Sei sulla pagina 1di 56

INTRODUCTION Objective : WebBase HR Recuirtment System provides the facility to both JobSeekers and employers to interact with the

site.

On the part of the Employer the Site provides the following facilities

Post Jobs View Jobs View candiates applied for jobs

On the part of the Jobseeker the Site provides the following facilities

Add Profile View Profile


View and Apply for jobs posted by company

Page 1 of 56

Scope Of The Project

INTRODUCTION Objective : WebBase HR Recuirtment System provides the facility to both JobSeekers and employers to interact with the site.

On the part of the Employer the Site provides the following facilities

Post Jobs View Jobs View candiates applied for jobs

On the part of the Jobseeker the Site provides the following facilities

Add Profile View Profile View and Apply for jobs posted by company

Page 2 of 56

TECHNOLOGY USED

The strength of any project depends upon the technology on which the project is based. Today we are living in a world where technologies related to computer science are evolving every day new technologies are taking an edge over the older ones. Every new technology is provides some new benefits, but only small part of them remains in the competitive world. NET is the latest technology, which is in use nowadays and has proved to be the most reliable development framework. The technologies we have used in the development of the project are:

* .NET * ASP.NET * SQL Server

Why to use .NET? The .NET Framework is a new computing platform that simplifies application development in the highly distributed environment of the

Page 3 of 56

Internet. The .NET Framework is designed to fulfill the following objectives:

To

provide

consistent

object-oriented

programming

environment whether objects code is stored and executed locally, executed locally but Internet-distributed, or executed remotely. * To provide a code-execution environment that minimizes

software deployment and versioning conflicts. * To provide a code-execution environment that guarantees safe

execution of code, including by an unknown or semi-trusted third party. * To provide a code-execution environment that the performance

problems of scripted or interpreted environments * To make the developer experience consistent across widely

varying types of applications, such as windows-based applications and Web-based applications. * To build all communication on industry standards to ensure that

code based on the .NET Framework can integrate with any other code.

The .NET Framework has two main components: The common language runtime and the .NET Framework class library. The common language runtime is the foundation of the .NET Framework. You can think of the runtime as an agent that manages code at execution time, providing core services such as memory

Page 4 of 56

management, thread management, and remoting, while also enforcing strict type safety and other forms of code accuracy that ensures security and robustness. In fact, the concept of code management is a fundamental principle of the runtime. Code that targets the runtime is known as managed code, while the code that does not target the runtime is known as unmanaged code.

The class library, the other main component of the .NET framework, is a comprehensive, object-oriented collection of reusable types that you can use to develop applications ranging from traditional command-line or graphical user interface (GUI) applications to applications based on the latest innovations provided by ASP.NET, such as web Forms and XML Web services. Features of Common Language Runtime The common language runtime manages memory; thread execution, code execution, code safety verification, compilation, and system services. These features are intrinsic to the managed code that runs on the common language runtime.

With regards to security, managed components are awarded varying degrees of trust, depending on a number of factors that include their origin (such as the Internet, enterprise network. This means that a managed component might or might not be able to perform file-access operations, registry access operations, or other sensitive functions, even if it is being used in the same active application.

Page 5 of 56

The runtime enforces code access security. For example, users can trust that an executable embedded in a web page can play an animation on screen or sing a song, but cannot access their personal data, file system, or network. The security features of the runtime thus enable legitimate Internet-deployed software to be exceptionally feature- rich.

The runtime also enforces code robustness by implementing a strict type- and code-verification infrastructure called the common type system (CTS). The CTS ensures that all managed code is selfdescribing. The various Microsoft and third party language compilers generate managed code that conforms to the CTS. This means that managed code can consume managed types and instances, while strictly enforcing type fidelity and type safety. In addition, the managed environment of the runtime eliminates many common software issues. For example, the runtime automatically handles object layout and managed references to objects, releasing them when they are no longer being used. This automatic memory management resolves the two most common application errors, memory leaks and invalid memory references.

The runtime also accelerates developer productivity. For example, programmers can write applications in their development of choice, yet take full advantage of the runtime, the class library, and

Page 6 of 56

components written in other languages by other developers. Any compiler vendor who chooses to target the runtime can do so. Languages compilers that target the .NET Framework make the features of the .NET Framework available to existing code written in that language, greatly easing the migration process for existing applications. While the runtime is designed for the software of the future, it also supports software of today and yesterday. Interoperability between managed and unmanaged code enables developers to continue to use necessary COM components and DLLs. The runtime is designed to enhance performance. Although the common language runtime provides many standard runtime services, managed code is never interpreted. A feature called just-in-time (JIT) compiling enables all managed code to run in the native machine language of the system on which it is executing. Meanwhile, the memory manager removes the possibilities fragmented memory and increases memory locality-of-reference to further increase performance. Finally, the runtime can be hosted by high-performance, server-side applications, such as SQL Server and Internet Information Services (IIS). This infrastructure enables you to use managed code to write your business logic, while still enjoying the superior performance of the industrys best enterprise servers that support runtime hosting.

. NET Framework Class library The .NET Framework class library is a collection of reusable types that tightly integrate with the common language runtime. The class
Page 7 of 56 7

library is object oriented, providing types from which you can own managed code can derive functionality. This not only makes the. . NET Framework types easy to use, but also reduces the time associated with learning new features of the .NET Framework. In addition, third-party components can integrate seamlessly with classes in the .NET Framework. For example, the .NET Framework collection classes implement a set of interfaces that you can use to develop your own collection classes. Your collection classes will blend seamlessly with the classes in the .NET Framework.

As you would expect from an object-oriented class library, the .NET Framework types enable you to accomplish a range of common programming tasks, including tasks such as string management data collection, database connectivity, and file access. In addition to these common tasks, the class library includes types that support a variety of specialized development scenarios. For example, you can use the .NET Framework to develop the following types of applications and services:

* Console applications. * Scripted or hosted applications. * Windows GUI applications. * ASP.NET applications.

Page 8 of 56

* XML Web services. * Windows services.

For example, the Windows Forms classes are a comprehensive set of reusable types that vastly simplify Windows GUI development. If you write an ASP.NET Web Form application, you can use the Web Forms classes.

OTHER TECHNOLOGIES

SQL SERVER: Microsoft SQL Server 2000 is a family of products that meet the data storage requirements of the largest processing systems and commercial Web sites, yet at the same time can provide easy-to-data storage services to an individual or small business.

Microsoft SQL Server TM 2000 features include: Internet Integration. The SQL Server 2000 database engine includes integrated XML support. It also has the scalability, availability, and security features required to operate as the data storage component of the largest Web sites.

Page 9 of 56

Scalability and Availability. The same database engine can be used across platforms ranging from laptop computers running Microsoft Windows98 through large, multiprocessor servers running Microsoft Windows 2000 Data Center Edition. SQL Server 2000 Enterprise Edition supports features such as federated servers, indexed views, and large memory support that allows it to scale to the levels required by the largest Web sites.

Enterprise-Level Database Features : The SQL Server 2000 relational database engine supports the features required to support demanding data processing environments. The database engine protects data integrity while minimizing the overhead of managing thousands of users concurrently modifying the database. SQL Server 2000 distributed queries allow you to reference data from multiple sources as if it were a part of a SQL Server 2000 database, while at the same time, the distributed transaction support protects the integrity of any updates of the distributed data. Replication allows you to also maintain multiple copies of data, while ensuring that the separate copies remain synchronized.

Ease of installation, deployment, and use. SQL Server 200 includes a set of administrative and development tools that improve upon the process of installing, deploying, managing, and using SQL Server across several sites. These features
Page 10 of 56 10

allow you to rapidly deliver SQL Server applications that customers can implement with a minimum of installation and administrative overhead.

SQL Query Analyzer

SQL Query Analyzer is a Microsoft Win32 application that is an excellent tool for the ad hoc, interactive execution of Transact-SQL statements and scripts. To use SQL Query Analyzer, users must understand Transact-SQL.

In SQL Query Analyzer, users enter Transact-SQL statements in a full-text window, execute the statements and view the results in a results window. Users also can open a text file containing TransactSQL statements, execute the statements and view the results in a results window. SQL Query Analyzer also provides tools for determining how Microsoft SQL Server is interpreting and working with a Transact-SQL statement. A user can: Start the Index Tuning Wizard to determine which indexes can be defined for the underlying tables to optimize the performance of the statement.

Page 11 of 56

11

* Create queries and other SQL scripts and execute them against SQL Server databases (Query window). * Quickly create commonly used database objects from predefined scripts (Templates). * Quickly copy existing database objects (Object Browser scripting feature). * Execute stored procedures without knowing the parameters (Object Browser procedure execution feature). * Debug stored procedures (T-SQL Debugger). * Debug query performance problems (Show Execution Plan, Show Server Trace, Show Client Statistics, and Index Tuning Wizard). * Locate objects within database (object search feature), or view and work with objects (Object Browser). * Quickly insert, update, or delete rows in a table (Open Table Window). * Create keyboard shortcuts for frequently used queries (custom query shortcuts feature).

Database Architecture Microsoft SQL Server TM 2000 data is stored in databases. The data in a database is organized into the logical components visible to users. A database is also physically organized as two or more files on disk. When using a database, you work primarily with the logical components such as tables, views, procedures, and users. The physical
Page 12 of 56 12

implementation of files is largely transparent. Typically, only the database administrator needs to work with the physical implementation.

Page 13 of 56

13

Page 14 of 56

14

Advantages

Advantages of .NET ASP.NET is the latest Microsoft programming framework that allows for the rapid development of powerful web applications:

Faster web applications: Two aspects of ASP.NET make it fast compiled code and caching. In the past, the code was interpreted into machine language when your website visitor viewed your page. Now with ASP.NET, the code is compiled into machine language before your visitor ever comes to your site.

No need of third party tool: In ASP.NET for automated e-mail system and uploading the files no need of use of third party tool like ABC Upload and ASP Email Dll as. NET Framework is already having this class. Caching is the storage of information that will be reused in a memory location for faster access in the future.ASP.NET allows programmers to set up pages or areas of pages that are commonly reused to be cached for a set period of time to improve the performance of web applications. In addition, ASP.NET allows the caching of data from a database so your website isnt slowed down by frequent visits to a database when the data doesnt change very often.

ASP.NET was tested and found to be over 10 times faster for the average user than any other technology. While there have been some
Page 15 of 56 15

debates about the methods of testing, it is interesting to note that this has been validated by 3rd parties.

Memory leaks and crashes protection: ASP.NET automatically recovers from memory leaks and errors to make sure that your website is always available to your visitors.

Multiple language support: Programmers can actually write their code in more than 25 .NET languages (including VB.NET, C#, and Jscript.NET). This allows programmers to develop your site in the language.

VB

Executable Code

Runtime Executable Code

C++

Executable Code

Runtime

VB C L R Code Executed

C+ +

IL

Page 16 of 56

16

Duwamish 7.0 for DLL Development: It is multi-tier, distributed enterprise application built specifically for the Microsoft .NET Platform. Its design, development, and deployment provide insight into how developers can various features of the .NET Platform to build reliable, scalable, and well-performing applications.

Powerful Web Controls: In ASP.NET we can use Tab Strip, Tree view, List View Control, User Control, and Data Grid Control using which we can do ADD/EDIT/DELETE in the grid itself, also it is having the advantages of in-built sorting and paging logic. Deployment is Easy: As compared to ASP application, the deployment is as easy in .NET as there I is no need of registration of DLL.

b) Advantages of SQL Server SQL is widely used and accepted in the high-performance database industry. Its current version has recently been compared to Oracle, the database leader, in terms of overall market acceptance. Incorporating SQL means many clients IT staff will already have experience installing, configuring, and managing the database, and their staff will often already have already used. SQL was tested and used in the in the field for several years. Now in version 8, with millions of people having used it, bug fixing, tweaking, and performance testing has

Page 17 of 56

17

been completed in almost every environment. Clients can be sure data will not be lost, connections will not drop, and data will be secure.

Microsoft supports SQL. Clients can expect world-class technical support and the largest single collection of product literature and support documentation on the Internet. SQL is extendible, expandable and multiprocessor compliant. An SQL server can be installed on RAID-5 or Windows extended volume to allow a redundant copy of the database to be available at all times, in case one of them fails. As well, two identical servers can be identical and redundant, allowing for instant fail-over should one of them fail. On top of all that, the database has been designed to take advantage up to 32 processors per server. With SQL Server, the client can expect greater acceptance and satisfaction from staff, and will be able to use the valuable data they collect in other software programs and systems now and well into the future.

Advantages over Traditional Techniques a). Net and traditional Techniques. Standardized configuration: Java configuration is for the most part oriented around property files, which are simple name value pairs separated by equal signs in a text file. Property parsers are included as part of Java runtime executable (java exe on Windows) accepts named properties on the command
Page 18 of 56 18

line that are included with System properties (which are a centralized repository for global properties).

With .Net, every component knows to retrieve its configuration information from configuration Settings. GetConfig, the data for which built for which is built from a hierarchy of configuration files. This greatly simplifies administration of applications, and has been tremendously useful as a development option.

Extensible metadata Anyone who has developed in Java has encountered the wonders of Java Reflection system. Reflection is the term used to describe the ability to retrieve type information about a Java class runtime. Through Reflection, a Java class will tell you about the methods it contains, whether they are public or private, the arguments it expects, the member variables contained inside the class, etc. Not being the sort to ignore good ideas, Microsoft has included Reflection in. Net, and has ensured that it is defined as part of the core CLR (in other words, every conformant .Net runtime must support reflection). Microsoft, however, has taken reflection to the next level, allowing programmers to include custom information with a .Net class, which can be retrieved using the .Net reflection APIs. Customizable type information is an important, makes your program simpler and easier to manage.

Page 19 of 56

19

Assemblies Assemblies are the unit of distribution for .Net code. In some ways, they are akin to Java jar files. Java classes are composed of byte codes that can be written individually to a disk. If you have ever seen a directory containing a bunch of files with a . class extension, then you have seen Java class files in all there uncompressed glory. Jar files use PKZ compression (the same algorithm used in ZIP files) to include multiple compressed java class files into a single unit of distribution. Often this file includes a text based manifest which is used to provide certain entries in these manifests files, which are used to describe the contents of a jar file to the Java runtime environment.

.Net Remoting .Net Remoting is the manner in which .Net makes objects callable over a network. In that sense, it is like Java RMI, Javas solution for making objects accessible over a network On the other hand, .Net Remoting bears more in common with Multilanguage inter operability infrastructure like CORBA than RMI. In contrast to RMIs emphasis on Java only development (JRMF, RMIs default protocol, is particular to Java, in that it relies on the Java serialization format), .Net Remoting emphasizes flexibility and extensibility. One of the more interesting things about .Net Remoting, however, is the ability to configure remote objects using only external configuration files.ge.

Page 20 of 56

20

Conclusion : These are only some of the highlights of development with. Net. Add to this a greatly steam lined development tools that make their Java- oriented equivalent look like tinker toys. People have a number of reasons for favoring one programming environment over another. For those attracted by good technology .Net is worth a look.

b) SQL Sever and traditional Techniques. Access utilizes a File Sever design while SQL Server employs a Client/Server approach. This is a fundamentally different architecture, which has many, many implications.

Reliability With Access each client reads client reads and writes directly to the raw data tables. If a client machine crashes while writing data this will usually cause the back- end database to also crash and become corrupt. The same thing will occur if the network fails, has a glitch or temporarily becomes overloaded. This problem becomes more apparent as the amount of data and the number of users increases and over slows connections.

With SQL Server the clients do not talk directly with the tables but with an intelligent data manager on the server. This intelligent data manager in turn writes changes to an intermediate storage location called the Transaction Log. It is only when the client signals to the server that it has finished that the intelligent data manager commits
Page 21 of 56 21

the actual data changes from the transaction log to the real, data tables. If a client Machines crashes or the network hiccups. This Transaction log has another useful function during backup and restore of the database. If a database has to be restored then the transaction logs can also be reapplied and can potentially recover the database to the situation it was in just before the crash.

Data Integrity Data Integrity in SQL Server is enhanced by the use of triggers, which can be applied whenever a record is added, updated or deleted. This occurs at the table level and cannot thus be forgotten about, ignored or bypassed by the client machine.

Performance With Access, all tables involved in a form, report or a query are copied across the network from the server to the clients machine. The tables are then processed and filtered the required record set. Contrast this with SQL Server where the filtering takes place on the server (if designed properly).

Network Traffic As can be seen from the previous section, network traffic is greatly reduced in a client/server scenario, often by many orders of

Page 22 of 56

22

magnitude. This both improves network reliability and also improves the performance of the network for other software.

Scalability A file server system such as Access is designed for small workgroups and is scalable to perhaps 10 concurrent clients. Above this level performance starts to degrade rapidly as more users are added. With the SQL Server client/server architecture many hundreds, or even (with the appropriate infrastructure), of concurrent users can be supported without significant performance degradation.

Software and Hardware Requirements

Software requirements: * Operating System: Windows 2000 and above * Development Environment: Microsoft Development Environment -2002 version 7.0.9466 Microsoft .NET Framework 1.0 version 1.0.3705 * Database Server:
Page 23 of 56 23

Microsoft SQL Server Service Manager version 8.00.194 SQL Query Analyzer * Languages Used: VB.NET ASP.NET * Word Processor: Microsoft Word 2000 * Image Processing Tool: Microsoft Paint * Web Browser: Microsoft Internet Explorer version 6.0

Hardware Requirements * Microprocessor X86 Family 6 Model 8 Stepping 6 GenuineIntel~930 MHZ * RAM 128 MB * Hard Disk Space Required 100 MB
Page 24 of 56 24

* Hard Disk Drive 40 GB * Visual Display Unit HCL-56V * CD ROM Samsung CD ROM sc-152c

SDLC

INTRODUCTION: Human is dealing with the data and information since a long time, perhaps since the beginning of civilization man is manipulating data.
Page 25 of 56 25

Since then, give and take of information is in practice, but this has been considered as an important discipline for the last few decades. Todays data manipulation and information processing have become the major tasks of any organization small or big, whether it is educational institution, government concern, scientific, commercial or any other.

Information is the requirement of every organization. Infect, large organizations have started having information systems whose work is together the necessary data and to process those data into meaningful information. System is a buzzword today. Everybody talks of the system such as an educational system, transportation system, accounting system, financial system, computer system, and information system. A system is a set of interrelated elements that operate together to achieve an objective. The general model of system has an inputs, process and output. A system can have many inputs and many outputs. Most talk about system is information system. It receives the data and collects the information and instructions, process the data according to the instructions and outputs the result which itself has some information. An information system in which storage methods are also added, the information processing function means not only the transformation of the data into information but also the storage of the data for later use. The information system receives data as input and converts them into information.

Page 26 of 56

26

An information system can comprises of both human and machines. It is not that an information system simply means machine. Information system uses the various tools to collect data. These tools can be humans as well as machines. Then these tools data is processed into information. The data can be processed using some manual methods or electronic method. Then the information that they get after processing of data is the output of that information system.

An information system is to an organization, what a nervous system is to the body. They do not operate independently, but exists in organization to support the organization process at different levels. Timely information is required at every level of any organization to take the important decision. To cater the needs of organization, information systems in any organization, are available at different levels.

Requirement Analysis: A systematic investigation of a real or planned system to determine the function of the system and how they relate to each other and to any other system is known as system analysis. System analysis is conducted with the following objectives in mind: . Identify the customers need, . Perform economic and technical analysis,

Page 27 of 56

27

. Evaluate the system concept for feasibility, . Allocate functions to hardware, software, people, database and other system elements, . Establish cost and schedule constraints, . Create a system definition that forms the foundation for all subsequent engineering work.

System Analysis Overview: Problem recognition means detailed study of the current system being used by the user. A detailed study of system being currently used must be carried out of sessions with customer and end user. It can be termed as a process of recognizing problems and opportunities.

A complete understanding of software requirement is essential to the success of a software development effort. The problem evaluation and solution synthesis is the next major area of effort for analysis. It enables the system, engine to redefine the software allocation and build model of process followed Identification of need Preliminary investigation

Page 28 of 56

28

Identification of need: The first step of the System Analysis process involves the identification of need. The analyst meets the customer and the end user (if different from the user). The intent is to understand the products objective and to define the goals required to meet the objectives. Timely Customer-Analyst communication is an important ingredient of a system analysts work. The specific objectives are:

Reducing the Duplication during manual Processing Designing and Developing User friendly interfaces through which user will interact with the package Interaction of these GUI with the Database Managing the Database Improve efficiency and quality of services

There are a number of factors that needs to be actively handled, the system must track the data and be able to manage it as well as give the detailed account of the comparative study in the forms of graphs and reports.

Every system must have some complexity attached with it, which is needed to be simplified so that we can achieve a system, which is easier, less complex and easily accessible to the less trained user.

Page 29 of 56

29

The above stated complexity being faced by the staff in respect of such a large number of departments and variety of programs being run by each department, each having its own criteria makes it entice the official to look for a system which can operate with a such a complex nature of data and be developed in such a way so that it becomes relatively easier to operate by the end user.

Preliminary investigation: During the analysis phase of the project, first we decided to sit/talk /and understand the current workflow. And found that the basic functionality is divided into 12 major modules, which deals with registration management, searching for tender management, supplying and purchasing of tender management, generation of reports for each requirement and searching for many other facilities etc.

Feasibility study: All the projects are feasible given the unlimited resources and infinite time. Unfortunately, the development of a computer-based system or product is more likely to be plagued by the scarcity of resources and difficult delivery dates. It is both necessary and prudent to evaluate the feasibility of a project at the earliest possible time. Months or years of effort, thousand or millions of rupees, and untold professional

Page 30 of 56

30

embarrassment can be averted if an recognized early in the definition phase.

ill-conceived system is

Feasibility and risk analysis are related to each other. If project risk is great, the feasibility of producing quality software is reduced. However, we confine our attention to: Technical Feasibility. Economical Feasibility. Operational feasibility.

Technical Feasibility: A study of function, performance, and constraints that may affect the ability to achieve an acceptable system. It is the most difficult area to assess because objectives, functions, and performance are somewhat hazy; anything seems possible if me right assumptions are made.

A clinical attitude should prevail during an evaluation of technical feasibility. The considerations normally attached with the technical feasibility:

Development Risk: Can the system element be designed so that necessary function and performance are achieved within the constraints uncovered during analysis?

Page 31 of 56

31

Resource availability: Are skilled staff available to develop the system element in Question? Are any other necessary resources (hardware and software) available to build the system?

Technology: Has the relevant technology progressed to a state that will support the system?

All of the above consideration also applies to the work I have done. As far as developments risks are concerned, yes necessary functions and the constraints under which they have to perform have been identified and divided into modules so that each module perform its own assigned task.

As for skilled staff for development is concerned, I am the only person performing this task and I have fully understood the problem. I am sufficiently equipped with the use of programming and can perform this tasks in the given time constraints.

The use of programming language enables the programmer to develop software that can help end-user to operate the system more easily. The use of GUI tool VB.NET and Oracle 8i can be really helpful in case of developing an information system. The tool comprises of all the components required to solve me problem system.

Economical Feasibility:

Page 32 of 56

32

An evaluation of development cost weighed against the ultimate income or benefit derived from the development system or product. It includes a broad range of concerns such as:

Cost-benefit Analysis Long-term m corporate income strategies Impact on other profits/products Cost of resources needed for development Potential market growth

The work being done is economically feasible since the work is not being done at very large scale, although it might be a bit complex. The cost of resources needed to do the work was not big. I did receive the necessary monetary help required to develop this software.

Operational Feasibility: This study helps us in finding whether the work to be done will be operational with the available staff and with in the given time. The staff is fully capable of handling information system. The IT literacy is of good order and the software has been made in such a way that it becomes easier for the user to answer queries being asked. This will facilitate easy use and adoptability of the system. Based on this, it was felt that the proposed system would be operationally feasible. With the use of menus, simple command buttons and proper validation
Page 33 of 56 33

required it become fully understandable to the common user and operational with the user.

SOFTWARE REQUIREMENT SPECIFICATION

A document describing the requirements of a computer system from the users point of view. An SRS document specifies the required behavior the system in terms of input data, required processing, output data, operational scenarios and interfaces and the attributes of a system including performance, security, maintainability, reliability, audit ability, availability and safety requirements and design constraints. specification. Alias: user requirement specification, functional

The software requirement specifications produced at the culmination of the analysis task. The function and the performance allocated to software as part of the system engineering are refined by establishing a complete information description, a detailed functional and behavioral description, an indication of performance requirements and design constraints, appropriate validation criteria, and other data

Page 34 of 56

34

pertinent to requirements. [Pressman Roger S.] SRS was evolved based on brain storming sessions and active interactions with the following set of stakeholders: a) b) c) d) Assistant registrar (PGS) Superintendent (PGS) Assistant Chairman, grades and registrations. The main area of the I.T. dept, which had to be automated, was described in module description. Input/output design Design is the first step in the development phase for any engineered product or system. It may be denned as the process of applying various techniques and principles for the purpose of defining a device, a process or a system in sufficient detail to permit its physical realization. The design of a system is a blueprint, or a plain for a solution for a system. The design a solution a how to approach compared to analysis, a what is orientation. It translates the system requirements into ways of operating them. Software design sits at the technical kernel of the software process model that is used. Design is the phase where the quality is fostered in software development. Design provides us with a representation of software that can be assessed for quality.

Risk Analysis:

Page 35 of 56

35

These steps are performed in risk analysis for designing the system because:

The future of the system is our concern. We identifying what risks might create problem in the life of the system.

We also identified that what change in the user requirements, technologies, hardware and all other entries connected to the system will effects the system.

Risk Identification: We were able to identifying the risk under the following categories: Project risk Technical risk Business risk Following list was identifying under the categories mentioned above: Enough number of people was available, as estimated, to complete the system. All staff involved in the system was not folly trained on the platform to be used for die development. We also had to study various things about the platform and the system.

Page 36 of 56

36

The staff involved in the system was committed for the entire decision of the project. The entire member worked fulltime on the system.

Probability of risk: The probability for the project risks such as schedule, resources, customer, requirement problems and their impact on the system was negligible. There was a risk on the technical grounds because the system was developed with a new technology hence the experience on the tools was taking which faced the management to think whether the choice made was right or wrong. But a survey done on the use of new platform gave us the confidence of continuing on this decision. As we know system design is a solution a how to approach to the creation of a new system. This important phase is composed of several steps. It provides the understanding and procedural details necessary for implementing the system recommended in the feasibility study.

Several activities were carried out during Design. They were: Database design Program design

Data base design: Databases:

Page 37 of 56

37

Database is an organized logical grouping of related files. In a database, data are integrated and related so that one set of software programs provide access to all the data, alleviating many of the problems associated with data file environments. Therefore, data redundancy, data isolation, and data inconsistency are minimized, and data can be shared among all users of the data.

Database Management System: The program (or group of programs) that provides access to a database is known as a database management system (DBMS). A DBMS contains three major components: 1. A data definition language (DDL) is the language used by programmers to specify the content and structure of the database. The DDL is essentially the link between the logical and physical views of the database. (Logical refers to the way data are physically stored and processed). 2. The data manipulation language (DML) is used with a third/fourth generation language to manipulate the data in the database. 3. Structured Query Language (SQL) is the most popular relational database language, combining both DML and DDL features.

Logical Data Organization:

Page 38 of 56

38

There are three basic models for logically structuring database: hierarchical, network, and relational. Each has its own advantages and disadvantages.

The Hierarchical Database Model: The hierarchical model relates data be rigid structuring data into an inverted tree in which records contains two elements: A single root or master field often called a key, which identifies the type location, or ordering of the records. A variable number of subordinate fields that defines the rest of the data within the record.

The Network Database Model: The network model creates relationship amongst data through a linked-list structure in which subordinate records (called members) can be linked to more than one parent (called owner).

The Relational Database Model: While organization have been organized in a hierarchical fashion, most business data have traditionally been organized into tables of tables of columns and rows, especially accounting and financial data. Hierarchical and network structures have several disadvantages. All the access paths, directories, and indices must be specified in advance. Once specified, they are not easily changed
Page 39 of 56 39

without a major programming effort. Therefore, these designs have low flexibility. Relational database designs have flexibility in regard to Ad hoc queries, Power to combine information from different sources, Simplicity of design and maintenance, Ability to add new records without disturbing existing

applications.

Logical Database Design: It is necessary to develop a conceptual model of data, which specifies the relationships between data. This is used to group data into a number of tables. The tables are organized to: Reduce duplication of data, Simplify functions like adding, deleting and updating data, Retrieving data The method of organizing or structuring data into tables is known as Normalization. The collection of tables of data is called a Database. This analysis is then used to organized data as relations, normalizing relations, and obtaining a relational database. This approach we used is based on the one described by Turban.

Page 40 of 56

40

SnapShots Login Form

Page 41 of 56

41

Registration Form

Page 42 of 56

42

EMPLOYER MAIN SCREEN

Page 43 of 56

43

JOB POSTING FORM

Page 44 of 56

44

VIEW JOBS

Page 45 of 56

45

CANDIDATE REVIEWING FORM

Page 46 of 56

46

CANDIDATE DETAILS FORM

Page 47 of 56

47

JOB SEEKER MAIN PAGE

Page 48 of 56

48

PROFILE ADDITION FORM

Page 49 of 56

49

JOB APPLICATION FORM

Page 50 of 56

50

VIEW PROFILE

Page 51 of 56

51

DATABASE
1. EMPLOER TABLE

Page 52 of 56

52

2.JOBS TABLE

Page 53 of 56

53

3.JOBSEEKER TABLE

Page 54 of 56

54

4.APPJOBS TABLE

Page 55 of 56

55

5.JOBS TABLE

Page 56 of 56

56

Potrebbero piacerti anche