industrial training report

102
INDUSTRIAL MANPOWER RESOURCE ORGANIZER FULL SEMESTER INDUSTRIAL TRAINING AT RICCS COMPUTER EDUCATION,LUDHIANA (FROM ** JAN 2012 TO **MAY 2012) Submitted by SAHIL JEET SINGH KAILEY, 802111 In partial fulfillment for the award of the degree of B-TECH IN ELECTRONICS AND COMMUNICATION ENGINEERING. University College of Engineering Punjabi University ,Patiala May 2012 0

Upload: manwinder-singh-gill

Post on 17-Jul-2016

5 views

Category:

Documents


2 download

DESCRIPTION

RICCS

TRANSCRIPT

Page 1: Industrial Training Report

INDUSTRIAL MANPOWER RESOURCE ORGANIZER

FULL SEMESTER INDUSTRIAL TRAINING

AT

RICCS COMPUTER EDUCATION,LUDHIANA

(FROM ** JAN 2012 TO **MAY 2012)

Submitted by

SAHIL JEET SINGH KAILEY, 802111

In partial fulfillment for the award of the degree

of

B-TECH

IN

ELECTRONICS AND COMMUNICATION ENGINEERING.

University College of Engineering

Punjabi University ,Patiala

May 2012

0

Page 2: Industrial Training Report

ACKNOWLEDGEMENT

Nothing concrete can be achieved without an optimum combination of

inspection and perspiration. The idea of presenting this material without

adequate thanks to those who give it to us or pointed in the right direction seems

simply indefensible. Generating this piece has been time consuming and an

arduous task and has involved various contributions.

It is our pleasure to acknowledge the help we have received from different

individuals and the Project Guide.

Our sincere appreciation and whole hearted sense of gratitude goes to respected

Miss Satjeet Kaur, our project guide, for her untiring guidance, constructive

comments, valuable suggestions and inspirations. We have received endless

help from her. It has been a matter of great privilege to derive benefits of her

enormous experience.

We would also like to thank Mr. Jyoteesh Malhotra (HOD CSE Dept.) &

our internal project guide Mr. Butta Singh who guided us in completing this

project. We would also like to thank our parents for guiding and encouraging us

throughout the duration of the project.

In all we found a congenial work environment in RICCS, Ludhiana

and this completion of the project will mark a new beginning for us in the

coming future.

Simarjeet Singh

B.Tech(ECE,4th year)

883352

1

Page 3: Industrial Training Report

Table of Contents

1. Overview of Training Organization

1.1 Overview

1.2 Vision

1.3 Quality

1.4 Management Team

1.5 Contact Address

1.6 About DOEACC

2. Introducton to Java 2.1 Characteristics

2.2 OOPs Principle

2.3 Java Platform

2.4 Java Programing Fundamentals

3. Introduction to Ms-Access 4. Java Database Connectivity(JDBC)

4.1 JDBC Architecture

5. Project

5.1 Introduction

5.2 Objective

5.3 Features

5.4 Software and Hardware Specifications

5.5 Limitations of Manual System

5.6 Objectives of Computerised System

5.7 No. Of Modules

5.8 Module Description

5.9 DFD’s

2

Page 4: Industrial Training Report

5.10 System Design

5.11 System Description

6. References and Bibliography

3

Page 5: Industrial Training Report

1. Company Profile

RICCS COMPUTER EDUCATION LTD

DOEACC Accredited Computer Institute under AICTE & Ministry of I.T.,

Govt. Of India.

RICCS Computer Education Ltd. Is a public Limited Company under

Companies Act 1956 and is an Accredited Computer Institute for software,

Hardware & Networking Courses under DOEACC, Ministry of Information

Technology, and Government of India. RICCS is the pioneer institute for

preparing the professionals by imparting international standards of education

in the field of the Computer applications.

RICCS is the only Authorized Training Centre in Punjab of ministry of

Information Technology, Govt. of India having granted permission for

Software as well as Hardware, Networking & Telecommunication Course.

RICCS has been declared as the “Institute with best infrastructure in Punjab

& Chandigarh” by Punjab Govt.

RICCS is Computer education Service Provider to various leading colleges

& Schools.

4

Page 6: Industrial Training Report

1.1 RICCS is

1. Accredited institute of DOEACC, Govt. of India for Software &

Hardware Courses & Networking Courses.

2. Approved Study Centre of Maharishi Dayanad University, Rohtak

(Recognised by UGC) for IT and Management Courses.

3. Authorised Training Institute of Cal-C Technology Learning Punjab

InfoTech, Govt. of Punjab.

4. Registration Centre of British Council for IELTS.

5. Approved Study Centre of Karnataka State Open University (UGC

recognised).

6. Approved Institute by various technical Colleges for providing

Practical training to students of B. Tech/ Diploma.

7. Approved Institute for importing computer training to the students of

Institute of Cost & Works Accountants of India (ICWAI).

8. Approved Practical Examination centre of O/A/B levels by DOEACC,

Govt. of India.

9. Approved Institute for conducting All India Online Exams for Course

on Computer Concepts by DOEACC, Govt. of India.

5

Page 7: Industrial Training Report

1.2 Vision

To develop a strong Client base with an equally effective Support

structure which acts as a catalyst for effective deployment of

futuristically complete and credible IT solutions. RICSS strive to achieve

this by focusing individually on each project and build a healthy

relationship with its Customers.

1.3Quality

Quality is a comprehensive & fundamental rule or belief, for leading &

operating an organization. And this helps in continually improving

performance over the long term.

1.4 Management Team

After having brought the company from the conceptualization stage

onward, the management is confident that technologies, work force and

determination are poised for growth and wide acceptance. The

management is continually identifying some more niche segments, where

the presence is desirable to ensure globalization

6

Page 8: Industrial Training Report

1.5 Contact Address

Riccs Computer Education Ltd

Deol Tower, Opp. HDFC Bank, Pakhowal Road, Ludhiana

Ph.:0161-243654,2404193

E-mail : [email protected].

1.6About DOEACC

DOEACC Society is set up an autonomous or organization under

Ministry of Communications & Information Technology, Govt. Of India.

The DOEACC Scheme is the outcome of a working group set up by the

All India Council for Technical Education (AICTE) which is the

statutory body responsible for the development of technical education in

the country. Right from a familiarization Certificate Course on Computer

Concepts(CCC) to the ‘O’ , ‘A’ , ‘B’ , & ‘C’ level Courses, the

DOEACC helps the students to attain degrees up to MCA & M. Tech level.

7

Page 9: Industrial Training Report

DOEACC At a glance

O, A & B level recognized by the Govt. of India for purpose of employment.

DOEACC ‘B’ level qualifiers considered at par with MCAs for Govt. Jobs.

DOEACC A, B & C level qualifiers are eligible for working visas in Japan.

DOEACC students being accepted in the United States and the world over.

Over 1000 DOEACC Accredited Computer Institute throughout India.

Syllabi designed and regularly updated by leading academicians ad I.T. professionals.

Examination conducted nationwide by an Autonomous Examination Board.

A Scheme of all India Council for technical Education (AICTE) which is the statutory

body responsible for the development of technical education in the country.

DOEACC ‘B’ level recognized for competitive exams –UPSC, NDA & SSC and

eligible to appear in FATE examinations.

DOEACC Industry Academic Group under the chairmanship of Kiran Kaushik,

President, NASSCOM.

8

Page 10: Industrial Training Report

2.Introduction to JAVA

Java is a programming language originally developed by James Gosling at Sun

Microsystem (which has since merged into Oracle Corporation and released in

1995 as a core component of Sun Microsystems' Java platform . The language

derives much of its syntax from C and C++ but has a simpler object model

and fewer low-level facilities. Java applications are typically compiled to

bytecode (class file) that can run on any Java Virtual Machine (JVM) regardless

of computer architecture. Java is a general-purpose, concurrent, class-based,

object-oriented language that is specifically designed to have as few

implementation dependencies as possible. It is intended to let application

developers "write once, run anywhere", meaning that code that runs on one

platform does not need to be recompiled to run on another.

Java is an object-oriented programming language with a built-in application

programming interface (API) that can handle graphics and user interfaces and

that can be used to create applications or applets. Because of its rich set of

API's, similar to Macintosh and Windows, and its platform independence, Java

can also be thought of as a platform in itself. Java also has standard libraries for

doing mathematics.

Much of the syntax of Java is the same as C and C++. One major difference is

that Java does not have pointers. However, the biggest difference is that you

must write object oriented code in Java. Procedural pieces of code can only be

embedded in objects. In the following we assume that the reader has some

familiarity with a programming language. In particular, some familiarity with

the syntax of C/C++ is useful.

9

Page 11: Industrial Training Report

In Java we distinguish between applications, which are programs that perform

the same functions as those written in other programming languages, and

applets, which are programs that can be embedded in a Web page and accessed

over the Internet. Our initial focus will be on writing applications. When a

program is compiled, a byte code is produced that can be read and executed by

any platform that can run Java.

2.1 Characteristics:

Platform Independent

Java is a platform for application development. A platform is a loosely

defined computer industry buzzword that typically means some

combination of hardware and system software that will mostly run all the

same software.

Java byte code is exactly the same on every platform. Java programs that

have been compiled into byte code still need an interpreter to execute

them on any given platform. The interpreter reads the byte code and

translates it into the native language of the host machine on the fly. Since

the byte code is completely platform independent, only the interpreter and

a few native libraries need to be ported to get Java to run on a new

computer or operating system.

All these pieces, the javac compiler, the java interpreter, the Java

programming language, and more are collectively referred to as Java.

10

Page 12: Industrial Training Report

Simple

There are various features that ` the java as a simple language. Programs

are easy to write and debug because java does not use the pointers

explicitly. It is much harder to write the java programs that can crash the

system but we can not say about the other programming languages. Java

provides the bug free system due to the strong memory management. It

also has the automatic memory allocation and deallocation system.

Object oriented

In object-oriented programs data is represented by objects. Objects have

two sections, fields (instance variables) and methods. Fields tell you

what an object is. Methods tell you what an object does. These fields and

methods are closely tied to the object's real world characteristics and

behaviour.

Robust

Java implements a robust exception handling mechanism to deal with

both expected and unexpected errors. The worst that an applet can do to a

host system is bringing down the runtime environment. It cannot bring

down the entire system.

Most importantly Java applets can be executed in an environment that

prohibits them from introducing viruses, deleting or modifying files, or

otherwise destroying data and crashing the host computer. A Java

11

Page 13: Industrial Training Report

enabled web browser checks the byte codes of an applet to verify that it

doesn't do anything nasty before it will run the applet.

Multithreaded

Java is inherently multi-threaded. A single Java program can have many

different threads executing independently and continuously. Three Java

applets on the same page can run together with each getting equal time

from the CPU with very little extra effort on the part of the programmer.

High performance

Java byte codes can be compiled on the fly to code that rivals C++ in

speed using a "just-in-time compiler." Several companies are also

working on native-machine-architecture compilers for Java. These will

produce executable code that does not require a separate interpreter, and

that is indistinguishable in speed from C++.

Dynamic

Java programs carry with them substantial amounts of run-time type

information that is used to verify and resolve accesses to objects at run-

time. This makes it possible to dynamically link code in a safe and

expedient manner. The java programming language is unusual than other

programming languages it first compiles and then interprets the program.

Compile first translate the program into intermediate language called

intermediate language called java byte code. Java byte code is platform

12

Page 14: Industrial Training Report

independent code, which is further interpreted by the interpreter on the

java platform. Interpreter parses and run each java byte code instruction

on

the computer. Compilation occurs only once, interpretation occurs each

time when the program is executed.

Java byte code helps in making the program “write once, run anywhere”.

The program can be compiled into byte code by any platform that is

having the java compiler; the compiled java byte code program is read

to run on any machine having the java virtual machine (JVM). JVM is

an interpreter for byte code.

Effective:

Java has caused more excitement than any development on the Internet

since Mosaic. Java was the first way to include inline sound and

animation in a web page. Java also lets users interact with a web page.

Instead of just reading it and perhaps filling out a form, users can now

play games, calculate spreadsheets, chat in real-time, get continuously

updated data and much, much more.

13

Page 15: Industrial Training Report

2.2 OOPs Principles

The object oriented programming languages provide mechanisms that help

you implement the object oriented model.

Data Hiding and Encapsulation

One of the important object-oriented techniques is hiding the data within

the class and making it available only through the methods. This

technique is known as encapsulation because it seals the data (and

internal methods) safely inside the "capsule" of the class, where it can be

accessed only by trusted users (i.e., by the methods of the class).

The most important reason is to hide the internal implementation details

of your class. If you prevent programmers from relying on those details,

you can safely modify the implementation without worrying that you will

break existing code that uses the class.

There are other reasons to hide fields and methods of a class, as well:

Internal fields and methods that are visible outside the class just

clutter up

the API. Keeping visible fields to a minimum keeps your class tidy

and therefore easier to use and understand.

If a field or method is visible to the users of your class, you have to

document it. Save yourself time and effort by hiding it instead.

14

Page 16: Industrial Training Report

Inheritance

Inheritance is the process by which one object acquires the properties of

another object. This is important because it supports the concept of

hierarchical classification. Most knowledge is made by hierarchical

classification.

Inheritance is a compile-time mechanism in Java that allows you to

extend a class (called the base class or super class) with another class

(called the derived class or subclass).

In Java, inheritance is used for two purposes:

Class inheritance - create a new class as an extension of another class,

primarily for the purpose of code reuse. That is, the derived class

inherits the methods of the base class.

Interface inheritance - create a new class to implement the methods

defined as part of an interface for the purpose of sub typing. That is a

class that implements an interface “conforms” to the interface.

In Java, unlike C++, these two types of inheritance are made distinct by

using different language syntax. For class inheritance, Java uses the

keyword extends and for interface inheritance Java uses the keyword

implements.

In Java, unlike C++, only single class inheritance is supported i.e. for a

given class, there is only one super class.

15

Page 17: Industrial Training Report

Polymorphism

Polymorphism is the capability of an action or method to do different

things based on the object that it is acting upon. This is the third basic

principle of object oriented programming.

Two types of polymorphism:

Overloading and Overriding.

Dynamic method binding.

16

Page 18: Industrial Training Report

2.3 JAVA PLATFORM

A java platform is the hardware or software environment in which a

program runs. The java platform has two components:

1) Java Virtual Machine (JVM)

2) Java Application Programming Interface (Java API)

JVM is a standardized hypothetical computer, which is emulated inside

your computer by a program.

17

Java Source Code

Java Compiler Java

Object Code

Java Virtual Machine

Java interpreter

Page 19: Industrial Training Report

The Java API is a large collection of ready-made software components

that provide many useful capabilities, such as graphical user interface

(GUI). The java API is grouped into libraries of related classes and

interfaces these libraries are known as packages.

18

Page 20: Industrial Training Report

2.4 Java language fundamentals

Java is purely object-oriented programming language.

It is neither a superset nor a subset of C / C++.

Difference between Java and C

Java does not include keywords like goto , sizeof and typedef.

Java does not contain data types like struct, union and enum.

Java does not define the type modifiers keywords like auto, register, signed.

Java does not support an explicit pointer type.

Java does not have preprocessor.

Java does not support variables arguments to functions.

Java adds many features required for Object-Oriented Programming.

19

C++ C Java

Page 21: Industrial Training Report

Difference between Java and C++

Java does not support operator overloading.

Java does not support multiple inheritances.

Java does not support global variables.

Java has replaced the destructor function with a finalize() function.

Java is a true object-oriented language while C++ is basically C with object-

oriented extension.

Java does not provide the access to the pointers.

General Style

In order to write a program in Java, one has to follow the well-defined structure

of the Java program and should have the basic idea of all the programming

constructs like statements, tokens, etc.

Following points are to be noted:

Java is case-sensitive language.

In Java, uppercase and lowercase letters are not the same.

Java is freeform language.

Freeform means that one need not have to indent any lines to make the

program work properly, but it is good practice to use indent to make the

program readable.

20

Page 22: Industrial Training Report

2.5 JSP

Java Server Pages (JSP) is a technology that helps software

developers create dynamically generated web pages based on HTML, XML, or

other document types. Released in 1999 by Sun Microsystems and JSP is

similar to PHP, but it uses the Java programming language.

Java Server Pages (JSP) technology provides a simplified, fast way to create

dynamic web content. JSP technology enables rapid development of web-based

applications that are server- and platform-independent.  The JSP Standard Tag

Library (JSTL) is a collection of tag libraries that implement general-purpose

functionality common to many Web applications.

 

The focus of Java EE 5 has been ease of development by making use of Java

language annotations that were introduced by J2SE 5.0. JSP 2.1 supports this

goal by defining annotations for dependency injection on JSP tag handlers and

context listeners.

To deploy and run Java Server Pages, a compatible web server with a servlet

container, such as Apache Tomcat or Glass Fish is required.

21

Page 23: Industrial Training Report

Overview:

Architecturally, JSP may be viewed as a high-level abstraction of Java

servlets. JSPs are translated into servlets at runtime; each JSP's servlet is

cached and re-used until the original JSP is modified.

JSP can be used independently or as the view component of a server-

side model–view–controller design, normally with JavaBeans as the

model and Java servlets (or a framework such as Apache Struts) as the

controller. This is a type of Model 2 architecture.

JSP allows Java code and certain pre-defined actions to be interleaved

with static web markup content, with the resulting page being compiled

and executed on the server to deliver a document. The compiled pages, as

well as any dependent Java libraries, use Java byte-code rather than a

native software format. Like any other Java program, they must be

executed within a Java virtual machine (JVM) that integrates with the

server's host operating system to provide an abstract platform-neutral

environment.

JSP pages are usually used to deliver HTML and XML documents, but

through the use of Output-Stream, they can deliver other types of data as

well.

Syntax:

22

Page 24: Industrial Training Report

JSP pages use several delimiters for scripting functions. The most basic

is <% ... %>, which encloses a JSP scriptlet. A scriptlet is a fragment of

Java code that is run when the user requests the page. Other common

delimiters include <%= ... %> for expressions, where the value of the

expression is placed into the page delivered to the user, and directives,

denoted with <%@ ... %>.

Java code is not required to be complete or self-contained within its

scriptlet element block, but can straddle markup content providing the

page as a whole is syntactically correct. For example, any Java

if/for/while blocks opened in one scriptlet element must be correctly

closed in a later element for the page to successfully compile. Markup

which falls inside a split block of code is subject to that code, so markup

inside an if block will only appear in the output when the if condition

evaluates to true; likewise, markup inside a loop construct may appear

multiple times in the output depending upon how many times the loop

body runs.

The following would be a valid for loop in a JSP page:

<p>Counting to three:</p>

<% for (int i=1; i<4; i++) { %>

<p>This number is <%= i %>.</p>

<% } %>

The output displayed in the user's web browser would be:

Counting to three:

23

Page 25: Industrial Training Report

This number is 1.

This number is 2.

This number is 3.

Compiler

A Java Server Pages compiler is a program that parses JSPs, and

transforms them into executable Java Servlets. A program of this type is

usually embedded into the application server and run automatically the

first time a JSP is accessed, but pages may also be precompiled for better

performance, or compiled as a part of the build process to test for errors.

Some JSP containers support configuring how often the container checks

JSP file timestamps to see whether the page has changed. Typically, this

timestamp would be set to a short interval (perhaps seconds)

during software development, and a longer interval (perhaps minutes, or

even never) for a deployed Web application.

2.6 JSF(Java Server Faces )

24

Page 26: Industrial Training Report

Java Server Faces (JSF) is a Java-based Web application

framework intended to simplify development integration of web-based user

interfaces.

JSF is serverbased, e.g. the JSF UI components and their state are

represented on the server with a defined life-cycle of the UI components.

JSF is part of the Java EE standard.

A JSF application run in a standard web container, for

example Tomcat or Jetty.

This articles provides an introduction to JSF using only standard JSF

features. For the usage of special Apache Trinidad features please

see Apache Myfaces Trinidad with Eclipse - Tutorial .

JSF Application:

A JSF application consists of web pages with JSF UI components. A JSF

application requires also some configuration files ("faces-config.xml" and

"web.xml").

The faces-config.xml defines:

25

Page 27: Industrial Training Report

Managed Bean - the data elements of the JSF application (managed beans

and backing beans) represents a Java class which will be created

dynamically during runtime of the JSF application. It can be defined for

which scope the bean is valid (Session, Request, Application or none).

the navigation between web pages

data validators - Used to check the validity of UI input

data converters -Used to translate between UI and model

Managed beans are simple Java objects (POJO's) which are declared in

"faces-config.xml" and can be used in an JSF application. For example you

can define a Java object "Person". Once you define the object in faces-

config.xml you can use the attributes of Person in your JSF UI components,

e.g. by binding the value "firstName" of this object to an JSF input field.

JSF uses the Unified Expression Language (EL) to bind UI components to

object attributes or methods.

Value and Method Binding

In JSF you can access the values of a managed bean via value binding. For

value binding the universal Expression Language (EL) is used (to access

bean and / or methods). In JSF you do not need to specify the get() or set()

method but just the variable name.

Method binding can be used to bind a JSF component, e.g. a button to an

method of a Java class.

26

Page 28: Industrial Training Report

Expression Language statements either start with "${" or with "#{" and end

with "}". JSP EL expressions are using the ${...} syntax. These EL

expressions are immediately evaluated. JSF EL expressions are of the type

#{...}. These are only evaluated when needed (and otherwise stored as

strings).

Prerequisites to use JSF: JSF Implementation (in the form of the JSF jars)

The JSTL tags library

A Java runtime environment

A web-container to use JSF in (for example Tomcat)

JSF Main features

JSP has the following main features:

JSP is based on the Model-View-Controller concept

JSP has a stateful UI component model, e.g. each component is aware of

its data

JSF separates the functionality of a component from the display of the

component. The renderer is responsible of displaying the component for a

certain client. This renderer can get exchanged. The standard renderer for

JSF components is the HTML renderer.

27

Page 29: Industrial Training Report

JSP support listeners on UI components

JSP support data validation, data binding and data conversion between

the UI and the model

3. Introduction to Microsoft access.

Database

A database is a tool for collecting and organizing information. Databases

can store information about people, products, orders, or anything else.

Many databases start as a list in a word-processing program or

spreadsheet. As the list grows bigger, redundancies and inconsistencies

begin to appear in the data. The data becomes hard to understand in list

form, and there are limited ways of searching or pulling subsets of data

out for review. Once these problems start to appear, it's a good idea to

transfer the data to a database created by a database management system

(DBMS), such as Office Access 2007.

A computerized database is a container of objects. One database can

contain more than one table. For example, an inventory tracking system

that uses three tables is not three databases, but one database that contains

three tables. Unless it has been specifically designed to use data or code

from another source, an Access database stores its tables in a single file,

along with other objects, such as forms, reports, macros, and modules.

28

Page 30: Industrial Training Report

Databases created in the Access 2007 format have the file

extension .accdb, and databases created in earlier Access formats have the

file extension .mdb. You can use Access 2007 to create files in earlier file

formats (for example, Access 2000 and Access 2002-2003).

Using Access, you can:

Add new data to a database, such as a new item in an inventory

Edit existing data in the database, such as changing the current

location of an item

Delete information, perhaps if an item is sold or discarded

Organize and view the data in different ways

The parts of an Access database

Tables

Forms

Reports

Queries

Macros

Modules

29

Page 31: Industrial Training Report

Creating New, and Opening Existing Databases Create a New Database from scratch

Use the wizard to create a New Database

Open an existing database

o The white box gives you the most recent databases you have used.

If you do not see the one you had created, choose the More Files

option and hit OK. Otherwise choose the database you had

previously used and click OK.

Create a database using the Database Wizard

1. When Microsoft Access first starts up, a dialog box is automatically

displayed with options to create a new database or open an existing one.

If this dialog box is displayed, click Access Database Wizards, pages,

and projects and then click OK.

If you have already opened a database or closed the dialog box that

displays when Microsoft Access starts up, click New Database on the

toolbar.

2. On the Databases tab, double-click the icon for the kind of database you

want to create.

30

Page 32: Industrial Training Report

3. Specify a name and location for the database.

4. Click Create to start defining your new database

Create a database without using the Database Wizard

1. When Microsoft Access first starts up, a dialog box is automatically

displayed with options to create a new database or open an existing one.

If this dialog box is displayed, click Blank Access Database, and then

click OK.

If you have already opened a database or closed the dialog box that

displays when Microsoft Access starts up, click New Database on the

toolbar, and then double-click the Blank Database icon on the General

tab.

2. Specify a name and location for the database and click Create.

31

Page 33: Industrial Training Report

32

Page 34: Industrial Training Report

Tables

A database table is similar in appearance to a spreadsheet, in that data is

stored in rows and columns. As a result, it is usually quite easy to import

a spreadsheet into a database table. The main difference between storing

your data in a spreadsheet and storing it in a database is in how the data is

organized.

To get the most flexibility out of a database, the data needs to be

organized into tables so that redundancies don't occur. For example, if

you're storing information about employees, each employee should only

need to be entered once in a table that is set up just to hold employee

data. Data about products will be stored in its own table, and data about

branch offices will be stored in another table. This process is called

normalization.

Each row in a table is referred to as a record. Records are where the

individual pieces of information are stored. Each record consists of one or

more fields. Fields correspond to the columns in the table. For example,

you might have a table named "Employees" where each record (row)

contains information about a different employee, and each field (column)

contains a different type of information, such as first name, last name,

address, and so on. Fields must be designated as a certain data type,

whether it's text, date or time, number, or some other type.

Another way to describe records and fields is to visualize a library's old-

style card catalog. Each card in the cabinet corresponds to a record in the

database. Each piece of information on an individual card (author, title,

and so on) corresponds to a field in the database.

33

Page 35: Industrial Training Report

Create a Table from scratch in Design view 1. If you haven't already done so, switch to the Database Window You can

press F11 to switch to the Database window from any other window.

2. Double-Click on "Create table in Design view".

(DESIGN VIEW)

3. Define each of the fields in your table.

o Under the Field Name column, enter the categories of your table.

o Under Data Type column, enter the type you want for you

categories.

The attribute of a variable or field that determines what kind

of data it can hold. For example, in a Microsoft Access

database, the Text and Memo field data types allow the field

to store either text or numbers, but the Number data type will

allow the field to store numbers only. Number data type

fields store numerical data that will be used in mathematical

calculations. Use the Currency data type to display or

calculate currency values. Other data types are Date/Time,

Yes/No, Auto Number, and OLE object (Picture).

o Under the Description column, enter the text that describes what

you field is. (This field is optional).

Primary Key

One or more fields (columns) whose value or values uniquely identify

each record in a table. A primary key does not allow Null values and

must always have a unique value. A primary key is used to relate a table

to foreign keys in other tables.

34

Page 36: Industrial Training Report

4. Java – JDBC

JDBC stands for "Java Database Connectivity". It is an API (Application

Programming Interface) which consists of a set of Java classes, interfaces

and exceptions and a specification to which both JDBC driver vendors and

JDBC developers adhere when developing applications.

4.1 JDBC Architecture

The JDBC API supports both two-tier and three-tier processing models for

database access.

1.Two-tier Architecture for Data Access.

35

Page 37: Industrial Training Report

In the two-tier model, a Java application talks directly to the data source.

This requires a JDBC driver that can communicate with the particular data

source being accessed. A user's commands are delivered to the database or

other data source, and the results of those statements are sent back to the

user. The data source may be located on another machine to which the

user is connected via a network. This is referred to as a client/server

configuration, with the user's machine as the client, and the machine

housing the data source as the server.

2.Three-tier Architecture for Data Access.

In the three-tier model, commands are sent to a "middle tier" of services,

which then sends the commands to the data source. The data source

processes the commands and sends the results back to the middle tier,

which then sends them to the user. MIS directors find the three-tier model

very attractive because the middle tier makes it possible to maintain

control over access and the kinds of updates that can be made to corporate

data. Another advantage is that it simplifies the deployment of

applications. Finally, in many cases, the three-tier architecture can provide

performance advantages.

36

Page 38: Industrial Training Report

5. PROJECT

INDUSTRIAL MANPOWER RESOURCE ORGANIZER(IMPRO)

5.1 Introduction:

Every Organization has many managers, who are responsible for all

the activities in the organization. These managers manage different

aspects of the organizational management issues, such as

manufacturing, production, marketing, etc.; one such essential

management issue is IMPRO.

As years progressed, the approach of the management changed

towards the human capital. Now Hierarchical Organization is part of

every organization, and has its own identity and importance. In this

scenario, the bigger organizations need to put lot of effort in the

management of human Resources, as they are underlying capital asset

to the organization. In doing so, along with times, the Organization

Information changed from its basic operations to more strategic

approach.

37

Page 39: Industrial Training Report

5.2 Objective:

The objective behind developing IMPRO (Industrial Manpower Resource

Organizer) is to maintain the hierarchy of the employee’s within an

organization. It provides the manger and administrative department an

overall hierarchical view of the complete enterprise and helps them in

managing employees.

5.3 Features:

1. Maintenance of profile details of the employees and retrievals as and

when required.

2. Overall detailed view of the organization hierarchy which is very much

essential in making effective decisions.

3. Maintenance of the data when the organization has many branches spread

over wide geographical area.

4. Accessing one branch information from another branch.

5. Accessing one department information from another branch.

6. Vacancy situations and their priority /effect on the organizations

performance.

7. Job Rotation.

8. Assigning Designation.

38

Page 40: Industrial Training Report

5.4 Software and Hardware Specifications

Hardware Specification

Processor : Intel Core i3, i5 or i7 CPU

RAM : 2 GB

Hard disk : 250 GB

Mouse : 3 Button scroll

Keyboard : 108 keys

Software Specification

Operating System : Windows 2000/XP/Vista/7

Front End : JAVA

Platform : J2EE

Web Servers : GlassFish Server 3.1.2

Backend : Microsoft Access

Browser Program : Mozilla Firefox, Google Chrome

39

Page 41: Industrial Training Report

5.5 Limitations of Manual System:

The various limitations of manual system are given below:

1.) Data Duplication: The same data gets repeated over and over since the

workers find it hard to keep track of the documents, information and

transactions.

2.) Lack of Security: Since data is stored in filing cabinets it is freely

available to anyone. If information falls into the wrong hands it can be used

against the company and customers and can blackmail them.

3.) Common Errors: When entering data customers might have accidentally

switched details and data since it is hand written.

4.) Inconsistency of Data: There will be unavailability for future use, since

data might get misplaced during manual filing.so data won’t be preserved

properly for future use.

5.) Repetition of work: If there are any changes to be made, the data will

have to be entered again.at times the worker would forget to make the

changes or forget that they had already altered it and might redo it again, its

again time consuming.

40

Page 42: Industrial Training Report

6.) Too much paper work: Since everything and every detail is written

down manually in paper there will be too much paper work.

7.) Space consuming: Since the data and paper is stored in filing cabinets it

consumes too much place, as the amount of work done on paper increases

the filing cabinets too increases.

8.) Slow retrieval of Data: The information of customers and details are

stored in different parts of the site and so takes a long time to retrieve the

data.it takes a long time to find the information about a relevant person.in

case of a Delivery, the delivery will be held back. This results in a sharp

drop in sales, unhappy customers and a bad impression on the company.

5.6 Objectives of Computerised System:

The various objectives of computerized system are given below:

1.)Speed: They understand the importance of timing, of getting there before

the competition. A rich portfolio of reusable, modular frameworks helps jump-

start projects. Tried and tested methodology ensures that we follow a

predictable, low - risk path to achieve results. Our track record is testimony to

complex projects delivered within and evens before schedule.

2.)Expertise: Our teams combine cutting edge technology skills with rich

domain expertise. What’s equally important - they share a strong customer

orientation that means they actually start by listening to the customer. They’re

41

Page 43: Industrial Training Report

focused on coming up with solutions that serve customer requirements today

and anticipate future needs.

3.) A full service portfolio: They offer customers the advantage of being able to

Architect, integrate and manage technology services. This means that they

can rely on one, fully accountable source instead of trying to integrate

disparate multi-vendor solutions.

5.7 Number of Modules

The system after careful analysis has been identified to be presented with the

following modules:

Guest

Administrator

Employee.

Web Registration.

Report.

Authentication.

42

Page 44: Industrial Training Report

5.8 Module Description:

Guest:

1. He can view the profile of the company.

2. He can view the department wise vacancies.

3. He can apply for the vacancies.

4. He can send his queries to the company.

5. He can view the news updates of the company.

Administrator:

Administrator is treated as the super user in this system.

1. He manages the profile of the company.

2. He manages all the branches of the company.

3. He manages all the departments of various branches.

4. He manages vacancies in various branches.

5. He manages the profiles of all the employees in the company.

6. He can update the profiles of the employees.

7. He updates the news related with the company.

43

Page 45: Industrial Training Report

Employee:

1. He has to login with username and password provided by the

administrator.

2. He can view his profile.

3. He can update his profile.

Web Registration:

The system has a process of registration. Every User need to submit his

complete details in the form of registration. Whenever a User registration

completed automatically he/she can get a user id and password. By using

that user id and password he/she can log into the system.

Reports:

Different kind of reports is generated by the system which is given below:

1. Branch Report

2. Employee Report

3. Vacancy Report.

4. Department Report.

Authentication:

44

Page 46: Industrial Training Report

Authentication is nothing but providing security to the system. Here

every must enter into the system throw login page. The login page will

restrict the unauthorized users. A user must provide his credential like

user Id and password for log into the system. For that the system

maintains data for all users. Whenever a user enters his user id and

password, it checks in the database for user existence. If the user is exists

he can be treated as a valid user. Otherwise the request will throw back.

45

Page 47: Industrial Training Report

5.9 Data flow Diagram:

A dataflow diagram (DFD) is a significant modeling technique for

analyzing and constructing information processes. DFD literally

means an illustration that explains the course or movement of

information in a process. DFD illustrates this flow of information in a

process based on the inputs and outputs. ADFD can be referred to a

Process Model.

Additionally, a DFD can be utilized to visualize data processing or a

structured design. A DFD illustrates technical or business processes

with the help of the external data stored, the data flowing from

process to another and the results.

A designer usually draws a context level DFD showing the relationship

between the entities inside and outside of a system as one single step. This

basic DFD can be disintegrated to a lower level diagram demonstrating

similar steps exhibiting details of the system that is being modeled.

Numerous levels may be required to explain a complicated system.

Therefore, the principle for creating a DFD is that one system may be

disintegrated into subsystems, which in turn can be disintegrated into

subsystems at a much lower level, and so on and so forth. Every subsystem

in a DFD represents a process. In this process are activity the input data is

processed. Processes cannot be decomposed after reaching a certain lower

level. Each process in DFD characterizes an entire system. In a DFD

system, data is introduced into the system from the external environment.

Once entered the data flows between processes. And then processed data is

produced as an output or a result.

46

Page 48: Industrial Training Report

DFD Symbols:

In the DFD, there are four symbols:

1.A square defines a source (originator) or destinations of the system

data

2.An arrow identifies data flow. It is the pipeline through which the

information flows

3. A circle or a bubble represents a process that transforms incoming

data flow into outgoing data flows.

4. An open rectangle is a data store, data at rest or a temporary

repository of data.

47

Page 49: Industrial Training Report

DFD’s Of IMPRO:

Top Level DFD:

48

Page 50: Industrial Training Report

Login DFD

Admin Home Page:

49

Page 51: Industrial Training Report

Employee Home Page:

50

Page 52: Industrial Training Report

5.10 System Design:

The Hierarchical Organization Information software has been

modularized into following modules:

Branches

Departments

Employee

Vacancy

Profiles

Test Rounds

View Reports

Payroll

5.11 System Description:

51

Page 53: Industrial Training Report

Home Page of guest

Home Page of Admin:

52

Page 54: Industrial Training Report

Admin is the super User.

He manages the profile of the company.

53

Page 55: Industrial Training Report

Home Page of employee:

Employee can update his profile.

He can register in the company.

He view the vacancies, departments and branches of the company.

Branches:

54

Page 56: Industrial Training Report

Branches represent various centres of the organisation across the world.

These are further divided into:

Add Branches: New branches can be added in the database.

Modify Branches: Branches can be modified.

View Branches: All the branches of the organisation can be

viewed.

Delete Branches: Any branch can be removed from database.

A new Branch of the Organisation has been added to the database.

55

Page 57: Industrial Training Report

Branches of the organisation are viewed.

56

Page 58: Industrial Training Report

Departments:

These are further divided into:

Add Department: New departmentss can be added in the database.

Modify Department: Departments can be modified.

View Departments: All the departments in various branches can be

viewed.

Delete Department: Any department can be removed from

database.

Assign Department: Departments are assigned to the new

employees

Which are recruited in the organisation.

57

Page 59: Industrial Training Report

A new Department has been added to the database

58

Page 60: Industrial Training Report

A Department has been removed from the database

59

Page 61: Industrial Training Report

Departments in various branches

60

Page 62: Industrial Training Report

Employee:

These are further divided into:

Employee Registration: New Employees register in the

organisation.

Update Registration: The details of the employees can be updated.

Update Password: The Employees can update their password.

List of all employees: All the employees in the organisation can be

viewed.

Present status of employees: Information regarding their present

branch, department and designation can be viewed.

Sign Up new employees: Admin provides password to the new

employees. Employees can login with the password provided to

them.

Mark Attendance: Attendance of employees is marked.

Leave Status: Information is provided about the employees which

are on leave.

61

Page 63: Industrial Training Report

New Employee registered in the organisation.

62

Page 64: Industrial Training Report

List of all employees in the organisation.

63

Page 65: Industrial Training Report

Attendance of an employee marked

64

Page 66: Industrial Training Report

Leave Status of an employee

65

Page 67: Industrial Training Report

Vacancy:

This is further divided into:

Add Vacancy: New vacancies can be created.

ModifyVacancy: Vacancies can be modified.

View Vacancy: All the vacancies in various branches can be

viewed.

Delete Vacancy: Vacancies which have been filled can be

removed.

New Vacancy added.

66

Page 68: Industrial Training Report

List of Vacancies

67

Page 69: Industrial Training Report

Profiles:

This is further divided into:

Application: Applicants can apply for various vacancies.

Job Rotation: Employees can be transferred from one branch to

another branch/departments of the employees can be changed.

Update Job Rotation

Assign Designation: Employees can be promoted/demoted.

Update Designation

Employee transferred from one department to another.

68

Page 70: Industrial Training Report

Applicant applying for a vacancy

69

Page 71: Industrial Training Report

Test Rounds:

Represents the recruitment process of the organisation. It consists of

three stages: Written Round, Technical Round, HR Round.

This is further divided into:

Applicant Tests: New tests for various vacancies can be created.

Written Round: Result of Written Test is updated. Applicants

which clear the Written test move to the Technical Interview.

Technical Round: Result of Technical Interview is updated.

Applicants which clear the Technical Round move to the HR

Interview.

HR Round: Result of HR Interview is updated.

Selected Candidates List: Applicants which clear theHR interview

are recruited in the organisation.

View Reports:

This is further divided into:

Employee: All the employees in the organisation can be viewed.

Branches: The various centres of the organisation can be viewed.

Departments: All the departments in various branches can be

viewed.

Vacancy: Vacancies created in the organisation can be viewed.

70

Page 72: Industrial Training Report

Payroll:

Payroll helps in determining the salary details of all the employees and

other agreement related information.

Agreement: The information regarding the salary of various

employees can be recorded in the database.

Salary Detail: The salary detail of all the employees in the

organisation can be viewed.

About Us:

All the information about organisation is provided on this page.

Enquiry:

All the applicants can send their queries to the organisation.

71

Page 73: Industrial Training Report

Contact Us:

DEOL TOWER , 745/1,Opp. HDFC Bank

LUDHIANA (141001)

Tel:0161-2403654,2404193

Mobile: 9988299002

Email: [email protected]

72

Page 74: Industrial Training Report

6.BIBLIOGRAPHY AND REFRENCES

List of websites:

http://www.wikipedia.org/

http:// www.google.com

http:// www.java.sun.com

http://www.roseindia.net/   

 

Books:

The Complete Reference Java 2 by Herbert Schildt.

Java Server Programming Java EE5 (Black Book) by Kogent Learning

Solutions Inc.

73