * *
-End5
-End1 -End3
-End9
ad post response
* *
-End12
Company
-End14 *
-End15
Admin
Update
-End18
-End19
Search
P a g e | 36
P a g e | 37
P a g e | 38
Chapter No: 6
DATA DICTIONARY
P a g e | 39
Company Detail
Employer Login
Employer Register
P a g e | 40
Job Detail
Log in jobseeker
P a g e | 41
Chapter No: 7
IMPLEMENTATION PLANNING
P a g e | 42
Graphical user Interface (GUI):ASP.NET has many more facility compared to ASP. It provides many standard GUI components such as buttons, lists, menus, and text areas in web form control, validation control, which you combine to create your programs GUI.
User-Name and password should not accessible by any other users. Only Administrator can delete users.
If anyone field from username or password remains blank, then user will not be allowed to enter into the system. Ad can be displayed on web after the admin check and give permission it.
P a g e | 43
This section describes the coding standards, which we have used in the project. We have adopted the following coding standards.
P a g e | 44
Chapter No: 8
Screen Layouts
P a g e | 45
P a g e | 46
Client
When we search for job then it will shown
P a g e | 47
Company login
P a g e | 48
P a g e | 49
If company has not member of our site then sign in this page : this will show in company profile
P a g e | 50
P a g e | 51
P a g e | 52
Update profile
P a g e | 53
If login Fails
P a g e | 54
Chapter No: 9
P a g e | 55
For our module we have tested each and every module one by one. Every day we had one module and regarding to that module. Also our testing was approved day by our external guide and other higher authorities. Next we will formulate test cases for the features that will be tested. These tests will be conducted on the application. If the test will fail tan function under consideration have a bug.
time and again revolved for other level check. This technique to be very much helpful as it came out with innovative ideas reduces errors to very low level. As abstract view of testing process is shown in figure:
Fig. 7.1Testing process The component testing stage is concerned with resting the functionality of clearly identifiable components. These may be functions or groups of methods collected together into a module or object. During integration testing should focus on interaction between the components and on the functionality and performance of the system as a whole.
P a g e | 57
Here we test the modules as white-box testing mechanism. We consider the coding for testing not just only input and output.
The testing is done for integrated system by running the system in our limited environment. The testing done here by us is the black box testing. We just give input for checking system functionality and get output without checking intermediate coding steps because we already checked these steps i.e. coding in module testing phase. We have tested integrated system by running each functionality of system simultaneously. So the maximum stress that system can bear is tested by this experiment. We checked all the interface work together as expected or not. We found success as a result.
Unit Testing Unit Testing involves testing individual components of the system to see if they are functioning properly. When a program tested all error conditions were checked to see if they are handled properly. Breaking the program down to self-contained portion each of which can be checked at certain key points, faculties the process.
P a g e | 58
In this testing individual components and modules are tested to ensure that they operate correctly. We had tested each and every module such as, Admin, Manage Application, Test Management, Process Management, Manage Comment, Reports. For this we have checked the database for particular entry for validation.
The key fields for each entry are checked to avoided duplication and relevant data are modified when required.
Integration Testing Program are invariable related to one and interact in total system. Each program is tested to see whether is confirms to the related program in the system. Each portion is tested against the entire module with both test and live data before entire system is ready to be implemented. The global variable was tested such that the hold data related to current module.
Validation Testing Validation testing can defined in many ways, but a simple definition is that validation succeeds when software functions in a manner that can be reasonably expected by the customer. After each validation test case has been conducted, one of two possible conditions exits: The function or performance conform to a specification and are accepted. A deviation from specification is uncovered and a deficiency list is created.
Alpha and Beta Testing The testing is divided into two phases: 1. The first phase was testing was done by software professionals within the company (Alpha Testing). 2. People who ought to be the end users of the system did the second phase testing (Beta Testing). The first phase mainly was aimed in checking the normalization of database; testing quires and algorithms for implementation, uncover etc. As a result of first phase testing some good suggestions were put forward and we could able to implement that suggestion for going ahead. The second phase of project was mainly aimed at client side validation. Here end user will be given chance to operate the system. He can do various inputs to check whether the validation
P a g e | 59
is working properly. For e.g. such types of validation are done throughout the entire project and have been successfully tested by end users. Project should satisfy the users requirement. Application has satisfied most of the clients requirements and few suggestions made by the client were also included successfully. System Testing System testing is a critical process that can take as much as 50% of the system development time. The common view of testing held by users is that it is performed to prove that there are no errors in a program. However, as indicated earlier, this is virtually impossible, since the analyst cannot prove that system is free and clear of errors. Therefore, the most useful and practical approach is with the understanding that testing is the process of executing a program with the explicit intention of finding errors that is, making the program fail. The tester, who may be an analyst, a programmer, or a specialist trained in software testing, is a actually trying to make a program fail. A successful test, then, is one that finds an error. System testing is designed to uncover weakness that wearer found in the earlier test. This includes forced system failure and its user in original environment will implant validation of total system as such. The total is also tested for recovery and fallback after various major failures to ensure that no data lost during the emergency. User Acceptance Testing An acceptance test verifies that the systems procures operate to system specification and that the integrity of vital data is maintained. The performance for an acceptance test is actually what the users show. User motivation and knowledge are critical for successful performance of the system. The system under consideration is tested for user acceptance by keeping constant touch with perspective system user at a time of developing and making change whenever required.
P a g e | 60
Chapter No: 10
P a g e | 61
10.1 LIMITATIONS
The presentation tier and business logic tire are required to be deployed within the same server computer. For better scalability it is required that these two tiers run on different server computers. The version has to be entered manually. The status of test-case has to be entered manually when it is executed. The authorities of role have to be assigned when a new role is inserted.
P a g e | 62
Chapter No: 11
CONCLUSION
Advantages Conclusion
P a g e | 63
11.1 Advantages
Helps organizations by identifying appropriate candidates Frees up managers time so that they can focus on their core business Provides a higher level of expertise in identifying candidates Reduces your administrative time associated with screening resumes Our Customers benefit from our efficient recruiting processes Dedicated team to provide fast response time Guaranteed quality of service Access to top-notch consultants for IT and management training
11.2 Conclusion
The web administrator can easily create and maintain any job listing with the help Job Listing Manager. As this is more user-friendly, the visitors can post their resume directly through job ticket and easily can see all the options... Through this project we also learnt how to manage time and to get things done within time. We learnt many new technology and tools while working on the project. Most important of them were the ASP.NET, some coding from Ajax, Microsoft Visio for analysis and design. Working under a corporate environment was also a learning experience where we tried to follow the discipline and rules laid by the organization. Overall this project is the foundation for all our future endeavors and we feel satisfied with the efforts that we have put in.
P a g e | 64
Chapter No: 12
BIBLIOGAPHY
P a g e | 65
1. Pressman R.S., Software Engineering : A Practitioner's Approach, TMH 2.. Software Engineering, Eighth Edition, Sommerville, Pearson 3. SQL,PL/SQL The Programming Of ORACLE, Ivan Bayross 4. Beginning ASP.NET 3.5: In C# and VB, Imar Spaanjaars 5. Asp.Net 3.5:Covers C# & Vb 2008 Codes, Black Book, Platinum Ed By Kogent Solutions Inc.
P a g e | 66
Chapter No: 13
References
P a g e | 67
P a g e | 68