Final Report Capstone



Comments



Description

CAPSTONE PROJECT REPORT(ONLINE COUNSELLING SYSTEM) Submitted by Devika Nag Registration No: 10812468 Programme Section B.Tech K28E3 Under the Guidance of ( MR. AMAN KAMBOJ) Discipline of CSE Lovely School of Technology Lovely Professional University, Phagwara 1| Page CERTIFICATE This is to certify that DEVIKA NAG bearing Registration no. 10812468 has completed capstone project titled, “ONLINE COUNSELLING SYSTEM” under my guidance and supervision. To the best of my knowledge, the present work is the result of her original investigation and study. No part of the work has ever been submitted for any other degree at any University. The project is fit for submission and the partial fulfillment of the conditions for the award. Signature and Name of the Research Supervisor Designation School Lovely Professional University Phagwara, Punjab. Date: 6th March 12 2| Page DECLARATION I, DEVIKA NAG , student of B.TECH-MBA PC-160 under Department of computer Science of Lovely Professional University, Punjab, hereby declare that all the information furnished in this dissertation / capstone project report is based on my own intensive research and is genuine. This dissertation / report does not, to the best of my knowledge, contain part of my work which has been submitted for the award of my degree either of this university or any other university without proper citation. Date : 25th Nov2011 DEVIKA NAG Registration No.10812468 ACKNOWLEDGEMENT 3| Page I take this opportunity to present my votes of thanks to all those guidepost who really acted as lightening pillars to enlighten our way throughout this project that has led to successful and satisfactory completion of this study. We are really grateful to our teacher for providing us with an opportunity to undertake this project in this university and providing us with all the facilities. We are highly thankful to Mr. AMAN KAMBOJ for his active support, valuable time and advice, whole-hearted guidance, sincere cooperation and pains-taking involvement during the study and in completing the assignment of preparing the said project within the time stipulated. Lastly, We are thankful to all those, particularly the various friends , who have been instrumental in creating proper, healthy and conductive environment and including new and fresh innovative ideas for us during the project, their help, it would have been extremely difficult for us to prepare the project in a time bound framework. Contents 4| Page …………………………………………………………………………..2 Feasibility Analysis…………………………………………………………………13-15 4.2 Post Implementation and Software maintenance…………………………………………35 5| Page .4 What’s new in the system to be developed……………………………………………...31 8 Implementation…………………………………………………………………………34 8.2 Structural Testing………………………………………………………………………30 7.25 6.3 DFD for present system………………………………………………………………8-10 3.4 Testing the Project……………………………………………………………………..………………………………………………………17 5.3 Specific Requirements…………………………………………………………………..3Project Plan……………………….1 Functional Testing………………………………………………………………………29 7.…………………………………………………………………….8 3...1. Organization Overview………………………………………………………………..2 Design Notations…………………………………………………………………………20 6.2 General Description……………………………………………………………………..1Product definition………………………………………………………………….6 2.2 Existing Software.……………………………………………………16 5 Software Requirement Analysis…..…………………………………………………………………………………19 6...26 7 Testing……………… …………………………………………………………………..17 5.. Existing System……………………………………………………………………….29 7.1 Introduction.7 3.5 Flowcharts……………………………………………………………………………….6 Pseudo Code…………………………………………………………………………….11-12 4.11 4.1 Implementation of Project………………………………………………………………35 8.1 System Design…………………………………………………………………………19 6..11 4Problem Analysis………………………………………………………………………….17 5. Profile of the Problem…………………………………………………………………6 3.1 Introduction……………………………………………………………………………7 3..4 Entity Relational Diagram……………………………………………………………..3 Detailed Design………………………………………………………………………21-23 6.18 6 Design….3 Level of testing…………………………………………………………………………30 7.24 6. 2 Remaining areas of the concern………………………………………………………….43 12 Bibliography……………………………………………………………………………….36 9.3 Technical and managerial lessons learnt………………………………………………….. ORGANIZATION OVERVIEW 6| Page .37 11 Source Code……………………………………………………………………………….124 1...36 10 User Manual……………………………………………………………………………….9 Project Legacy………………………………………………………………………………36 9.1 Current status of the project………………………………………………………………36 9. 2. LPU is India’s Largest University with 25. LPU provides a Professional learning Environment that acts as a catalyst for the exponential growth of students academics as well as extracurricular abilities. PROFILE OF THE PROBLEM 7| Page . LPU is duly recognized by UGC and other Apex Bodies and has accreditations of various national and International bodies and associations. LPU has 25+ international tie-ups.The name of my organization is Lovely Professional University (Lpu). It has a 600 + Acres Campus: A technology driven campus. spreed over 600 + acres of lush green area on NH-1 at the entry of Jalandhar city. LPU has a strong internationalization strategy where LPU wants to be regarded as a university with a global perspective.000+ students (on one campus) from across 26 States of India and 16 Countries around the world. But now we can track student and perents contacts at the individual level. counseling of any university or colleges was held through paper work.Track referrals to and from outside professionals as well as referrals made internally within your organization.The profile of the problem is that in previous time. These categories can be added to or modified to meet the needs of your project.Counselors can track their time spent in the four objective areas of Individual Planning. 8| Page . System Support. Counselor Time Sheet:. Simultaneously track multiple referrals for individual students Guideince Curriculum:-With the Deep Well Data Service (DWDS) Elementary Counseling Data System. counselors are able to track their delivered curriculum by date. So with the help of counseling system we can solve the problem through:Referral Tracking:. and Responsive Service. that means for attending that counseling we had to arrived on the place where university/colleges is located. Curriculum Development. it is necessary to make a thorough study of the existing system . The system is mainly related to online counseling management system. As the number of student’s increases counseling process becomes more and more 9| Page .The all the information not maintains globally. This leads to many drawbacks some of which are: • • It is a time consuming process.1 EXISTING SYSTEM Introduction:Present system or Existing system of “Counseling Management System” working manually or computerized in a building. Then verify there form by the university and maintain the record in computer or register. Limitations of the Existing System: The maintenance of various records and procedure of reporting are being done manually by the counseling department. then we need go to the University and get a form for reporting and fill the form and submit in the queue conditions. Therefore all types works are maintain in building. Proper arrangements should be made before and after the examination -which is both money spending and time consuming. So maintain all the counseling procedure very difficult.3.There is no online Counseling Management System . If we are reporting. Therefore to maintain all the information of university is very difficult. Which is developing an online web based application system. It is important that required attributes by specified so that their achievement can be objectively verified. The input system will allow for inputting numbers. The following items provide a partial list of examples. Existing Software:There are a number of attributes of software that can serve as requirements. special symbols and letters of the alphabets. operands. Difficult to management the all types of information of college or university. Not globally maintain the information Evaluating of answer sheets also consumes heavy amount of time.difficult. DFD of present system:0 Level Diagram Request for Reporting Student Counseling Process University Database 10 | P a g e . 1 Level Diagram 11 | P a g e . 2 Level Diagram 12 | P a g e . 13 | P a g e . 14 | P a g e . What’s new in the system to be developed:- The new in this system is as follow:15 | P a g e . delete. choices etc until we submit the form.The candidates can submit the documentation form of counseling by website. We can do the changes like modify. and we can transfer the fees from online transaction. 16 | P a g e . No time consuming. as is programmer portability. and implementations thereof. C# is intended to be suitable for writing applications for both hosted and embedded systems.4. and automatic garbage collection. The language is intended for use in developing software components suitable for deployment in distributed environments. modern. detection of attempts to use uninitialized variables. should provide support for software engineering principles such as strong type checking. general-purpose.NET C# language is intended to be a simple. Software robustness. the language was not intended to compete directly on 17 | P a g e .and programmer productivity are important. ranging from the very large that use sophisticated operating systems. durability. Problem Analysis Product definition:C#. array bounds checking. especially for those programmers already familiar with C and C++. Source code portability is very important. Although C# applications are intended to be economical with regard to memory and processing power requirements. Support for internationalization is very important. object-oriented programming language. The language. down to the very small having dedicated functions. and programs with unsafe code need appropriate permissions to run. Most object access is done through safe object references. In C#. or a pointer. which always either point to a "live" object or have the welldefined null value. Local variables cannot shadow variables of the enclosing block. Variable shadowing is often considered confusing by C++ texts. allowing a to be an int.. it can be freely converted to and from integers. While C++ also has a boolean type. memory address pointers can only be used within blocks specifically marked as unsafe. In addition to the try.. 18 | P a g e . An unsafe pointer can point to an instance of a value-type.performance and size with C or assembly language. unlike C and C++. FEATURES There are no global variables or functions. C# disallows this "integer meaning true or false" approach on the grounds that forcing programmers to use expressions that return exactly bool can prevent certain types of common programming mistakes in C or C++ such as if (a = b) (use of assignment = instead of equality ==). or to a random block of memory. such as while and if. All methods and members must be declared within classes. Code that is not marked as unsafe can still store and manipulate pointers through the system. require an expression of a type that implements the true operator. and expressions such as if(a) require only that a is convertible to bool. such as the boolean type. or a block of memory allocated on a stack. Statements that take conditions. it is impossible to obtain a reference to a "dead" object . Garbage collection addresses the problem of memory leaks by freeing the programmer of responsibility for releasing memory which is no longer needed. C# supports a strict Boolean datatype. string. Managed memory cannot be explicitly freed. instead. it is automatically garbage collected. Static members of public classes can substitute for global variables and functions. array. bool.catch construct to handle exception. 0. C# supports a "dynamic" data type that enforces type checking at runtime only. There are no implicit conversions between booleans and integers. Feasibility Analysis:Feasibility is the determination of whether or not a project is worth doing. the analyst can go ahead and prepare the project specification which finalizes project requirements. Any user-defined conversion must be explicitly marked as explicit or implicit.Multiple inheritance is not supported. This has been a conscious decision based on the issues of scalability and versionability. such as widening of integers. C# provides properties as syntactic sugar for a common pattern in which a pair of methods. Full type reflection and discovery is available. Generally. unlike C++ copy constructors and conversion operators. This was a design decision by the language's lead architect to avoid complication and simplify architectural requirements throughout CLI. In other words a feasibility study is carried out to select the best system that meets performance requirements. feasibility studies are undertaken within tight time constraints and normally culminate in a written and oral feasibility The contents and recommendations of such a study will be used as a sound basis for deciding 19 | P a g e . at runtime. which can be implicitly converted to any enumerated type). This is enforced at compile-time. in some cases. during JIT. Starting with version 4. nor between enumeration members and integers (except for literal 0. which are both implicit by default. C# is more type safe than C++. Checked exceptions are not present in C#. and. C# currently (as of version 4.0) has 77 reserved words. accessor (getter) and mutator (setter) encapsulate operations on a single attribute of a class. The process followed in making this determination is called a feasibility study. The only implicit conversions by default are those which are considered safe. Once it has been determined that a project is feasible. Enumeration members are placed in their own scope. although a class can implement any number of interfaces. The technical needs of the system may vary considerably. but interrelated types of feasibility. Specific hardware and software products can then be evaluated keeping in view with the logical needs.The configuration should give the complete picture about the system’s requirements: How many workstations required? How these units are interconnected so that they could operate and communicate smoothly. the analyst will usually consider seven distinct. are as follows: Technical Feasibility Operational Feasibility Economic Feasibility TECHNICAL FEASIBILITY This is concerned with specifying equipment and software that will successfully satisfy the user requirement. 20 | P a g e . Three of them. Investigation of these technical alternatives can be aided by approaching a range of suppliers for preliminary discussions. What speeds of input and output should be achieved at particular quality of printing. which are used hugely. postpone or cancel the project. configuration of the system is given more importance than the actual make of hardware.Facility to communicate data to distant location In examining technical feasibility.Ability to process a certain volume of transaction at a particular speed. since the feasibility study may lead to the commitment of large resources. it is desirable that two or three different configurations will be pursued that satisfy the key technical requirements but which represent different levels of ambition and cost. Thus. In the conduct of the feasibility study. Out of all types of feasibility. At the feasibility stage. it becomes necessary that it should be conducted competently and that no fundamental errors of judgment are made. but might include:The facility to produce outputs in a given time.whether to proceed. technical feasibility generally is the most difficult to determine.Response time under certain conditions. This can be used as a basis for the tender document against which dealers and manufacturers can later make their equipment bids. further justification or alternative in the proposed system will have to e made if it is to have a chance of being approved. 21 | P a g e . The points to be considered are:What changes will be brought with the system? What organizational structures are disturbed? What new skills will be required? Do the existing staff members have these skills? If not. OPERATIONAL FEASIBILITY It is mainly related to human organizational and political aspects. decision points. Otherwise. The planning and decision making is the good criteria to the development of the project. If benefits outweigh costs. This is an ongoing effort that improves in accuracy at each phase of the system life cycle. who understand the parts of the business that are relevant to the project and are skilled in system analysis and design process. the procedure is to determine the benefits and savings that are expected from a proposed system and compare them with costs. can they be trained in due course of time? Generally project will not be rejected simply because of operational infeasibility but such considerations are likely to critically affect the nature and scope of the eventual recommendations. This feasibility study is carried out by a small group of people who are familiar with information system techniques. and transaction handled by the present system. More commonly known as cost/benefit analysis. Project Plan Planning and Scheduling is the detailed study of the various operations performed by a system and their relationships within and outside of the system. a decision is taken to design and implement the system. During Planning and Scheduling. data are collected on the available files.ECONOMICAL FEASIBILITY Economic analysis is the most frequently used technique for evaluating the effectiveness of a proposed system. and use cases. Historically. Analysis includes several techniques to elicit the requirements from the customer. Software Requirement Analysis Introduction:- PROBLEM DEFINITION Problem definition encompasses those tasks that go into determining the needs or conditions to meet for buying books. the analysis can be combination of these methods to establish the exact requirements of the stakeholders. so that a system that meets the business needs is produced. Requirement Specification Microsoft Windows XP/Vista Professional Operating System 22 | P a g e . Where necessary. it included such things as holding interviews and creating requirements lists. More modern techniques include prototyping. 5. It can be a long and arduous process.Requirements Design Coding Testing Maintenanc e System analysis is simply uses several types of model and System Testing to their development that is why the project get completed. Specific Requirement Analysis:- 23 | P a g e . The information flow would be as: Login page: Verifies user identity and grant the appropriate access to ensure data security.Microsoft Visual Studio 2008 Microsoft SQL Server 2005 General Description:Data from students seeking admission will be stored with the help of an integrated database application. This includes: Access to candidate’s database View complete list Generate list of eligible students Apply filter Generate list of selected students Export to Excel Fill registration form Access to counseling page Take printout Registration page: Allows details to be entered in the database through forms The resulting list of records can also be exported to an excel spreadsheet. Admin view page: Displays the various operations that can be performed by the administrator on the database. The database would be linked to a frontend creating a user friendly interface for easy access and manipulation of data as well as report generation. Defining the user requirements. The major steps are:.Information gathering is usually the first phase of the software development project. which supports management. Studying the present system to verify the problem. The objective is to determine whether the request is valid anf feasible before a recommendation is made to build a new or existing manual system continues. and defining the performance expected by the candidate to use requirements. The purpose of this phase is to identify and doucument the exact requirements for the system. Design System Design Introduction: The objective of the system design is to deliver the requirements as specified in the feasibility report. databases. such as the outputs. The user’s request identifies the need for a new information system and on investigation re-defined the new information system and on investigation re-defined the new problem to be based on MIS. files. and a working system. The logical design describes the structure and characteristics of features. inputs. The physical construction produces actual program software. System design involves first logical design (logical design) and then physical construction (detailed design) of the system. and procedures. System design goes through two phases of development: Logical Design Physical Design 24 | P a g e . Language (Front-End) : . files.NET FRAMEWORK 2008 Database (Back-End) : Microsoft SQL Server 2005 Operating System : Windows NT/2000/XP/VISTA 6. Physical system design consists of the followingDesign the physical system Specify input. Plan system implementation Module Description:Online Counseling System with the fallowing modules: Counseling – Helps in Category wise counseling Institute record –covering Details regarding Institute Student record . Logical design describes the inputs.covering Details regarding Students Design Notations:- 25 | P a g e .Logical Design:We know that a data flow diagram shows the logical flow of a system and defines the boundaries of the system. output media Design the database and specify backup procedures. Design physical information flow through the system and a physical design walkthrough. Logical design specifies the user need at a level of details that virtually determine the information flow into and out of the system and the required data resources. In short it can state that physical design is the implementation of the logical design. outputs.All in a format that meets the user’s requirements. database and procedures . Physical Design:It provides the working system by defining the design specification that tells programmers exactly what that candidate system must do. Data Stores are represented by open-ended rectangles. These are now explained. and finally. These symbols can be explained in detail as follows: External entities are represented by squares. These four components can be represented by four simple symbols. DFDs make use of four basic symbols. A DFD usually comprises of four components. 26 | P a g e . Data flow diagrams (DFDs) show the data used and provided by processes within a system. Processes (input-processing-output) are represented by rectangles with rounded corners. data stored or an external entity. Data flow diagrams have only four symbols. Data Flows are represented by arrows. an oval or a circle depicting a processes. Flow diagrams in general are usually designed using simple symbols such as a rectangle. which makes useful for communication between analysts and users. together with the rules that apply to them. and arrows are generally used to depict the data flow from one step to another.Data Process Relationship Data Storage Entity Flow Input/Output Detailed Design There are some symbols that are used in the drawing of business process diagrams (data flow diagrams). Data flow diagrams present the logical flow of information through a system in graphical or pictorial form. Secondly. Only those entities which originate or receive data are represented on a business process diagram. for example. The symbol used is an oval containing a meaningful and unique identifier. Finally. This may. for example 'maintain customer records' or 'find driver'. and data process diagrams as well as data flowcharts.Create structured analysis. a descriptive title is placed in the centre of the box. a location appears to the right of the identifier and describes where in the system the process takes place. process-oriented. Information always flows to or from a process and may be written. Data stores may be long-term files such as sales ledgers. information flow. be a department or a piece of hardware. or by a description of its contents. Each data flow may be referenced by the processes or data stores at its head and tail. with arrowheads showing the direction of flow. This is allocated arbitrarily at the top level and serves as a unique reference. data-oriented. External Entity An external entity is a source or destination of a data flow which is outside the area of study. or may be short-term accumulations: for example batches of documents that are 27 | P a g e . Data Flow A data flow shows the flow of information from its source to its destination. Data Store A data store is a holding place for information within the system: It is represented by an open ended narrow rectangle. The symbol used is a rectangular box which contains 3 descriptive elements: Firstly an identification number appears in the upper left hand corner. Data Process A process shows a transformation or manipulation of data flows within the system. verbal or electronic. This should be a simple imperative sentence with a specific verb. A data flow is represented by a line. avoid glossing over them. without really understanding their role. an external source or recipient. Processes When naming processes. 28 | P a g e . to avoid crossing data flow lines. These external entities may be duplicated on a diagram. a data flow at a particular level of a diagram may be decomposed to multiple data flows at lower levels. External Entities It is normal for all the information represented within a system to have been obtained from.waiting to be processed. Indications that this has been done are the use of vague terms in the descriptive title area .like 'process' or 'update'. The most important thing to remember is that the description must be meaningful to whoever will be using the diagram. in common with most of the other symbols used. and/or to be passed onto. Where they are duplicated a stripe is drawn across the left hand corner. Each data store should be given a reference followed by an arbitrary number. like this. The addition of a lowercase letter to each entity on the diagram is a good way to uniquely identify them. Data Flows Double headed arrows can be used (to show two-way flows) on all but bottom level diagrams. Furthermore. Entity Relational Diagram:- Roll no. catego ry Rank name U_cod e U_nam e U_ad d student counseling College Affiliati on 29 | P a g e . C_code C_name C_adds Flowcharts:Counseling System Flow Chart Counseling System Login Page Main Page Yes Add Student Registration Page Add More No View Seats Generate Result View Student Page Import To 30 | P a g e . 5. 4. Already registered then view seats. 6.Print Seats still left Yes No Stop Pseudo code For login page 1. Search the marks. 3. 2. If student is not add then registered. Display on site 31 | P a g e . Give rating. Join group. data files. at the same time searching for errors in each function. Functions are tested by feeding them input and examining the output.).g. This approach is known as black box testing. A black box examines some fundamental aspects of a system with little regard for the internal logical structure of the software. Black box testing is designed to uncover errors.Functional testing is a type of black box testing that bases its test cases on the specifications of the software component under test. the engineer creates a series of test cases that are. that input is properly accepted and output is correctly produced. Any software product can be tested in one of two ways: • Knowing the specific function that a product has been designed to perform. and that integrity of external information is maintained (e. intended to “demolish” the software that has been built. They are used to demonstrate that software function are operations. • Knowing the internal working of a product.1 FUNCTIONAL TESTING : . 32 | P a g e .7. and internal structure program is rarely structured. Test case design focuses on a set technique for the cases that meet overall testing objectives. test can be conducted to ensure that internal operation performs according to specification and all internal components have been adequately exercised. This approach is know as white-box testing. In test case design phase. Testing 7. test can be conducted that demonstrate each function is fully operational. we have the concept of levels of testing. The “state of the program” may be examined at various points to determine if the expected or asserted status corresponds to the actual status.3 LEVEL OF TESTING: In order to uncover the errors present in different phases. 7. to ensure the functionality provided against the customer requirement specifications. The basic levels of testing are: 33 | P a g e . if any supplied by the customer. The quality of a product or item can be achieved by ensuring that the product meets the requirements by planning and conducting the following tests at various stages • Unit Tests at unit level. • product against the customer requirement specifications and the user documentation. Providing test cases that exercise specific set of conditions and loops test logical paths through the software. conducted by development team. conducted by the Validation Tests prior to customer. designed and conducted by standalone units.2 STRUCTURAL TESTING: . • Acceptance Tests prior to the release to validation manger. • development team to test the interface between the integrated units. conducted by the validation team to validate the Regression Testing is the re-execution of some subsets of tests already been conducted development team.White box testing of software is predicated on close examination of procedural details. • the team independent of designers and coders. • to ensure that changes are not propagated unintended side effects. The objective is to ensure that the product designed is structurally sound and will function correctly. It attempts to determine that the technology has been used properly and that when all the component parts are assembled they function as a cohesive unit. to verify individual Integration Tests after two or more product units are integrated conducted by Functional Test prior to the release to validation manager.Structural system testing is designed to verify that the developed system and programs work. 7. This form of testing is performed of software in five steps: 1.Client Needs Acceptance Testing Requirements System Testing Design Integration Testing Code Fig. Tests are conducted as each component is integrated. 5. 2. Modules are integrated moving downward beginning with main control module. time. On completing each set of tests another stub is replaced. It is also tested to ensure that new errors have not been introduced. 3. 4. Level of Testing Unit Testing Integration Testing In this process of testing it is incremented approach to construction of program structure. Modules subordinate structure to main control module is incorporated into structure. Main control module is used as test driver and stubs (modules) are Depending on integration selected subordinate stubs are replaced one at a substituted for all components subordinate to main control. 34 | P a g e . In context of integration test strategy Successful tests result in discovery of errors and errors must be corrected. When software is corrected some aspect of software configuration is changed. the software changes. build 35 | P a g e . libraries. Each time a new module is added as part of integration testing. Low-level components are combined into clusters that perform a specific software function. early recognition is essential. new I/O can occur. • A series of tests is designed to expose errors that will keep the build from properly performing its function. • • • A driver (a control program for testing) is written to coordinate test case input and output. If major control problem do exist. and new control logic is invoked. Smoke testing It is an integration testing that is commonly used when “shrink wrapped” software products are being developed. A includes all data files. This consists of steps: • Software components are translated into code are integrated into a “build”. It is designed as pacing mechanism for time critical projects. allowing us to assess the project on frequent basis. This is termed as top-down integration testing. • The build is integrated with other builds and the entire product is smoke tested daily. processing required for components subordinate to a given level is always available and the need for stubs is eliminated. reusable modules and engineered components. New data flow paths are established. These changes cause problems with functions that previously worked flawlessly. Drivers are removed and clusters are combined moving upward in the program structure. The cluster is tested.In well-factored program structure decision-making occurs at upper levels in hierarchy and therefore encountered first. Bottom-up integration testing begins construction and testing with atomic modules as the components are integrated from the bottom-up. Appropriate Validation Checks S . have completed unit testing first and system testing was done after combining /linking all different Modules with different menus and thorough testing was done.4 TESTING THE PROJECT: The best testing is to test each subsystem separately as we have done in our project. We have tested each module separately i. 7. conducted by the validation team to validate the product against the customer requirement specifications and the user documentation. units are combined with related units and retested in combination. Hence we have used the Top Up approach for testing our system. These proceeds hierarchically bottom-up until the entire system is tested as a whole.e. Once each lowest level unit has been tested.no Test cases Expected value 1 If incorrect username or password. It is best to test a system during the implementation stage in form of small sub steps rather then large chunks.Validation Testing prior to customer. Error message must be displayed 2 If user log in Logout must Displayed be displayed 5 changes in marks description The new description must be saved into database Updated Displayed Actual value 36 | P a g e . an implementation is a realization of a technical specification or algorithm as a program. and file conversion. Sometimes system developers may choose to pilot the operation in only area of the firm.6 If user log out The home page must be displayed Displayed 8. web browsers contain implementations of World Wide Web Consortium-recommended specifications. design. software component. 37 | P a g e . Implementation is the process of having system personnel check out and put new software into use. For example. When the candidate system is linked to terminals or remote sites. installs the new application and constructs any strategies. model. standard. Implementation is the realization of an application.The result indicated a considerable time saving with the candidate system and comes out with fast and efficient development. trained user. In computer science. the telecommunication network and tests of the network along with the system are also included under implementation.1 IMPLEMENTATION OF THE PROJECT: . algorithm. IMPLEMENTATION 8. say in one department or with only one or two persons. and software development tools contain implementations of programming languages. Sometimes they run old and new systems together to compare the result. or execution of a plan. Implementation means the process of converting a new or a revised system design into an operational one. Many implementations may exist for a given specification or standard. The implementation phase is less creative than system design. or other computer system. specification. site preparation. or policy. idea. It is primarily concerned with user training. 2 POST IMPLEMENTATION AND SOFTWARE MAINTENANCE: . Like any system. These steps are often overseen by a Project Manager using Project Management Methodologies set forth in the Project Management Body of Knowledge. Technical Analysts. Legislatures pass laws that are then carried out by public servants working in bureaucratic agencies. Systems Integrations. Factors impacting implementation include the legislative intent. The importance of maintenance is to continue to bring the new system to standards. Hardware also requires periodic maintenance to keep in tune with design specifications. and Project Managers. This includes Requirements Analysis. Scope Analysis. If the new information is inconsistent with the design specifications. the administrative capacity of the implementing bureaucracy. For the maintenance it has to be regularly checked whether all the devices are working properly. User Training and Delivery. evaluation and maintenance begin. there is an aging process that requires periodic maintenance of hardware and software. Solutions Architect. This process consists of rule-making. and presidential or executive support. interest group activity and opposition. rule-administration and rule-adjudication. then changes have to be made. 8. 38 | P a g e . User Policies. If any of the devices on network is not working then that has to be checked and amended in time. In political science.After the installation phase is completed and the user staff is adjusted to the changes created by the candidate system. implementation refers to the carrying out of public policy.In the IT Industry. implementation refers to post-sales process of guiding a client from purchase to use of the software or hardware that was purchased. Customizations. Software Implementations involve several professionals that are relatively new to the knowledge based economy such as Business Analysts. each modules.During the development of system. PROJECT LEGACY 9. 9.2 REMAINING AREAS OF CONCERN: . All the modules have been accomplished with required controls. dataset) fetches data and create table. I have learnt so many assets about tools. 39 | P a g e . 9. files like Class file helps me to create numerous method.3 TECHNICAL AND MANEGERIAL LESSONS LEARNT: .9.No remaining areas were left anymore. and the result of each pages are meeting to the requirements very well. system language and many more like: 1) I got to know how the classes(eg dataReader. from index page to thanks page are working so fine. 2)Moreover.1 CURRENT STATUS OF THE PROJECT: .Till now. The current status of the project is that the basics of discovering and starting the projects are functional. USER MANUAL 40 | P a g e . 41 | P a g e . 42 | P a g e . 43 | P a g e . 44 | P a g e . Bibliography 45 | P a g e . NET SUPPORT FROM ENVIGO MARKETING PRIVATE LIMITED • W3SCHOOLS 46 | P a g e .• WIKIPEDIA • MICROSOFT ONLINE SUPPORT • DATABASE AND .
Copyright © 2024 DOKUMEN.SITE Inc.