Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
C-DAC
IN THE PARTIAL FULFILLMENT FOR THE DEGREE OF
1|Page
Acknowledgement
Before I begin discussing the minute details of the project, I would take the opportunity to thank some individuals for their unnerving support. This support carried from the day we undertook the project to its termination. I would like to thank Ms. Pradnya Mam for providing us with the opportunity to give opportunity to study in YC !"IT. I would like to e#tend my heart!felt gratitude towards $ur roject guide and Prof Mr.Venkat Krishnan for their continuous help and support in providing me with the right kind of guidance and work e#perience. I e#press our deep sense of gratitude to our Internal reviews for e#ecuting the project at hand. &inally, I would like to thank all teaching and non!teaching staff, our friends for their inspirational ideas and their brainwaves which helped us complete our project. It was because of the support provided by the above individualistic groups that the project was comprehensively complete roject %uide
Mr.Sumit,Mr.Apurva and Mr.Rahul Sir for their valuable inputs, comments and
2|Page
3|Page
&a'le of (ontents
$.
$.$
)ntroduction
A'stract $.$.$ "bout the roject
$.*
+',ective - Scope of the Pro,ect $.*.$ $bjective of the roject $.*.* *cope of the roject
$..
&heoretical /ackground $...$ $verview of &ront ,nd $...* $verview of Back ,nd
*.
*.$
System Analysis
0easi'ility Study *.$.$ Technical feasibility *.$.* $perational feasibility *.$.. 0esource feasibility *.$...$ *oftware 1evelopment 2odel
*.*
..
..$
System 1esign
Software Re2uirement Specification ..$.$ Introduction ..$.* *election of Technology7*pecific 0e8uirements ..$.*.$ 9ardware ..$.*.* *oftware ..$.*.. Tools
..* 4|Page
)ntroduction
5|Page
$.$ A'stract
$.$.$ A'out the Pro,ect " material safety data sheet :MS1S; is a form containing data regarding the properties of a particular substance. "n important component of product stewardship and workplace safety, it is intended to provide workers and emergency personnel with procedures for handling or working with that substance in a safe manner, and includes information such as physical data :melting point, boiling point, flash point, etc.;, to#icity, health effects, first aid, reactivity, storage procedures. MS1S formats can vary from source to source within a country depending on national re8uirements. MS1S :material safety data sheets; are a widely used system for cataloging information on chemicals, chemical compounds, and chemical mi#tures. 2*1* information may include instructions for the safe use and potential ha<ards associated with a particular material or product. These data sheets can be found anywhere where chemicals are being used. There is also a duty to properly label substances on the basis of physic! chemical, health and7or environmental risk. =abels can include ha<ard symbols such as the ,uropean >nion standard black diagonal cross on an orange background, used to denote a harmful substance. "n MS1S for a substance is not primarily intended for use by the general consumer, focusing instead on the ha<ards of working with the material in an occupational setting. In some jurisdictions the MS1S is re8uired to state the chemical?s risks, safety, and effect on the environment. It is important to use an MS1S specific to both country and supplier, as the same product :e.g. paints sold under identical brand names by the same
6|Page
company; can have different formulations in different countries. The formulation and ha<ard of a product using a generic name :e.g. sugar soap; may vary between manufacturers in the same country. 2any companies offer the service of collecting, or writing and revising, data sheets to ensure they are up to date and available for their subscribers or users. *ome jurisdictions impose an e#plicit duty of care that each 2*1* be regularly updated :usually every three to five years;. " material safety data sheet :MS1S;>ser are categori<ed into major two Types@ $. 3enral user4 5 ,mployee who is actually working in 2*1* department as a normal user like data entry operator etc. 9ere after legall permission of "dmin user and if and only if "dmin userAs authority general user can log in into system and can add information about material that is chemical details as well as about other staff of 2*1*As department. *. Admin 6ser@ ! In admin employee have permission to add users of system, after adding users to system i.e 1ata entry operator .9e7she can also logon to system to perform action and this process of authentication is totally manual and legal of system department.
(urrent System This system is currently manual system . Bhenever a new entry for the chemical is to be added to database ,the person who is going to make entry have to fill a lot of paper work and also they have to safely keep in safe. " single mistake in writing documents is very risky in such case .*o responsibility increases .It is also time and cost consuming . 1raw'acks of (urrent System There are various problems faced by this current system those are like@ Bhenever any employee comes, the process of finding all files related to chemical information consumes a lot of time,
7|Page
Be have to keep each and every paper based documents in proper way manually, so there may be problem of misplace of all documents which are based on paper works.
Bhen we need to use all information for making medicine , we have to take care of all chemical properties to make product and need to check all such documents so to reduce the chances of taking wrong basic chemical and to reduce harms we manage it in particular way.
To make a record of the chemical information at one place. To keep track of all documents related to chemical for the proper working we manage.
"s well as there is no such facility to store the information regarding employee of 2*1*As staff and authority for this particular area.
Proposed System4 roposed system will keep track of all informative data. There shall be feeding of data by "dmin users as well as authori<ed other users . They will enter data, view data and edit data. ropose system should store the following@ Considering all the listed limitations, the resent system provides an indigenous way for handling all documents which was developed using the waterfall model. $vercoming the demerits, this system leads to a completely computeri<ed system for the company.
Advantage of Proposed System4 Computeri<e and secure the *ystem. >ser is introduced due to which accessibility of system is handled. &ast data accessing and cost is reduced
8|Page
1ata is consolidating easily. Tracking of the investigation and reporting is easy. It is easier to carryout meaningful analysis of data. This system uses $0"C=, ))g as data base which is strong and secure database for proposed system. The proposed system empowers the user with a new computer based system by reducing the efforts of data maintenance.
The proposed developed according to the user specification hence it is a user! centered system.
This system provides a facility to search various chemicals as soon as to the employees.
This project can be said to have the below mentioned scopes@ To enable the employees to handle the chemical information manual system to computeri<ed system. reporting from
To enable employees to make reporting of 2*1* from the preliminary report : aper report; to report To enable employees to make analysis on accident on the basis of various parameters for corrective action. To enable employees to see how many cases entered by admin users. To enable employees to see how many detail entry that is detail information filled by the normal employees7 officers. To enable employee to edit the particularly selected case entry To enable employees to view the information. To enable employees to view the status of all the case according to their role and authority.
The programs written on one platform can run on any platform provided the platform must have the CD2. 0eatures4
latform Independent *imple $bject $riented :,ncapsulation, olymorphism, Inheritance; 0obust 1istributed ortable 1ynamic *ecure erformance 2ultithreaded
Interpreted
11 | P a g e
computing, the most fle#ible and cost effective way to manage information and applications. ,nterprise grid computing creates large pools of industry!standard, modular storage and servers. Bith this architecture, each new system can be rapidly provisioned from the pool of components. There is no need for peak workloads, because capacity can be easily added or reallocated from the resource pools as needed. "n $racle database is a collection of data treated as a unit. The purpose of a database is to store and retrieve related information. " database server is the key to solving the problems of information management. In general, a server reliably manages a large amount of data in a multiuser environment so that many users can concurrently access the same data. "ll this is accomplished while delivering high performance. " database server also prevents unauthori<ed access and provides efficient solutions for failure recovery The database has logical structures and physical structures. Because the physical and logical structures are separate, the physical storage of data can be managed without affecting the access to logical storage structures.
+RA(87 0eatures4
$racle 1atabase is a single integrated platform that supports *E=, F2=, and procedural languages :e.g., =7*E=, Cava, C7CGG; in a simple fashion with high performance and scalability..
9igh *peed@ $racle 8uery can be used to retrieve large amount of a records from a database 8uickly and efficiently.
12 | P a g e
2ultiple Diews $f a data. Cava Integration :C1BC;. " broad subset of "5*I *E= 33, as well as e#tensions *tored procedures Triggers Cursors >pdatable Diews Information schema Euery caching *ub!*,=,CTs :i.e. nested *,=,CTs; ,mbedded database library 1atabase *ecurity
13 | P a g e
System Analysis
*.$
0easi'ility Study
&easibility studies aim to objectively and rationally uncover the strengths and weaknesses of the e#isting business or proposed venture, opportunities and threats as presented by the environment, the resources re8uired to carry through, and ultimately the prospects for success.In its simplest terms, the two criteria to judge feasibility are cost re8uired and value to be attained. The feasibility studies carried out for this project are@
14 | P a g e
*.$.$ &echnical 0easi'ility4 The technologies proposed for the development of this project are C* and
$0"C=,. These technologies are feasible because they are easily available within the organi<ation. .. The C"D" is feasible due to following reasons@
15 | P a g e
"pplications made from the use of C"D" technology are easier to maintain in the long run. "s the Cava language has a specific structure, itAs easier to manage, and maintain, many modular applications.
If you use C"D" technology, your system wonAt be susceptible to crashes. 2oreover, memory management is a significant advantage of using C"D". It protects against memory leaks and also enables the faster deployment of applications.
The technology $0"C=, is feasible due to following reasons@ Better erformance and *calability Better *ecurity $0"C=,= is an open source system The $racle has most capabilities to handle most corporate database application and used to very easy and fast. It can used to store many %B?s of data into database.
16 | P a g e
The system is very easy to handle and has a user friendly %>I that would enable the end users to get ac8uainted to it easily and in short time.
There is no need for any special training to anybody to handle the system. To handle the system the user need not be a computer professional, on the whole the user will benefit from the system and hence the system is operationally feasible.
The proposed system is operationally feasible as it would increase the throughput and reduce the response time to some e#tent.
It will reduce the cost and time of officer to analysis accident details and to take a corrective action.
It will be accepted by the users as it provides various operations in a very simpler way that is easy to understand and use.
The development of the proposed project will prove very beneficial to the user as well as the management.
The proposed project does not interfere with the e#isting system. Be have sufficient time to develop the proposed project. "ll the resources re8uired to develop and maintain the project are available and sufficiently provided by the management.
roper training and guidance provided for the people involved in the project. "vailability of physical worksite i.e. College =ab. .
The spiral model combines the idea of iterative development :prototyping; with the systematic, controlled aspects of the waterfall model. It allows for incremental releases of the product, or incremental refinement through each time around the spiral. The spiral model also e#plicitly includes risk management within software development. Identifying major risks, both technical and managerial, and determining how to lessen the risk helps keep the software development process under control. The spiral model is based on continuous refinement of key products for re8uirements definition and analysis, system and software design, and implementation :the code;. "t each iteration around the cycle, the products are e#tensions of an earlier product. This model uses many of the same phases as the waterfall model, in essentially the same
19 | P a g e
order, separated by planning, risk assessment, and the building of prototypes and simulations. *tarting at the center, each turn around the spiral goes through several task regions@ 1etermine the objectives, alternatives, and constraints on the new iteration. ,valuate alternatives and identify and resolve risk issues. 1evelop and verify the product for this iteration. lan the ne#t iteration. 2aterial safety 1ata sheet contains more iteration in it. *uch as while coding module for general users7employee side analysis must be done thoroughly.
20 | P a g e
Pro,ect Steps Re2uiremant gathering Planning and analysis 1esigning data'ase schema 1esign 36) (oding )ntegration &esing 1eployment
1ecem'er
"anuary
21 | P a g e
System 1esign
resently there is no such application developed to save the data computeri<ed way. *o this will be the first application for 2*1* department
Scope of the system4 To enable the employees to handle chemical information from manual system to computeri<ed system. To enable employees to make reporting of chemical information from the preliminary report :Telegram report; to report in format " including flow of report to level hierarchy as per policy. To enable employees to make analysis on accident on the basis of various parameters for corrective action. To enable employees to see how many cases are rejected or approved by admin officers To enable employees to see how many detail entry that is detail information filled by the normal employees7 officers. To enable employee to edit the particularly selected case entry To enable employees to view the status of all the case according to their role and authority.
..$.*.$ 9ardware4 C > Type@ @ entium!1ual Core Base 2emory@ 6 2B. ,#tended 2emory@ + %B. Cache 2emory@ 6 2B. C > Clock@ +)4429<. 1isplay Type@ D%"7=C1. 9ard 1isk@ 6%B.
..$.*.* Software )nterface4 $perating *ystem@ Bindows F * -7Bindows ' * ) &0$5T ,51@ C"D":swing; B"CH ,51@ $0"C=,
24 | P a g e
*: 6pdate chemical details J "fter the ;Add chemical 1etails< the normal user or admin user can update specific chemical details by entering C"*I number into the field . *earchJ *earching of chemicals can be done by entering C"*I into field >pdate! "fter the search he can make changes into field which they want to update,but without spoiling C"*I number 1elete ! "fter the search he can make changes into field which they want to delete done by entering C"*I into field *. 1epartmental 7mployee 1etails45 This module consist of the following. $: Add 1epartmental 7mployee 1etails! In this module the "dmin officer 75ormal user can able to add details or information about any chemical product
25 | P a g e
2*1* ,mployee .9ere its mandatory to enter empI1 details uni8uely to differentiate between two employees. *: 6pdate 1epartmental 7mployee details J "fter the ;Add 1epartmetal employee 1etails< the normal user or admin user can update specific 2*1* ,mployee details by entering empI1 number into the field . *earchJ *earching of 2*1* ,mployee can be done by entering empI1 into field >pdate! "fter the search he can make changes into field which they want to update,but without spoiling empI1 number 1elete ! "fter the search he can make changes into field which they want to delete done by entering empI1 into field
.. System 6ser 1etails45 This module consist of the following. $: Add System 6ser 1etails! In this module the "dmin officer can able to add details or information about >ser of 2*1* . *: Account settings J "fter the ;Add System 6ser 1etails< the admin user7normal can update specific 2*1* ,mployee details . >pdate! "fter the search he can make changes into field which they want to update 1elete ! "fter the search he can make changes into field which they want to delete their account as well. =. 1etail View J This module 1etail ,ntry will be display.
26 | P a g e
$: (hemical reports ! In this module the user is able to view reports of chemicals *: MS1S 7mployee reports J In this module the user is able to view reports of 2*1* employees. > . 9elp5 In this module user manual is shown. ..*.* +',ect +riented Analysis - 1esign 1iagrams ..*.*.$ Entity relationship diagram:[ERD]: In software engineering, an entity5relationship model :7RM; is an abstract and conceptual representation of data. ,ntity!relationship modeling is a database modeling method, used to produce a type of conceptual schema or semantic data model of a system, often a relational database, and its re8uirements in a top!down fashion. 1iagrams created by this process are called entity5relationship diagrams, 7R diagrams, or 7R1s. The definitive reference for entity!relationship modeling is eter Chen?s )3'/ paper. 9owever, variants of the idea e#isted previously and have been devised subse8uently.
27 | P a g e
7ntity diagrams4
(hemical 1etails: C"*I *ynonyms roductK5ame Created Time Chemical 5ame Created 1ate Chemical 1etails &ormulaK5am e
&lamable limit
&lash point
ContactK1etail s
$nline $rder
Created 1ate
,mployee 1etails
2ob!5o
Country
,mail !I1
"ddress osition
Category
29 | P a g e
5ame
Confirm password
surname
Category
>ser 5ame
30 | P a g e
HAS
HAS
HAS
31 | P a g e
Process !otations4 Process " process transforms incoming data flow into outgoing data flow.
32 | P a g e
1ata store !otations 1ata *tore 1ata stores are repositories of data in the system. They are sometimes also referred to as files.
1ataflow !otations
33 | P a g e
Dataflow 1ataflows are pipelines through which packets of information flow. =abel the with the name of the data that moves through it.
arrows
7?ternal 7ntity !otations External Entity ,#ternal entities are objects outside the system, with which the system communicates. ,#ternal entities are sources and destinations of the system?s inputs and outputs.
34 | P a g e
=ogin *tatus
+. C9"5%, "**B$01@
>pdate assword
User Update Password Add Delete
35 | P a g e
"dd 1etails
User Add new &ser "!ste
,mployee 1etails
User Add new ,mployee E plo!ee
,mployee 1etails
User "ear#$ %or
,mployee
,mployee information
Detail
36 | P a g e
,mployee 1etails
User Update
,mployee
,mployee
entr!
Confirmation of updating
6. 1,=,T, C9,2IC"=@
,mployee
,mployee7Chemical 1etails
User Update Entr! 'eports
0eport 1etail
37 | P a g e
..*.. 1ata'ase 4
..*...$ 1ata'ase &a'le4 !o. ). +. -. &a'le ChemicalK1etails 1epartK,mpK1etails 1escription =ist the chemical details =ist the departmental employee details =ist the system users
*ystemK>serK1etails
38 | P a g e
Sr. !o ) + 6 . / ' ( 3 )4 ))
(olumn !ame roductKname CasI *ynonyms ChemKname &ormKname ContKdetails $nlineKorder ,ye contact *kin contact &lash point &lammable limit
1ata &ype varchar:+; varchar:+; varchar:+; varchar:+; varchar:+; 5umber:)4; 5umber:).; varchar:+; varchar:+; 5umber :)4; 5umber :)4;
39 | P a g e
)+ )-
varchar:+; varchar:+;
! !
) + 6 . / ' ( 3 )4 )) )+
,mpKI1 *urname &irK2idK5ame 2obK5o ,mailKI1 Category osition "ddress Country CreatedKdate CreatedKtime 5ote
varchar:+; varchar:+; varchar:+; 5umber :)4; varchar:+; varchar:+; varchar:+; varchar:+; varchar:+; varchar:+; varchar:+; varchar:+; ! ! ! ! ! ! ! ! ! ! !
40 | P a g e
.. System@6ser@1etails Sr. !o
) + 6 .
(olumn !ame
5ame Category >ser5ame assword Cnf assword
1ata &ype
varchar:+; varchar:+; varchar:+; varchar:+; varchar:+;
(onstraint ! ! ! ! !
41 | P a g e
42 | P a g e
8ogin Screen4
43 | P a g e
44 | P a g e
45 | P a g e
46 | P a g e
(hemical 1etails4
Add (hemical 1etails ASuccessful Saving:4
47 | P a g e
Add (hemical 1etails 4 Validation4 )f user doesnDt entered any details it gives error.
48 | P a g e
7nter casE
49 | P a g e
Searched result @
50 | P a g e
51 | P a g e
52 | P a g e
Add departmental employees 1etails 4 Validation4 )f user doesnDt mandatory fields entered any details it gives error.
53 | P a g e
Add departmental employees 1etails 4 Validation4 )f user doesnDt entered M+/)87 num'er properly it gives error.
Add departmental employees 1etails 4 Validation4 )f user doesnDt entered 7MP@)1 num'er properly it gives error. 54 | P a g e
Searched result4
55 | P a g e
56 | P a g e
Add system user 1etails 4 Validation4 )f user doesnDt entered PASSF+R1 properly it gives error.
57 | P a g e
Add system user 1etails 4 Validation4 )f user doesnDt entered PASSF+R15(+!0)RM PASSF+R1 properly it gives error.
58 | P a g e
59 | P a g e
View Reports4
60 | P a g e
61 | P a g e
&esting
62 | P a g e
The V5model represents a software development process :also applicable to hardware development; which may be considered an e#tension of the waterfall model. Instead of moving down in a linear way, the process steps are bent upwards after the coding phase, to form the typical D shape. The D!2odel demonstrates the relationships between each phase of the development life cycle and its associated phase of testing. The hori<ontal and vertical a#es represents time or project completeness :left!to!right; and level of abstraction :coarsest!grain abstraction uppermost;, respectively. Verification Phases45 ). 0e8uirements analysis@!
63 | P a g e
In the 0e8uirements analysis phase, the first step in the verification process, the re8uirements of the proposed system are collected by analy<ing the needs of the user:s;. +. *ystem 1esign@! *ystems design is the phase where system engineers analy<e and understand the business of the proposed system by studying the user re8uirements document. They figure out possibilities and techni8ues by which the user re8uirements can be implemented. -. "rchitecture 1esign@! The phase of the design of computer architecture and software
architecture can also be referred to as high!level design. The baseline in selecting the architecture is that it should reali<e all which typically consists of the list of modules, brief functionality of each module,
their interface relationships, dependencies, database tables, diagrams, technology details etc. 6. 2odule 1esign@!
architecture
The module design phase can also be referred to as low!level design. The designed system is broken up into smaller units or modules and each of them is e#plained so that the programmer can start coding directly. Validation Phases45 ). >nit Testing@! In computer programming, unit testing is a method by which individual units of source code are tested to determine if they are fit for use.>nit tests
64 | P a g e
are created by programmers or occasionally by white bo# testers. +. Integration Testing@! In integration testing the separate modules will be tested together to e#pose faults in the interfaces and in the interaction between integrated components. Testing is usually black bo# as the code is not directly checked for errors. -. *ystem Testing@! *ystem testing will compare the system specifications against the actual system. "fter the integration test is completed, the ne#t test level is the system test. *ystem testing checks if the integrated product meets the specified re8uirements. 6. >ser "cceptance Testing@! "cceptance testing is the phase of testing used to determine whether a system satisfies the re8uirements specified in the re8uirements analysis phase. The acceptance test design is derived from the re8uirements document. The acceptance test phase is the phase used by the customer to determine whether to accept the system or not.
/enefits of V5Model &aults are prevented and it stops fault multiplication. "voids the downward flow of defect. =ower defect 0esolution cost due to earlier detection.
65 | P a g e
Improved 8uality and reliability. 0eduction in the amount of 0e!work. Improved 0isk 2anagement Dalidation and Derification at each level of stage containment "llows testers to be active in the project early in the projectAs lifecycle. They develop critical knowledge about the system.
66 | P a g e
67 | P a g e
=.*.*/lack /o? &esting4 /lack /o? testing takes an e#ternal perspective of the test object to derive test cases. These tests can be functional or non!functional, though usually functional. The test designer selects valid and invalid inputs and determines the correct output. Black!bo# testing implies that a tester doesn?t know how an application is designed at the code level that is, it involves dynamic testing of compiled applications. The tester interacts with the software system via its interface and analy<es the application reaction. Black bo# testing, concrete bo# or functional testing is used to check that the outputs of a program, given certain inputs, conform to the functional specification of the program. The advantages of this type of testing include@ The test is unbiased because the designer and the tester are independent of each other. The tester does not need knowledge of any specific programming languages. The test is done from the point of view of the user, not the designer. Test cases can be designed as soon as the specifications are complete. The disadvantages of this type of testing include@ The test can be redundant if the software designer has already run a test case. The test cases are difficult to design. Testing every possible input stream is unrealistic because it would take a inordinate amount of timeM therefore, many program paths will go untested.
68 | P a g e
=.*.*.$ 72uivalence (lass &esting This is an ,8uivalence class for (onsumer !um'er which should 'e accepted as e?actly > digit num'ers. (orrect e2uivalence classes and representatives4
72uivalence (lass
Representatives
(+3)+6).3+
Parameter
72uivalence (lass
Representatives
1isplaying the 2obile 5umber which should be i,C)@ #O4 accepted as e#actly )4 digit numbers. i,C+@ #P)4 i,C-@ #O)4 i,C6@5a5
69 | P a g e
Parameter
8ower
/oundary
Value 72uivalence
class%6pper
/oundary Value
2obile 5umber
4,S )4 T,))
70 | P a g e
=.*.*.* (ause 7ffect 3raph4 This cause effect graph is regarding the number of digits in Mo'ile !um'er.. which should be e8ual to )4 It should accept only numerical values.
(o) o% digits in o*ile no +0
A##epted
71 | P a g e
(onditions $: !o. of digits in Mo'ile 5 !o.G #. *: !o. of digits in Mo'ile !o. 5 H# .: #G !o. of digits in Mo'ile Y !o. H $#. =: !o. of digits in mo'ile 5 !o. I $#. Actions $: Accepted. F ! F Y 5 Y Y
0orm 8ogin4 =ogin 1evelopers name4 "kshata *hinde &ester !ame4 ratiksha kewale
&est (ase (ase &est (ase Steps and 1escription &est )nput $pen the This test login form case would enter user id =oginKtest4 check for a U ) valid user id password.Clic U valid k on =ogin password Button. $pen the This test login form case would keep user id =oginKtest4 check for a U password + a blank user field blank id id and 7or .Click on password =ogin Button. $pen the This test login form case would enter valid check for =oginKtest4 user id U the valid invalid user id and password.Clic invalid k on =ogin password. Button. &est )1
7?pected +utput
Actual +utput
&est Result
=ogin should be =ogin should be successful.1irecte successful.1irecte d to 2ain d to 2ain &orm.2enus are &orm.2enus are displayed =ogin should be unsuccessful. rompt to enter user id and password. =ogin should be unsuccessful. rompt to enter user id and password..
"**
"**
=ogin should be =ogin should be unsuccessful. unsuccessful. rompt to enter rompt to enter valid password. valid password.
"**
&est (ase )1
&est (ase &est (ase 7?pected Steps and 1escription +utput &est )nput
Actual +utput
&est Result
ChemicalKtest4 )
This test case $pen "dd would check >ser can *ave >ser can save chemical for a valid details. details. form C"*I. 1isplay error This test case $pen "dd message and would check chemical rompt to enter for a blank form valid details. information. 1isplay error message and rompt to enter valid information.
"**
ChemicalKtest4 +
"**
74 | P a g e
&est case )14 =oginKtest4) Test Case 1escription@ This test case would check for a valid user id U valid password
2odule 5ame@ =ogin :unit testing; Before 0etesting 0esult@ &"I= 0eported To@ ratiksha Hewale 1eveloper has Checked75ot@ Checked
&est case )14 ChemicalKtest4) Test Case 1escription@ This test case would check for a valid C"*I. 2odule 5ame@ Chemical entry :unit testing; Before 0etesting 0esult@ &"I= 0eported To@ Bhavana Bankhede 1eveloper has Checked75ot@ Checked
75 | P a g e
System )mplementation
76 | P a g e
77 | P a g e
/eta &esting4 $perational testing by potential and7or e#isting users7customers at an e#ternal site not otherwise involved with the developers to determine whether or not a component or system satisfies the user7customer needs and fits within the business processes. Beta testing is often employed as a form of e#ternal acceptance testing in order to ac8uire feedback from the market.
78 | P a g e
79 | P a g e
J.$ Maintenance
$nce the website is successfully uploaded on the web server it may undergo some changes. This may occur due to a change in the re8uirements, change in operational environment or an error in coding, which has not been fi#ed while testing. The proper follow up of the system and error solving in post implementation phase is what is called as maintenance. *ystem 2aintenance and ,valuation of software can be defined as modification of software product after the delivery to correct defaults, improve performance or other attributes or adapt the product to a changed environment.
After our system has 'een deployed i.e. after it is operational it will have to4 V 9elp in efficient management of data. V Improve work efficiency w.r.t 1etail ,ntry module. V >ser friendly application.
80 | P a g e
J.* 7valuation
In todayAs world, none of the system is completely perfect. "s the various re8uirements of user keeps on changing, the software needs to be further modified. "fter the software has been installed it may undergo some changes. This may occur due to change in the user re8uirements, change in operational environment or an error in software, which has not been fi#ed while testing.
81 | P a g e
6serC+perational Manual
82 | P a g e
(hemical details "dd chemical details @ ,nter details in chemical details Click on save data
>pdate chemical details @ To update ,nter C"*I number and click on *,"0C9 button >pdate any re8uired details and click on > 1"T, button
To delete ,nter C"*I number and click on *,"0C9 button click on 1,=,T, button
1epartmental 7mployee details "dd departmental employee details @ ,nter details in departmental employee details
83 | P a g e
>pdate departmental employee details @ To update ,nter ,2 KI1 number and click on *,"0C9 button >pdate any re8uired details and click on > 1"T, button
To delete ,nter ,2 KI1 number and click on *,"0C9 button click on 1,=,T, button
System 6ser details click on "dd system user details @ ,nter details in chemical details Click on save data
Click on "ccount settings @ To update >pdate any re8uired details and click on > 1"T, button
84 | P a g e
85 | P a g e
K.. /ackup
"s this *ystem is a critical system. The database is a key aspect of system. *o we have set an incremental backup of daily and full back up of system once in month these task are kept in database system also the admin can take backup as per needed. These backup are store in a internal drive which can be move to e#ternal device. "nd we can restore this backup if the system is fail.
86 | P a g e
8imitations
87 | P a g e
The project can be said to following limitations@ *low data analysis %eneral user can also only view all details not anyone else filled details 2enu screen should be different for different users
88 | P a g e
(onclusion
89 | P a g e
The normal user can easily submit the details and reduce the time for analysis of reports
>ser can check details. Its became easy to understand details of all chemical and 2*1* employee It is easier to carryout meaningful analysis of reports to arrive at conclusive data for corrective action.
"part from above conclusion about the project, we also conclude that developing this project was a very learning e#perience as a whole. Bith the successful completion of project work, we have not only developed our skills as an IT professional but also had an e#perience to work in real!life IT industry environment. Thus we hope so that these newly developed skills and e#perience will help us to achieve great heights in our career in future.
90 | P a g e
0uture 7nhancements
91 | P a g e
The project developed can be said to have following enhancements in the near future
It should be available on web browser roper authentication also provided by application 2ore security measures must provide.
92 | P a g e
/i'liography
93 | P a g e
Reference /ooks45
"ava the (omplete Reference "uthor@ ! 2c%raw!9ill Companies
Fe'sites45
94 | P a g e