91
Executive Summary The main objective of Job Consultancy is to make easy for job seekers for searching jobs and recruiting for companies. It acts as a mediator between the jobseekers and companies. Companies ask required number of candidates and consultancy for wad the list of candidates to the company. It also sends a list of companies to jobseekers to which are recruiting. For a new user or general user there are various modules helping him for entering into consultancy. For a new user he has to enter their details according to the registration form. He has to select is own registration number through which he has to login. There are several modules that work once when the user is logged in with his registration number and password. The user can choose any of the components displayed and can avail the services according to his need. Username and password is given for each user so that the system recognizes them as authorised user. Multiple logins with same identity is not allowed. The major prospect of this project is to make .net enabled applications which is administrative based to provide the complete information of the Job consultancy’s that the job Page 1

Raman Synopsis

Embed Size (px)

Citation preview

Executive Summary

The main objective of Job Consultancy is to make easy for job seekers for

searching jobs and recruiting for companies. It acts as a mediator between the jobseekers

and companies. Companies ask required number of candidates and consultancy for wad

the list of candidates to the company. It also sends a list of companies to jobseekers to

which are recruiting.

For a new user or general user there are various modules helping him for entering

into consultancy. For a new user he has to enter their details according to the registration

form. He has to select is own registration number through which he has to login.

There are several modules that work once when the user is logged in with his registration

number and password. The user can choose any of the components displayed and can

avail the services according to his need.

Username and password is given for each user so that the system

recognizes them as authorised user. Multiple logins with same identity is not allowed.

The major prospect of this project is to make .net enabled applications which is

administrative based to provide the complete information of the Job consultancy’s that

the job seeker can be made easy in searching jobs and recruiting for companies. Net

enabled consultancy has changed the world in the age of information technology

therefore in the arena of post globalization.

Every citizen of the world should have access to the authorities. Using this

application, individual users can then place their own requirements and hence can

retrieve the information needed sitting at their place. Multiple logins with same identity is

not allowed.

In the past Jobseekers had to search for the jobs in newspaper articles and then had

to visit to the company office and then used to get them registered or visit to the

Page 1

consultancy office for any of the jobs available with them from any company. The

companies used to give the advertisements by any of the media or they used to post

the jobs with the consultancy office. Now with this system none of the user need to

actually visit to the consultancy for the Jobs.

The project entitled ‘Online Job Consultancy’ can be easily accessed through web

from any remote location thus reducing the extra efforts required for the recruitment

process.

In the current situation of recession in every sector of the economy, there is a need of

such a reliable system which can reduce the efforts of the recruitment process. Some

of the elements of the society are also taking benefits of the situation and trying to

make fool people by giving information about the fake companies and by conducting

interviews for the fake names, so there is a requirement for a system which is

reliable in this context.

Page 2

Problem Definition

MAJOR PROSPECT

Proposed System:The major prospect of this project is to make ASP.NET enabled applications

which is administrative based to make searching jobs easier for job seekers and

also recruiting for companies. The system contains all services for Jobseekers and

Employers, by which they can get best out of it with less time and efforts.

Benefits Of Proposed System:

.NET enabled consultancy has changed the world in the age of information

technology therefore in the arena of post globalization.

Every citizen of the world should have access to the authorities. Using this

application, individual users can then place their own requirements and hence can

retrieve the information needed sitting at their place. Multiple logins with same

identity is not allowed.

Page 3

FEATURES

Online Job Consultancy is intentionally built with a minimal feature set.

Registered company can post any number of the jobs with the system.

Registered jobseeker can apply to any number of the jobs with the system.

Authentication mechanisms are provided to ensure that data is kept secure from

unauthorized access. Objects can be made private or public, and rights can be

granted to specific users.

Uses standards-based REST and SOAP interfaces designed to work with any

Internet-development toolkit.

Built to be flexible so that protocol or functional layers can easily be added.

Default download protocol is HTTP. A BitTorrent™ protocol interface is

provided to lower costs for high-scale distribution. Additional interfaces will be

added in the future.

Reliability backed with the Online Job Consultancy service Level Agreement.

Page 4

PRODUCT FUNCTION

First of all, users, both the company and jobseeker need to get registered to get all

the benefits of the system and its free of cost and easy. As user has to request for

the registration form and has to fill the form and submit it to the system and then

all his details will get stored in the system, database and he is given a unique

U_Id. After registration process users are authorized for all the facilities of their

respective domain.

The main and initial function of the system is to allow companies to post jobs and

let the registered user search and apply to the jobs available with the system. It

manages proper authorization, so as none of the user can access other user’s

domain. Thus the system proves to be highly reliable and secure.

It provides an effective way to login into the system and to avail the services of

the system. This system is perfectly secure because of a secure database that is

used in the backhand of the system. This database can only be accessed by the

administrator of the website.

Page 5

OBJECTIVE

The objective of this software is to completely automate the following processes:

Online Job Consultancy system is based on the idea of reducing the time and

efforts required for the recruitment process. As the company which wants to

recruit people has to search for the people with the required professional skills

through various advertisements and articles, with this system the company can

post the job with all its descriptions about the requirements from any remote

location and need not to worry about getting the right people. As this system

keeps record of all the registered Jobseekers, so what this system does it matches

the qualification of the candidates and the requirements of the job from various

companies and then sends the details to both the users.

Jobseekers are also benefited by the system as after registration they can search

for jobs according to their qualification, location and Functional area from any

remote location. The system will then forward all the details to both the parties,

recruiting company and applying user.

As the system is available on the web so none of the user needs to visit the

consultancy office for accessing the system, it can be easily accessed from any

remote location.

Page 6

Provide an innovative, cost efficient and effective recruitment system.

Increase the quality and quantity of applicants applying for vacancies.

Offer immediate cost savings on recruitment with substantial long term saving

over a prolong period.

Dramatically reduce paper work and administrative work.

Streamline the recruitment process and reduce the corporate’s overall

recruitment cycle.

Since the system has been generated by using Object Oriented programming

there are chances of reusability of code in other environment even on

different platforms. Also its present features can be enhanced by some

simple modification in the codes so as to reuse it in the changing scenario.

The enhancement can be done when ever it require in the system without

disturbing the ongoing working on the system. As the user tells his/her new

requirements in the system, those changes can be done in the system by

making some changes in the web pages of the site of the system.

Before making any changes in the system, we just need to analyze the cost

and benefits. If we find it affordable and beneficial, we may upgrade our

system with those enhancements.

Page 7

TOOLS/PLATFORM USED:

SYSTEM IMPLEMENTATION

System will be installed on the Internet server with its backhand i.e. database.

That server will be the only system that will be responsible to save the

records of each and every individual user. This system will manage the

dataflow through the database about the companies and the jobseekers

registered with the system. The companies will post jobs and the jobseekers

will apply to it, Admin will actually manage the dataflow to both the parties

by accessing the database so as to make the system free from unauthorized

access and thus giving high reliability to the users of the system.

Technologies to be used:

Server-side requirements:

IIS/.NET Platform: For providing the basic framework of the server

component in this model.

Client-side requirements:

WEB Browser & internet /intranet connectivity: The client or the end-

user only requires Internet Browser to be installed on their machine with a

dedicated connection.

Page 8

DETAILS OF HARDWARE USED

These are the minimal requirements of the hardware that are needed in the

system to deploy the Online Job Consultancy..

Page 9

Processor:

RAM:

Hard Disk Space:

Pentium IV (1.8 GHz)

512 MB

1.5 GB

DETAILS OF SOFTWARE USED

Operating System:

Web browser:

Windows NT/200/XP

Internet Explorer 7.0, Mozilla Firefox, etc.

Front End:

Designing language:

Graphics design tools:

ASP.NET 3.5, ADO.NET, C#

Macromedia Flash, Adobe Photoshop 7.0

Back End:

DBMS

Other Databases

Editor

Micro Soft SQL Server 2005 (Enterprise

Edition)

Micro Soft Word,

Micro Soft Access,

Micro Soft Excel

Notepad,

WordPad

Page 10

Dependencies

It doesn’t matter how efficiently the application works, if the bandwidthIt doesn’t matter how efficiently the application works, if the bandwidth is not sufficient the transaction will take more time then expected.is not sufficient the transaction will take more time then expected.

.Net Framework for execution environment and Ado.Net Provides for.Net Framework for execution environment and Ado.Net Provides for database connectivity.database connectivity.

IIS server is required for the application.IIS server is required for the application. Although this software is architecturally independent but followingAlthough this software is architecturally independent but following

hardware resources are required. For i.e. any IBM compatible PC or anyhardware resources are required. For i.e. any IBM compatible PC or any other workstation with mouse support and relevant softwareother workstation with mouse support and relevant software

Page 11

LIST OF TABLES

Page 12

Serial No. Table Name

1 LOGIN

2 GENERAL

3 EDUCATIONAL

4 EXPERIENCE

5 COMPANY INFORMATION

6 ADD EMPLOYEE

7 COMPANY LOGIN

8 COMPANY REQUIREMENT’S

9 FILTER

10 COMPANY

11 EMPLOYEE

12 COMPANY FILTER

13 CONSULTANCY LOGIN

14 SELECTED CANDIDATES

List of Figures

Figure1 Context Diagram

Figure2 Registration

Figure3 Data Dictionary

Figure 4 Job seeker data flow

Figure 5 Consultancy data flow diagram

Figure 6 Company data flow diagram

Page 13

Introduction/Problem Definition

1.1 User Requirements1.1 User Requirements

1.1.1 Input requirements1.1.1 Input requirements

A legal citizen of India can Login on this site by entering his/her name as the username and his/her password

1.1.21.1.2 Output requirementsOutput requirements

Person should have a Email id For Login. There must be a net connection and browser to view the web pages of respective

site.

1.1.3 Functional Requirements1.1.3 Functional Requirements

Person should have a Email ID in any domain server.There must be a net connection and browser to view the web pages of respective site

1.1.4 External Interface Requirements1.1.4 External Interface Requirements

The user interface of software is responsible for all the interactions with the user. Almost every software has a user interface. Many users often judge a software product based on its user interface. An interface that is difficult to use leads to higher level of user errors and ultimately leads to user dissatisfaction. Users become particularly irritated when a system behaves in unexpected ways i.e. issued commands do not carry out actions according to the intuitive expectations of the user. Therefore, sufficient care and attention should be paid to the design of the user interface of any software product. Development of a good user interface usually takes significant portion of the total system development effort. This software is developed keeping in mind the basic characteristics of a good user interface. Some features of this software can be stated as:-

Page 14

It is very easy to learn. It does not require its users to memorize commands. Neither the users are asked to remember information from one screen to another while performing various tasks using the interface.

The time and user effort necessary to initiate and execute different commands is minimal.

It is very attractive to use. It catches user attention and fancy. It is a Graphical-based user interface.

The users can seek guidance and online help when they are unaware of some features of the software.

1.2 SCOPE OF THE FURTHER ENHANCMENT

The system maintenance is the inevitable process. System requirements always

change and so a system must evolve if it is to remain useful.

The object-oriented systems are easier to maintain, as the objects are independent.

They may be understood and modified as stand-alone entities. Changing the

implementation of an object or adding other services should not affect other

system objects. This improves the understandability of the design.

Page 15

1.2.4 Data Required & Data Collection Method

Data is completely based on the SRS given by the client,requirements do come during all

the phases of the process.

Methods of Data collection:

1. Client Interaction over audio conference calls,

2. VPN connection established so that the client can take a look on the

developing software.

3. Via e-mails.

4. After the demonstration of the partial build each time, client used to

give the feed back, so that necessary changes/ modifications could be

done.

5. Looked for different sites working in this domain.

Page 16

Systems Requirement Analysis

This project is developed for job aspirants who are in search of suitable job. This

project will be helpful for fresher as well as experienced professionals. It keeps track of

strong reputation for a systematic and hands-on approach to Human Resources

Consulting. It also undertakes to manage the needs for organizations particularly

small/medium and start-up companies on an outstanding basis.

Job consultancy acts like a mediator between job seekers and company.

This project contains seven modules.

1. Job seekers Registration Form

2. Employee Registration Form

3. Company placing job requirements on the site

4. Consultancy checking with their database

5. Consultancy after conducting first round of interview, short listed candidate

details will be send to company.

6. Company after conducting rounds of interviews, selected candidates list will be

send to consultancy.

7. Job seekers deletion process.

Page 17

MODULE DESCRIPTIOIN

1.Job seekers Registration Form

In this module we describe the job seekers details. Consultancy will place registration

form on the site. In this job seekers interact with the consultancy. Job seekers will take

registration form from the site and fill those forms and send to the consultancy.

Consultancy will store these registration forms in their database.

2.Employee Registration Form: In this module we describe the company details. Employees are interact with the

consultancy. Consultancy will provide registration form to the company. Company will

fill those form with their details and send to the consultancy and these details will be

stored in consultancy database.

3.Company placing job requirements on the site:

In this module company will interact with consultancy. Consultancy will place the form

on the site. This form is taken by the company. Company will fill those form according to

their requirements and this form will be sent back to the consultancy.

Consultancy will store it in their database.

4.Consultancy checking with their database:

In this module consultancy will check both the job seekers form and company

Requirement form. If they match the job seekers names will be short listed. This short

listed candidates details will be stored in consultancy database. Consultancy will inform

to the short listed candidates.

5.Consultancy after conducting first round of interview, short listed candidates details

will be send to the company:

In this module consultancy will conduct the interview to the job seekers. Based on

Page 18

their interview performance consultancy will short list the job seekers and those short

listed job seekers names will be send to the company and also stored in the consultancy

database.

6.Company after conducting rounds of interviews, selected candidates details will send

to the consultancy:

In this module company will conduct the interview to the short listed job seekers. If they

select in the interview that selected job seekers details will be send to the

Consultancy and consultancy will store this information in their database.

7. Job seekers deletion process:

In this module consultancy delete the job seekers details who are not interact with

consultancy in particular period.

Page 19

Systems Design

Physical Design

Dfd’s

I N T R O D U C T I O N

The DFD also known as the Bubble Chart is a simple graphical formalism that can be used to represent a system in terms of the input data to the system. Various processing carried out on these data, and the output data generated by the system. The main reason why the DFD technique is so popular is probably because of the fact that DFD is a very simple formalism-it is simple to understand and use. A DFD uses a very limited number of primitive symbols to represent the functions performed by a system and the data flow among these functions. Starting with a set of high-level functions that a system performs, a DFD model hierarchically represents various sub functions. The five different types of primitive symbols used for constructing DFDs are:

SYMBOLS USED:

PROCESS:

A function is represented using a circle. This symbol is called a process or a bubble. Bubbles are annotated with the names of the corresponding functions.

EXTERNAL ENTITY:

An external entity such as a librarian, a library member, etc. is represented by a rectangle. The external entities are essentially those physical entities external to the

Page 20

software system that interact with the system by inputting data to the system or by consuming the data produced by the system. In addition to the human users, the external entity symbols can be used to represent external hardware and software such as application software.

DATA FLOW:

A directed arc or an arrow is used as a data flow symbol. A data flow symbol represents the data flow occurring between two processes, or between an external entity and a process, in the direction of the data flow arrow. Data flow symbols are usually annotated with the corresponding data names.

DATA STORE:

A data store represents a logical file. It is represented using two parallel lines. A logical file can represent either a data store symbol, which can represent either a data structure, or a physical file on disk. Each data store is connected to a process by means of a data flow symbol. The direction of the data flow arrow shows whether data is being read from or written into a data store. A arrow flowing in or out of a data store implicitly represents the entire data of the data store and hence connecting to a data store need not be annotated with the name of the corresponding data items.

OUTPUT SYMBOL:

The output symbol is used when a hard copy is produced and the user of the copies cannot be clearly specified or there are several users of the output

Page 21

VALIDATES

APPOINTS

REGIS INFO

SETS

UNDERTAKES

DECLARES

DATA

figure 1

Page 22

REGISTR ATION

TEST

RESULT

CANDIDATE

ADMINISTRATO

OPERATOR

COMPANY

CANDIDATES -LIST

SPECIFICATIONS

Request for registration formOnline Job

ConsultancyServices

Request for emp reg form

Receiving emp reg form

Job seeker

LIST

GETS PROVIDES

ISSUES

ARE STORED

ED

SELECTED CANDIDATES

Figure 2

Page 23

CANDIDATES -LIST

SPECIFICATIONS

Figure 3: Data Dictionary

Figure4: JobSeeker Data Flow

Page 24

Job seeker

1Validationprocess

2Validating constraints

3Checking status

User table db

Uname/pswd

Login

Forward resume

Db user table

Db constraint

Page 25

Db Company

consultancy1

Validationprocess

2Checking Resumes

Login,usr,pwd

filteration

Db companies

Db consultancy

3Short listing

4Candidates’ details sent to company

Figure 5:Consultancy Data Flow Diagram

Page 26

Login,uname,pwdCompany

1Validation

Process

2Company placing jobs

Db consultancy

Db company table

3Short listed candidates Db Company

4selected candidates details

Db Consultancy

Figure 6:Company Data Flow

Introduction

2.1 Description of the system

2.2 Indianfresher.com SPECIFICATION:

The system specification is the final work produced by the system and requirements engineer. It serves as the foundation for hardware engineering, software engineering, database engineering and human engineering.

Once requirements have been gathered explore each requirements in relationship to others, examine requirements for consistency, omissions and ambiguity.

2.21 Hardware Specification

It is recommended that the minimum configuration for clients is as appended below:- Suggested Configuration of Windows clients:-

Microprocessor : Pentium-2 class processor, 450 megahertz MHz) Ram : 128 MB of RAM

Hard Disk : 2.5 gigabytes (GB) on installation drive, which Includes 500 MB on system drive.

CD ROM Drive : 52 X CD ROM Drive

2.22 Software Specifications

Operating System : Windows 2000XP/Windows 2000 NTRDBMS : Sql Server 2000Front End : Microsoft Visual Studio.NET

Page 27

2.3 DEPENDENCIES

It doesn’t matter how efficiently the application works, if theIt doesn’t matter how efficiently the application works, if the bandwidth is not sufficient the transaction will take more time thenbandwidth is not sufficient the transaction will take more time then expected.expected.

.Net Framework for execution environment and Ado.Net Provides.Net Framework for execution environment and Ado.Net Provides for database connectivity.for database connectivity.

IIS server is required for the application.IIS server is required for the application. Although this software is architecturally independent but followingAlthough this software is architecturally independent but following

hardware resources are required. For i.e. any IBM compatible PChardware resources are required. For i.e. any IBM compatible PC or any other workstation with mouse support and relevantor any other workstation with mouse support and relevant softwaresoftware

3.User Requirements3.User Requirements

3.1 Input requirements3.1 Input requirements

A legal citizen of India can Login on this site by entering his/her name as the username and his/her password

3.23.2 Output requirementsOutput requirements

Person should have a Email id For Login. There must be a net connection and browser to view the web pages of respective

site.

3.33.3 Functional Requirements Functional Requirements

Person should have a Email ID in any domain server.There must be a net connection and browser to view the web pages of respective site

3.43.4 External Interface RequirementsExternal Interface Requirements

The user interface of software is responsible for all the interactions with the user. Almost every software has a user interface. Many users often judge a software product based on its user interface. An interface that is difficult to use leads to higher level of user errors and ultimately leads to user dissatisfaction. Users become particularly irritated when a system behaves in unexpected ways i.e. issued commands do not carry out actions according to the intuitive expectations

Page 28

of the user. Therefore, sufficient care and attention should be paid to the design of the user interface of any software product. Development of a good user interface usually takes significant portion of the total system development effort. This software is developed keeping in mind the basic characteristics of a good user interface. Some features of this software can be stated as:-

It is very easy to learn. It does not require its users to memorize commands. Neither the users are asked to remember information from one screen to another while performing various tasks using the interface.

The time and user effort necessary to initiate and execute different commands is minimal.

It is very attractive to use. It catches user attention and fancy. It is a Graphical-based user interface.

The users can seek guidance and online help when they are unaware of some features of the software.

4. Establish the Need of the New System :

NEED OF THE SOFTWARE:This software is developed keeping in mind the above-mentioned problems. The

needs and requirements of the end users are also kept in mind while designing

this software. All the information can be easily accessed and shared among the

people.

Thus, indianfresher.com is developed in order to facilitate it users to establish network between one to many persons..

Page 29

4.2 Security

The indianfresher.com provides two levels of security. The 1st level of security, which is provided by ASP.NET named as FormBasedSecurity checks for authentication and authorization and prevent to enter anonymous users. The 2nd level of security provided by the database which is being used.

4.31 FRONT END SECURITY

This security level is developed or designed by the s/w developer or designer. S/he provides her/his s/w the security for the system, by considering many factors regarding to the particular s/w.In this software following are used to provide security.

LOGIN CHECKING There are two login’s are provided in this software one for user and another for admin. In order to avail the services of user have to provide a valid id and password and only after entering correct id and password user will get entry otherwise they will be blocked from accessing any services of this site. Similarly a login check is provided for admin that check credentials for admin which can do any admin job. In this way, security has been provided for both user section and admin section. There is also provision to change the password in case password is known by other. Password recover section provides users to recover their password whenever they have forgotten their password.

4.32 BACK END SECURITY

In this particular software our back end used is Sql-Server. So all the inbuilt security aspects provided by the Sql-Server database is used as it is. It will provide the strong feature of security so that it will be difficult to change, modify any personal or university data. Information is vital to success, but when damaged or in the wrong hands, it can threaten success. Sql-Server provides extensive security features to safe guard your information from both unauthorized viewing and intentional or inadvertent damage. This security is provided by granting or revoking privileges on a person- by- person and privilege-by-privilege basis.

6.1 Methodology

Page 30

7.1 Data Required & Data Collection Method

Data is completely based on the SRS given by the client,requirements do come during all

the phases of the process.

Methods of Data collection:

6. Client Interaction over audio conference calls,

7. VPN connection established so that the client can take a look on the

developing software.

8. Via e-mails.

9. After the demonstration of the partial build each time, client used to

give the feed back, so that necessary changes/ modifications could be

done.

10. Looked for different sites working in this domain.

11. The client gathered some dummy data from various resorts in the US.

Page 31

SNAPSHOTS

Home Page

Page 32

JobSeeker Registration1

Page 33

JobSeeker Registration2

Page 34

JobSeeker Registration3

Page 35

Welcome page

Page 36

Search Jobs

Page 37

Change Password

Page 38

Page 39

Forgot Password

Page 40

Employee Login

Page 41

Employee Registration

Page 42

Site Map

Page 43

About Us

Page 44

Tables

DATA DICTIONARY

TABLE NAME: LOGIN Name Type----------------------------------------- -------- ----------------------------REGNO VARCHAR2(20)PWD VARCHAR2(10)DOR DATEDLA DATESTATUS VARCHAR2(10)

When ever a new user registers with the Consultancy Register Number and password are stored in login table

TABLE: GENERAL Name Type----------------------------------------- -------- ----------------------------REGNO VARCHAR2(20)NAME VARCHAR2(10)FNAME VARCHAR2(10)DOB DATE

Page 45

AGE NUMBER(10)HNO NUMBER(20)STREET VARCHAR2(20)CITY VARCHAR2(20)STATE VARCHAR2(20)COUNTRY VARCHAR2(20)PIN NUMBER(10)GENDER VARCHAR2(10)QUAL VARCHAR2(20)BRANCH VARCHAR2(10)YOP NUMBER(20)PERCENTAGE NUMBER(20)EXP VARCHAR2(20)EXPY NUMBER(10)PHONE NUMBER(20)EMAIL VARCHAR2(20)The personal details of the candidates are stored genral table.TABLE NAME: EDUCATIONAL

SSC DataBase

Name Type ----------------------------------------- -------- --------------------------- REGNO VARCHAR2(20)SNAME VARCHAR2(20)PER NUMBER(20)YOP NUMBER(10)

The ssc details of the candidate will be stored in Educational table Board Of Intermediate DataBase

Name Type ----------------------------------------- -------- --------------------------- REGNO VARCHAR2(20) INAME VARCHAR2(20) BRANCH VARCHAR2(20) IPER NUMBER(10) IYOP NUMBER(20)

The Intermediate details of the candidate will be stored in Educational table Under Graduation DataBase

Page 46

Name Type ----------------------------------------- -------- --------------------------- REGNO VARCHAR2(20) UNAME VARCHAR2(20) COURSE VARCHAR2(20) UBRANCH VARCHAR2(20) UPER NUMBER(20) UYOP NUMBER(20)

The Under Graduation details of the candidate will be stored in Educational table

Post Graduate DataBase

Name Type ----------------------------------------- -------- ---------------------------- REGNO VARCHAR2(20) PNAME VARCHAR2(20) PCOURSE VARCHAR2(20) PBRANCH VARCHAR2(20) PPER NUMBER(20) PYOP NUMBER(20) The Post Graduation details of the candidate will be stored in Educational table TABLE NAME: EXPERIANCE Name Type ----------------------------------------- -------- ---------------------------- CNAME VARCHAR2(20) DESG VARCHAR2(20) JDATE DATE EDATE DATE TOTE NUMBER(20) KSKILL VARCHAR2(20) REGNO NUMBER(20)The Experiance details of the candidate will be stored in Experiance table

Page 47

TABLE NAME: COMPANY INFORMATION

Name Type ----------------------------------------- -------- --------------------------- REGNO VARCHAR2(7) CNAME VARCHAR2(20) PADD VARCHAR2(20) STRADD VARCHAR2(20) LOCATION VARCHAR2(20) CITY VARCHAR2(20) COUNTRY VARCHAR2(20) PINNO NUMBER(20) PHONE NUMBER(20) EMAIL VARCHAR2(20) GRADE VARCHAR2(10) STATE VARCHAR2(20) CCODE NUMBER(10)

The Company information details of the candidate will be stored in Company Information table

TABLE NAME: COMPANY LOGIN

Name Type ----------------------------------------- -------- ---------------------------- REGNO VARCHAR2(7) PWD VARCHAR2(10)

When ever a new Company registers with the Consultancy Register Number and password are stored in Company login table

Page 48

TABLE NAME: ADD EMPLOYEE

Name Type ----------------------------------------- -------- ---------------------------- REGNO VARCHAR2(10) ENAME VARCHAR2(20) DESG VARCHAR2(20) DEPT VARCHAR2(20) PHONE NUMBER(20) EMAIL VARCHAR2(20) ECODE VARCHAR2(10) PWD VARCHAR2(10)

The Employee details of the Company will be stored in this table

TABLE NAME: COMPANY REQUIREMENTS

Name Type ----------------------------------------- -------- --------------------------- COMPNAME VARCHAR2(20) JCODE VARCHAR2(20) QUAL VARCHAR2(20) CEXP VARCHAR2(20) CEXPY NUMBER(20) SALARY NUMBER(20) IDATE VARCHAR2(20) SKILL VARCHAR2(20) ECODE VARCHAR2(10) Company Requirements will be stored in Company Requirements table

Page 49

TABLE NAME: COMPANY

Name Type ----------------------------------------- -------- ---------------------------- CNAME VARCHAR2(20) LOC VARCHAR2(20) CITY VARCHAR2(20) STATE VARCHAR2(20) COUNTRY VARCHAR2(20) PHONE NUMBER(10) EMAIL VARCHAR2(20) CGRADE VARCHAR2(20)

Company Details will be stored in this table TABLE NAME: EMPLOYEE

Name Type ----------------------------------------- -------- ---------------------------- ENO NUMBER(10) ENAME VARCHAR2(20) DES VARCHAR2(20) DEP VARCHAR2(20) PHONE NUMBER(10) EMAIL VARCHAR2(20)

Employee Details will be stored in this table

Page 50

TABLE NAME: FILTER

Name Type ----------------------------------------- -------- --------------------------- REGNO VARCHAR2(20) NAME VARCHAR2(20) QUA VARCHAR2(20) EXP VARCHAR2(20) SKILL VARCHAR2(20)

Filtered Candidates Details will be stored in Filter table

TABLE NAME: COMPANY FILTER

Name Type ----------------------------------------- -------- --------------------------- CCODE VARCHAR2(20) CNAME VARCHAR2(20) SADD VARCHAR2(20) LOC VARCHAR2(20) CITY VARCHAR2(20) STATE VARCHAR2(20) COUNTRY VARCHAR2(20) PINNO NUMBER(20) EMAIL VARCHAR2(20) CGRADE VARCHAR2(20)

List of filtered Candidates details by Company will be stored in this table TABLE NAME: CONSULTANCY LOGIN

Name Type ----------------------------------------- -------- --------------------------- REGNO VARCHAR2(20)PASSWORD VARCHAR2(20)

Consultancy Register Number and password are stored in login table

TABLE NAME: SELECTED CANDIDATES

Page 51

Name Type ----------------------------------------- -------- ---------------------------- REGNO VARCHAR2(20) COMNAME VARCHAR2(20) JOBTITLE VARCHAR2(20) DESG VARCHAR2(20) SALARY NUMBER(20) REQ DATE

Selected Candidates Details will be stored in this table

Systems Development

language or package used

Page 52

INTRODUCTION TO ASP.NET

ASP.NET offers a novel programming model and infrastructure that facilitates a powerful

new class of applications. ASP.NET is a compiled. NET-based environment, so one can

author applications in any .NET compatible language, including Visual Basic, C# and

Jscript.NET. Developers can effortlessly access the advantage of these technologies,

which consist of a managed Common Language Runtime environment, type safety,

inheritance, and so on. With the aid of Microsoft Visual Studio.NET Web development

become easier.

Web Forms permits us to build powerful forms-based Web pages. When building these

pages, we can use Web Forms controls to create common UI elements and program them

for common tasks. These controls permit us to rapidly build up a WebForm.

Web services enable the exchange of data in client-server or server-server scenarios,

using standards like HTTP, SOAP (Simple Object Access Protocol) and XML messaging

to move data across firewalls. XML provides meaning to data, and SOAP is the protocol

that allows web services to communicate easily with one another. Web services are not

tied to a particular component technology or object-calling convention. As a result,

programs written in any language, using any component model, and running on any

operating system can access Web services.

Advantage of asp .Net

Page 53

ASP.NET is Part of the .NET Framework:

The .NET Framework comprises over 3,400 classes that we can employ in our ASP.NET

applications. We can use the classes in the .NET Framework to develop any type of

applications. Since ASP.NET is part of the .NET Framework, we can do all these things

from within an ASP.NET page. While ASP Classic pages are formed with scripting

languages such as VBScript and JavaScript. ASP.NET pages are formed with full-blown

programming languages such as Visual Basic and C#. And whereas there are five

standard objects accessible in the ASP Classic Framework (the Request, Response,

Application, Session, and Server objects), there are over 3,400 standard objects in

the .NET Framework that we can use in an ASP.NET page.

ASP.NET Pages are compiled

When an ASP.NET page is first requested, it is compiled and cached on the server. This

means that an ASP.NET page performs very rapidly. All ASP.NET code is compiled

rather than interpreted, which permits early binding, strong typing, and just-in-time (JIT)

compiling to native code.

XML-Based

ASP.NET configuration settings are stored in XML-based files, which are human

readable and writable. Each one of our applications can have a different configuration file

and we can extend the configuration scheme according to our necessities.

Code-Behind logic

The main problem with ASP Classic pages is that an *.asp page does not yield

modularized code. Both HTML and Script are present in a single page. But Microsoft's

ASP.NET implementation contains a new-fangled method to break up business logic

code from presentation code. Each ASPX created in Visual Studio has an equivalent class

written in a .NET compliant language such as C#. This class consists of event handlers,

initialization code and other supporting code for the user interface in the ASPX file. The

C# file that hold this class is called the code-behind file and affords the ASPX file's

programmatic implementation.

Page 54

ASP.NET Pages are built with Server Controls

We can easily build complex Web pages by bring together the pages out of ASP.NET

server controls. For example, by adding validation controls to a page, we can easily

validate form data.

Introduction of Database Management System

A database is a collection of interrelated data. The collection of data must be logically

coherent with some inherent meaning. A database is designed and built for a specific

purpose, keeping in mind the needs of the applications that are going to use it and end

users of those applications. It is managed by a software package known a database

management system (DBMS).

A DBMS is a software system that enables users to record and maintain database. It

provides an environment where in data can be stored and retrieved from database easily

and must efficiently. The data can be any thing that is deemed to be of significant to the

organization, the system is serving.

What is .net?.NET is set of common services which can be used from a number of

languages and have the following specialties:

i. These services are executed in the form of intermediate code that is

independent of the underlying architecture.

ii. They operate in the runtime (Common Language Runtime), which manages

resources and monitors applications execution.

The .NET frameworks are a multi-language environment for building, deploying, and

running web services and applications. The Microsoft .NET platform provides .NET

infrastructure and tools to build and operate a new generation of services.

Sql-Server 2005

Page 55

In recent years, Database Management System (DBMS) have established themselves as primary means of data storage for information system ranging from large commercial transaction to PC desktop application. At the heart of today’s most of the information system is Relational Database System (RDBMS).

Have been the workhouse for data management operation for over a decade and continue to evolve and mature, providing sophisticated storage, retrieval and distribution function to enterprise – wide data processing and management system compared to the file system, RDBMS provides organization with capability to easily integrate and leverage the massive amount of operational data into meaningful data.

The evolution of high-powered database engine such as SQL Server 2005 has faster the development of advance enabling technology including client/server ,data warehousing and online processing ,all of which comprise the core today’s state –of –art information system. A database is an organized collection of related information. Any meaningful data is called information. A database management system is a collection of interrelated data a set of programs to access that data.

The SQL Server architecture in this section is generic architecture that applies all platforms on which SQL run. These may be different platform, but the fundamentals are same. Physically in its simplest form, an SQL database is nothing more than a set of files on the disk. The physical relation of these files is irrelevant to the function of the database. Logically the database is divided into a set of user account, each of which is identified by username and password unique to the database. Tables and objects are owned one by one of these. SQL Server maintains its own list of authorized user and their associated privileged, manages memory cache paging; control locking for concurrent resource usage; dispatch and schedules users request ; manages space usage within its table space structure.

Sql-Server 2005 Architecture

SQL Files

There are major three sets of files on the disk that compose database: 1) Database File 2) Control File 3) Redo Files

Page 56

The most common is the database files where the data resides. The control and the redo logs support the functioning of the architecture itself. All of these sets of files be present, open and available to SQL Server for any data on database to be usable all these files are binary files.

Memory

SQL Server uses the memory of the system to turn the user process and to cache data objects. There are major areas used by SQL Server : memory that is shared by all process against the data and the database memory that is local to each individual user process.

System Memory

SQL Server database wide system memory is known as the SGA (System Global SQL Shared Area). The data and control structures in SGA are sharable and all SQL Server background process uses them.

Testing & Debugging:

Testing MethodologyThere are many strategies that can be used to test software. An extreme would be a

software team could wait until the system is fully constructed and then conduct test on

overall system in hopes of finding errors. This approach, although appealing, simply does

not work. It will result in buggy software that disappoints the customer and end-user. At

the other extreme, a software engineer could conduct tests on a daily basis, whenever any

Page 57

part of the system is conducted. This approach, although less appealing to many, can be

very effective.

A testing strategy that is chosen by most software teams falls between the two extremes.

It takes an incremental view of testing, beginning with the testing of individual program

units, moving to tests designed to facilitate the integration of the units, and culminating

with tests that exercise the constructed system.

Levels of Testing

In order to uncover the errors present in different phases, we have the concept of levels of

testing. The basic levels of testing are

Client Needs Acceptance Testing

Requirements System Testing

Design Integration Testing

Code Unit Testing

Unit Testing

A Unit is the small testable piece of software that can be compiled for example

functions, procedures, classes, interface. It is generally written by the programmer and is

done after coding Rigorous use of unit tests helps catch defects prior to customer testing

and minimises the cost of correcting defects by identifying them when they are the

cheapest to fix. In computer programming, a unit test is a procedure used to validate that

Page 58

a particular module of source code is working properly. The procedure is to write test

cases for all functions and methods so that whenever a change causes a regression, it can

be quickly identified and fixed

Unit testing focuses verification effort on the smallest unit of software design-the

software component or module. Using the component-level design description as a guide,

important control paths are tested to uncover errors within the boundary of the module.

The relative complexity of tests and the errors those tests uncover is limited by

constrained scope established for unit testing. The unit test focuses on the internal

processing logic and data structures within the boundaries of a component. This type of

testing can be conducted in parallel for multiple components.

It is the testing phase, in which each facade class written in j2EE will be tested

individually for the correct functionality. If working fine, then it will be integrated

together for the purpose of creation of the whole Project.

Objective:

To validate each distinct module of the application is implemented as per the technical

and functional specification of the story at the unit level.

Scope

The testing would be done on developer’s machine, and the test cases would be

maintained in a separate hierarchy in configuration management repository. The database

server used for testing would be installed locally on developer’s/ tester’s team.

Approach and activities:

Page 59

Implementation follows Test Driven Development (TDD) approach where we

write unit test for the components prior to writing code.

Unit tests created before the implementation starts.

Unit tests are created test case template and test case scenarios

Hence the development is kicked off to ensure that the story specifications are

implemented

For every method, test cases are written based upon boundary partitioning.

Test cases need to provide statement (& decision if applicable) coverage

All critical and complex algorithm methods are covered by test cases found using

decision coverage.

Thus, the unit testing starts on the first day of the iteration implementation and

continues in parallel with development activities. This not only improves the

quality but also helps in early detection and resolution of bugs.

Integration Testing

It is a systematic technique for constructing the software architecture while at the same

time conducting tests to uncover errors interfacing. The objective is to take unit tested

components and build a program structure that has been dictated by design.

Page 60

It is the testing phase, in which whole project developed in J2EE will be tested with

integrating it with the various modules for the correct functionality. If working fine, then

it will be integrated together with the other modules for purpose of creation of the whole

System.

Objective: Integration testing of the application is done to validate that, different

components / modules of the applications are linked correctly and are functionally

operational as an integrated unit.

Approach and activities:

All the modules of the modules, designed in the track, are integrated together

and tested to find bugs

All the bugs, find during the integration testing, will be fixed

Based on the story specifications, the testing team identifies the functional test

scenarios covering different navigation paths and erroneous user behaviour in

order to test the application in different user situations

System Testing

It is a series of different tests whose primary purpose is to fully exercise the computer-

based system. Although each test has a different purpose, all work to verify that system

elements have been properly integrated and performed allocated functions.

It is the type of testing in which all the modules are integrated together to form

the whole system, then this whole system is tested against various efficiency

based tests, that also test the accuracy of the system, working as a whole.

Approach and activities:

Page 61

The entire range of modules are integrated into the final system and tested to

find bugs

Any bugs found at this stage mean that the system’s success is based on

correcting the found bugs.

Black Box and White Box Testing

Black Box Testing, also called behavioral testing focuses on the functional

requirements of the software. That is, it enables the software engineer to derived sets

of input conditions that will fully exercise all functional requirements for a program.

Black Box Testing is a testing strategy, which does not need any knowledge of internal

design or code etc. As the name "black box" suggests, no knowledge of internal logic or

code structure is required. The types of testing under this strategy are totally

based/focused on the testing for requirements and functionality of the work

product/software application. It attempts to find errors in the following categories:

- Incorrect or missing functions

- Interface errors

- Errors in data structures or external data base access

- Behavior or performance errors

White Box Testing, also called glass-box testing, is a test case design philosophy that

uses the control structure described as part of component level design to derive test cases.

White box testing strategy deals with the internal logic and structure of the code. White

box testing is also called as glass, structural, open box or clear box testing. The tests

Page 62

written based on the white box testing strategy incorporate coverage of the code written,

branches, paths, statements and internal logic of the code etc.

In order to implement white box testing, the tester has to deal with the code and hence is

needed to possess knowledge of coding and logic i.e. internal working of the code. White

box test also needs the tester to look into the code and find out which

unit/statement/chunk of the code is malfunctioning. Using white-box testing methods,

one can derive test cases that:

- Guarantee that all independent paths within a module have been exercised

at least once.

- Exercise all logical decisions on their true and false sides

- Execute all loops at their boundaries and within their operational bounds

- Exercise internal data structures to ensure their validity.

Acceptance Testing

This testing is performed with realistic data of the user to demonstrate that the software is

working satisfactory. Testing here focuses on the external behavior of the system, the

internal logic of the program is not emphasized.

The objective of Acceptance Testing is to give confidence that the software being

developed, or changed, satisfies the specified requirements, meets customer/user

expectations and is fit for business purpose (validation). Unlike the other test phases, an

objective of acceptance testing is not to actively look for faults. Clear entry criteria may

Page 63

need to be put in place to ensure that the expectation of a system being ‘production ready’

has been met. This is an opportunity to review the effectiveness, completeness and

outcome of previous test phases and to declare any known problems that remain prior to

acceptance test commencing following information are defined

Customer responsibilities: Describe the activities the customer is responsible for

and what others are responsible for customer is responsible for all aspects of the

or the entire teams may assist in the various activities.

Acceptance criteria: Before the begin the acceptance test, what criteria is used to

decide whether the system is acceptable or not. But the acceptance criteria should

define how the decision will be made. The customer may accept a system with

certain minor types of errors remaining. But there may be other levels of errors

that will render the system unacceptable

Acceptance Test Work plan: Here, the activities associated with the acceptance

test are defined , when they will begin and end, who is responsible, and so on. In

other words the work plan for the test.

Test Data and Test Cases

A test case is a set of conditions or variables and inputs that are developed for a particular

goal or objective to be achieved on a certain application to judge its

capabilities or features.

Page 64

It might take more than one test case to determine the true functionality of the application

being tested. Every requirement or objective to be achieved needs at least

one test case.

The primary objective for test case design is to derive a set of tests that have the highest

likelihood of uncovering errors in software. The test case specification is the major

activity in the testing process.

Careful selection of test cases that satisfy the criterion on approach specified is essential

for proper testing. Various characteristic of test cases that are required for portal are:

1. A good test has a high probability of finding an error.

2. A good test is not redundant.

3. A good test should be “Best of Breed”.

4. A good test should be neither too simple not too complex.

Test Plan Document

A test plan is a general document for the entire project which defines the scope, approach

to be taken, and the schedule for testing, as well as identifying the test items for entire

testing process, and the personnel responsible for the different activities of testing. The

test plan can be done well before the actual testing commences and can be done in

parallel with the coding and design phases.

Page 65