Youth information website, allowing young people to have an easy access to online information. Young people visiting this site will have the opportunity to become part of an online information website, youth view about youth related concerns and it is not restricted to youth related issues only, there will be articles which are related economic state of country . Young people usually seek for interesting blogs to read, they like to stay updated with the latest trend.
There are several stages during the process of a web application project, and every stage is important to achieve a positive end result. The purpose of our system "youth search" is to provide the latest information and current happening all over the world and our site is not limited to current affairs only it also have fun-zone which will provide a space for youth to view videos, blogs and many more attractions. One more advantage of Youth Search is that a user can apply for jobs also as per their qualification.
Software project management is concerned with activities involved in ensuring that software is delivered on time and on schedule and in accordance with the requirements of the organizations developing and procuring the software. Project management is needed because software development is always subject to budget and schedule constraints that are set by the organization developing the software. Project management is the discipline of planning, organizing, motivating, and controlling resources to achieve specific goals. A project is a temporary endeavor with a defined beginning and end (usually time-constrained, and often constrained by funding or deliverables), undertaken to meet unique goals and objectives, typically to bring about beneficial change or added value. The temporary nature of projects stands in contrast with business as usual (or operations), which are repetitive, permanent, or semi-permanent functional activities to produce products or services. In practice, the management of these two systems is often quite different, and as such requires the development of distinct technical skills and management strategies.
The project comprises of many useful features for youth and which will benefits youth in all way. This website will be very beneficial for young people. We would like to conclude that this system would be beneficial to student, youngster and teenager who like to explore world and are seeking for fun and entertainment.
Our project follows spiral model.(figure 1.1)
Figure 1.1
This model is iterative in nature and has a six task regions as follows
1. Customer Communication: – In this region, it is suggested to establish customer communication.
2. Planning: – All the planning activities are carried out in order to define resources time line and other project related activity.
3. Risk analysis: – The task required calculating technical and management risks are carried out.
4. Engineering: – In this region, tasks required to build one or more representations of applications are carried out.
5. Construction and release: – All the necessary tasks required constructing, testing, install the application are constructed. Some tasks are required to provide user support are also carried out in this task region
6. Customer evaluation: – Customer’s feedback is obtained and based on customer evaluation required tasks are performed and implemented at installation stage.
1.1.1 Purpose
The purpose of our project to provide a proper medium for young people so that they can share their views and enjoy the attractions of the project. The project comprises of many useful features for youth and which will benefits youth in all way. This website will be very beneficial for young people.
Also young people visiting this site will have the opportunity to become part of an online information website, youth can post their opinions about youth related concerns and it is not restricted to youth related issues only, it have many more attractions
1.1.2 Scope
The main goal of our system is to provide a proper medium which involves multiple attractions for the user which make this website more convenient to use.
This system comprises of many such features which youth demand the most hence making the system very useful.
This system can be used anywhere, anytime as it is a web application, no special software is used to run this system.
1.2 General Description
1.2.1 Organization Profile
‘ The Innoventaa Technocrats is founded to promote latest and in demand educational courses in the field of information technology.
‘ Innoventaa as a leading software development company operating globally since 2008 acting a trustable web provider to both small and large companies.
‘ Innoventaa software training team has extensive knowledge and experience in any kind of website development project.
1.2.2 Short Description about Activities of the Organization
Innoventaa Technocrats is reputed Software and Website Development Company who also provides IT training to fresher and professionals. This company is based in Ahmedabad-Gujarat, India. The company as a leading software development company operating globally since 2008 acting a trustable web provider to both small and large companies. This company is a team of 50+ tech-minded enthusiasts, certified senior specialists in .NET, PHP, Java technologies. This company helps its clients to reach a new level of their business aims and bring the quality innovation by providing customer centric full cycle development approach.
The company software training team has extensive knowledge and experience in any kind of website development project. We at Innoventaa provide ASP.Net training,PHP programming training, Java training, software testing and other IT programs.
This company assure to provide professional and quality course modules to every student in institute. The trained faculty give extensive practical session to have better understanding over the course opted by students. The faculty team is very qualified and has several years of industry experience in their specific field. As this company is also Website Development Company hence students get an opportunity to work on live project to get real time experience.
The goal of this company is
‘ To provide high quality training program
‘ To tackle with unemployment issues by creating more and more industry specific professionals
‘ Cost effective programs for all segments
‘ To be a best career builder software institute in the industry
1.2.3 Project introduction
Our project ‘Youth Search’ goal is to provide a proper medium for young people so that they can view the latest news, trend and enjoy the attractions of the project. The project comprises of many useful features for youth and which will benefits youth in all way.
This system consists of three actors
”User
”Admin
”Seller
”User Activities:-
”View home.
”Registration/Sign in.’
”View current affairs.
”View Vellabuddy.
‘ View blogs.
”View Fun zone
‘ View games videos.
‘ View game details.
‘ Buy game
”View places to visit.
‘ View place name.
‘ View place details.
‘ View place location.
”View Bussinessbuddy.
”Complain/feedback
‘ Submit complain/feedback
”Contact us
”Logout.
‘ Admin Activities
‘ Manage user
‘ Add & Search User
‘ Manage country
‘ Add & Search country.
‘ Manage state
‘ Add & Search state.
‘ Manage city
‘ Add & Search city
‘ . Manage job.
‘ Add & Search jobr.
‘ Manage categories
‘ Add & Search categories.
‘ Manage subcategories
‘ Add & Search subcategories.
‘ Manage News
‘ Add & Search funzone
‘ Manage blogs
‘ Add & Search funzone
‘ Manage funzone.
‘ Add & Search funzone
‘ Manage places to visit.
‘ Add & Search ptv
‘ Manage business buddy
‘ Add & Search business buddy
‘ Manage Report
‘ View buyer game.
‘ View applied jobs.
‘ Seller Activities
‘ Registration and Sign in
‘ View and Search products.
‘ Provide payment by paypal
‘ Receive payment by paypal
‘ View and post complaints
‘ View feedback
‘ Logout
1.2.4 Project Profile
Project definition
Youth Search: Online Web application for youth
Project description
Our project ‘Youth Search’ goal is to provide a proper medium for young people so that they can share their views and enjoy the attractions of the project. The project comprises of many useful features for youth and which will benefits youth in all way.
Youth information website, allowing young people to have an easy access to online information. Young people visiting this site will have the opportunity to become part of an online information website, youth can post their opinions about youth related concerns and it is not restricted to youth related issues only, there will be articles which are related economic state of country . Young people usually seek for interesting blogs to read, they like to stay updated with the latest trend.
Developed for
Innoventaa technocrats pvt. Ltd.
External Project Guide
Mr.Harshal Trivedi
Internal project guide
Prof. S.G. Desai
Team-size
There are 2 people in our team.
Hardware Configuration
‘ Processor : Pentium IV or Higher Processor
‘ Hard disk : 100 GB
‘ RAM : Up to 2 GB or Higher
Front-End tool
Visual studio .NET
Back-End tool
SQL Server 2005+
1.3 Security and Reliability Requirements
1) Security
”There must be a log in id and password to every user. The user can view the whole site.
”The Information should be Secure; there should not be any kind of malfunctioning. System Information will not be changed by any person rather than the management (admin).
2) Reliability
”System should be reliable. It should keep secure all the information regarding to particular User, Seller and Products. It should work effectively in tremendous rush.
”The system must give the perfect results in kind of damn situation. The Particular result must be listed in to the particular user only; there should not be any kind of data integrity or other problem between Administrator, User and Seller.
3) Availability
”The information and data about each module should perfectly available in the system.
4) Efficiency
”System should be efficient enough to meet all kinds of requirements as required by the Administrator, User and Seller. The system should not hang or lose its efficiency in any kind of worse conditions. It should provide the correct output in all manners.
5) User Friendliness
”System should be user friendly, so that any user can access the system.
6) Maintainability
”The application should be maintainable in such a manner that if any new requirement occurs then it should be easily incorporated in an individual module.
1.4 Organizational Requirements
1.4.1 Implementation Requirements
It requires good skill for implementation of project. As this project is using n- tier business architecture. All the classes, functions, procedures and objects are created in the system wise architecture. The n tiers are given below.
1) GUI
2) Business Logic Layer
3) Data Access Layer
4) Web Services layer
5) Common layer
Entire coding will be done using Microsoft Visual Studio and SQL Server 5. Soft copy for the documentation is provided in Microsoft Word Format. Entire coding would not be shown to the client for any reasons. Implementation does not require any more software support without as mentioned below in the system requirements.
1.4.2 Standards Requirements
Industry standards will be followed by us in any negotiation or deal related to the product software. Coding, Documentation and final product delivery will be followed by the standards.
1.5 External Requirements
1.5.1 Ethical Requirements
Product Software should be negotiated with human ethics and it is wished that the software should be used with ethical requirements. Any non-ethical use of this software will be at the user’s own risk.
1.5.2 Legislative Requirements
Privacy Requirements
Privacy of any particular things and strategy will be served based on prior negotiation and it should be cleared purposed for that requirement.
Safety Requirements
Safety will be provided based on the requirement of the members and necessary critical points.
1.6 Study and Weakness of the Current System
There are dozens of websites on internet which attracts youth a lot as in websites of blogging, websites, and websites of games and many entertainment websites. Blogging is very popular today because it allows people to interact with each other. Blogging has also become a popular search engine optimization (SEO)tool because search engines like Google and Yahoo know that a blog is frequently updated with content or visitor comments, so their spiders visit blogs frequently looking for new content to include in their index.
Additionally, blog content can be delivered automatically via electronic RSS (Really Simple Syndication) data feeds. Visitors subscribe to a blog’s feeds in order to stay up to date with content that’s being posted on subjects that interest them. Blog feeds are then read by what’s known as blog feed reader software, widely available for free, so users can scan for recent blog posts of interest on the blogs to which they subscribe.
Finally, blogging doesn’t require that writers and contributors know a lot about HTML (Web page code). If a blogger or visitor can fill in an online form, they can blog and post comments on other blogs. There are any blogging sites such as Tumblr, Twitter which attracts youth a lot.
People should be aware of world and the latest news so there are websites available for that even. There are current affair websites like Civil Services India and Best Current Affair which have latest information about the world and political issues.
PC games, also known as computer games, are video games played on a general-purpose personal computer rather than a dedicated video game console or arcade machine. Youth really like computer games and now a day there are amazing games which available online. We have searched many gaming sites and the most popular gaming sites are Zynga, Pogo, Yahoo! Games, and Y8.com.
Millions of teens who grew up with a mouse in one hand and a remote control in the other, young people should go out and explore various places. There are websites which tells us the best places to visit such as City8, Mapjack.com, and Slight walk.
Shopping sites are a latest hit now days. Online shopping or online retailing is a form of electronic commerce which allows consumers to directly buy goods or services from a seller over the Internet using a web browser. Alternative names are: e-web-store, e-shop, e-store, Internet shop, web-shop, web-store, online store, and virtual store. Most popular sites for online shopping are Myntra, Jabong.com etc.
Weakness in current system
The above mentioned site are individually very good and beneficial for youth but the problem is that the user have to go through these sites separately so there is a need of such a system which will provide all the benefits of above system in a single website.
1.7 Requirements of New System
1.7.1 User Requirements
1. The User requirements for the new system are to make the system fast, flexible, less prone to errors and reduce expenses and save time.
2. Time can be saved as this website is a multipurpose website.
3. The system should have User and Seller information which can be used as per required only by authorized personnel for security purpose.
4. The New system should be more secure in managing user records and reliable enough to be used in any condition.
1.7.2 Feasibility Study
A key part of the preliminary investigation that reviews anticipated costs and benefits and recommends a course of action based on operational, technical, economic, and time factors. The purpose of the study is to determine if the systems request should proceeded further.
1.7.3 Features of the New System
The new system has been designed as per the user requirements so as to fulfill almost all them. Our project comprises of various panels such as current affairs, fun zone, music zone, blogging, e- commerce, event management, payment,jobs. So for the efficient work of these panels we will require a person for the management of the system and that person will be the administrator who will manage the whole system.
Our project requirements are fulfill by three actors
1) ADMIN
2) USER
3) SELLER
The execution of our project is responsible by three actors-Admin, User, Seller. Each person has their own work and responsibility. Admin is responsible for managing user, categories and sub categories. Admin will manage the whole system and provide a proper system to the user and seller. The user will manage his own profile and do the registration for the one. The user work is just to view the activities of the project. The seller work is to place his product on the website and sell it.
From the technical viewpoint the system is made up of the following components:
‘ Manage user.
‘ Manage categories.
‘ Manage sub-categories.
‘ Manage current affairs
‘ Manage Product.
‘ Manage schemes.
‘ Manage seller package.
‘ Manage events.
‘ Manage blog.
‘ Manage fun zone.
‘ Manage notification.
‘ Manage payment.
‘ Manage complains.
‘ Manage feedback.
‘ Manage music.
‘ Manage places.
So as user this system can provide these functionalities:-
‘ Registration.
‘ Profile management.
‘ View and search current affairs.
‘ View, search and buy the product.
‘ View events.
‘ View and posting.
‘ Upload post.
‘ Receive notification.
‘ Provide payment.
‘ Post complains.
‘ View and post feedback.
‘ Uploading and downloading music files.
‘ View places.
1.8 Interface Requirement
1.8.1 Hardware Interface
The user can able to run the system, the minimum requirements of the hardware for this system are:
RAM: – Up to 2 GB or Higher
Disk space: – 100GB
Processor: – Pentium IV or Higher Processor
1.8.2 Software Interface
” Development Tools:
Front End : Visual studio .NET
Back End : SQL Server 2005+
Other Tools : AJAX Control toolkit.
Web Server : IIS.
”Documentation & Presentation Tools:
Microsoft Word 2003 or above
Microsoft PowerPoint 2003 or above
Visio
”Technology Used
About Visual Studio 2008:
‘ Visual Studio is a complete set of development tools for building ASP.NET Web applications, XML Web Services, desktop applications, and mobile applications. Visual Basic, Visual C#, and Visual C++ all use the same integrated development environment (IDE), which enables tool sharing and eases the creation of mixed-language solutions. In addition, these languages use the functionality of the .NET Framework, which provides access to key technologies that simplify the development of ASP Web applications and XML Web Services.
‘ Visual Studio 2008 is the latest version of Microsoft’s flagship IDE. Along with it comes the .NET Framework 3.5, new versions of Visual Basic and C#, a data query model known as LINQ, improvements to the .NET Framework technologies that were released alongside Windows Vista, and out-of-the-box access to ASP.NET AJAX and Visual Studio Tools for Office.
‘ The Microsoft .NET Framework is a software framework that can be installed on computers running Microsoft Windows operating systems. It includes a large library of coded solutions to common programming problems and a virtual machine that manages the execution of programs written specifically for the framework. The .NET Framework is a Microsoft offering and is intended to be used by most new applications created for the Windows platform.
‘ The framework’s Base Class Library provides a large range of features including user interface, data access, database connectivity, cryptography, web application development, numeric algorithms, and network communications. The class library is used by programmers, who combine it with their own code to produce applications.
‘ Version 3.0 of the .NET Framework is included with Windows Server 2008 and Windows Vista. The previous stable version of the framework, 3.5, is included with Windows 7, and can also be installed on Windows XP and the Windows Server 2003 family of operating systems.
What is .NET Framework?
‘ Applied .NET Framework Programming
[Fig. 3.1.1 .NET Framework]
‘ If you use the .NET Framework, your code targets the common language runtime (CLR), which affects your decision about a programming language.
‘ The common language runtime is just what its name says it is: A runtime that is usable by different and varied programming languages.
‘ The features of the CLR are available to any and all programming languages that target it-period. If the runtime uses exceptions to report errors, then all languages get errors reported via exceptions.
‘ If the runtime allows you to create a thread, then any language can create a thread. In fact, at runtime, the CLR has no idea which programming language the developer used for the source code.
‘ You may develop your code in any programming language you desire as long as the compiler you use to compile your code targets the CLR.
‘ Microsoft is creating several language compilers that target the runtime: C++ with managed extensions, C# (pronounced ‘C sharp’), Visual Basic.NET, JScript, Java, and an intermediate language (IL) Assembler.
‘ In addition to Microsoft, there are several other companies creating compilers that produce code that targets the CLR. At this writing,
About .NET 3.5:
‘ Version 3.5 of the .NET Framework was released on 19 November 2007, but it is not included with Windows Server 2008. As with .NET Framework 3.0, version 3.5 uses the CLR of version 2.0. In addition, it installs .NET Framework 2.0 SP1, (installs .NET Framework 2.0 SP2 with 3.5 SP1) and .NET Framework 3.0 SP1 (installs .NET Framework 3.0 SP2 with 3.5 SP1These changes do not affect applications written for version 2.0, however.
‘ As with previous versions, a new .NET Compact Framework 3.5 was released in tandem with this update in order to provide support for additional features on Windows Mobile and Windows Embedded CE devices.
‘ The source code of the Base Class Library in this version has been partially released (for debugging reference only) under the Microsoft Reference Source License.
SQL Server 2005:
‘ SQL Server 2005 (codenamed Yukon), released in October 2005, is the successor to SQL Server 2000.
‘ It included native support for managing XML data, in addition to relational data. For this purpose, it defined an xml data type that could be used either as a data type in database columns or as literals in queries.
‘ XML columns can be associated with XSD schemas; XML data being stored is verified against the schema. XML is converted to an internal binary data type before being stored in the database.
‘ Specialized indexing methods were made available for XML data.
‘ XML data is queried using XQuery; Common Language Runtime (CLR) integration was a main features with this edition, enabling one to write SQL code as Managed Code by the CLR.
‘ SQL Server 2005 added some extensions to the T-SQL language to allow embedding XQuery queries in T-SQL.
‘ In addition, it also defines a new extension to XQuery, called XML DML, which allows query-based modifications to XML data.
‘ SQL Server 2005 also allows a database server to be exposed over web services using TDS packets encapsulated within SOAP (protocol) requests. When the data is accessed over web services, results are returned as XML.
‘ For relational data, T-SQL has been augmented with error handling features (try/catch) and support for recursive queries with CTEs (Common Table Expressions).
‘ SQL Server 2005 has also been enhanced with new indexing algorithms, syntax and better error recovery systems.
‘ Data pages are check summed for better error resiliency, and optimistic concurrency support has been added for better performance.
‘ Permissions and access control have been made more granular and the query processor handles concurrent execution of queries in a more efficient way. Partitions on tables and indexes are supported natively, so scaling out a database onto a cluster is easier.
‘ SQL CLR was introduced with SQL Server 2005 to let it integrate with the .NET Framework.
‘ SQL Server 2005 introduced "MARS" (Multiple Active Results Sets), a method of allowing usage of database connections for multiple purposes.
‘ SQL Server 2005 introduced DMVs (Dynamic Management Views), which are specialized views and functions that return server state information that can be used to monitor the health of a server instance, diagnose problems, and tune performance.
‘ SQL Server 2005 introduced Database Mirroring, but it was not fully supported until the first Service Pack release (SP1).
‘ In the initial release (RTM) of SQL Server 2005, database mirroring was available, but unsupported.
‘ In order to implement database mirroring in the RTM version, you had to apply trace flag 1400 at startup. Database mirroring is a high availability option that provides redundancy and failover capabilities at the database level.
‘ Failover can be performed manually or can be configured for automatic failover. Automatic failover requires a witness partner and an operating mode of synchronous (also known as high-safety or full safety).
.1.9 Preliminary schedule
Software project planning involves estimation of ‘ Money, – Effort, – Resources and Time it will take to build a specific software base system.
‘ PROJECT DEVELOPMENT APPROACH AND JUSTIFICATION
For the project development, we have chosen the spiral model. The Spiral Model is an evolutionary software process model that couples the iterative nature of prototyping with the controlled and systematic aspects of the Linear Sequential Model. It provides the potential for rapid development of incremental versions of the software. Using the spiral model, software is developed in a series of incremental releases. A spiral model is divided into a number of framework activities, also called task regions . Typically, there are between three and six task regions. Figure shows a Spiral model that contains six task regions:
‘ User communication’tasks required to establish effective communication between developer and user
‘ Planning’ tasks required to define resources, timelines,
‘ Risk analysis’tasks required to assess both technical and management risks.
‘ Engineering’tasks required to build one or more representations of the application.
‘ Construction and release’tasks required to construct, test, install, and provide user support (e.g., documentation and training).
Chapter 2
Data Dictionary
‘
A Data Dictionary is Catalog-Responsibility of the Element in a System. As the Name Suggests, these Element are Structured around Data in a Way to Meet the Use and the Organization Requirements. A Data Dictionary is a List of Elements that composes all the Data Flow Process through the System. It Stores Detail and Description of Data Flow, Data Store and Processes.
‘ If Analysts Wants to Know by What Other Means is a Table or a Data Item Referenced in the System or where it is Being Used the Answers are Properly Developed in the Data Dictionary.
‘ The Dictionary Id Developed During Data Flow Analysis and Assists the Analysts Involved in Requirements. However it’s Content is used during System Design as Well.
Feature of Data Dictionary
‘ The Volume of Data in Most Information System is Substantial More then a Single Analyst Can Easily Keep Track of the same. When the Teams of Analyst Work on Assistance the Task of Co-Coordinating Data Definition Becomes More Complex. Individual Depends on the Information provided by others with their Assumption and the Specification made by them.
‘ Data Dictionary is Integral Component of Structured Analysis. Since Dataflow Diagram by them do not Fully Describe the Subject of the Investigation. The Data Dictionary Provides Additional Information About System.
2.1 Data dictionary: Admin
‘ Table Name: categories
Table Description: Use to add category into the system.
Table 2.1.1 categories
Column Name Datatype Constraint
categoryid int Primary key
categoryname nvarchar(max) Not Null
categorydescription Nvarchar(max) Not Null
‘ Table Name: subcategories
Table Description: Use to add sub-category and fetch the description of the category from the system.
Table 2.1.2 subcategories
Column Name Datatype Constraint
subcatid int Primary Key
categoryid int not null
subcategoryname nvarchar(max) not null
subcategorydescription nvarchar(max) not null
‘ Table Name: country
Table Description: Use to add Country
Table 2.1.3 country
Column Name Datatype Constraint
countryid int Primary Key
countryname nvarchar(max) not null
‘ Table Name: state
Table Description: Use to add state
Table 2.1.4 state
Column Name Datatype Constraint
stateid int Primary Key
countryid int not null
statename nvarchar(max) not null
‘ Table Name: city
Table Description: Use to add City
Table 2.1.5 city
Column Name Datatype Constraint
cityid int Primary key
countryid int not null
stateid int not null
cityname nvarchar(max) not null
Data dictionary: User
‘ Table Name: registrationform
Table Description: Use to take the personal details from the User and register the User with Username and password.
Table 2.2.1 registrationform
Column Name Datatype Constraint
userid int Primary key
firstname nvarchar(max) not null
lastname nvarchar(max) not null
gender nvarchar(max) not null
education nvarchar(max) not null
countryid int not null
stateid int not null
cityid int not null
Dob datetime not null
contactno decima(18,2) not null
emailid nvarchar(max) not null
password nvarchar(max) not null
confirmpassword nvarchar(max) not null
username nvarchar(max) not null
‘ Table Name: Contact Us
Table Description: Use to Add Contact-detail of user
‘
Table 2.2.2 ContactUs
Column Name Datatype Constraint
Contact_id Int Primary key
Name nvarchar(max) not null
Email nvarchar(max) not null
Details nvarchar(max) not null
‘ Table Name: Feedback/Complain
Table Description: Use to Add feedback Or Complain about site.
Table 2.2.3 feedback/complain
Column Name Datatype Constraint
Feedback_id int Primary key
Type nvarchar(max) not null
Name nvarchar(max) not null
Email nvarchar(max) not null
Subject nvarchar(max) not null
Details nvarchar(max) not null
Data dictionary: Current Affairs
‘ Table Name: currentaffairs
Table Description: Use to view and search current affair’s information into the system .
Table 2.3.1 currentaffairs
Column Name Datatype Constraint
Caid int Primary key
Catid int not null
Subcatid int not null
News Nvarchar(max) not null
Photos Nvarchar(max) not null
Description Nvarchar(max) not null
Data dictionary: Vella-buddy
‘ Table Name: vellabuddy
Table Description: Use to view blogs into the system .
Table 2.4.1 vellabuddy
Column Name Datatype Constraint
Id int primary Key
blogname nvarchar(max) not null
photos nvarchar(max) not null
blogdescription nvarchar(max) not null
Data dictionary: Fun-zone
‘ Table Name: funzones
Table Description: Use to view Game-videos in funzone into the system .
Table 2.5.1 funzones
Column Name Datatype Constraint
GameID int primary key
gamename nvarchar(max) not null
GameVideo nvarchar(max) not null
gamedescription nvarchar(max) not null
Price decimal(18,2) not null
‘ Table Name: PayMents
Table Description: Use to Game’s payment into the system .
Table 2.5.2 PayMents
Column Name Datatype Constraint
Payid int Primary key
userid int not null
GameID int not null
buydate datetime not null
Status nvarchar(max) not null
Data dictionary: PTV(Places To Visit)
‘ Table Name: ptvs
Table Description: Use to view and search information about places by PTV into the system .
Table 2.6.1 ptvs
Column Name Datatype Constraint
Ptvid int Primary key
Placename nvarchar(max) not null
Location nvarchar(max) not null
Description nvarchar(max) not null
Data dictionary: BusinessBuddy
‘ Table Name:businessbuddies
Table Description: Use to view the items for sell in the system.
Table 2.7.1 businessbuddies
Column Name Datatype Constraint
addid int Primary key
adname nvarchar(max) Not null
photos nvarchar(max) Not null
adddescription nvarchar(max) Not null
status nvarchar(max) Not null
Data dictionary: Job
‘ Table Name: jobs
Table Description: Use to view Jobs in the system.
Table 2.8.1 jobs
Column Name Datatype Constraint
Jobid int Primary key
Jobtitle nvarchar(max) not null
interviewdate datetime not null
Time nvarchar(max) not null
branchname nvarchar(max) not null
Skills nvarchar(max) not null
Salary int not null
Location nvarchar(max) not null
Company nvarchar(max) not null
Qualification nvarchar(max) not null
‘ Table Name: ApplyJobs
Table Description: Use to view job applicant’s detail in the system.
Table 2.8.2 ApplyJobs
Column Name Datatype Constraint
ApplyId int Primary key
userid int Foreign key(jobs)
jobid int Foreign key(registrationform)
ApplyDate datetime not null
Status nvarchar(max) not null
Chapter 3
Diagram
3.1 UML Diagrams
Unified Modeling Language
In The Unified Modeling Language User Guide, the original developers of the UML-Grady Booch, James Rum Baugh, and Ivar Jacobson–provide a tutorial to the core aspects of the language in at wo-color format designed to facilitate learning. Starting with a conceptual model of the UML, the book progressively applies the UML to a series of increasingly complex modeling problems across a variety of and assumes no responsibility for errors or omissions. No liability is assumed for incidental or consequential to advanced modeling problems.
Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks where those designations appear in this book, and Addison Wesley LongmanInc. was aware of a trademark claim, the designations have been printed in initial caps are all in caps. The author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind damages in connection with or arising out of the use of the information or programs contained herein. application domains. This example-driven approach helps readers quickly understand and apply the UML. For more advanced developers, the book includes a learning track focused on applying the UML
List of UML Diagrams Shown.
1) Use Case Diagram
2) Activity Diagram
3.2 E-R Diagram
Entity Relationship is Described by their dependence on each other, As Well as by extent of the relationship among We Will Begin by Examining the Basis of Database Management Drawing on the Relationship Data and the Sharing of Data Across Different Application.
Entity Relationship Analysis uses Three Major Abstraction to Described Data.
1. Entities: Entities are Distinguishable Object That can be represented in
The Database.
2. Relationship: It is meaningful interaction between the entities.
3. Attributes: It is nothing but properties of entities.
In E-R Diagram three types of Relationship exists:-
1. One-to-One (1:1)
Relationship is associated between two objects.
2. One-to-Many (1: M or M: 1)
Relationship describes an entity that may more
Entities related to it.
3. Many-to-Many (M: M)
Relationship describes an entities multiple
Relationship with other entities.
E-R diagram contains following components:
1. Rectangle: This represents entity sets.
2. Ellipse: This represents attributes.
3. Diamonds: This represents relationship sets.
4. Line: Links attributes to entity sets and entity sets to Relationship sets
3.3 Data flow Diagram
Data flow diagram (DFD) represents the flows of data between different processes in a business. It is a graphical technique that depicts information flow and the transforms that are applied as data move form input to output. It provides a simple, intuitive method for describing business processes without focusing on the details of computer systems. DFDs are attractive technique because they provide what users do rather than what computers do.
5.1Security Features
Security is an important aspect of any software development. Without reasonable level of security, the availability, the reliability and safety may be compromised if external attack damage to the system.
”For security purpose we have various validations.
Validation provided to every input ensures there are no take entries and redundant data.
Enterprise library validation provides various validation formats. So exact input format is decided, thus ensuring a correct input to the system.
”Authorization at the time of login enables access to valid users.
”Other security feature we have used is roll base architecture. So the
”access to different functions can be specified access to the roles
”We provide login for users, with using event log viewer are maintained in the database so admin can check any error if at all generated as per the users.
5.2 Coding Standards
The coding standard is well defined and standard style of coding. With the help of coding standards any person can find the exact meaning of code and understand the working of the system. A coding standard includes the way the variables are to be named, the code that is to be laid out, the comments that are to be described etc. To develop reliable and maintainable applications, you must follow coding standards and best practice.
General Coding Standard:
The coding standard we have used is Pascal case that includes proper naming and programming conventions. It includes first letter in identifier as capital letter and first letter of each subsequent concatenated word also capitalized.
File Naming Conventions:
The files created in the project are named in such a way that all letters are in small.
The files in the same module are grouped together in a folder with appropriate name. This makes it easier for the developer to navigate to the appropriate file. Thus it is a good coding technique that enables faster access to the files.
Identifier Standard:
The other variable names must also be relevant and must be descriptive.
Comment Standard:
The other technique used for programming is comments. The few lines of comments make the code more elegant. Sometimes it makes the code easier to understand and works as a help for the programmers.
Tables:
The tables created in the project are named in such a way that all characters are in small letters.
Chapter 6
Testing
6.1Testing Plan
1) System Testing is an expensive but critical process that can take as much as 50 % of the budget for the program development. The common view of testing held by user is that it is performed to prove that there are no errors in a program. However this is virtually impossible since analyst cannot prove that is software is free and clear of errors.
2) Software testing is a critical element of software quality assurance and represents the ultimate review of specification design and coding.
3) Some of the Testing Objectives are:
”Testing is a process of executing a program with the intend of finding the errors.
”A good test case is one that has a high probability of finding undiscovered errors.
”A successful test on the other hand is one that uncovers all the undiscovered errors.
4) Testing is set of activities that can be planned in advance and conducted systematically to carry out the testing procedures of the proposed system. Testing is generally done at two levels- Testing of individual screens and testing of the entire system. Testing is the process of executing a program with the explicit intention of finding errors, which makes the program fail. The tester is actually trying to make the program fail. A successful test is the one that find an error. During Systems testing, the system is used experimentally to ensure that the software does not fail, i.e. that it will run according to its specifications and in the way users expect.
5) A test case is a set of data that the system will process as normal input. However, the data are created with the express intend of determining whether the system will process them correctly or not.
Features are tested:
”All the functional features specified in the System Requirement specification are tested.
”System level integration for the various screens that were developed has been done.
”Performance testing has been done for acceptable response and correctness of data.
Testing Principles:
Some of the basic testing principles are as followed:
”All tests should be traceable to customer requirements.
”Tests should be planned long before testing begins.
”Testing should begin ‘in the small’ and progress towards testing ‘in the large’.
6.2 Testing Strategy
UNIT TESTING
1) The starting point of testing is unit testing. In this, each and every module is tested separately and is often performed by the developer himself simultaneously along with the coding of the form. Each and every in the software is tested for consistency and attempt is made to make the software error free.
2) In the Login Form it is checked that the user exist and the password entered is correct, otherwise the error message is developed and the system waits for the correct input. Proper messages are displayed on occurrence of errors.
3) In each and every form it is checked that the information provided by the user is valid and complete, otherwise it will display proper message and system waits for the correct input. Proper messages are displayed on occurrence of errors.
4) In every form it is checked that if the user has rights to perform the specific action and if user doesn’t have rights then that action will not be performed.
5) In the update action it is checked that the information provided by the user for updating is valid and complete, otherwise proper error message is displayed and the system waits for the correct input. Proper messages are displayed on occurrence of errors.
INTEGRATION TESTING
1) After unit testing the forms are gradually integrated into subsystems which are then integrated to eventually form the entire system. During integration of forms, integration testing is performed to detect design errors by focusing on testing the interconnection between forms.
2) After linking of each form’s integration testing is performed. In this testing it is checked that the user can not directly visit the forms, which can’t be visited login. E.g. User can’t view, Inert, Update or verify entries without login into the system.
SECURITY TESTING
1) This is testing which is conforms that the program can restrict access authorized personal and that authorized personal can access the function available to that level.
2) User can not visit or perform action for which he is not given access rights. As the system is role based so security is provided based on role.
COMPATIBILITY TESTING
1) Compatibility Testing is testing whether software is compatible with other element of a system with which it should operate. E.g. Browser, hardware or Operating Systems.
2) Compatibility testing is performed by running it on different browsers. Here it is verified that the display or functionality of controls is not changed when used in other projects.
RECOVERY TESTING
1) Recovery Testing is testing how well a system recovers from crashes hardware failure or other catastrophic problem.
SYSTEM TESTING
1) After developing entire application/project or product or major portion of it is tested at once, this is called system testing.
6.3 Testing Methods
BLACK BOX TESTING
1) Black box testing alludes to test that are conducted at the software interface. Although they are design to uncover errors, black box tests are used to demonstrates that software functions are operational, that input is properly accepted and output is correctly produce, that the integrity of external information is maintained.
2) Black Box Testing, also called behavioural testing, focuses on the functional requirements of the software. That is, black box testing enables the software engineer to derive sets of input conditions that will fully exercises all functional requirements for a program. Black Box Testing is not an alternative to White Box techniques. Black- Box testing attempts to find errors in the following categories:
”Incorrect or missing functions.
”Interface errors.
”Errors in data structures or external database access.
”Behavior or performance errors.
”Initialization and termination errors.
WHITE BOX TESTING
1) White box testing of software is predicted on close examination of procedural detail. Logical parts through the software are tested by providing test cases that exercises specific sets of conditions and /or loops. The ‘Status of the program’ may be examined at various points to determine if the expected or asserted status corresponds.
2) White-Box testing sometimes called Glass-Box testing; it is a test case design method that uses the control structure of the procedural design to derive test cases. Using white-Box testing methods, the software engineer can derive test cases that: Guarantee that all independents paths within a module have been exercised at least once.
”Exercise all logical decisions on their true and false sides.
”Execute all loops at their boundaries and within their operational bounds.
”Exercise internal data structures to ensure their validity
‘ Table 6.1:- Test Case #1
Module Name: Youth Search
Test Title: Verify login with valid username and password
Description: Testing the Login Form
Pre-conditions: User (admin) has valid username and password.
Test # Description Input Expected
Result
Actual
Result
Status
1 Username admin Control passes to password field
Control passes to password field
Pass
2 Password admin Control passes to admin home
page
Control do not pass to admin
home page
Pass
Post-conditions: User (admin) is validated with database and successfully login to account. The account session details are logged in database.
‘ Table 6.2:- Test Case #2
Module Name: Youth Search
Test Title: Verify the registration information of User.
Description: Testing the User registration form
Pre-conditions: User entering valid information details.
Test # Description Input Expected Resul
t Actual Result
Status
1 First Name ina Control passes
Last Name field
to Control passes to
Last Name field
Pass
2 Last Name
moza Control passes
gender field
to Control passes to
gender field
Pass
3 gender female Control passes
gender field
to Control passes to
gender field
Pass
4 Education b.e. Control passes
Education field
to Control passes to
Education field
Pass
6 Country name india Control passes to
state field
Control passes to state field Pass
7 State Gujarat Control passes
city field
to Control passes to city field
Pass
8 City Ahmedabad Control passes
Dob field
to Control passes to Dob field Pass
9 Dob 7/11/1991 Select form calendar or enter the date and Control passes to Dob field Control passes to
Dob field
Pass
10 Contact number India Control passes
emailid field to Control passes to emailid field Pass
11 Emailid inamoza@gmail.com Control passes to
password field Control passes to password id field Pass
12 Password 1234 Control passes to
Confirm Password field
Control passes to
Confirm Password field
Pass
13 Confirm password 1234 Control passes to user home page
Control passes to user home page
Pass
Post-conditions: User is validated with database and successfully account is created.
‘ Table 6.3:- Test Case #3
Module Name: Youth Search
Test Title: Verify Category with category name
Description: Testing the Manage Category Form
Pre-conditions: Admin has manage category name and category description.
Test # Description Input Expected
Result
Actual
Result
Status
1 Category name Category’s name Control passes to category description field
Control passes to category description field
Pass
2 Category description Category’s description Control passes to manage category
page
Control pass to manage category page
Pass
Post-conditions: Category is successfully enter into database.
‘ Table 6.4:- Test Case #4
Module Name: Youth Search
Test Title: Verify subcategory with subcategory name.
Description: Testing the Manage subcategory form
Pre-conditions: Admin has subcategory name and description.
Test # Description Input Expected
Result
Actual
Result
Status
1 Subcategory name Subcategory’s name Control passes to subcategory description field
Control passes to subcategory description field
Pass
2 Subcategory Description Subcategory’s description Control passes to manage subcategory page Control passes to manage subcategory
Pass
Post-conditions: Subcategory is successfully enter into database.
‘
‘ Table 6.5:- Test Case #5
Module Name: Youth search
Test Title: Verify country
Description: Testing the Manage Country Form
Pre-conditions: Admin has manage country name.
Test # Description Input Expected
Result
Actual
Result
Status
1 Country name country’s name Control passes to manage country page
Control passes to manage country page
Pass
Post-conditions: Country name is successfully enter into database.
‘ Table 6.6:- Test Case #6
Module Name: Youth search
Test Title: Verify state
Description: Testing the Manage state Form
Pre-conditions: Admin has manage state name.
Test # Description Input Expected
Result
Actual
Result
Status
1 State name State’s name Control passes to manage state page.
Control passes to manage state page
Pass
Post-conditions: State name is successfully enter into database.
‘ Table 6.7:- Test Case #7
Module Name: Youth search
Test Title: Verify city
Description: Testing the Manage City Form
Pre-conditions: Admin has manage city name.
Test # Description Input Expected
Result
Actual
Result
Status
1 City name city’s name Control passes to manage city page
Control passes to manage city page
Pass
Post-conditions: City name is successfully enter into database.
‘ Table 6.8:- Test Case #8
Module Name: Youth search
Test Title: Verify news.
Description: Testing the Manage news Form
‘
Pre-conditions: Admin has manage news, photos description.
‘
Test # Description Input Expected
Result
Actual
Result
Status
1 Category name category’s name Control passes to subcategory name field
Control passes to subcategory name field
Pass
2 Subcategory subcategory’s name Control passes to News name field
Control passes to News name field
Pass
3 News News name Control passes to photo name field
Control passes to photo name field
Pass
4 Photo News photo Control passes to Description name field
Control passes to Description name field
Pass
5 Description Add description Control passes to manage news page
Control passes to manage news page
Pass
Post-conditions:
News is successfully entered into database.
‘ Table 6.9:- Test Case #9
Module Name:
Test Title: Verify business buddy
Description: Testing the Manage businessbuddy Form
Pre-conditions: Admin has manage name, description & photos.
Test # Description Input Expected
Result
Actual
Result
Status
1 Advertisement name Advertisement’s Name Control passes to photo’s field
Control passes to photo’s field
Pass
2 Photos Advertisement ‘s photo Control passes to description field
Control pass to description field
Pass
3 Description Advertisement ‘s Description Control passes to status field
Control passes to status field
Pass
4 Status Advertisement ‘s
Status Control passes to manage businessbuddy page
Control passes to manage businessbuddy page
Pass
Post-conditions: Advertisement is successfully enter into database.
‘ Table 6.10:- Test Case #10
Module Name: Youth Search
Test Title: Verify Fun zone
Description: Testing the fun zone Form
Pre-conditions: Admin has manage game name, video & description.
Test # Description Input Expected
Result
Actual
Result
Status
1 Game name Game ‘s name Control passes to game’ video field
Control passes to video field field
Pass
2 Game video Game ‘s video Control passes to game description
Control pass to game description field
Pass
3 Game Description Game ‘s description Control passes to manage fun zone page
Control passes to manage fun zone page
Pass
Post-conditions: Game name and video is successfully enter into database.
‘ Table 6.11:- Test Case #11
Module Name: Youth Search
Test Title: Verify job
Description: Testing the manage job forms.
Pre-conditions: Admin has manage job’s title, interview date, time etc
Test # Description Input Expected
Result
Actual
Result
Status
1 Job title Job ‘s title Control passes to interview date field
Control passes to interview date field
Pass
2 Interview date Interview ‘s date Control passes to time field
Control pass to time field
Pass
3 Time Interview’s time Control passes to branch name field Control passes to branch name field Pass
4 Branch name Branch’s name Control passes to skills field Control passes to skills field Pass
5 Skills Skills Required Control passes to salary field Control passes to salary field Pass
6
Salary Salary amount Control passes to location field Control passes to location field Pass
7 Location Company location Control passes to company field Control passes to company field Pass
8 Company Company’s name Control passes to qualification field Control passes to qualification field Pass
9 Qualification User’s qualification Control passes to manage jobs page Control passes to manage jobs page Pass
Post-conditions: Jobs are successfully entered into database.
‘ Table 6.12:- Test Case #12
Module Name: Youth search
Test Title: Verify blog
Description: Testing the Manage blog Form
Pre-conditions: Admin has manage blog’s name, photos description.
Test # Description Input Expected
Result
Actual
Result
Status
1 Blog name Blog’s name Control passes to photos field
Control passes to photos field
Pass
2 Photos Blog’s photo Control passes to blog description field
Control passes to blog description field
Pass
3 Blog description Blog’s description Control passes to manage blog page
Control passes to manage blog page Pass
Post-conditions:
Blog is successfully enter into database.
‘ Table 6.13:- Test Case #13
Module Name: Youth search
Test Title: Verify PTV
Description: Testing the Manage PTV Form
Pre-conditions: Admin has manage place’s sname, location & description.
‘
Test # Description Input Expected
Result
Actual
Result
Status
1 Place name Place ‘s name Control passes to location field
Control passes to location field
Pass
2 Location Location ‘s name Control passes to description field
Control passes to description field
Pass
3 Description Place description Control passes to manage ptv page
Control passes to manage ptv page
Pass
Post-conditions:
Places are successfully enter into database.
Chapter 7
References & Conclusions
‘
7.1 References
We got the idea of making such a system by viewing many youth oriented websites.Following are some references from where we have been through:
1) We have gone through current affair websites like Civil Services India and Best Current Affair which have latest information about the world and political issues.
2) We have searched many gaming sites and the most popular gaming sites are Zynga, Pogo, Yahoo! Games, and Y8.com.
3) There are websites which tells us the best places to visit such as City8, Mapjack.com ,and Slight walk.
4) We have searched many blogging site and the most popular blogging sites are Tumblr, Twitter and Weebly.
5) There is website called oxygen.org.au which have many good features for youth,we have gone through this website also.
7.2Conclusions
1) To provide current affairs , so that youth can gain knowledge and current information about the world.
2) To provide blogs which gives youth a medium to exchange their views and ideas.
3) The purpose of our system "youth search" is to provide the latest information and current happening all over the world and our site is not limited to current affairs only it also have fun-zone which will provide a space for youth to upload videos,galleries,blogs and many more attractions.
7.3Future Enhancement
1) The future enhancement of the Youth Search will include all the updates of various places, current affairs, games etc.
2) In our system user password save in database as it is but in future we will make an encryption algorithm for save password of user in database for security of site and clients.