Sei sulla pagina 1di 94

A PROJECT REPORT ON

Material Safety Data Sheet


SUBMITTED TO

C-DAC
IN THE PARTIAL FULFILLMENT FOR THE DEGREE OF

DIPLOMA IN JAVA PROGRAMMING


DJP-OCT(2013)
BY MS A!SHATA ASHO! SHINDE J"#

Ya$h%a&tra' Cha(ha& Prati$hta&)A*a+e,y 'f I&f'r,ati'& Te*h&'l'-y M.,/ai 01"#231"#45

1|Page

Acknowledgement

Before I begin discussing the minute details of the project, I would take the opportunity to thank some individuals for their unnerving support. This support carried from the day we undertook the project to its termination. I would like to thank Ms. Pradnya Mam for providing us with the opportunity to give opportunity to study in YC !"IT. I would like to e#tend my heart!felt gratitude towards $ur roject guide and Prof Mr.Venkat Krishnan for their continuous help and support in providing me with the right kind of guidance and work e#perience. I e#press our deep sense of gratitude to our Internal reviews for e#ecuting the project at hand. &inally, I would like to thank all teaching and non!teaching staff, our friends for their inspirational ideas and their brainwaves which helped us complete our project. It was because of the support provided by the above individualistic groups that the project was comprehensively complete roject %uide

Mr.Sumit,Mr.Apurva and Mr.Rahul Sir for their valuable inputs, comments and

Akshata A. Shinde Roll !o."#$%

2|Page

3|Page

&a'le of (ontents
$.
$.$

)ntroduction
A'stract $.$.$ "bout the roject

' ( ( )) )) )) )+ )+ )). )/ )' )( )3 +4 ++ ++ +++6 +. +. +. +. +/ +/

$.*

+',ective - Scope of the Pro,ect $.*.$ $bjective of the roject $.*.* *cope of the roject

$..

&heoretical /ackground $...$ $verview of &ront ,nd $...* $verview of Back ,nd

*.
*.$

System Analysis
0easi'ility Study *.$.$ Technical feasibility *.$.* $perational feasibility *.$.. 0esource feasibility *.$...$ *oftware 1evelopment 2odel

*.*

System Planning and Schedule *.*.$ %"5TT Chart

..
..$

System 1esign
Software Re2uirement Specification ..$.$ Introduction ..$.* *election of Technology7*pecific 0e8uirements ..$.*.$ 9ardware ..$.*.* *oftware ..$.*.. Tools

..* 4|Page

1etailed life (ycle of the Pro,ect ..*.$ 2odules

)ntroduction
5|Page

$.$ A'stract
$.$.$ A'out the Pro,ect " material safety data sheet :MS1S; is a form containing data regarding the properties of a particular substance. "n important component of product stewardship and workplace safety, it is intended to provide workers and emergency personnel with procedures for handling or working with that substance in a safe manner, and includes information such as physical data :melting point, boiling point, flash point, etc.;, to#icity, health effects, first aid, reactivity, storage procedures. MS1S formats can vary from source to source within a country depending on national re8uirements. MS1S :material safety data sheets; are a widely used system for cataloging information on chemicals, chemical compounds, and chemical mi#tures. 2*1* information may include instructions for the safe use and potential ha<ards associated with a particular material or product. These data sheets can be found anywhere where chemicals are being used. There is also a duty to properly label substances on the basis of physic! chemical, health and7or environmental risk. =abels can include ha<ard symbols such as the ,uropean >nion standard black diagonal cross on an orange background, used to denote a harmful substance. "n MS1S for a substance is not primarily intended for use by the general consumer, focusing instead on the ha<ards of working with the material in an occupational setting. In some jurisdictions the MS1S is re8uired to state the chemical?s risks, safety, and effect on the environment. It is important to use an MS1S specific to both country and supplier, as the same product :e.g. paints sold under identical brand names by the same
6|Page

company; can have different formulations in different countries. The formulation and ha<ard of a product using a generic name :e.g. sugar soap; may vary between manufacturers in the same country. 2any companies offer the service of collecting, or writing and revising, data sheets to ensure they are up to date and available for their subscribers or users. *ome jurisdictions impose an e#plicit duty of care that each 2*1* be regularly updated :usually every three to five years;. " material safety data sheet :MS1S;>ser are categori<ed into major two Types@ $. 3enral user4 5 ,mployee who is actually working in 2*1* department as a normal user like data entry operator etc. 9ere after legall permission of "dmin user and if and only if "dmin userAs authority general user can log in into system and can add information about material that is chemical details as well as about other staff of 2*1*As department. *. Admin 6ser@ ! In admin employee have permission to add users of system, after adding users to system i.e 1ata entry operator .9e7she can also logon to system to perform action and this process of authentication is totally manual and legal of system department.

(urrent System This system is currently manual system . Bhenever a new entry for the chemical is to be added to database ,the person who is going to make entry have to fill a lot of paper work and also they have to safely keep in safe. " single mistake in writing documents is very risky in such case .*o responsibility increases .It is also time and cost consuming . 1raw'acks of (urrent System There are various problems faced by this current system those are like@ Bhenever any employee comes, the process of finding all files related to chemical information consumes a lot of time,

7|Page

Be have to keep each and every paper based documents in proper way manually, so there may be problem of misplace of all documents which are based on paper works.

Bhen we need to use all information for making medicine , we have to take care of all chemical properties to make product and need to check all such documents so to reduce the chances of taking wrong basic chemical and to reduce harms we manage it in particular way.

To make a record of the chemical information at one place. To keep track of all documents related to chemical for the proper working we manage.

"s well as there is no such facility to store the information regarding employee of 2*1*As staff and authority for this particular area.

Proposed System4 roposed system will keep track of all informative data. There shall be feeding of data by "dmin users as well as authori<ed other users . They will enter data, view data and edit data. ropose system should store the following@ Considering all the listed limitations, the resent system provides an indigenous way for handling all documents which was developed using the waterfall model. $vercoming the demerits, this system leads to a completely computeri<ed system for the company.

Advantage of Proposed System4 Computeri<e and secure the *ystem. >ser is introduced due to which accessibility of system is handled. &ast data accessing and cost is reduced

8|Page

1ata is consolidating easily. Tracking of the investigation and reporting is easy. It is easier to carryout meaningful analysis of data. This system uses $0"C=, ))g as data base which is strong and secure database for proposed system. The proposed system empowers the user with a new computer based system by reducing the efforts of data maintenance.

The proposed developed according to the user specification hence it is a user! centered system.

This system provides a facility to search various chemicals as soon as to the employees.

$.* +',ective and Scope of the Pro,ect


$.*.$ +',ective of the Pro,ect4 The main objective of our project is to develop an application that will be easier for the 2*1* department to add, update and delete the information about chemical product with a safety. The other objective of our project is to provide simple and user friendly system for user. The data so created shall also be in handy in processing for further uses. $.*.* Scope of the pro,ect4
9|Page

This project can be said to have the below mentioned scopes@ To enable the employees to handle the chemical information manual system to computeri<ed system. reporting from

To enable employees to make reporting of 2*1* from the preliminary report : aper report; to report To enable employees to make analysis on accident on the basis of various parameters for corrective action. To enable employees to see how many cases entered by admin users. To enable employees to see how many detail entry that is detail information filled by the normal employees7 officers. To enable employee to edit the particularly selected case entry To enable employees to view the information. To enable employees to view the status of all the case according to their role and authority.

$.. &heoretical /ackground


$...$ +verview of 0ront 7nd &echnology4C"D" 8anguage4 C* "AVA4 The concept of Brite!once!run!anywhere :known as the latform independent; is one of the important key feature of java language that makes java as the most powerful language. 5ot even a single language is idle to this feature but java is closer to this feature.
10 | P a g e

The programs written on one platform can run on any platform provided the platform must have the CD2. 0eatures4

latform Independent *imple $bject $riented :,ncapsulation, olymorphism, Inheritance; 0obust 1istributed ortable 1ynamic *ecure erformance 2ultithreaded
Interpreted

$...* +verview of /ack 7nd4


+RA(874 The +racle 1ata'ase :commonly referred to as +racle R1/MS or simply as +racle; is an object!relational database management system produced and marketed by $racle Corporation. $racle 1atabase is the first database designed for enterprise grid

11 | P a g e

computing, the most fle#ible and cost effective way to manage information and applications. ,nterprise grid computing creates large pools of industry!standard, modular storage and servers. Bith this architecture, each new system can be rapidly provisioned from the pool of components. There is no need for peak workloads, because capacity can be easily added or reallocated from the resource pools as needed. "n $racle database is a collection of data treated as a unit. The purpose of a database is to store and retrieve related information. " database server is the key to solving the problems of information management. In general, a server reliably manages a large amount of data in a multiuser environment so that many users can concurrently access the same data. "ll this is accomplished while delivering high performance. " database server also prevents unauthori<ed access and provides efficient solutions for failure recovery The database has logical structures and physical structures. Because the physical and logical structures are separate, the physical storage of data can be managed without affecting the access to logical storage structures.

+RA(87 0eatures4

$racle 1atabase is a single integrated platform that supports *E=, F2=, and procedural languages :e.g., =7*E=, Cava, C7CGG; in a simple fashion with high performance and scalability..

9igh *peed@ $racle 8uery can be used to retrieve large amount of a records from a database 8uickly and efficiently.

12 | P a g e

2ultiple Diews $f a data. Cava Integration :C1BC;. " broad subset of "5*I *E= 33, as well as e#tensions *tored procedures Triggers Cursors >pdatable Diews Information schema Euery caching *ub!*,=,CTs :i.e. nested *,=,CTs; ,mbedded database library 1atabase *ecurity

13 | P a g e

System Analysis

*.$

0easi'ility Study
&easibility studies aim to objectively and rationally uncover the strengths and weaknesses of the e#isting business or proposed venture, opportunities and threats as presented by the environment, the resources re8uired to carry through, and ultimately the prospects for success.In its simplest terms, the two criteria to judge feasibility are cost re8uired and value to be attained. The feasibility studies carried out for this project are@
14 | P a g e

Technical feasibility $perational feasibility 0esource feasibility

*.$.$ &echnical 0easi'ility4 The technologies proposed for the development of this project are C* and

$0"C=,. These technologies are feasible because they are easily available within the organi<ation. .. The C"D" is feasible due to following reasons@

15 | P a g e

"pplications made from the use of C"D" technology are easier to maintain in the long run. "s the Cava language has a specific structure, itAs easier to manage, and maintain, many modular applications.

If you use C"D" technology, your system wonAt be susceptible to crashes. 2oreover, memory management is a significant advantage of using C"D". It protects against memory leaks and also enables the faster deployment of applications.

The technology $0"C=, is feasible due to following reasons@ Better erformance and *calability Better *ecurity $0"C=,= is an open source system The $racle has most capabilities to handle most corporate database application and used to very easy and fast. It can used to store many %B?s of data into database.

*.$.* +perational 0easi'ility4


The proposed project is operationally feasible due to following reasons@ The management provided good support for the operations involved in the project.

16 | P a g e

The system is very easy to handle and has a user friendly %>I that would enable the end users to get ac8uainted to it easily and in short time.

There is no need for any special training to anybody to handle the system. To handle the system the user need not be a computer professional, on the whole the user will benefit from the system and hence the system is operationally feasible.

The proposed system is operationally feasible as it would increase the throughput and reduce the response time to some e#tent.

It will reduce the cost and time of officer to analysis accident details and to take a corrective action.

It will be accepted by the users as it provides various operations in a very simpler way that is easy to understand and use.

The development of the proposed project will prove very beneficial to the user as well as the management.

*.$.. Resource 0easi'ility4


The proposed project is resourcefully feasible due to following reasons@
17 | P a g e

The proposed project does not interfere with the e#isting system. Be have sufficient time to develop the proposed project. "ll the resources re8uired to develop and maintain the project are available and sufficiently provided by the management.

roper training and guidance provided for the people involved in the project. "vailability of physical worksite i.e. College =ab. .

*.$...$ Software development model4


18 | P a g e

The spiral model combines the idea of iterative development :prototyping; with the systematic, controlled aspects of the waterfall model. It allows for incremental releases of the product, or incremental refinement through each time around the spiral. The spiral model also e#plicitly includes risk management within software development. Identifying major risks, both technical and managerial, and determining how to lessen the risk helps keep the software development process under control. The spiral model is based on continuous refinement of key products for re8uirements definition and analysis, system and software design, and implementation :the code;. "t each iteration around the cycle, the products are e#tensions of an earlier product. This model uses many of the same phases as the waterfall model, in essentially the same

19 | P a g e

order, separated by planning, risk assessment, and the building of prototypes and simulations. *tarting at the center, each turn around the spiral goes through several task regions@ 1etermine the objectives, alternatives, and constraints on the new iteration. ,valuate alternatives and identify and resolve risk issues. 1evelop and verify the product for this iteration. lan the ne#t iteration. 2aterial safety 1ata sheet contains more iteration in it. *uch as while coding module for general users7employee side analysis must be done thoroughly.

20 | P a g e

*.* System Planning and Schedule4


*.*.$ 3A!&& (hart4

Pro,ect Steps Re2uiremant gathering Planning and analysis 1esigning data'ase schema 1esign 36) (oding )ntegration &esing 1eployment

1ecem'er

"anuary

21 | P a g e

System 1esign

..$ Software Re2uirement Specification


..$.$ )ntroduction4 Purpose4
22 | P a g e

resently there is no such application developed to save the data computeri<ed way. *o this will be the first application for 2*1* department

Scope of the system4 To enable the employees to handle chemical information from manual system to computeri<ed system. To enable employees to make reporting of chemical information from the preliminary report :Telegram report; to report in format " including flow of report to level hierarchy as per policy. To enable employees to make analysis on accident on the basis of various parameters for corrective action. To enable employees to see how many cases are rejected or approved by admin officers To enable employees to see how many detail entry that is detail information filled by the normal employees7 officers. To enable employee to edit the particularly selected case entry To enable employees to view the status of all the case according to their role and authority.

..$.* Selection of &echnology


23 | P a g e

..$.*.$ 9ardware4 C > Type@ @ entium!1ual Core Base 2emory@ 6 2B. ,#tended 2emory@ + %B. Cache 2emory@ 6 2B. C > Clock@ +)4429<. 1isplay Type@ D%"7=C1. 9ard 1isk@ 6%B.

..$.*.* Software )nterface4 $perating *ystem@ Bindows F * -7Bindows ' * ) &0$5T ,51@ C"D":swing; B"CH ,51@ $0"C=,

..$.*.. &ools4 ,dit lus+ *E= lus

24 | P a g e

..* 1etailed life (ycle of the Pro,ect


..*.$ Modules4 The modules of the purposed project are as follows@ $. (hemical 1etails45 This module consist of the following. $: Add (hemical 1etails! In this module the "dmin officer 75ormal user can able to add details or information about any chemical product.9ere its mandatory to enter C"*I details uni8uely to differentiate between two chemicals.

*: 6pdate chemical details J "fter the ;Add chemical 1etails< the normal user or admin user can update specific chemical details by entering C"*I number into the field . *earchJ *earching of chemicals can be done by entering C"*I into field >pdate! "fter the search he can make changes into field which they want to update,but without spoiling C"*I number 1elete ! "fter the search he can make changes into field which they want to delete done by entering C"*I into field *. 1epartmental 7mployee 1etails45 This module consist of the following. $: Add 1epartmental 7mployee 1etails! In this module the "dmin officer 75ormal user can able to add details or information about any chemical product
25 | P a g e

2*1* ,mployee .9ere its mandatory to enter empI1 details uni8uely to differentiate between two employees. *: 6pdate 1epartmental 7mployee details J "fter the ;Add 1epartmetal employee 1etails< the normal user or admin user can update specific 2*1* ,mployee details by entering empI1 number into the field . *earchJ *earching of 2*1* ,mployee can be done by entering empI1 into field >pdate! "fter the search he can make changes into field which they want to update,but without spoiling empI1 number 1elete ! "fter the search he can make changes into field which they want to delete done by entering empI1 into field

.. System 6ser 1etails45 This module consist of the following. $: Add System 6ser 1etails! In this module the "dmin officer can able to add details or information about >ser of 2*1* . *: Account settings J "fter the ;Add System 6ser 1etails< the admin user7normal can update specific 2*1* ,mployee details . >pdate! "fter the search he can make changes into field which they want to update 1elete ! "fter the search he can make changes into field which they want to delete their account as well. =. 1etail View J This module 1etail ,ntry will be display.

26 | P a g e

$: (hemical reports ! In this module the user is able to view reports of chemicals *: MS1S 7mployee reports J In this module the user is able to view reports of 2*1* employees. > . 9elp5 In this module user manual is shown. ..*.* +',ect +riented Analysis - 1esign 1iagrams ..*.*.$ Entity relationship diagram:[ERD]: In software engineering, an entity5relationship model :7RM; is an abstract and conceptual representation of data. ,ntity!relationship modeling is a database modeling method, used to produce a type of conceptual schema or semantic data model of a system, often a relational database, and its re8uirements in a top!down fashion. 1iagrams created by this process are called entity5relationship diagrams, 7R diagrams, or 7R1s. The definitive reference for entity!relationship modeling is eter Chen?s )3'/ paper. 9owever, variants of the idea e#isted previously and have been devised subse8uently.

27 | P a g e

7ntity diagrams4

(hemical 1etails: C"*I *ynonyms roductK5ame Created Time Chemical 5ame Created 1ate Chemical 1etails &ormulaK5am e

&lamable limit

&lash point

ContactK1etail s

*kin Contact ,ye Contact


28 | P a g e

$nline $rder

1epartmental 7mployee 1etails: ,mpKI1 5ote surname

Created Time 2id7&ir 5ame

Created 1ate

,mployee 1etails

2ob!5o

Country

,mail !I1

"ddress osition

Category

29 | P a g e

System 6ser 1etails:

5ame

Confirm password

surname

*ystem >ser 1etails assword

Category

>ser 5ame

30 | P a g e

Entity relationship diagram:


SYSTEM USER SYSTEM USER DETAILS DETAILS

HAS

MSDS system MSDS system

HAS

HAS

DEPARTMENT DEPARTMENT EMPLOYEE DETAILS EMPLOYEE DETAILS

CHEMICAL DETAILS CHEMICAL DETAILS

31 | P a g e

..*.*.* 1ata 0low 1iagram

Data flow diagram:


" data5flow diagram :101; is a graphical representation of the LflowL of data through an information system. 1&1s can also be used for the visuali<ation of data processing :structured design;.$n a 1&1, data items flow from an e#ternal data source or an internal data store to an internal data store or an e#ternal data sink, via an internal process. " 1&1 provides no information about the timing or ordering of processes, or about whether processes will operate in se8uence or in parallel. It is therefore 8uite different from a flowchart, which shows the flow of control through an algorithm, allowing a reader to determine what operations will be performed, in what order, and under what circumstances, but not what kinds of data will be input to and output from the system, nor where the data will come from and go to, nor where the data will be stored :all of which are shown on a 1&1;.

Process !otations4 Process " process transforms incoming data flow into outgoing data flow.

Yourdon and Coad rocess 5otations.

32 | P a g e

%ane and *arson rocess 5otation.

1ata store !otations 1ata *tore 1ata stores are repositories of data in the system. They are sometimes also referred to as files.

Yourdon and Coda Data store Notations

Gane and Sarson Data store Notations

1ataflow !otations

33 | P a g e

Dataflow 1ataflows are pipelines through which packets of information flow. =abel the with the name of the data that moves through it.

arrows

7?ternal 7ntity !otations External Entity ,#ternal entities are objects outside the system, with which the system communicates. ,#ternal entities are sources and destinations of the system?s inputs and outputs.

34 | P a g e

1ata flow diagram4

System @1etails4 ). =$% I5@ =ogin 0e8uest


User Log In Login

=ogin *tatus

+. C9"5%, "**B$01@

>pdate assword
User Update Password Add Delete

Confirmation and updating

35 | P a g e

-. "11 *Y*T,2 >*,0@

"dd 1etails
User Add new &ser "!ste

"dded new user details

7mployee 1etails4 ). "11 5,B ,2 =$Y,,@

,mployee 1etails
User Add new ,mployee E plo!ee

"dded ,mployee 1etail

+. *,"0C9 ,2 =$Y,, I5&$02"TI$5@

,mployee 1etails
User "ear#$ %or

,mployee

,mployee information

Detail

36 | P a g e

-. > 1"T, ,2 =$Y,, I5&$02"TI$5@

,mployee 1etails
User Update

,mployee

,mployee
entr!

Confirmation of updating

6. 1,=,T, C9,2IC"=@

1elete ,mployee 1etails


User Delete ,mployee

,mployee

1eleted ,mployee 1etail

View Reports4 ). DI,B 0, $0T*@

,mployee7Chemical 1etails
User Update Entr! 'eports

0eport 1etail
37 | P a g e

..*.. 1ata'ase 4

..*...$ 1ata'ase &a'le4 !o. ). +. -. &a'le ChemicalK1etails 1epartK,mpK1etails 1escription =ist the chemical details =ist the departmental employee details =ist the system users

*ystemK>serK1etails

38 | P a g e

..*...* 1ata'ase Schema $. (hemical@1etails

Sr. !o ) + 6 . / ' ( 3 )4 ))

(olumn !ame roductKname CasI *ynonyms ChemKname &ormKname ContKdetails $nlineKorder ,ye contact *kin contact &lash point &lammable limit

1ata &ype varchar:+; varchar:+; varchar:+; varchar:+; varchar:+; 5umber:)4; 5umber:).; varchar:+; varchar:+; 5umber :)4; 5umber :)4;

(onstraint rimary key,5ot 5ull ! ! ! ! ! ! ! ! ! !

39 | P a g e

)+ )-

Created 1ate Created time

varchar:+; varchar:+;

! !

*. 1epart@emp@details4 Sr.!o (olumn !ame 1ata &ype (onstraint

) + 6 . / ' ( 3 )4 )) )+

,mpKI1 *urname &irK2idK5ame 2obK5o ,mailKI1 Category osition "ddress Country CreatedKdate CreatedKtime 5ote

varchar:+; varchar:+; varchar:+; 5umber :)4; varchar:+; varchar:+; varchar:+; varchar:+; varchar:+; varchar:+; varchar:+; varchar:+; ! ! ! ! ! ! ! ! ! ! !

rimary key,5ot 5ull

40 | P a g e

.. System@6ser@1etails Sr. !o
) + 6 .

(olumn !ame
5ame Category >ser5ame assword Cnf assword

1ata &ype
varchar:+; varchar:+; varchar:+; varchar:+; varchar:+;

(onstraint ! ! ! ! !

..= Screen 8ayouts 4


)nde? ScreenAApplication Start6p: 4

41 | P a g e

42 | P a g e

37!7RA8 7M8+B77 CA1M)! +00)(7RS 8+3)! S(R77!4

8ogin Screen4

43 | P a g e

)nvalid 8oginAinvalid )d and password:4

)nvalid 8oginA 'lank )d and password:4

44 | P a g e

37!7RA8 7M8+B77 CA1M)! +00)(7RS MA)!M7!6 S(R77!4

MainMenu Screen AAdmin:

45 | P a g e

MainMenu Screen Ausers:

MainMenu Screen Ausers:

46 | P a g e

(hemical 1etails4
Add (hemical 1etails ASuccessful Saving:4

47 | P a g e

Add (hemical 1etails 4 Validation4 )f user doesnDt entered any details it gives error.

Add (hemical 1etails 4

48 | P a g e

Validation4 )f user doesnDt entered (ASE num'er properly it gives error.

Search (hemical 1etails 4

7nter casE

49 | P a g e

Searched result @

50 | P a g e

1elete (hemical 1etails 4

6pdate (hemical 1etails 4

51 | P a g e

52 | P a g e

1epartmental 7mployee 1etails4


Add departmental employees 1etails ASuccessful Saving:4

Add departmental employees 1etails 4 Validation4 )f user doesnDt mandatory fields entered any details it gives error.

53 | P a g e

Add departmental employees 1etails 4 Validation4 )f user doesnDt entered M+/)87 num'er properly it gives error.

Add departmental employees 1etails 4 Validation4 )f user doesnDt entered 7MP@)1 num'er properly it gives error. 54 | P a g e

Search departmental employees 1etails 4 7nter 7mp@)14

Searched result4

55 | P a g e

1elete departmental employees 1etails 4

6pdate departmental employees 1etails 4

56 | P a g e

System 6ser 1etails4


Add system user 1etails ASuccessful Saving:4

Add system user 1etails 4 Validation4 )f user doesnDt entered PASSF+R1 properly it gives error.

57 | P a g e

Add system user 1etails 4 Validation4 )f user doesnDt entered PASSF+R15(+!0)RM PASSF+R1 properly it gives error.

58 | P a g e

6pdate system user 1etails 4

1elete system user 1etails 4

59 | P a g e

View Reports4
60 | P a g e

(hemical )nformation Reports 4

1epartmental 7mployee 1etails reports4

61 | P a g e

&esting

62 | P a g e

=.$Methodologies used for &esting


V Model4

The V5model represents a software development process :also applicable to hardware development; which may be considered an e#tension of the waterfall model. Instead of moving down in a linear way, the process steps are bent upwards after the coding phase, to form the typical D shape. The D!2odel demonstrates the relationships between each phase of the development life cycle and its associated phase of testing. The hori<ontal and vertical a#es represents time or project completeness :left!to!right; and level of abstraction :coarsest!grain abstraction uppermost;, respectively. Verification Phases45 ). 0e8uirements analysis@!

63 | P a g e

In the 0e8uirements analysis phase, the first step in the verification process, the re8uirements of the proposed system are collected by analy<ing the needs of the user:s;. +. *ystem 1esign@! *ystems design is the phase where system engineers analy<e and understand the business of the proposed system by studying the user re8uirements document. They figure out possibilities and techni8ues by which the user re8uirements can be implemented. -. "rchitecture 1esign@! The phase of the design of computer architecture and software

architecture can also be referred to as high!level design. The baseline in selecting the architecture is that it should reali<e all which typically consists of the list of modules, brief functionality of each module,

their interface relationships, dependencies, database tables, diagrams, technology details etc. 6. 2odule 1esign@!

architecture

The module design phase can also be referred to as low!level design. The designed system is broken up into smaller units or modules and each of them is e#plained so that the programmer can start coding directly. Validation Phases45 ). >nit Testing@! In computer programming, unit testing is a method by which individual units of source code are tested to determine if they are fit for use.>nit tests

64 | P a g e

are created by programmers or occasionally by white bo# testers. +. Integration Testing@! In integration testing the separate modules will be tested together to e#pose faults in the interfaces and in the interaction between integrated components. Testing is usually black bo# as the code is not directly checked for errors. -. *ystem Testing@! *ystem testing will compare the system specifications against the actual system. "fter the integration test is completed, the ne#t test level is the system test. *ystem testing checks if the integrated product meets the specified re8uirements. 6. >ser "cceptance Testing@! "cceptance testing is the phase of testing used to determine whether a system satisfies the re8uirements specified in the re8uirements analysis phase. The acceptance test design is derived from the re8uirements document. The acceptance test phase is the phase used by the customer to determine whether to accept the system or not.

/enefits of V5Model &aults are prevented and it stops fault multiplication. "voids the downward flow of defect. =ower defect 0esolution cost due to earlier detection.

65 | P a g e

Improved 8uality and reliability. 0eduction in the amount of 0e!work. Improved 0isk 2anagement Dalidation and Derification at each level of stage containment "llows testers to be active in the project early in the projectAs lifecycle. They develop critical knowledge about the system.

66 | P a g e

=.* &ypes of &esting


=.*.$ Fhite /o? &esting4 Fhite5'o? testing is a method of testing software that tests internal structures or workings of an application, as opposed to its functionality. In white!bo# testing an internal perspective of the system, as well as programming skills, are re8uired and used to design test cases. The tester chooses inputs to e#ercise paths through the code and determine the appropriate outputs. Bhite!bo# testing can be applied at the unit, integration and system levels of the software testing processM it is usually done at the unit level. It can test paths within a unit, paths between units during integration, and between subsystems during a system level test. Though this method of test design can uncover many errors or problems, it might not detect unimplemented parts of the specification or missing re8uirements. >sing the white!bo# testing techni8ues, a software engineer can design the following test cases@ ,#ercise independent paths within a module or unitM ,#ercise logical decisions on both their true and false sideM ,#ecute loops at their boundaries and within their operational boundsM and ,#ercise internal data structures to ensure their validity

67 | P a g e

=.*.*/lack /o? &esting4 /lack /o? testing takes an e#ternal perspective of the test object to derive test cases. These tests can be functional or non!functional, though usually functional. The test designer selects valid and invalid inputs and determines the correct output. Black!bo# testing implies that a tester doesn?t know how an application is designed at the code level that is, it involves dynamic testing of compiled applications. The tester interacts with the software system via its interface and analy<es the application reaction. Black bo# testing, concrete bo# or functional testing is used to check that the outputs of a program, given certain inputs, conform to the functional specification of the program. The advantages of this type of testing include@ The test is unbiased because the designer and the tester are independent of each other. The tester does not need knowledge of any specific programming languages. The test is done from the point of view of the user, not the designer. Test cases can be designed as soon as the specifications are complete. The disadvantages of this type of testing include@ The test can be redundant if the software designer has already run a test case. The test cases are difficult to design. Testing every possible input stream is unrealistic because it would take a inordinate amount of timeM therefore, many program paths will go untested.

68 | P a g e

=.*.*.$ 72uivalence (lass &esting This is an ,8uivalence class for (onsumer !um'er which should 'e accepted as e?actly > digit num'ers. (orrect e2uivalence classes and representatives4

Parameter 1isplaying the 2obile

72uivalence (lass

Representatives

5umber which should be v,C)@ #N)4 accepted as e#actly )4 digit numbers.

(+3)+6).3+

)nvalid e2uivalence classes and representatives4

Parameter

72uivalence (lass

Representatives

1isplaying the 2obile 5umber which should be i,C)@ #O4 accepted as e#actly )4 digit numbers. i,C+@ #P)4 i,C-@ #O)4 i,C6@5a5

!) 3)(+3)+6).3+ 6'. QgnhR

69 | P a g e

/oundary Value Analysis4

Parameter

8ower

/oundary

Value 72uivalence

class%6pper

/oundary Value

2obile 5umber

4,S )4 T,))

70 | P a g e

=.*.*.* (ause 7ffect 3raph4 This cause effect graph is regarding the number of digits in Mo'ile !um'er.. which should be e8ual to )4 It should accept only numerical values.
(o) o% digits in o*ile no +0

(o) o% digits in o*ile no , 0

A##epted

no)o% digits in o*ile no ,10

(o) o% digits #ons& er no- 10

Error essage and re.enter o*ile n& *er

71 | P a g e

=.*.*.. 1ecision ta'le

(onditions $: !o. of digits in Mo'ile 5 !o.G #. *: !o. of digits in Mo'ile !o. 5 H# .: #G !o. of digits in Mo'ile Y !o. H $#. =: !o. of digits in mo'ile 5 !o. I $#. Actions $: Accepted. F ! F Y 5 Y Y

*: 7rror message and re5 ! enter code

=.. &est (ase


6nit &esting
72 | P a g e

0orm 8ogin4 =ogin 1evelopers name4 "kshata *hinde &ester !ame4 ratiksha kewale

&est (ase (ase &est (ase Steps and 1escription &est )nput $pen the This test login form case would enter user id =oginKtest4 check for a U ) valid user id password.Clic U valid k on =ogin password Button. $pen the This test login form case would keep user id =oginKtest4 check for a U password + a blank user field blank id id and 7or .Click on password =ogin Button. $pen the This test login form case would enter valid check for =oginKtest4 user id U the valid invalid user id and password.Clic invalid k on =ogin password. Button. &est )1

7?pected +utput

Actual +utput

&est Result

=ogin should be =ogin should be successful.1irecte successful.1irecte d to 2ain d to 2ain &orm.2enus are &orm.2enus are displayed =ogin should be unsuccessful. rompt to enter user id and password. =ogin should be unsuccessful. rompt to enter user id and password..

"**

"**

=ogin should be =ogin should be unsuccessful. unsuccessful. rompt to enter rompt to enter valid password. valid password.

"**

0orm 8ogin4Chemical ,ntry 1evelopers name4 "kshata *hinde


73 | P a g e

&ester !ame4 Bhavana Bankhede

&est (ase )1

&est (ase &est (ase 7?pected Steps and 1escription +utput &est )nput

Actual +utput

&est Result

ChemicalKtest4 )

This test case $pen "dd would check >ser can *ave >ser can save chemical for a valid details. details. form C"*I. 1isplay error This test case $pen "dd message and would check chemical rompt to enter for a blank form valid details. information. 1isplay error message and rompt to enter valid information.

"**

ChemicalKtest4 +

"**

=.= &est Report

74 | P a g e

&est case )14 =oginKtest4) Test Case 1escription@ This test case would check for a valid user id U valid password

2odule 5ame@ =ogin :unit testing; Before 0etesting 0esult@ &"I= 0eported To@ ratiksha Hewale 1eveloper has Checked75ot@ Checked

&est case )14 ChemicalKtest4) Test Case 1escription@ This test case would check for a valid C"*I. 2odule 5ame@ Chemical entry :unit testing; Before 0etesting 0esult@ &"I= 0eported To@ Bhavana Bankhede 1eveloper has Checked75ot@ Checked

75 | P a g e

System )mplementation

76 | P a g e

>.$ 9ardware Re2uired at (lient5Side


The user must have a computer system with internet connectivity and following minimum specifications@ Processor4 (44 29< entium III or "thlon :2inimum;M )%9< entium processor or e8uivalent :0ecommended; Ram4 +./2B :2inimum;M .)+2B :0ecommended; 1isplay4 (44 # /44, +./ colors :2inimum;M )4+6 # '/( high color, -+!bit :0ecommended;

>.*Software Re2uired at (lient5Side


It doesnAt re8uired special softwares

77 | P a g e

>..&esting done as 7nd 6ser 4


Testing that is done as ,nd >ser is@ Alpha &esting4 In software development, testing is usually re8uired before release to the general public. In!house developers often test the software in what is known as ?"= 9"? testing which is often performed under a debugger or with hardware!assisted debugging to catch bugs 8uickly. "lpha testing is often employed as a form of internal acceptance testing.

/eta &esting4 $perational testing by potential and7or e#isting users7customers at an e#ternal site not otherwise involved with the developers to determine whether or not a component or system satisfies the user7customer needs and fits within the business processes. Beta testing is often employed as a form of e#ternal acceptance testing in order to ac8uire feedback from the market.

78 | P a g e

System Maintenance And 7valuation

79 | P a g e

J.$ Maintenance
$nce the website is successfully uploaded on the web server it may undergo some changes. This may occur due to a change in the re8uirements, change in operational environment or an error in coding, which has not been fi#ed while testing. The proper follow up of the system and error solving in post implementation phase is what is called as maintenance. *ystem 2aintenance and ,valuation of software can be defined as modification of software product after the delivery to correct defaults, improve performance or other attributes or adapt the product to a changed environment.

After our system has 'een deployed i.e. after it is operational it will have to4 V 9elp in efficient management of data. V Improve work efficiency w.r.t 1etail ,ntry module. V >ser friendly application.

80 | P a g e

J.* 7valuation
In todayAs world, none of the system is completely perfect. "s the various re8uirements of user keeps on changing, the software needs to be further modified. "fter the software has been installed it may undergo some changes. This may occur due to change in the user re8uirements, change in operational environment or an error in software, which has not been fi#ed while testing.

81 | P a g e

6serC+perational Manual

82 | P a g e

K.$ 6ser Manual


)nde?Aapplication startup:4 8ogin4 =ogin by entering user id and password. =ogin by clicking on login button to enter respective loginKid and password.

(hemical details "dd chemical details @ ,nter details in chemical details Click on save data

>pdate chemical details @ To update ,nter C"*I number and click on *,"0C9 button >pdate any re8uired details and click on > 1"T, button

To delete ,nter C"*I number and click on *,"0C9 button click on 1,=,T, button

1epartmental 7mployee details "dd departmental employee details @ ,nter details in departmental employee details

83 | P a g e

Click on save data

>pdate departmental employee details @ To update ,nter ,2 KI1 number and click on *,"0C9 button >pdate any re8uired details and click on > 1"T, button

To delete ,nter ,2 KI1 number and click on *,"0C9 button click on 1,=,T, button

System 6ser details click on "dd system user details @ ,nter details in chemical details Click on save data

Click on "ccount settings @ To update >pdate any re8uired details and click on > 1"T, button

To delete click on 1,=,T, button

View Reports click on chemical reports @ Click on departmental employee reports @

84 | P a g e

9elp Click on help menu 8ogout Click on =$%$>T

K.* Security Aspects and Access Rights


"lthough basic password authentication will be used to protect the application from unauthori<ed accessM functionality are assumed to be sufficiently protected under the e#isting security policies.

85 | P a g e

K.. /ackup
"s this *ystem is a critical system. The database is a key aspect of system. *o we have set an incremental backup of daily and full back up of system once in month these task are kept in database system also the admin can take backup as per needed. These backup are store in a internal drive which can be move to e#ternal device. "nd we can restore this backup if the system is fail.

86 | P a g e

8imitations

87 | P a g e

The project can be said to following limitations@ *low data analysis %eneral user can also only view all details not anyone else filled details 2enu screen should be different for different users

88 | P a g e

(onclusion

89 | P a g e

"fter successful implementation of the website we conclude the following point@

The normal user can easily submit the details and reduce the time for analysis of reports

>ser can check details. Its became easy to understand details of all chemical and 2*1* employee It is easier to carryout meaningful analysis of reports to arrive at conclusive data for corrective action.

1ata is consolidating easily. Tracking of the investigation and reporting is easy.

"part from above conclusion about the project, we also conclude that developing this project was a very learning e#perience as a whole. Bith the successful completion of project work, we have not only developed our skills as an IT professional but also had an e#perience to work in real!life IT industry environment. Thus we hope so that these newly developed skills and e#perience will help us to achieve great heights in our career in future.

90 | P a g e

0uture 7nhancements

91 | P a g e

The project developed can be said to have following enhancements in the near future

It should be available on web browser roper authentication also provided by application 2ore security measures must provide.

92 | P a g e

/i'liography

93 | P a g e

Reference /ooks45
"ava the (omplete Reference "uthor@ ! 2c%raw!9ill Companies

Fe'sites45

http://www.coderanch.co /foru s http://stac!o"erflow.co / http://www.roseindia.net/ http://www.w#schools.co / http://www.oracle.co /

94 | P a g e

Potrebbero piacerti anche