training file ketaki

63
A TRAINING FILE ON JAVA Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal (M.P.) (University Of Technology of Madhya Pradesh) I n th e partial fu lf il lment of the req ui reme nt f or the awa rd of th e de gree of  Bache lor of E nginee ri ng  I n  Computer Sc ience & En ginee ring  2009-2013 Submitt e d to Submi tted By Under the Guidance of Anj ali Kaushik  Prof. U Du tta 0903CS091006 (HOD OF CSE) BE- 4 th Year M AH ARANA PRATAP COLLEGE OF TECHNOL OGY  GWALI OR ( M .P.)   474006  DE CEM BER, 2 013  

Upload: vishnu0751

Post on 04-Jun-2018

222 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 1/63

A

TRAINING FILE

ON

JAVA

Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal (M.P.)

(University Of Technology of Madhya Pradesh)

I n the partial fu lf il lment of the requi rement for the award of the degree of  

Bachelor of Engineeri ng  

I n  

Computer Science & Engineeri ng  

2009-2013

Submitted to Submi tted By

Under the Guidance of Anjali Kaushik  

Prof. U Dutta 0903CS091006

(HOD OF CSE) BE- 4th

Year

MAHARANA PRATAP COLLEGE OF TECHNOLOGY  

GWALI OR (M .P.) –  474006  

DECEMBER, 2013  

Page 2: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 2/63

DECLEARATION BY CANDIDATE

We hereby declare that the work ,which is being presented in the

project entitled “TRANING JAVA ” in partial fulfillment for the

award of degree of “Bachelor of Engineering” in DEPARTMENT

OF COMPUTER SCIENCE & ENGINEERING, MAHARANA

PRATAP COLLEGE OF TECHNOLOGY, GWALIOR carried

under guidance of Prof. UNMUKH DUTTA, Dept of COMPUTER

SCIENCE & ENGINEERING award of any other degree.

Anjali Kaushik

0903CS091006

Page 3: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 3/63

  CERTIFICATION  

This is to certify that the project entitled “TRANING ON JAVA”

which is being submitted by Anjali kaushik in partial fulfillment for

the award of the degree of Bachelor of Engineering in Computer

Science and Engineering of Rajiv Gandhi Technical University,

Bhopal (M.P.) is a record of students own work carried by the under

guidance and supervision.

To the best of our knowledge, the matter presented in this

project has not been submitted for the award of any diploma or

degree certificate.

Prof. Unmukh Datta Prof. K.K Joshi

( Academic Di rector Head of Dept. (CS/I T) ( Assistant Professor CS/I T Dept ).

M.P.C.T. Gwalior (M .P.) M .P.C.T. Gwalior(M .P.)

Dr .Ghanshyam Singh

Director  

M.P.C.T., Gwalior(M .P.)  

Page 4: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 4/63

 

ACKNOWLEDGEMENT

It is with great pleasure , we present this “TRANING ON JAVA”.We greatfully acknowledge our profound indebtedness towards

our esteemed Mr. U DUTTA , Designated as Associate Professor of

Computer Science & Engineering, Maharana Pratap College of

Technology , Gwalior for his valuable guidance , excellence

assistance and constant encouragement during the entire course

work.

We also express sincere gratitude to Mr. Unmukh Datta(Director Academic , HOD CS/IT Dept.) and Mr. K.K Joshi for

providing helpful study materials.

Last but of the least ; we would like to thank our beloved

parents for their encouragement and cooperation during the time of

working through the project.

Also thanks to all our friends for their encouragement andsupport.

Anjali Kaushik

0903CS091006  

Page 5: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 5/63

 

ABSTRACT

A Student Info System (SIS) is a software application for educationestablishment to manage student data. Student information system

provide capabilities for entering student test and other assessment

scores through an electronic grade book , building student

schedules, tracking student attendance,and managing many other

student related data naads in a school , colleges or university. Also

known as Student Information Management System (SIMS),

Student Record System (SRS) , Student Management System (SMS), Campus Management System (CMS) or School Management

System (SMS).

These system vary in size, scope and capability, from package that

are implemented in relatively small organization to cover student

record alone , to enterprise with solution that aim to cover most

aspect of running large multi campus organization with significant

local responsibility many systems can be scaled to different levels offunctionality by purchasing add on “modules” and can typically be

configured by their home instition to meet local needs.

Until recently, the common function of a student record system

are to support the maintainance of personal and study information

relating to:

-Handling inquiries from prospective student.

-Handling the admissions process.

-Automatically creating class and teacher scheduler.

Page 6: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 6/63

-Handling record of examinations, assessment marks, grade and

academic progression.

-Maintaining record of absence and attendance.

-Recording communications with students.

-Maintaining discipline record.

-Providing stastistical reports.

-Maintainance boarding house details.

-Communicating students details to parents through a parent

portal.

-Special Education/ Individual Education Plan (IEP) services.

-Human resource services.

-Accounting and budgeting services.

-Student health record.

Page 7: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 7/63

 

Contents  

S. No.TITLE

SIGNATURE

1. Candidate Declaration

2. Certification

3. Acknowladgement

4. Abstraction

5. Company Profi le

6. Daily Diary

7. Problem defi ni tion & identi fi cation

8. Preliminary I nvestigation

9. F inding of Project

10. Overview

11. Document coll ection

12. Data flow diagram

13. Use case diagram

14. ER diagram

15. Time requirement & schedul ing

Page 8: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 8/63

16. Hardware & software requi rement

17. System conf iguration specif ication

18. Modules

19. Technology Specif ications

20. Designing of modules

21. Designing of tables

22. Testing

23. Appli cation area

24. Reference

Page 9: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 9/63

DAILY DIARY

Name of the trainee: Anjali Kaushik

College: Maharana Pratap Collage Of Technology, Gwalior

Industry/Workplace: HCL ,GWALIOR

Week No. 1

Department/Section: Computer Science & Engineering

Date: 01-07 June2012

DATE DAY TIMING TOPICS

Theory  Practical

01/06/2012 Friday 10-12 AM 12:30-3 PM Learn about SDLC

02/06/2012 Saturday 10-12 AM 12:30-3 PM Learn about DBMS

03/06/2012 Sunday 10-12 AM 12:30-3 PM Seminar or Time Table Management

04/06/2012 Monday 10-12 AM 12:30-3 PM Learn about MS-Access DDL, DCL,DML Statement

05/06/2012 Tuesday 10-12 AM 12:30-3 PM Learn about Constraints, Operators,Functions Joins & Sub Queries

06/06/2012 Wednesday 10-12 AM 12:30-3 PM Learn about Basic java core

07/06/2012 Thursday 10-12 AM 12:30-3 PM Learn about OOPs Concepts

 Note: Please include attachment wherever necessary.

Declaration hereby declare that all information provided above is true

215, Garima Arcade Shinde Ki Chhawani, Lashkar, GwaliorMob. : 900904508, 9630883466

(Signed by trainee) ( Date)

 ________________ ______________

Page 10: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 10/63

  DAILY DIARY

Name of the trainee: Anjali Kaushik

College: Maharana Pratap Collage Of Technology, Gwalior

Industry/Workplace: HCL,GWALIOR

Week No. 2

Department/Section: Computer Science & Engineering

Date: 08-13 June 2012

DATE DAY TIMING TOPICS

Theory  Practical

08/06/2012 Friday 10-12 AM 12:30-3 PM Learn about String Functions

09/06/2012 Saturday 10-12 AM 12:30-3 PM Learn about Exception Handling

10/06/2012 Sunday 10-12 AM 12:30-3 PM Seminar on Stress Management

11/06/2012 Monday 10-12 AM 12:30-3 PM Learn about Multi Threading

12/06/2012 Tuesday 10-12 AM 12:30-3 PM Learn about JDBC

13/06/2012 Wednesday 10-12 AM 12:30-3 PM Learn about Web ApplicationTechnologiesIntroduction of HTMLBasics Tags Text Formatting tags

14/06/2012 Thursday 10-12 AM 12:30-3 PM Learn about List, Frameset, Link &Image tag and its Attributes Tabletag with attributes Form & InputTags

 Note: Please include attachment wherever necessary.

Declaration hereby declare that all information provided above is true

215, Garima Arcade Shinde Ki Chhawani, Lashkar, Gwalior

(Signed by trainee) ( Date)

 ________________ ______________

Page 11: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 11/63

  DAILY DIARY

Name of the trainee: Anjali Kaushik

College: Maharana Pratap Collage Of Technology, Gwalior

Industry/Workplace: HCL,GWALIOR

Week No. 3

Department/Section: Computer Science & Engineering

Date: 14-21 June 2012

DATE DAY TIMING TOPICS

Theory  Practical

15/06/2012 Friday 10-12 AM 12:30-3 PM Learn about Introduction aboutDHTML, Applying Styles usingCSS, Java script basics

16/06/2012 Saturday 10-12 AM 12:30-3 PM Learn about Java Scripts, methods inJavaScript Introduction about Clientside scripting

17/06/2012 Sunday 10-12 AM Seminar on Personality Development

18/06/2012 Monday 10-12 AM 12:30-3 PM Learn about Introduction to J2ME,Web Application Structure

19/06/2012 Tuesday 10-12 AM 12:30-3 PM Learn about Application Server &Web Server

20/06/2012 Wednesday 10-12 AM 12:30-3PM Learn about SERVLETS What isServlets and ServletsAPI

21/06/2012 Thursday 10-12 AM 12:30-3PM Learn about Roles and Life Cycle ofServlets

 Note: Please include attachment wherever necessary.

Declaration hereby declare that all information provided above is true

215, Garima Arcade Shinde Ki Chhawani, Lashkar, Gwalior  

(Signed by trainee) ( Date)

 ________________ ______________

Page 12: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 12/63

  DAI LY DIARY

Name of the trainee: Anjali Kaushik

College: Maharana Pratap Collage Of Technology, Gwalior

Industry/Workplace: HCL,GWALIOR

Week No. 4

Department/Section: Computer Science & Engineering

Date: 22-28 June 2012

DATE DAY TIMING TOPICS

Theory  Practical

22/06/2012 Friday 10-12 AM 12:30-3 PM Learn about Configuring Servlet inTomcat Webserver

23/06/2012 Saturday 10-12 AM 12:30-3 PM Learn about Genric Servlet & HTTPServlet

24/06/2012 Sunday 10-12 AM Resume Making Class

25/06/2012 Monday 10-12 AM 12:30-3 PM Learn about Handling HTTP

Request &Response26/06/2012 Tuesday 10-12 AM 12:30-3 PM Learn about Servlet Context

&Servlet configure

27/06/2012 Wednesday 10-12 AM 12:30-3 PM Learn about Session Management

28/06/2012 Thursday 10-12 AM 12:30-3 PM Learn about Using Hidden formfields AND URL Rewriting

 Note: Please include attachment wherever necessary.

Declaration hereby declare that all information provided above is true

215, Garima Arcade Shinde Ki Chhawani, Lashkar, Gwalior

(Signed by trainee) ( Date)

 ________________ ______________

Page 13: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 13/63

  DAILY DIARY

Name of the trainee: Anjali Kaushik

College: Maharana Pratap Collage Of Technology, Gwalior

Industry/Workplace: HCL,GWALIOR

Week No. 5

Department/Section: Computer Science & Engineering

Date: 29-05 July 2012

DATE DAY TIMING TOPICS

Theory  Practical

29/06/2012 Friday 10-12 AM 12:30-3 PM Learn about Creating Filters

30/06/2012 Saturday 10-12 AM 12:30-3 PM Learn about Java DatabaseConnectivity (JDBC) with DAO

01/07/2012 Sunday 10-12 AM Group Discursion

02/07/2012 Monday 10-12 AM 12:30-3PM Overview on Project

03/07/2012 Tuesday 10-12 AM 12:30-3 PM Design Data Base

04/07/2012 Wednesday 10-12 AM 12:30-3 PM Design User Registration Form

05/07/2012 Thursday 10-12 AM 12:30-3 PM Design Login Form

 Note: Please include attachment wherever necessary.

Declaration hereby declare that all information provided above is true

215, Garima Arcade Shinde Ki Chhawani, Lashkar, GwaliorMob. : 900904508, 9630883466

(Signed by trainee) ( Date)

 ________________ ______________

Page 14: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 14/63

  DAILY DIARY

Name of the trainee: Anjali Kaushik

College: Maharana Pratap Collage Of Technology, Gwalior

Industry/Workplace: HCL,GWALIOR

Week No. 6

Department/Section: Computer Science & Engineering

Date: 06-12 July 2012

DATE DAY TIMING TOPICS

Theory  Practical

06/07/2012 Friday 10-12 AM 12:30-3 PM Design Product Category Form

07/07/2012 Saturday 10-12 AM 12:30-3 PM Design Product Form

08/07/2012 Sunday 10-12 AM Personal Interview

09/07/2012 Monday 10-12 AM 12:30-3 PM Update User Registration From

10/07/2012 Tuesday 10-12 AM 12:30-3 PM DisplayProject Item From andCategory Form

11/07/2012 Wednesday 10-12 AM 12:30-3 PM Bank Form

12/07/2012 Thursday 10-12 AM 12:30-3PM Transition Form

 Note: Please include attachment wherever necessary.

Declaration hereby declare that all information provided above is true

215, Garima Arcade Shinde Ki Chhawani, Lashkar, GwaliorMob. : 900904508, 9630883466

(Signed by trainee) ( Date)

Page 15: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 15/63

 ________________ ______________

DAILY DIARY

Name of the trainee: Anjali Kaushik

College: Maharana Pratap Collage Of Technology, Gwalior

Industry/Workplace: HCL,GWALIOR

Week No. 7

Department/Section: Computer Science & Engineering

Date: 13-15 July 2012

DATE DAY TIMING TOPICS

Theory  Practical

13/07/2012 Friday 10-12 AM 12:30-3PM Project Designing

14/07/2012 Saturday 10-12 AM 12:30-3PM Project Testing

15/07/2012 Sunday 10-12 AM 12:30-3PM Get together

 Note: Please include attachment wherever necessary.

Declaration hereby declare that all information provided above is true

215, Garima Arcade Shinde Ki Chhawani, Lashkar, GwaliorMob. : 900904508, 9630883466

(Signed by trainee) ( Date)

 ________________ ______________

Page 16: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 16/63

 

COMPANY PROFILE

Hindustan computer Ltd.

Type Private

Industry IT Services

Founded 11 August 1976

Headquarters Noida, India

Key people Shiv Nadar (Founder& Chairman)

Revenue US$ 6.2 billion (2012)

Employees 90,000 (2012)

Subsidiaries HCL Technologies

HCL Infosystems

Website

www.hcl.com

In 1976, Shiv Nadar, Arjun Malhotra,

Subhash Arora, Badam Kishore Kumar,

T.V Bharadwaj and Arun Kumar H

 jointly started a company named

Microcomp Limited.

The focus of the company was design

and manufacturing of scientific

calculators. The venture provided its

founders money to start a company that

focused on manufacturing computers.

The company name "HCL" used to

stand for "Hindustan Computer

Limited" but now HCL is the only one

name that the company goes by. HCL

received support from the Government

of Uttar Pradesh to set up

manufacturing in Noida. On February

1, 2013, Nadar announced that he would

step down as chairman of HCL

Corporation and his daughter Roshni

Page 17: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 17/63

 

 Nadar would become the next chairman.

Shiv Nadar ,(Chairman)

Shiv Nadar (born 14 July 1945) is anIndian industrialist and philanthropist. He

is the founder and chairman of HCl and

the Shiv Nadar Foundation. As of 2012,

his personal wealth is US$ 8.6 billion.

 Nadar founded HCL in the mid-1970s

and transformed the IT hardware

company into an IT Enterprise over the

next three decades by constantl

reinventing his company's focus. In 2008,

 Nadar was awarded Padma Bhushan for

his efforts in the IT industry.

 Nadar, nicknamed by friends as Magus

(Old Persian for Wizard), since mid-

1990s has focused his efforts in

developing the educational system of

India through the Shiv Nadar Foundation.

Page 18: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 18/63

 

OUR GUIDELINES FOR DEVELOPING A QUALITY PRODUCT 

The globally accepted Rational Unified Process is followed.

Skilled force ensures a product with international standard.

 Focus on successful and robust executable application.

 In depth analysis to understand the actual requirement and business

constraint.

Stress for generating new ideas during analysis which will enhance your

business.

Quality is a way of our life, not an afterthought.

Catch the major risks early and continuously and search for their remedy or

alternate solution.

 A future vision before developing an application assists in extensibility of

application, less and easy maintenance.

 Be in touch with you during whole life cycle of project. This makes the things

transparent that we are doing work on common tasks or requirements.

Standard design patterns (object oriented) are adopted to make the reusability

of the things.

Work with some of the most successful and expertise individuals,

Page 19: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 19/63

 

entrepreneurs and corporations and bring solutions to their most challenging

and complex issues of the day.

 Formed by a team of young and enterprising IT professionals, ETH LTD.

 PUNE.aims at blending knowledge and skills to provide results that match

 your requirements

 At ETH LTD. PUNE, we believe in listening, analyzing, advising, and

implementing new projects and concepts to effectively present complex

information.

Problem Defi nition & I dentifi cation

System Analysis is the most critical phase of a project. It is during that we learn about the

existing business marketing system, come to understand its problems, define objectives for

improvement, and define the detailed business requirements that must be fulfilled by any

subsequent technical solution. Clearly, any subsequent design and implementation of a new

system depends on the quality of the preceding systems analysis.

System analysis is the dissection of a system into its component pieces to study how those

component pieces interact & work.

System analysis of the pro ject “ONLINE SHOPPING” Consist the following sections.

  I denti f ication of the need

As a first step in the analysis of the system, the end-users of the proposed system were

meeting to get first hand information regarding their needs and wants. Ideas from the both the

side were exchanged in order to get a standard and satisfactory system. Once overall goal were

identified, a detailed analysis on the technology needed to make the System functional was made

.

  Problem defi ni tion

The first step is to define the  problem that led to the client’s request. Let’s first examine the

 brief statement of the  problem made by the client

Page 20: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 20/63

  Br ief statement of problem

In a market there is lot of work related to the purchasing, marketing and others. Presently the

organization is carrying on all the required processes manually on papers. The recruitment

 process, selection process, information related to there products company information, theredesignation, products rates, etc. so the organization finds out that storing entire information on

 papers is very difficult because if they want to see the record of a particular item details and

other information.

Preliminary I nvestigation  

When the brief statement of the problem made by the Human Resource Management as

explained in Identification of the need, the first system activity begins,

i.e. preliminary investigation. It has 3 parts:-

  REQUEST CLARIFI CATION  

Many requests from the Staff members in organization are not clearly stated. Therefore,

 before any systems investigations can be considered, the project request must be examined to

determine precisely what the originator wants. Clarification of the project request is a must.

  For the clarification of the project request the better way out is to conduct interviews with

various level of Staff members of the Company.

  FEASIBI LI TY STUDY  

The feasibility study is carried out to test if the proposed system worth being

implemented. Given unlimited resources and infinite time, all projects are feasible. Hence it

 become booty necessary and prudent to evaluate the feasibility of the project at the earliest

 possible time in order to avoid unnecessary wasted of time, effort and professional

embarrassment over an all - conceived system. Feasibility study is a test of system proposedregarding its workability. Impact on the organization ability to meet user need and effective use

of resources. It is usually carried out by the small group of people who are familiar with the

information system technique, understand the part of the business or organization that will be

involved or affected by the project, and are skilled in the System Analysis and Design process.

The purpose of feasibility study is not to solve the problem but to determine if the problem is

worth solving.

Page 21: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 21/63

 

  REQUEST APPROVAL

After all aspects of the System Analysis of the project “ONLINE SHOPPING” are deeply

explored with starting with problem definition, analysis of problem statement by Human

Resource Management, and brief statement of the expected solution, preliminary investigationcovering each and every level of Staff member of the organization, findings of the investigation

& after feasibility study concluded that the project is feasible in every aspect the request made by

the organization is approved. 

FI NDING OF PROJECT(ONLI NE SHOPING)

More people would shop onl ine if they trusted the Online shopping envir onment

Internet users’ attitudes about online shopping are not entirely consistent. They are 

willing to shop online because it is convenient and a time-saver, but they also do not like sending personal or credit card information over the internet. Our analysis suggests that if concerns aboutthe safety of the online shopping environment were eased and if shoppers felt that onlineshopping saved them time and was convenient, the number of online shoppers would be higher.

It is possible to sort through these different attitudes to see what matter more in

influencing people’s propensities to shop online.1 Using as the baseline internet users’ 

response to the question about whether they have ever bought a product such as a book,

music, toy or clothing online, the analysis asks what would happen to levels of online

shopping if certain attitudes were different. We find that concerns about sending personal orcredit card information online loom largest in influencing whether to shop online.

Page 22: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 22/63

Specifically:

 If the three-quarters of internet users who agree that they don’t like sending 

personal or credit card information online felt more confident about doing this, the

share of the internet population shopping online would be 7 percentage points higher

than the current average of 66%, or 73%.

 If those who disagree that online shopping is convenient felt otherwise, the share of

the internet population shopping online would be 3 percentage points higher than the

current average (or 69% instead of 66%)

 If those who disagree that online shopping saves time believed that they could save

time by e-shopping, the share of the online population shopping online would be 2

 percentage points higher than the current average (or 68% instead of 66%).

The estimates above are independent effects, showing the impact when the other factors

noted above, as well as other demographic and socio-economic impacts are held constant.

In fact, demographic factors such as race or gender have no significant impact on

 predicting levels of online shopping, and the impact of income is small; if low-income

Americans suddenly had at least average incomes the incidence of online shopping

would be one percentage point higher.

Finally, higher broadband deployment would also drive up the size of the e-shopper

cohort by 6 percentage points.

Overview

About Onl ine Shopping

Online shopping  or online retailing  is a form of  electronic commerce wherebyconsumers directly buy goods or  services from a seller over the Internet without an intermediary

service. An online shop, eshop, e-store, Internet shop, webshop, webstore, online store, or virtual

store evokes the physical analogy of buying products or services at a bricks-and-

mortar  retailer or  shopping centre.  The process is called business-to-consumer (B2C) online

shopping. When a business buys from another business it is called business-to-business (B2B)

online shopping. The largest online retailing corporations are EBay and Amazon.com,  both of

Page 23: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 23/63

which are US-based.

Online customers must have access to a computer and a method of payment. 

In general, higher levels of education, income, and occupation of the head of the

household correspond to more favorable perceptions of shopping online. Also, increased

exposure to technology increases the probability of developing favorable attitudes towards new

shopping channels.

Online shoppers commonly use a credit card  to make payments, however some systems enable

users to create accounts and pay by alternative means, such as:

  Billing to mobile phones and landlines 

  Cash on delivery (C.O.D., offered by very few online stores)

  Cheque /  Check

   Debit card  

   Direct debit in some countries

   Electronic money of various types

  Gift cards 

   Postal money order  

  Wire transfer  / delivery on payment

Some sites will not accept international credit cards, some require both the purchaser's billing

address and shipping address to be in the same country in which site does its business, and still

other sites allow customers from anywhere to send gifts anywhere. The financial part of a

transaction might be processed in real time (for example, letting the consumer know their credit

card was declined before they log off), or might be done later as part of the fulfillment process.

Product del ivery

Once a payment has been accepted the goods or services can be delivered in the following ways.

  Drop shipping: The order is passed to the manufacturer or third-party distributor, who ships

the item directly to the consumer, bypassing the retailer's physical location to save time,

money, and space.

  In-store pickup: The customer orders online, finds a local store using locator software and picks the product up at the closest store. This is the method often used in the  bricks and

clicks business model.

  Printing out, provision of a code for, or  emailing of such items as admission

tickets and scrip (e.g., gift certificates and coupons). The tickets, codes, or coupons may be

redeemed at the appropriate physical or online premises and their content reviewed to verify

their eligility (e.g., assurances that the right of admission or use is redeemed at the correct

Page 24: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 24/63

time and place, for the correct dollar amount, and for the correct number of uses).

  Shipping: The product is shipped to the customer's address or that of a customer-designated

third party.

  Will call, lCOBO (in Care Of Box Office), or "at the door" pickup: The patron picks up pre-

 purchased tickets for an event, such as a play, sporting event, or concert, either just beforethe event or in advance. With the onset of the Internet and e-commerce sites, which allow

customers to buy tickets online, the popularity of this service has increased.

Shopping cart systems 

  Simple systems allow the offline administration of products and categories. The shop is then

generated as HTML files and graphics that can be uploaded to a webspace.the systems do not

use an online database.  A high end solution can be bought or rented as a standalone program or as an addition to

an enterprise resource planning  program. It is usually installed on the company's own

webserver and may integrate into the existing supply chain so that ordering, payment,

delivery, accounting and warehousing can be automated to a large extent.

  Commercial systems can also be tailored to one's needs so the shop does not have to be

created from scratch. By using a pre-existing framework, software modules for various

functionalities required by a web shop can be adapted and combined.

Document Collection

I ntroduction to the tools

ABOUT JAVA

JAVA is a platform Independent Language. It is important to Internet programming.

(One of the points to be noted about Java is that, it has developed concurrently with the WEB

Programming in which the APPLETS, SERVLETS, are the ways to enhance the results of

HTML Pages on the Net.) The NET Pages of the Module “Online Bus Reservation” of portal

Destination Travels.Com are also Designed, Developed with functionality by Servlet in the

Page 25: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 25/63

 background, which not only enhance the NET pages in the foreground but also maintains the

requirements of the Visitors. Various remarkable features of Java that makes this language

getting universal acceptance are:

Portability  

It can work on all types of computers and operating systems.

Security

It achieves security by confining a Java program to the Java execution environment andnot allowing access to other parts of computer .

Object Oriented

Java is totally object oriented. This provides benefits such as reusability; it decreases

complexity and is easy to debug.

What Java Is

The basics: Java is an object-oriented programming language developed by Sun Microsystems

that plays to the strengths of the Internet.

Object-oriented programming (OOP) is an unusual but powerful way to develop software. In

OOP, a computer program is considered to be a group of objects that interact with each other.

The feature that is best known about Java is that it can be used to create programs that execute

from World Wide Web pages. These programs are called applets.

A Java program is created as a text file with the file extension .java. It is compiled into one

or more files of byte codes with the extension .class. Byte codes are sets of instructions similar to

the machine code instructions created when a computer program is compiled. The difference is

Page 26: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 26/63

that machine code must run on the computer system it was compiled for, and byte codes can run

on any computer system equipped to handle Java programs.

Java I s Object Oriented

Object-oriented programming (OOP) is a powerful way of organizing and developing software.

The short-form description of OOP is that it organizes a program as a set of components called

objects. These objects exist independently of each other, and they have rules for communicating

with other objects and for telling those objects to do things.

Java inherits its object-oriented concepts from C++ and other languages such as Smalltalk.

The fact that a programming language is object oriented may not seem like a benefit to some.

Object-oriented programming can be an intimidating subject to tackle, even if you have some

experience programming with other languages. However, object-oriented programs are more

adaptable for use in other projects, easier to understand, and more bug proof.

The language includes a set of class libraries that provide basic variable types, system input and

output capabilities, and other functions. It also includes classes to support networking, Internet

 protocols, and graphical user interface functions.

Java I s Safe

Another thing essential to Java's success is that it be safe. The original reason for Java to execute

reliably was that people expect their waffle irons not to kill them or to exhibit any other

unreliable behavior. This emphasis on security was well-suited for Java's adaptation to the World

Wide Web.

A Java program that executes from a Web page is called an applet. All other Java programs are

called applications. When an applet is encountered on a Web page (if the user's browser can

handle Java), the browser downloads the applet along with the text and images on the page. The

applet then runs on the user's computer. This act should raise a red flag-danger!danger!-becausea lot of harmful things can occur when programs are executed: viruses, Trojan horses, the

Microsoft Network, and so on.

Java provides security on several different levels. First, the language was designed to make it

extremely difficult to execute damaging code. The elimination of pointers is a big step in this

regard. Pointers are a powerful feature, as the programmers of C-like languages can attest, but

Page 27: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 27/63

 pointers can be used to forge access to parts of a program where access is not allowed, and to

access areas in memory that are supposed to be unalterable. By eliminating all pointers except

for a limited form of references to objects, Java is a much more secure language.

Because of the multiple levels of security, and the continued efforts to improve these measures,

Java is generally regarded as a secure means to execute code over the World Wide Web.

The Java API

The Java Application Programming Interface (API) is a set of classes used to develop Java

 programs. These classes are organized into groups called packages. There are packages for the

following tasks:

   Numeric variable and string manipulation  Image creation and manipulation  File input and output   Networking  Windowing and graphical user interface design  Applet programming  Error handling

The API includes enough functionality to create sophisticated applets and applications. The Java

API must be supported by all operating systems and Web software equipped to execute Java

 programs, so you can count on the existence of Java API class files when developing programs.

The Java API is at version 1.0.2 at this time; Sun will make no changes in future versions that

would require changes to source code. Although enhancements are planned for future releases of

the API, there will be no removals or changes to class behavior.

Extended APIs

In addition to the basic API that must be present with all Java implementations, Sun is

developing extended APIs that extend the features of the language.

All but one of the following classes are in various stages of development at Sun:

  Commerce API, for secure commercial transactions  Security API, which adds advanced security features, an improved byte code verifier,

encryption, and other features  Three Enterprise APIs, to connect programs with enterprise database and legacy

applications

Page 28: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 28/63

  Media API, which adds multimedia classes for graphics, sound, video, 3D, VRML, andtelephony

  Java Beans component APIs, to connect Java to reusable software component schemessuch as Microsoft ActiveX, Netscape Live Connect, and OpenDoc

  Servlet API, which creates applet-like Java programs that can run on a Web server

  Management API, to integrate with network management systems, which will be offeredas part of the Solstice Workshop development tool

  Additional Abstract Windowing Toolkit classes, to extend the capabilities of Java'sgraphical user interface

  An object serialization API, which enables objects to be stored on and loaded from disks

Java Beans is the most likely of the extended APIs to appear first, although the enhanced security

APIs are close to completion. If you guessed that the Socratic API was the false one, move

forward two spaces-you're right. However, Microsoft could not take the risk that another

company would be first to implement it-the Socratic API will begin development with ActiveX

later this year.

Servlet

A Servlet can be thought of as a server-side applet.servlets are loaded and executed by a web s

the same manner that applets are loaded and execute by web browser.

Fig: Basic Servlet flow

As shown in figure a Servlet accepts requests from a client ((via the Web server), perfor

task, and returns the results.

The following list describes the basic flow when using Servlet.

Page 29: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 29/63

  The client (most likely a web browser) makes a request via HTTP.

  The web server receives the request and forwards it to the servlet.if the Servletyet been loaded, the web server will load it into the java virtual machine and exe

  The Servlet will receive the HTTP request and perform some type of process.

  The Servlet will return a response back to the Web server.

  The web server will forward the response to the client.Servlet is executing on the server, the security issues usually associated with applets

apply. This opens up a tremendous number of opportunities that are not possible, or at least

difficult, when working with applets. Communicating with legacy systems via CORB

sockets and native calls are just a few examples. Also keep in mind that the Web Browser

communicate directly with a Servlet, the Servlet is loaded and executed by the Web Ser

means that if Web server is secure behind a firewall, then Servlet is secure as well.

A Servlet is a dynamically loaded module that services requests from a Webserver. It runs entirely inside the Java Virtual Machine. Because the Servlet is running on the

server side, it does not depend on browser compatibility.

Servlet are modules that extend request/response- oriented servers, such as Java-

enabled web servers. For example, a Servlet might be responsible for taking data in an HTML

order entry form and applying the business logic used to update a company’s order database. 

Servlet are to servers, what applets are to browser. Unlike applet however Servlet have

no graphical user interface. Servlet can be embedded in many different servers because the

Servlet API, which you use to write Servlet, assumes nothing about server’s environment or

 protocol. Servlet have become most widely used within HTTP servers.

Uses of Servlet

Here are a few more of the many applications of Servlet:

Allowing collaboration between people: - A Servlet can handle multiple requests concurrently,

and can synchronize requests. This allows Servlet to support systems such as on-line

conferencing.

Page 30: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 30/63

 

Forwarding requests:- Servlet can forward requests to other servers and Servlet. Thus, Servlet

can be used to balance load among several servers that mirror the same content, and to partition a

single logical service over several servers, according to task type or organizational boundaries.

Benefi ts Of Using Servlet

Efficient:- A servlet’s initialization code is executed only the first time the Web server loads it.After the Servlet is loaded, handling new requests is only a matter of calling a service method.This is a much more efficient technique than loading a completely new executable with request.

Persistent:- Servlet can maintain state between requests. When a servlet is loaded, it stays resident inmemory while serving incoming requests. A simple example of this would be a vector that holds a list of

categories used in an online catalog. When the Servlet is initialized, it queries the database for a list of

categories in a Vector .As it services requests, the Servlet accesses the Vector that holds the categories

instead of querying the database again. Taking advantage of the persistent characteristics of Servlets can

improve our applications performance drastically.

Portable:- Servlets are developed using Java; therefore, they are portable. This enables servletsto be moved to a new operating system without changing the source. We can take code that wascompiled on Windows NT platform and move it to a Solaris box without making any changes. 

Robust:- Because servlets are developed with access to the entire JDK, they are very powerfuland robust solutions. Java provides a very well defined exception hierarchy for error handling. Ithas a garbage collector to prevent problems with memory leaks. In addition, it includes a verylarge class library that includes network support, file support database access, distributed objectcomponents, security, and many other classes. 

Extensible:-  Another advantage servlets gain by being developed in an Object -Orientedlanguage like Java is they can be extended and polymorphed into new objects that better suit ourneeds. A good example of this is an online catalog. We might want to display the same catalogsearch tool at the top of every dynamic page throughout our Web site. We definitely don’t want

to add this code to every one of our servlets. So, we implement a base servlet that builds andinitializes the search tool and extend it to display transaction-specific responses. 

The Servlet interface declares, but does not implement, methods that manage the servlet and its

communications with clients. Servlet provide some or all of these methods when developing a servlet.

Page 31: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 31/63

 

1. Server loads the servlet.

2. Server creates one or more instance of Servlet class.

3. Server calls the init () method of each Servlet instance.

4. Servlet request is received.

5. Servlet selects Servlet instance and calls its service () method.

6. Servlet service () method processes the request and returns output to client.

7. Servlet waits until next request is received or server unloads it.

8. Servlet unloads the servlet after calling it’s destroy () method. 

Page 32: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 32/63

 

Data flow diagram

catid

User registration

Products

Process To

Store data

ATM

Invoice

Process To

Store Data

User Registration

Process To

Store Data

Process To

Store Data

Invoice

User

Product

Country

State

City

Category Process To

Store Data

Category

Database

Page 33: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 33/63

 

Use Case diagram

Country

State

City

Registration

Login

Products

Admin

User

Page 34: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 34/63

 

ER diagram

ISD Code Country

NameUser ID First

Name

Second

Name

Password

Email

ICON

Category ID Cat_Name

City Code

City Name

State Code

State Code

State Name

ISD Code

Category ID Product ID Product Name

ATM INVOICE

Category PRODUCTS

USER

REGISRATION

City

State

Country

Bill

Bill NoDescriptionPicture

PriceCompany Rate

UserId

Cust.NoBalance

Account NoCard no

CityAmount

State

Country

Address

Pin no

Card type

Bank NameExpiry Date

Page 35: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 35/63

 

TIM E REQUIREMENT AND SCHDULI NG

If we talk about time requirement, there is approximately three month ( 90 days) we will have to

required for to completion of this project. This project required a deep knowledge of C#.Net,

ADO.Net, Asp.Net, Sql Server2005

COST ESTIMATION

Its cost is under the budget and make within given time period. It is desirable to aim for a system

with a minimum cost subject to the condition that it must satisfy the entire requirement.

S/W & H/W REQUIREMENT SPECIFI CATION

Software Requi rement

  Microsoft Windows XP, Microsoft Windows NT or Microsoft Windows 2000.

  Core Java

  JDBC

  Servlet

  Apache Tomcat 4.0 

  MS-Access 

Hardware Requirement  

  20 GB HDD 128 MB system RAM (Minimum)  PIII /Celeron Or Above 1.Ghz CPU

Page 36: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 36/63

 

Modules  

A) CLIENT-SIDE MODULES  

1)  Homepage2)  Add in cart3)  Login form4)  Registration5)  Invoice6)  Payment

 B) ADMIN-SIDE MODULES

1)  Admin Login2)  Add Category3)  Add New Product4)  Update Product5)  Show All Product

C) TABLES  

1)  Registration2)  Category3)  Product4)  Invoice5)  Atm6)  Transaction7)  Country8)  State9)  City

Page 37: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 37/63

 

SYSTEM CONF IGURATION SPECIFI CATION

  Microsoft Window XP SP -2  Processor: Intel [email protected] GHz  RAM: 2GB  Hard disk: 40 GB

Technology Specif ication

  Core Java

   JDBC

  Servlet

   MS-Access

   HTML

  CSS

Designing of Modules

ADMI N LOGIN  

Page 38: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 38/63

 

ADMIN HOME PAGE  

Page 39: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 39/63

 

ADD CATEGORIES

Page 40: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 40/63

 

Page 41: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 41/63

DI SPLAY CATEGORY

Page 42: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 42/63

ADD NEW PRODUCTS

Page 43: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 43/63

PRODUCTS DI SPLAY

DI SPLAY EMPLOYEE

Page 44: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 44/63

 

UPDATE EMPLOYEE INFORMATION

Page 45: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 45/63

 

CREATE BANK ACCOUNT

Page 46: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 46/63

 

USER REGISTRATION

Page 47: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 47/63

 

Page 48: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 48/63

USER HOME PAGE

Page 49: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 49/63

 

SEACHING CATEGORY OR PRODUCT

Page 50: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 50/63

 

AFTER SEARCHING SHOW PRODUCTS

Page 51: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 51/63

 

ADD PROJECT IN CART

Page 52: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 52/63

 

PRODUCT CONF IRMATION

Page 53: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 53/63

 

USER INVOICE

Page 54: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 54/63

 

AFTER PURCHES PRODUCT  

Designing of tables  

User Registration

Page 55: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 55/63

Page 56: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 56/63

 

TRANSACTION

TESTING

Page 57: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 57/63

TEST PLAN  

The importance of software testing and its implications cannot be over emphasized.

Software testing is a critical element of software quality assurance and represents the ultimate

review of the specifications, design and coding.

TESTING OBJECTIVES:

The main objective of testing is to uncover a host of errors, systematically and with

minimum effort and time. Stating formally we can say,

  Testing is a process of executing a program with the intent of finding an error.

  A successful test is one that uncovers an as yet undiscovered error.

  A good test case is one that has a high probability of finding an error, if it exists.

But there is one thing that testing cannot do (just to quote a very famous sentence)

“Testing cannot show the absence of defects, it can only show that software defects are present”. 

As the test results are gathered and evaluated they begin to a qualitative indication of the

reliability of the software. If severe errors are detected, the overall quality of the software is a

natural suspect. If, on the other hand, all the errors, which are encountered, are easily modifiable,

then one of the two conclusions can be made:

  The tests are inadequate to detect possibly present errors.

  The software more or less confirms to the quality and reliable standards.For the purpose of the current project we are assuming that in the event that errors that

are easily modifiable points to the later possibility, since repeating the entire testing routine can

 be very time consuming. What we propose to do instead is to get it tested by one or more persons

who are not a part of the development team. But is well versed with the subject and with the

concept of software testing (alpha testing). If he can detect no serious errors, it will enable us to

state with more confidence that the software does actually confirm to the expected standards.

TESTING STRATEGY:  

A testing strategy is a roadway, giving how to conduct a test. Our testing strategy is

flexible enough to promote customization that may be necessary in due course of development

 process. For instance during coding we found that a change in design. We maintain a change log

and refer to it at appropriate time during the testing.

Page 58: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 58/63

The developed application software is tested in the following way:

  Knowing the specific functions that the software is expected to perform, tests can be

conducted to confirm that all functions are fully operational.

  Knowing the internal workings of the project, tests can be conducted to show that internal

operations of the system perform according to the specifications and all internal

components are adequately exercised.

The first approach is what is known as Black box testing and the second approach is called

White box testing. We apply the white box testing techniques to ascertain the functionalities top

down and then we use black box testing to demonstrate that everything runs as expected

Test Case Design:- Test Case Design M ethods are bel low:

Whi te Box Testing:

It also called glass box Testing ,It is the test case design method that uses the case By this

method we drive following test –  

1.  Guarentee that all independent pathgs with in a module have been exercised at

least once.

2.  Exercise all logical decisions on their true and false sides

3.  Exercise all loops at their true and false side .

4.  Exercice internal data structures to assure their validity.

Black Box Testing :

1.  Exercise all graph based testing method.

2.  Exercise all Equivalence partitioning .

3.  Exercise all Boundry value analysis.

The techniques that are used in deriving the test cases are explained below.

Condition Testing :-

Condition testing is a test case design method that exercises the logical conditions

contained in the program. The possible components in a condition statement are a Boolean

operator, a Boolean variable, a relational operator, arithmetic expression and parenthesis around

simple or compound conditions. The condition testing method focuses on testing each condition

in the program.

Page 59: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 59/63

It has two advantages over the pure White box testing:

  Measurement of test coverage of conditions in a program provides guidance for generation of

additional tests for the program.

  Measurement of test coverage is straightforward 

  We have used special condition testing method called theDomain Testing where the condition in a form lie E1< Relational operator > E2 will the tested

for three conditions E1>E2, E1 equal to E2 and E1<E2.

Boundary Value Analysis:-  

Boundary value analysis leads to a selection of test cases that exercise the boundary

conditions or bounding values. It has been observed that a large number of errors tend to appear

at the boundaries of the input domain that in the center. The guidelines for developing the test

cases in a BVA are given below.

  If the input condition has a low and high range then tests should be done at the low and

high boundaries. Values above and below these extremes should be tested.

  Apply the same principle to output conditions. E.g. test cases should be designed to

generate the maximum and minimum number of entries in a report that is generated by the

 program. 

Equivalence parti tioning :-  

This is a Black box testing method that divides the input domain of a program into classes of

data from which test cases can be derived. A typical test case uncovers a class of errors that

might otherwise require many more test cases before the error is observed. Equivalence classes

for input determine the valid and invalid inputs for the program. Equivalence class test cases are

generated using the following guidelines.

  If an input class specifies a range then one valid and two invalid equivalence classes are

defined.  If an input class specifies a value then one valid and one invalid equivalence classes are

defined.

  If an input class specifies a member of a set then one valid and one invalid equivalence

classes are defined.

  If an input class specifies a Boolean then one valid and two invalid equivalence classes are

defined.

Page 60: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 60/63

Test cases should be selected so that the largest number of attributes of an equivalence class is

exercised at once.

  All the above-described test cases are handled successfully in this project.

Test Execution

Unit testing: -  In unit testing we focused verification on the smallest unit of software i.e. the

module. Using the detailed design and the process specifications testing is done to uncover errors

with in the boundary of the module. All modules must be successful in the unit test before the

start of the integration testing begins. 

I ntegration Testing:-   It is a systematic technique for constructing the program structure

while conducting tests, at the same time to uncover errors associated with interfacing. We have

used incremental integration testing for this project. 

Val idation Testing :-  At the culmination of integration testing the software is complete as a

 package and the interfacing errors have been uncovered and fixed, final tests-validation testing-

may begin. Validation tests succeed when the software performs exactly in the manner as

expected by the user. Software validation is done by a series of Black box tests that demonstrate

the conformance with requirements. Alpha & Beta testing fall in this category. We have done

Alpha testing in this project.

SYSTEM TESTING

Here the system testing involved is the most widely used testing process consists of five stages

as shown in the figure. In general, the sequence of testing activities is component testing,integration testing then user testing. However, as defects are discovered at any one stage, they

required program modifications to correct them and this may required other stages in the

testing process to be repeated.

Page 61: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 61/63

 

IMPLEMENTATION  

The Implementation of the application developed for Human Resource Management isimplemented in the following way:-

Change over:-

Unit Testing

Sub System

Testing

System Testing

Modul Testing

 Acceptance

Testin

Page 62: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 62/63

The change over process of the project “ONLINE SHOPPING” is implemented in the

following way. The new system involved in installing new hardware and preparing data. The

change over from manual to computerization of the organization has been done by two methods

of handling systems conversion.

Parallel running:-

Parallel running or operation means processing current data by new system to cross check

the results with the old system. Its main attraction is that the old system is kept live and

operational until the new system has been proved as a success one. The application developed is

implemented in this way. Because in this method we have tested the current transactions in both

ways and at the end of analysis of the reports generated by manual and automated system we

come to a conclusion that the application developed meets the requirement of the organization

efficiently. So, the application developed (ONLINE SHOPPING) is implemented directly after parallel running proved to be a success.

Training:-  

Training involves creating the right atmosphere and motivating user Staff. The sessions

are targeted to make the computer system more acceptable by reasoning out and explaining the

 benefits this package could provide to the user and the amount of clerical effort that is being

reduced. Also the users are educated how there work would get interesting rather than feelingthis would eliminate their jobs. The existing jobs are changed but not eliminated.

Training sessions are targeted on how to work with the package, how to navigate through

the package and so on. Training sessions are felt essential in the client’s work place, as it would

help them to work with the package in a faster and in an efficient manner.

Concluding remarks :-

The customized package Human Resource Management System fulfills the requirements

as stated by the client. This package took the first step in automizing the client’s manual system

 but a scope of improvement is a part of life and is inevitable for survival and this is no exception

to this package. Any improvement if found necessary would be incorporated in the next release

of Human Resource Management System.

Page 63: Training File Ketaki

8/13/2019 Training File Ketaki

http://slidepdf.com/reader/full/training-file-ketaki 63/63

 

Appli cation area  

Online shopping or online retailing is a form of  electronic commerce whereby consumersdirectly buy goods or  services from a seller over the Internet without an intermediary service. An

online shop, eshop, e-store, Internet shop, webshop, webstore,  online store, or virtual store

evokes the physical analogy of buying products or services at a bricks-and-

mortar  retailer or  shopping centre

Reference  

  www.google.com 

  www.w3school.com 

  www.ebay.com 

  www.filpcart.com

  Black Book

  Complete Reference Book …etc.