human value management i-iii chapter.doc
TRANSCRIPT
-
7/25/2019 Human Value Management I-III Chapter.doc
1/48
1. INTRODUCTION
1.1 Introduction
Human Value Management (HVM) is seen by practitioners in the field as a more
innovative view of workplace management than the traditional approach. Its techniques force the
managers of an enterprise to epress their goals with specificity so that they can be understood
and undertaken by the workforce and to provide the resources needed for them to successfully
accomplish their assignments. !s such" HVM techniques" when properly practiced" are
epressive of the goals and operating practices of the enterprise overall. HVM is also seen by
many to have a key role in risk reduction within organi#ations.
$he task of this organi#ation is to communicate with make the H% to provide them a
very much user interface to get their needs. $he position of the &andidates is automatically
retrieved by making high'level searching changes. $he proect allows the administrator to take
easy reports and the epartment *ise Interview +evels ,uch as !ptitude $est -roup iscussion
etc" can be taken at any time. $he main advantage of the system is to make available everything
on the ust clicking way.
$he numbers of &andidates in the ,election list are maintained in order to make
sufficient ideas to interview the candidate at the right time. $he details are also made available
even for the customer to take advantage over eplains about the ,kills and the -roup iscussion
is given to the &andidates to know their ,pot %ecogni#ing ower. ,o when the &andidates are
entered they are tested very correctly to make outcome the %eal talents from them.
-
7/25/2019 Human Value Management I-III Chapter.doc
2/48
MODULE DESIGN
The Project Consists of Six Modues
1. M!ster Modue
". Inter#ie$ Modue
%. P!ce&ent Modue
'. Tr!inin( Modue
). *o+ ,ot&ent Modue
-. S!!r Modue
M!ster Modue
!fter the administrator login of the screen the Master module details are stored. $heMaster Module consists of the epartment etails" esignation etails" /ob etails" 0mployee
etails and the candidate details. $he epartment &ode" epartment 1ame and the nature of
work carried in the department are maintained in the department master. $he designation and the
ob details are maintained for the various type of ob included and the eligibility to the ob is
maintained. $he employees details in the various departments placed are maintained in the
employee module. In the candidate details the various candidates resume details are stored that
can be filtered whenever it is necessary.
Inter#ie$ Modue
!n authenticated !dministrator can update candidate2s personal information" add new
user candidate" and terminate eisting user logins. $he Interview module consists of
%ecruitment and Interview card. $he recruitment necessary under various departments are stored
and the eligible candidates are sent Interview card regarding Interview date" time and venue of
the interview conducted.
-
7/25/2019 Human Value Management I-III Chapter.doc
3/48
P!ce&ent Modue
$he process of the placement is carried out here are Interview panel" !ptitude $est"
-roup discussion" $echnical Interview and the Human Value Interview. $he Interview panel
consists of who are the interviewing persons set to select the candidate. $he aptitude test
consists of the various questions and the result of the candidate. $he -roup discussion shows
how a candidate has performed in the group discussion. $he $echnical Interview process for the
candidate is maintained. $he candidate who overcomes all the rounds will have the final round
of H.%.
Tr!inin( Modue
$he training module has the training allotment for the selected candidates. $he
performance during the training period of the candidate is maintained and stored in the database.
*o+ ,ot&ent
!fter an interview is conducted the !dministrator can add the details of the interview
such as who conducted the interview" whether the !pplicant was selected and if the !pplicant
accepted the ob. $he ob allotment for the selected candidate can be appraisal or conformed is
stored in this module.
S!!r
$he ,elected candidates are paid salary under various schemes are stored and the payslip
is retrieved.
-
7/25/2019 Human Value Management I-III Chapter.doc
4/48
1." E/ISTING S0STEM
$he eisting system in this proect was maintaining the activities manually. $he
information2s provided by the eisting system require a lot of manual interventions at the time of
preparing the interview and all other formalities. !ll the activities are very much difficult toprepare reports for monthly and yearly. Hence there is a need for updating of the system.
In the proposed system" all the drawbacks and the disadvantages in the eisting systems
are removed.
Li&it!tions of Existin( Sste&
$he main drawback of the eisting system is manual and involves lots of inputs.
&andidate profiles are not maintained systematically
,earching is very much difficult for the ,uitable candidates
$imely Interview calls are not made
3navailability of quick references
-
7/25/2019 Human Value Management I-III Chapter.doc
5/48
1.% PROPOSED S0STEM
$he obective of the system of developing software for the ,earching the right candidate
for the suitable requirement removes the drawbacks of the earlier system.
!s already mentioned" the H% needs a good software to maintain the list of &andidates
available according to 4ualifiication and 0perience wise and also the &all the interview
activities. $hese details can be achieved through the development of the software
O*ECTI2ES O3 PROPOSED S0STEM
rovides a well defined user interface
rovides user authentication
%educes the paper work
,aves the time
3ser friendly environment
rovides timely reports
Human intervention is reduced
,earching is kept to customers very easily.
-
7/25/2019 Human Value Management I-III Chapter.doc
6/48
1.' O*ECTI2ES O3 T4E PRO*ECT
$he main obective of developing this ,ystem V5 based application is to provide efficient
services in H% epartment.
$he previous system was full of draw backs like writing patients information on books so
sometimes they can loss the important information.
$his developed proect is fully automated and any user who doesn2t know about computer
can operate it easily.
-
7/25/2019 Human Value Management I-III Chapter.doc
7/48
1.) 4,RD5,RE RE6UIREMENTS
rocessor 6 entium IV
,peed 6 7.8 -H#
%!M capacity 6 7 -5
9loppy disk drive 6 :.88 M5
Hard disk drive 6 ;< -5
=ey 5oard 6 ,amsung : buttons
& %?M rive 6 @7 +-
rinter 6 esk/et H
Motherboard 6 Intel
&abinet 6 !$A
Monitor 6 :@ B ,amsung &olor
-
7/25/2019 Human Value Management I-III Chapter.doc
8/48
1.- SO3T5,RE RE6UIREMENTS
O7er!tin( Sste& 8 5indo$s /P
3ront end used 8 MS 2isu! !sic -.9
!c: end used 8 MS ,ccess
SO3T5,RE DESCRIPTION! software package is a license to use a proprietary process packages are generally
reliable and perform according to started documentation.
,ome of the drawbacks should be avoided at the time of developing the proect" they are"
$he packages may not meet user requirements adequately.
0tensive modification of a package usually results in loss of the venders support.
$he methodology for package evaluations selection is often poorly defined.
,+out 2isu! !sic
Microsoft Visual 5asic presents itself as a series of tools used to assist you in creating
computer programs. !s a normal *indows application" it starts on top with a menu and some
toolbars. It is also equipped with various windows" considered as tools" you will be using. Most
of these tools are available or are functional only if you have primarily created or opened a
proect.
! toolbar is an obect made of buttons. $hese buttons provide the same features you
would get from the (main) menu" only faster. 3nder the main menu" the Integrated evelopment
0nvironment (I0) is equipped with the ,tandard toolbar.
5y default" when you start Microsoft Visual ,tudio" it is equipped with one toolbar6
,tandard. $o get more toolbars" on the main menu" you can click View 'C $oolbars and click the
toolbar of your choice. Dou can also right'click any available toolbar or the main menu. $his
displays a list of all the available toolbars. $hose that are currently opened have a check mark
net to them.
-
7/25/2019 Human Value Management I-III Chapter.doc
9/48
! toolbar is equipped with buttons. $o know what a button is used for" you can position
the mouse on top of it. ! tool tip will come up and display for a few seconds. In our lessons" each
button on any toolbar will be named after its tool tip. $his means that" if a tool tip displays
E1ewE" its button will be called the 1ew button.
Microsoft Visual ,tudioFs menus and toolbars can be customi#ed. Dou can customi#e a
menu category on the main menu by adding a menu item to it. Dou can customi#e a toolbar by
adding a button to it. $o start" right'click anything on the main menu or on any toolbar and click
&ustomi#e... 9or eample" imagine you want to add an item named ,tart *ithout ebugging so
that it would let you easily eecute your proects and you want to add its button to the ,tandard
toolbar" and imagine you want to position it on the left side of the ,tart button.
Visual basic has revolutioni#ed windows programming with an obect based" event
driven approach to software design. Visual basic G.< provides an array of sophisticated features
that make the language truly obect oriented and interface it with the latest in the database
technology.
Visual basic G.< introduces us to new world of !ctiveA technology" an unique way
harness the internet. Visual basic @.< offers many silent features to aid in the development of full
featured applications including ata access.
allows creation of front end applications that can wore on most of the opular database
systems.
!ctiveA technology allows usage of the functionality provided by other !pplications
such as M,'*ord" M,'0cel and other windows
!ccess to documents and applications across the internet from within your !pplication is
made easier through internet capabilities.
-
7/25/2019 Human Value Management I-III Chapter.doc
10/48
MS;,ccess
M, !ccess is a very powerful RDMS available in the computing environment. It
comprises of all the features from basic data storage to high'level data representation techniques
in the form of reports. It also comprises of V5 module programming" which allows embedding
Visual basic functions into M, !ccess.
Microsoft !ccess is a %elational atabase Management ,ystem (%5M,)" designed
primarily for home or small business usage.
!ccess is known as a desktopdatabase system because itFs functions are intended to be
run from a single computer. $his is in contrast to a serverdatabase application (such as ,4+
,erver)" where it is intended to be installed on a server" then accessed remotely from multiple
client machines.
Microsoft (or M,) !ccess is a software package that you install ust like any other
software package" and is bundled as part of the Microsoft ?ffice suite.
M, !ccess uses a simple" file based database and does not need any database server to be
installed on client machine. 0ach database is stored as a single file. $he etension of the M,
!ccess database file is .M5. !ll tables within the database are stored within the same database
file.
M, !ccess allows designing simple windows forms based applications without using any
eternal programming languagesplatforms. !lso" you can easily generate reports using the M,
!ccess reports wi#ard.
,ome of the programs use M, !ccess as fully functional applications using itFs forms and
reporting features. In this case" there will be no separate applications deployed. ?nly the
database file is copied to the client machine. $he forms and reports are embedded within the
.M5 file.
-
7/25/2019 Human Value Management I-III Chapter.doc
11/48
Maority of the applications use M, !ccess as database system. $he application itself
will be developed using some other programming tools (like V5.10$" !,.10$" & etc) and
application will use the !ccess database to store and retrieve data. In either case" there is no need
to deploy the M, !ccess software. ?nly the database file (.M5) need to be deployed in the
client machine.
M, !ccess comes with an integrated development environment (I0)" a fully interactive
visual debugger with breakpoints and step'through options. $hese capabilities make Microsoft
!ccess an etremely powerful platform for developing client'server database solutions.
3e!tures of MS;,ccess
0asy to deploy. 1o database server required on client machines. /ust need to copy the
database file (.M5).
9ile based database. 0asy to copy to different folders and take backups.
5uilt in feature to develop forms and reports. It is easy to develop fully functional
database applications using M, !ccess itself. $he easy to use reports wi#ard allow to
create simple reports.
,imple user interface. It is easy to create or modify tables using the M, !ccess software.
!ll In ?ne package ' the M, !ccess software has all features available within one
software (design tables" write and eecute queries" generate reports" design forms etc).
$here is no need to open different software to perform differnet tasks on database.
+ess targetted by hackers ' most of the hackers who attack the public web sites usually
target advanced database systems like ,4+ ,erver or ?racle. !lso" since the features
offered by M, !ccess are less than advanced systems like ,4+ ,erver" there are less
options to hack M, !ccess database. Many of the ,4+ inection attacks will not work on
!ccess databases due to the limited feature set.
-
7/25/2019 Human Value Management I-III Chapter.doc
12/48
1.) COST ESTIM,TION
COST ESTIM,TION
roect cost estimation and proect scheduling are normally carried out together. $he
costs of development are primarily the costs of the effort involved" so the effort computation is
used in both the cost and the schedule estimate. However" you may have to do some cost
estimation before detailed schedules are drawn up. $hese initial estimates may be used to
establish a budget for the proect or to set a price for the software for a customer.
There !re three 7!r!&eters in#o#ed in co&7utin( the tot! cost of ! soft$!re de#eo7&ent
7roject8
Hardware and software costs including maintenance
$ravel and training costs
0ffort costs (the costs of paying software engineers).
COSTING
$he time scheduled to complete this proect is about 8 months.
*e have to use Visual 5asic.1et as front end and ,4+ ,erver as back end on *indows
A latform.
$he cost is calculated on hourly basis" i.e. hours per day.
Man ower J 8@K> J :>@hrs J %s. 7;
-
7/25/2019 Human Value Management I-III Chapter.doc
13/48
". SO3T5,RE DESIGNS
".1 INPUT DESIGNS
-
7/25/2019 Human Value Management I-III Chapter.doc
14/48
-
7/25/2019 Human Value Management I-III Chapter.doc
15/48
-
7/25/2019 Human Value Management I-III Chapter.doc
16/48
-
7/25/2019 Human Value Management I-III Chapter.doc
17/48
-
7/25/2019 Human Value Management I-III Chapter.doc
18/48
-
7/25/2019 Human Value Management I-III Chapter.doc
19/48
-
7/25/2019 Human Value Management I-III Chapter.doc
20/48
-
7/25/2019 Human Value Management I-III Chapter.doc
21/48
-
7/25/2019 Human Value Management I-III Chapter.doc
22/48
-
7/25/2019 Human Value Management I-III Chapter.doc
23/48
-
7/25/2019 Human Value Management I-III Chapter.doc
24/48
-
7/25/2019 Human Value Management I-III Chapter.doc
25/48
-
7/25/2019 Human Value Management I-III Chapter.doc
26/48
-
7/25/2019 Human Value Management I-III Chapter.doc
27/48
-
7/25/2019 Human Value Management I-III Chapter.doc
28/48
-
7/25/2019 Human Value Management I-III Chapter.doc
29/48
-
7/25/2019 Human Value Management I-III Chapter.doc
30/48
-
7/25/2019 Human Value Management I-III Chapter.doc
31/48
-
7/25/2019 Human Value Management I-III Chapter.doc
32/48
-
7/25/2019 Human Value Management I-III Chapter.doc
33/48
-
7/25/2019 Human Value Management I-III Chapter.doc
34/48
-
7/25/2019 Human Value Management I-III Chapter.doc
35/48
"." D,T,,SE DESIGN
Concept of relational Database
The aim of the relational database is to generate a set of relational schemes
that allows us to store information without unnecessary redundancy, yet allows us
to retrieve information easily. In designing such system it may become necessary to
decompose a relation with number of attributes, into a number of relations but such
decomposition should follow,
Loss less Join
Dependency Preserving
Normaliation
Loss less Join
This means that the decomposition of single relation into smaller relation into
smaller relation should not result in any of information.
Dependency Preservation
!unction dependencies are a constraint on the set of legal relation. They
allow us to e"press facts the enterprise that we are modeling with our database.
Dependency preserving implies that, when relation is decomposed, then all the
relation is that where valid in the main relation also hold in the decomposed
relation.
Normalization
Normaliation is a important step in database design, particularly for
relational D#$%. Normaliation is the process of simplifying the relationship
between data elements in a record. Through normaliation a collection of data in a
record structure is replaced by successive records structure and ma&e data simpler
and more predictable and therefore more manageable.
Normalization is carried out for the following reasons:
-
7/25/2019 Human Value Management I-III Chapter.doc
36/48
To structure the data so that perfect relationship between entities can be
represented.
To permit is simple retrieval of data in response 'uery and report re'uest.
To reduce the need to restructure or reorganie data when new application
re'uirements arise.
Normalization consists of various levels as follows
First Normal Form
!irst Normal !orm decomposes all data groups into two(dimensional records.
It is achieved when all repeating groups are removed so that a record is of the )"ed
length.
* relation scheme + is said to be in N!, if values in the domain of each
attributes of the relation are atomic.
econd Normal Form
%econd Normal !orm eliminates any relationship in which data elements do
not fully depend on the primary &ey of the record. %econd Normal !orm is achieved
when a record is )rst Normal !orm and each item in the record is fully dependent on
the primary &ey for identi)cation in storage or retrieval.
* relation + said to be -N!, if it is in N! and if the entire nonprime attributes
ate fully functionally dependent on the relational &eys. * database scheme is said to
be in -N! if all the relations in the database are in -N!.
!hird Normal Form
Third Normal !orm eliminates any relationship that contains transitive
dependencies.
* relation + is said to be in N! if whenever a functional dependencies, /(0*
hold in + and * is not in /, then either / is super &ey for + or * is prime 1i.e. * is a
subset is a subset of the candidate &ey2.
"eys
-
7/25/2019 Human Value Management I-III Chapter.doc
37/48
* %uper 3ey is set of one or more attributes whose combined value uni'uely
identi)es the entity in the entity set.
* 4andidates 3ey is the minimal super &ey that is a super &ey, which does not have
proper subset, which also a super &ey.
* primary &ey is a candidate &ey that is chosen by the database designer as a
principal mean of uni'uely identifying entities with an entity set.
-
7/25/2019 Human Value Management I-III Chapter.doc
38/48
In the +elational Database model, each of the entities including the *ssociate
entities is transformed into a table.
-
7/25/2019 Human Value Management I-III Chapter.doc
39/48
-
7/25/2019 Human Value Management I-III Chapter.doc
40/48
-
7/25/2019 Human Value Management I-III Chapter.doc
41/48
".% D,T, 3LO5 DI,GR,M
$his is concerned with the transformation of requirements into data software
architecture various notation are used in this stage. $he most frequently used category of
architectural design notation is directed graphs. $here includes 92s" pertinence etc.
$he ata 9low iagram is used as graphical notation to depict information flow. $he
obective of this method is the derivation to program structure analysis and design. 9 is a
structural analysis and design. It describes the flow of data through out a system.
$he ata 9low iagram (9) is the graphical representation of the processes
and the flow of data among them. ! data flow diagram illustrates the processes" data
stores" eternal entities and the connecting data flows in a system. It is a common practice to
draw a contet'level ata 9low iagram first which shows the interaction between the system
and outside entities. $his contet'level 9 is then EeplodedE into adetailed 9.
There !re four co&7onents for ! D!t! 3o$ Di!(r!&. The !re
Extern! Entities< Ter&in!tors are outside of the system being
modeled. $hey represent where information comes from and where
it goes. $hese are represented by rect!n(es.
Processes" usually represented by an ei7se (circle)" which modify
the input to generate the output.
-
7/25/2019 Human Value Management I-III Chapter.doc
42/48
D!t! Stores represents a place in the process where data rests.
$his is represented by an o7en;ended rect!n(es or ! cinder
symbol.
D!t! 3o$s" represented by !rro$s" are how data moves between
terminators" processes" and data stores
$o gain access to the system the user must first be authenticated. epending on the role"
the user is directed to the respective subsystem.
-
7/25/2019 Human Value Management I-III Chapter.doc
43/48
D!t!fo$ Di!(r!&
-
7/25/2019 Human Value Management I-III Chapter.doc
44/48
%. CODING
%.1 CODINGS
Lo(in 3or&
rivate ,ub &M&!1&0+N&lick()
0nd
0nd ,ub
rivate ,ub &M?=N&lick()
If $A$3,0%.$et J EH,E $hen
If $A$*.$et J EH,E $hen
frmmainform.,how
3nload Me
0lse
Msg5o EI1V!+I !,,*?%E
$A$* J EE
0it ,ub
0nd If
0lse
Msg5o EI1V!+I 3,0%1!M0E
$A$3,0% J EE
$A$* J EE
0it ,ub
0nd If
0nd ,ub
rivate ,ub $imer:N$imer()im i !s Integer
i J ?
!dodc:.%ecordset.elete
Msg5o E%ecords eletedE
End Su+
Pri#!te Su+ Co&&!nd)=Cic:>?
0nd
End Su+
Pri#!te Su+ Co&&!nd-=Cic:>?
-
7/25/2019 Human Value Management I-III Chapter.doc
47/48
!dodc:.%ecordset.Move9irst
End Su+
Pri#!te Su+ Co&&!nd@=Cic:>?
!dodc:.%ecordset.Moverevious
If !dodc:.%ecordset.5?9 J $rue $hen
Msg5o E$his is 3% 9irst %ecordP...E
!dodc:.%ecordset.Move1et
0nd If
End Su+
Pri#!te Su+ Co&&!ndA=Cic:>?
!dodc:.%ecordset.Move+ast
End Su+
Pri#!te Su+ Co&&!ndB=Cic:>?
!dodc:.%ecordset.Move1et
If !dodc:.%ecordset.0?9 J $rue $hen
Msg5o E$his is 3% +ast %ecordP...E
!dodc:.%ecordset.Moverevious
0nd If
End Su+
-
7/25/2019 Human Value Management I-III Chapter.doc
48/48