human value management i-iii chapter.doc

Upload: uniq-manju

Post on 25-Feb-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/25/2019 Human Value Management I-III Chapter.doc

    1/48

    1. INTRODUCTION

    1.1 Introduction

    Human Value Management (HVM) is seen by practitioners in the field as a more

    innovative view of workplace management than the traditional approach. Its techniques force the

    managers of an enterprise to epress their goals with specificity so that they can be understood

    and undertaken by the workforce and to provide the resources needed for them to successfully

    accomplish their assignments. !s such" HVM techniques" when properly practiced" are

    epressive of the goals and operating practices of the enterprise overall. HVM is also seen by

    many to have a key role in risk reduction within organi#ations.

    $he task of this organi#ation is to communicate with make the H% to provide them a

    very much user interface to get their needs. $he position of the &andidates is automatically

    retrieved by making high'level searching changes. $he proect allows the administrator to take

    easy reports and the epartment *ise Interview +evels ,uch as !ptitude $est -roup iscussion

    etc" can be taken at any time. $he main advantage of the system is to make available everything

    on the ust clicking way.

    $he numbers of &andidates in the ,election list are maintained in order to make

    sufficient ideas to interview the candidate at the right time. $he details are also made available

    even for the customer to take advantage over eplains about the ,kills and the -roup iscussion

    is given to the &andidates to know their ,pot %ecogni#ing ower. ,o when the &andidates are

    entered they are tested very correctly to make outcome the %eal talents from them.

  • 7/25/2019 Human Value Management I-III Chapter.doc

    2/48

    MODULE DESIGN

    The Project Consists of Six Modues

    1. M!ster Modue

    ". Inter#ie$ Modue

    %. P!ce&ent Modue

    '. Tr!inin( Modue

    ). *o+ ,ot&ent Modue

    -. S!!r Modue

    M!ster Modue

    !fter the administrator login of the screen the Master module details are stored. $heMaster Module consists of the epartment etails" esignation etails" /ob etails" 0mployee

    etails and the candidate details. $he epartment &ode" epartment 1ame and the nature of

    work carried in the department are maintained in the department master. $he designation and the

    ob details are maintained for the various type of ob included and the eligibility to the ob is

    maintained. $he employees details in the various departments placed are maintained in the

    employee module. In the candidate details the various candidates resume details are stored that

    can be filtered whenever it is necessary.

    Inter#ie$ Modue

    !n authenticated !dministrator can update candidate2s personal information" add new

    user candidate" and terminate eisting user logins. $he Interview module consists of

    %ecruitment and Interview card. $he recruitment necessary under various departments are stored

    and the eligible candidates are sent Interview card regarding Interview date" time and venue of

    the interview conducted.

  • 7/25/2019 Human Value Management I-III Chapter.doc

    3/48

    P!ce&ent Modue

    $he process of the placement is carried out here are Interview panel" !ptitude $est"

    -roup discussion" $echnical Interview and the Human Value Interview. $he Interview panel

    consists of who are the interviewing persons set to select the candidate. $he aptitude test

    consists of the various questions and the result of the candidate. $he -roup discussion shows

    how a candidate has performed in the group discussion. $he $echnical Interview process for the

    candidate is maintained. $he candidate who overcomes all the rounds will have the final round

    of H.%.

    Tr!inin( Modue

    $he training module has the training allotment for the selected candidates. $he

    performance during the training period of the candidate is maintained and stored in the database.

    *o+ ,ot&ent

    !fter an interview is conducted the !dministrator can add the details of the interview

    such as who conducted the interview" whether the !pplicant was selected and if the !pplicant

    accepted the ob. $he ob allotment for the selected candidate can be appraisal or conformed is

    stored in this module.

    S!!r

    $he ,elected candidates are paid salary under various schemes are stored and the payslip

    is retrieved.

  • 7/25/2019 Human Value Management I-III Chapter.doc

    4/48

    1." E/ISTING S0STEM

    $he eisting system in this proect was maintaining the activities manually. $he

    information2s provided by the eisting system require a lot of manual interventions at the time of

    preparing the interview and all other formalities. !ll the activities are very much difficult toprepare reports for monthly and yearly. Hence there is a need for updating of the system.

    In the proposed system" all the drawbacks and the disadvantages in the eisting systems

    are removed.

    Li&it!tions of Existin( Sste&

    $he main drawback of the eisting system is manual and involves lots of inputs.

    &andidate profiles are not maintained systematically

    ,earching is very much difficult for the ,uitable candidates

    $imely Interview calls are not made

    3navailability of quick references

  • 7/25/2019 Human Value Management I-III Chapter.doc

    5/48

    1.% PROPOSED S0STEM

    $he obective of the system of developing software for the ,earching the right candidate

    for the suitable requirement removes the drawbacks of the earlier system.

    !s already mentioned" the H% needs a good software to maintain the list of &andidates

    available according to 4ualifiication and 0perience wise and also the &all the interview

    activities. $hese details can be achieved through the development of the software

    O*ECTI2ES O3 PROPOSED S0STEM

    rovides a well defined user interface

    rovides user authentication

    %educes the paper work

    ,aves the time

    3ser friendly environment

    rovides timely reports

    Human intervention is reduced

    ,earching is kept to customers very easily.

  • 7/25/2019 Human Value Management I-III Chapter.doc

    6/48

    1.' O*ECTI2ES O3 T4E PRO*ECT

    $he main obective of developing this ,ystem V5 based application is to provide efficient

    services in H% epartment.

    $he previous system was full of draw backs like writing patients information on books so

    sometimes they can loss the important information.

    $his developed proect is fully automated and any user who doesn2t know about computer

    can operate it easily.

  • 7/25/2019 Human Value Management I-III Chapter.doc

    7/48

    1.) 4,RD5,RE RE6UIREMENTS

    rocessor 6 entium IV

    ,peed 6 7.8 -H#

    %!M capacity 6 7 -5

    9loppy disk drive 6 :.88 M5

    Hard disk drive 6 ;< -5

    =ey 5oard 6 ,amsung : buttons

    & %?M rive 6 @7 +-

    rinter 6 esk/et H

    Motherboard 6 Intel

    &abinet 6 !$A

    Monitor 6 :@ B ,amsung &olor

  • 7/25/2019 Human Value Management I-III Chapter.doc

    8/48

    1.- SO3T5,RE RE6UIREMENTS

    O7er!tin( Sste& 8 5indo$s /P

    3ront end used 8 MS 2isu! !sic -.9

    !c: end used 8 MS ,ccess

    SO3T5,RE DESCRIPTION! software package is a license to use a proprietary process packages are generally

    reliable and perform according to started documentation.

    ,ome of the drawbacks should be avoided at the time of developing the proect" they are"

    $he packages may not meet user requirements adequately.

    0tensive modification of a package usually results in loss of the venders support.

    $he methodology for package evaluations selection is often poorly defined.

    ,+out 2isu! !sic

    Microsoft Visual 5asic presents itself as a series of tools used to assist you in creating

    computer programs. !s a normal *indows application" it starts on top with a menu and some

    toolbars. It is also equipped with various windows" considered as tools" you will be using. Most

    of these tools are available or are functional only if you have primarily created or opened a

    proect.

    ! toolbar is an obect made of buttons. $hese buttons provide the same features you

    would get from the (main) menu" only faster. 3nder the main menu" the Integrated evelopment

    0nvironment (I0) is equipped with the ,tandard toolbar.

    5y default" when you start Microsoft Visual ,tudio" it is equipped with one toolbar6

    ,tandard. $o get more toolbars" on the main menu" you can click View 'C $oolbars and click the

    toolbar of your choice. Dou can also right'click any available toolbar or the main menu. $his

    displays a list of all the available toolbars. $hose that are currently opened have a check mark

    net to them.

  • 7/25/2019 Human Value Management I-III Chapter.doc

    9/48

    ! toolbar is equipped with buttons. $o know what a button is used for" you can position

    the mouse on top of it. ! tool tip will come up and display for a few seconds. In our lessons" each

    button on any toolbar will be named after its tool tip. $his means that" if a tool tip displays

    E1ewE" its button will be called the 1ew button.

    Microsoft Visual ,tudioFs menus and toolbars can be customi#ed. Dou can customi#e a

    menu category on the main menu by adding a menu item to it. Dou can customi#e a toolbar by

    adding a button to it. $o start" right'click anything on the main menu or on any toolbar and click

    &ustomi#e... 9or eample" imagine you want to add an item named ,tart *ithout ebugging so

    that it would let you easily eecute your proects and you want to add its button to the ,tandard

    toolbar" and imagine you want to position it on the left side of the ,tart button.

    Visual basic has revolutioni#ed windows programming with an obect based" event

    driven approach to software design. Visual basic G.< provides an array of sophisticated features

    that make the language truly obect oriented and interface it with the latest in the database

    technology.

    Visual basic G.< introduces us to new world of !ctiveA technology" an unique way

    harness the internet. Visual basic @.< offers many silent features to aid in the development of full

    featured applications including ata access.

    allows creation of front end applications that can wore on most of the opular database

    systems.

    !ctiveA technology allows usage of the functionality provided by other !pplications

    such as M,'*ord" M,'0cel and other windows

    !ccess to documents and applications across the internet from within your !pplication is

    made easier through internet capabilities.

  • 7/25/2019 Human Value Management I-III Chapter.doc

    10/48

    MS;,ccess

    M, !ccess is a very powerful RDMS available in the computing environment. It

    comprises of all the features from basic data storage to high'level data representation techniques

    in the form of reports. It also comprises of V5 module programming" which allows embedding

    Visual basic functions into M, !ccess.

    Microsoft !ccess is a %elational atabase Management ,ystem (%5M,)" designed

    primarily for home or small business usage.

    !ccess is known as a desktopdatabase system because itFs functions are intended to be

    run from a single computer. $his is in contrast to a serverdatabase application (such as ,4+

    ,erver)" where it is intended to be installed on a server" then accessed remotely from multiple

    client machines.

    Microsoft (or M,) !ccess is a software package that you install ust like any other

    software package" and is bundled as part of the Microsoft ?ffice suite.

    M, !ccess uses a simple" file based database and does not need any database server to be

    installed on client machine. 0ach database is stored as a single file. $he etension of the M,

    !ccess database file is .M5. !ll tables within the database are stored within the same database

    file.

    M, !ccess allows designing simple windows forms based applications without using any

    eternal programming languagesplatforms. !lso" you can easily generate reports using the M,

    !ccess reports wi#ard.

    ,ome of the programs use M, !ccess as fully functional applications using itFs forms and

    reporting features. In this case" there will be no separate applications deployed. ?nly the

    database file is copied to the client machine. $he forms and reports are embedded within the

    .M5 file.

  • 7/25/2019 Human Value Management I-III Chapter.doc

    11/48

    Maority of the applications use M, !ccess as database system. $he application itself

    will be developed using some other programming tools (like V5.10$" !,.10$" & etc) and

    application will use the !ccess database to store and retrieve data. In either case" there is no need

    to deploy the M, !ccess software. ?nly the database file (.M5) need to be deployed in the

    client machine.

    M, !ccess comes with an integrated development environment (I0)" a fully interactive

    visual debugger with breakpoints and step'through options. $hese capabilities make Microsoft

    !ccess an etremely powerful platform for developing client'server database solutions.

    3e!tures of MS;,ccess

    0asy to deploy. 1o database server required on client machines. /ust need to copy the

    database file (.M5).

    9ile based database. 0asy to copy to different folders and take backups.

    5uilt in feature to develop forms and reports. It is easy to develop fully functional

    database applications using M, !ccess itself. $he easy to use reports wi#ard allow to

    create simple reports.

    ,imple user interface. It is easy to create or modify tables using the M, !ccess software.

    !ll In ?ne package ' the M, !ccess software has all features available within one

    software (design tables" write and eecute queries" generate reports" design forms etc).

    $here is no need to open different software to perform differnet tasks on database.

    +ess targetted by hackers ' most of the hackers who attack the public web sites usually

    target advanced database systems like ,4+ ,erver or ?racle. !lso" since the features

    offered by M, !ccess are less than advanced systems like ,4+ ,erver" there are less

    options to hack M, !ccess database. Many of the ,4+ inection attacks will not work on

    !ccess databases due to the limited feature set.

  • 7/25/2019 Human Value Management I-III Chapter.doc

    12/48

    1.) COST ESTIM,TION

    COST ESTIM,TION

    roect cost estimation and proect scheduling are normally carried out together. $he

    costs of development are primarily the costs of the effort involved" so the effort computation is

    used in both the cost and the schedule estimate. However" you may have to do some cost

    estimation before detailed schedules are drawn up. $hese initial estimates may be used to

    establish a budget for the proect or to set a price for the software for a customer.

    There !re three 7!r!&eters in#o#ed in co&7utin( the tot! cost of ! soft$!re de#eo7&ent

    7roject8

    Hardware and software costs including maintenance

    $ravel and training costs

    0ffort costs (the costs of paying software engineers).

    COSTING

    $he time scheduled to complete this proect is about 8 months.

    *e have to use Visual 5asic.1et as front end and ,4+ ,erver as back end on *indows

    A latform.

    $he cost is calculated on hourly basis" i.e. hours per day.

    Man ower J 8@K> J :>@hrs J %s. 7;

  • 7/25/2019 Human Value Management I-III Chapter.doc

    13/48

    ". SO3T5,RE DESIGNS

    ".1 INPUT DESIGNS

  • 7/25/2019 Human Value Management I-III Chapter.doc

    14/48

  • 7/25/2019 Human Value Management I-III Chapter.doc

    15/48

  • 7/25/2019 Human Value Management I-III Chapter.doc

    16/48

  • 7/25/2019 Human Value Management I-III Chapter.doc

    17/48

  • 7/25/2019 Human Value Management I-III Chapter.doc

    18/48

  • 7/25/2019 Human Value Management I-III Chapter.doc

    19/48

  • 7/25/2019 Human Value Management I-III Chapter.doc

    20/48

  • 7/25/2019 Human Value Management I-III Chapter.doc

    21/48

  • 7/25/2019 Human Value Management I-III Chapter.doc

    22/48

  • 7/25/2019 Human Value Management I-III Chapter.doc

    23/48

  • 7/25/2019 Human Value Management I-III Chapter.doc

    24/48

  • 7/25/2019 Human Value Management I-III Chapter.doc

    25/48

  • 7/25/2019 Human Value Management I-III Chapter.doc

    26/48

  • 7/25/2019 Human Value Management I-III Chapter.doc

    27/48

  • 7/25/2019 Human Value Management I-III Chapter.doc

    28/48

  • 7/25/2019 Human Value Management I-III Chapter.doc

    29/48

  • 7/25/2019 Human Value Management I-III Chapter.doc

    30/48

  • 7/25/2019 Human Value Management I-III Chapter.doc

    31/48

  • 7/25/2019 Human Value Management I-III Chapter.doc

    32/48

  • 7/25/2019 Human Value Management I-III Chapter.doc

    33/48

  • 7/25/2019 Human Value Management I-III Chapter.doc

    34/48

  • 7/25/2019 Human Value Management I-III Chapter.doc

    35/48

    "." D,T,,SE DESIGN

    Concept of relational Database

    The aim of the relational database is to generate a set of relational schemes

    that allows us to store information without unnecessary redundancy, yet allows us

    to retrieve information easily. In designing such system it may become necessary to

    decompose a relation with number of attributes, into a number of relations but such

    decomposition should follow,

    Loss less Join

    Dependency Preserving

    Normaliation

    Loss less Join

    This means that the decomposition of single relation into smaller relation into

    smaller relation should not result in any of information.

    Dependency Preservation

    !unction dependencies are a constraint on the set of legal relation. They

    allow us to e"press facts the enterprise that we are modeling with our database.

    Dependency preserving implies that, when relation is decomposed, then all the

    relation is that where valid in the main relation also hold in the decomposed

    relation.

    Normalization

    Normaliation is a important step in database design, particularly for

    relational D#$%. Normaliation is the process of simplifying the relationship

    between data elements in a record. Through normaliation a collection of data in a

    record structure is replaced by successive records structure and ma&e data simpler

    and more predictable and therefore more manageable.

    Normalization is carried out for the following reasons:

  • 7/25/2019 Human Value Management I-III Chapter.doc

    36/48

    To structure the data so that perfect relationship between entities can be

    represented.

    To permit is simple retrieval of data in response 'uery and report re'uest.

    To reduce the need to restructure or reorganie data when new application

    re'uirements arise.

    Normalization consists of various levels as follows

    First Normal Form

    !irst Normal !orm decomposes all data groups into two(dimensional records.

    It is achieved when all repeating groups are removed so that a record is of the )"ed

    length.

    * relation scheme + is said to be in N!, if values in the domain of each

    attributes of the relation are atomic.

    econd Normal Form

    %econd Normal !orm eliminates any relationship in which data elements do

    not fully depend on the primary &ey of the record. %econd Normal !orm is achieved

    when a record is )rst Normal !orm and each item in the record is fully dependent on

    the primary &ey for identi)cation in storage or retrieval.

    * relation + said to be -N!, if it is in N! and if the entire nonprime attributes

    ate fully functionally dependent on the relational &eys. * database scheme is said to

    be in -N! if all the relations in the database are in -N!.

    !hird Normal Form

    Third Normal !orm eliminates any relationship that contains transitive

    dependencies.

    * relation + is said to be in N! if whenever a functional dependencies, /(0*

    hold in + and * is not in /, then either / is super &ey for + or * is prime 1i.e. * is a

    subset is a subset of the candidate &ey2.

    "eys

  • 7/25/2019 Human Value Management I-III Chapter.doc

    37/48

    * %uper 3ey is set of one or more attributes whose combined value uni'uely

    identi)es the entity in the entity set.

    * 4andidates 3ey is the minimal super &ey that is a super &ey, which does not have

    proper subset, which also a super &ey.

    * primary &ey is a candidate &ey that is chosen by the database designer as a

    principal mean of uni'uely identifying entities with an entity set.

  • 7/25/2019 Human Value Management I-III Chapter.doc

    38/48

    In the +elational Database model, each of the entities including the *ssociate

    entities is transformed into a table.

  • 7/25/2019 Human Value Management I-III Chapter.doc

    39/48

  • 7/25/2019 Human Value Management I-III Chapter.doc

    40/48

  • 7/25/2019 Human Value Management I-III Chapter.doc

    41/48

    ".% D,T, 3LO5 DI,GR,M

    $his is concerned with the transformation of requirements into data software

    architecture various notation are used in this stage. $he most frequently used category of

    architectural design notation is directed graphs. $here includes 92s" pertinence etc.

    $he ata 9low iagram is used as graphical notation to depict information flow. $he

    obective of this method is the derivation to program structure analysis and design. 9 is a

    structural analysis and design. It describes the flow of data through out a system.

    $he ata 9low iagram (9) is the graphical representation of the processes

    and the flow of data among them. ! data flow diagram illustrates the processes" data

    stores" eternal entities and the connecting data flows in a system. It is a common practice to

    draw a contet'level ata 9low iagram first which shows the interaction between the system

    and outside entities. $his contet'level 9 is then EeplodedE into adetailed 9.

    There !re four co&7onents for ! D!t! 3o$ Di!(r!&. The !re

    Extern! Entities< Ter&in!tors are outside of the system being

    modeled. $hey represent where information comes from and where

    it goes. $hese are represented by rect!n(es.

    Processes" usually represented by an ei7se (circle)" which modify

    the input to generate the output.

  • 7/25/2019 Human Value Management I-III Chapter.doc

    42/48

    D!t! Stores represents a place in the process where data rests.

    $his is represented by an o7en;ended rect!n(es or ! cinder

    symbol.

    D!t! 3o$s" represented by !rro$s" are how data moves between

    terminators" processes" and data stores

    $o gain access to the system the user must first be authenticated. epending on the role"

    the user is directed to the respective subsystem.

  • 7/25/2019 Human Value Management I-III Chapter.doc

    43/48

    D!t!fo$ Di!(r!&

  • 7/25/2019 Human Value Management I-III Chapter.doc

    44/48

    %. CODING

    %.1 CODINGS

    Lo(in 3or&

    rivate ,ub &M&!1&0+N&lick()

    0nd

    0nd ,ub

    rivate ,ub &M?=N&lick()

    If $A$3,0%.$et J EH,E $hen

    If $A$*.$et J EH,E $hen

    frmmainform.,how

    3nload Me

    0lse

    Msg5o EI1V!+I !,,*?%E

    $A$* J EE

    0it ,ub

    0nd If

    0lse

    Msg5o EI1V!+I 3,0%1!M0E

    $A$3,0% J EE

    $A$* J EE

    0it ,ub

    0nd If

    0nd ,ub

    rivate ,ub $imer:N$imer()im i !s Integer

    i J ?

    !dodc:.%ecordset.elete

    Msg5o E%ecords eletedE

    End Su+

    Pri#!te Su+ Co&&!nd)=Cic:>?

    0nd

    End Su+

    Pri#!te Su+ Co&&!nd-=Cic:>?

  • 7/25/2019 Human Value Management I-III Chapter.doc

    47/48

    !dodc:.%ecordset.Move9irst

    End Su+

    Pri#!te Su+ Co&&!nd@=Cic:>?

    !dodc:.%ecordset.Moverevious

    If !dodc:.%ecordset.5?9 J $rue $hen

    Msg5o E$his is 3% 9irst %ecordP...E

    !dodc:.%ecordset.Move1et

    0nd If

    End Su+

    Pri#!te Su+ Co&&!ndA=Cic:>?

    !dodc:.%ecordset.Move+ast

    End Su+

    Pri#!te Su+ Co&&!ndB=Cic:>?

    !dodc:.%ecordset.Move1et

    If !dodc:.%ecordset.0?9 J $rue $hen

    Msg5o E$his is 3% +ast %ecordP...E

    !dodc:.%ecordset.Moverevious

    0nd If

    End Su+

  • 7/25/2019 Human Value Management I-III Chapter.doc

    48/48