industrial training report
DESCRIPTION
RICCSTRANSCRIPT
INDUSTRIAL MANPOWER RESOURCE ORGANIZER
FULL SEMESTER INDUSTRIAL TRAINING
AT
RICCS COMPUTER EDUCATION,LUDHIANA
(FROM ** JAN 2012 TO **MAY 2012)
Submitted by
SAHIL JEET SINGH KAILEY, 802111
In partial fulfillment for the award of the degree
of
B-TECH
IN
ELECTRONICS AND COMMUNICATION ENGINEERING.
University College of Engineering
Punjabi University ,Patiala
May 2012
0
ACKNOWLEDGEMENT
Nothing concrete can be achieved without an optimum combination of
inspection and perspiration. The idea of presenting this material without
adequate thanks to those who give it to us or pointed in the right direction seems
simply indefensible. Generating this piece has been time consuming and an
arduous task and has involved various contributions.
It is our pleasure to acknowledge the help we have received from different
individuals and the Project Guide.
Our sincere appreciation and whole hearted sense of gratitude goes to respected
Miss Satjeet Kaur, our project guide, for her untiring guidance, constructive
comments, valuable suggestions and inspirations. We have received endless
help from her. It has been a matter of great privilege to derive benefits of her
enormous experience.
We would also like to thank Mr. Jyoteesh Malhotra (HOD CSE Dept.) &
our internal project guide Mr. Butta Singh who guided us in completing this
project. We would also like to thank our parents for guiding and encouraging us
throughout the duration of the project.
In all we found a congenial work environment in RICCS, Ludhiana
and this completion of the project will mark a new beginning for us in the
coming future.
Simarjeet Singh
B.Tech(ECE,4th year)
883352
1
Table of Contents
1. Overview of Training Organization
1.1 Overview
1.2 Vision
1.3 Quality
1.4 Management Team
1.5 Contact Address
1.6 About DOEACC
2. Introducton to Java 2.1 Characteristics
2.2 OOPs Principle
2.3 Java Platform
2.4 Java Programing Fundamentals
3. Introduction to Ms-Access 4. Java Database Connectivity(JDBC)
4.1 JDBC Architecture
5. Project
5.1 Introduction
5.2 Objective
5.3 Features
5.4 Software and Hardware Specifications
5.5 Limitations of Manual System
5.6 Objectives of Computerised System
5.7 No. Of Modules
5.8 Module Description
5.9 DFD’s
2
5.10 System Design
5.11 System Description
6. References and Bibliography
3
1. Company Profile
RICCS COMPUTER EDUCATION LTD
DOEACC Accredited Computer Institute under AICTE & Ministry of I.T.,
Govt. Of India.
RICCS Computer Education Ltd. Is a public Limited Company under
Companies Act 1956 and is an Accredited Computer Institute for software,
Hardware & Networking Courses under DOEACC, Ministry of Information
Technology, and Government of India. RICCS is the pioneer institute for
preparing the professionals by imparting international standards of education
in the field of the Computer applications.
RICCS is the only Authorized Training Centre in Punjab of ministry of
Information Technology, Govt. of India having granted permission for
Software as well as Hardware, Networking & Telecommunication Course.
RICCS has been declared as the “Institute with best infrastructure in Punjab
& Chandigarh” by Punjab Govt.
RICCS is Computer education Service Provider to various leading colleges
& Schools.
4
1.1 RICCS is
1. Accredited institute of DOEACC, Govt. of India for Software &
Hardware Courses & Networking Courses.
2. Approved Study Centre of Maharishi Dayanad University, Rohtak
(Recognised by UGC) for IT and Management Courses.
3. Authorised Training Institute of Cal-C Technology Learning Punjab
InfoTech, Govt. of Punjab.
4. Registration Centre of British Council for IELTS.
5. Approved Study Centre of Karnataka State Open University (UGC
recognised).
6. Approved Institute by various technical Colleges for providing
Practical training to students of B. Tech/ Diploma.
7. Approved Institute for importing computer training to the students of
Institute of Cost & Works Accountants of India (ICWAI).
8. Approved Practical Examination centre of O/A/B levels by DOEACC,
Govt. of India.
9. Approved Institute for conducting All India Online Exams for Course
on Computer Concepts by DOEACC, Govt. of India.
5
1.2 Vision
To develop a strong Client base with an equally effective Support
structure which acts as a catalyst for effective deployment of
futuristically complete and credible IT solutions. RICSS strive to achieve
this by focusing individually on each project and build a healthy
relationship with its Customers.
1.3Quality
Quality is a comprehensive & fundamental rule or belief, for leading &
operating an organization. And this helps in continually improving
performance over the long term.
1.4 Management Team
After having brought the company from the conceptualization stage
onward, the management is confident that technologies, work force and
determination are poised for growth and wide acceptance. The
management is continually identifying some more niche segments, where
the presence is desirable to ensure globalization
6
1.5 Contact Address
Riccs Computer Education Ltd
Deol Tower, Opp. HDFC Bank, Pakhowal Road, Ludhiana
Ph.:0161-243654,2404193
E-mail : [email protected].
1.6About DOEACC
DOEACC Society is set up an autonomous or organization under
Ministry of Communications & Information Technology, Govt. Of India.
The DOEACC Scheme is the outcome of a working group set up by the
All India Council for Technical Education (AICTE) which is the
statutory body responsible for the development of technical education in
the country. Right from a familiarization Certificate Course on Computer
Concepts(CCC) to the ‘O’ , ‘A’ , ‘B’ , & ‘C’ level Courses, the
DOEACC helps the students to attain degrees up to MCA & M. Tech level.
7
DOEACC At a glance
O, A & B level recognized by the Govt. of India for purpose of employment.
DOEACC ‘B’ level qualifiers considered at par with MCAs for Govt. Jobs.
DOEACC A, B & C level qualifiers are eligible for working visas in Japan.
DOEACC students being accepted in the United States and the world over.
Over 1000 DOEACC Accredited Computer Institute throughout India.
Syllabi designed and regularly updated by leading academicians ad I.T. professionals.
Examination conducted nationwide by an Autonomous Examination Board.
A Scheme of all India Council for technical Education (AICTE) which is the statutory
body responsible for the development of technical education in the country.
DOEACC ‘B’ level recognized for competitive exams –UPSC, NDA & SSC and
eligible to appear in FATE examinations.
DOEACC Industry Academic Group under the chairmanship of Kiran Kaushik,
President, NASSCOM.
8
2.Introduction to JAVA
Java is a programming language originally developed by James Gosling at Sun
Microsystem (which has since merged into Oracle Corporation and released in
1995 as a core component of Sun Microsystems' Java platform . The language
derives much of its syntax from C and C++ but has a simpler object model
and fewer low-level facilities. Java applications are typically compiled to
bytecode (class file) that can run on any Java Virtual Machine (JVM) regardless
of computer architecture. Java is a general-purpose, concurrent, class-based,
object-oriented language that is specifically designed to have as few
implementation dependencies as possible. It is intended to let application
developers "write once, run anywhere", meaning that code that runs on one
platform does not need to be recompiled to run on another.
Java is an object-oriented programming language with a built-in application
programming interface (API) that can handle graphics and user interfaces and
that can be used to create applications or applets. Because of its rich set of
API's, similar to Macintosh and Windows, and its platform independence, Java
can also be thought of as a platform in itself. Java also has standard libraries for
doing mathematics.
Much of the syntax of Java is the same as C and C++. One major difference is
that Java does not have pointers. However, the biggest difference is that you
must write object oriented code in Java. Procedural pieces of code can only be
embedded in objects. In the following we assume that the reader has some
familiarity with a programming language. In particular, some familiarity with
the syntax of C/C++ is useful.
9
In Java we distinguish between applications, which are programs that perform
the same functions as those written in other programming languages, and
applets, which are programs that can be embedded in a Web page and accessed
over the Internet. Our initial focus will be on writing applications. When a
program is compiled, a byte code is produced that can be read and executed by
any platform that can run Java.
2.1 Characteristics:
Platform Independent
Java is a platform for application development. A platform is a loosely
defined computer industry buzzword that typically means some
combination of hardware and system software that will mostly run all the
same software.
Java byte code is exactly the same on every platform. Java programs that
have been compiled into byte code still need an interpreter to execute
them on any given platform. The interpreter reads the byte code and
translates it into the native language of the host machine on the fly. Since
the byte code is completely platform independent, only the interpreter and
a few native libraries need to be ported to get Java to run on a new
computer or operating system.
All these pieces, the javac compiler, the java interpreter, the Java
programming language, and more are collectively referred to as Java.
10
Simple
There are various features that ` the java as a simple language. Programs
are easy to write and debug because java does not use the pointers
explicitly. It is much harder to write the java programs that can crash the
system but we can not say about the other programming languages. Java
provides the bug free system due to the strong memory management. It
also has the automatic memory allocation and deallocation system.
Object oriented
In object-oriented programs data is represented by objects. Objects have
two sections, fields (instance variables) and methods. Fields tell you
what an object is. Methods tell you what an object does. These fields and
methods are closely tied to the object's real world characteristics and
behaviour.
Robust
Java implements a robust exception handling mechanism to deal with
both expected and unexpected errors. The worst that an applet can do to a
host system is bringing down the runtime environment. It cannot bring
down the entire system.
Most importantly Java applets can be executed in an environment that
prohibits them from introducing viruses, deleting or modifying files, or
otherwise destroying data and crashing the host computer. A Java
11
enabled web browser checks the byte codes of an applet to verify that it
doesn't do anything nasty before it will run the applet.
Multithreaded
Java is inherently multi-threaded. A single Java program can have many
different threads executing independently and continuously. Three Java
applets on the same page can run together with each getting equal time
from the CPU with very little extra effort on the part of the programmer.
High performance
Java byte codes can be compiled on the fly to code that rivals C++ in
speed using a "just-in-time compiler." Several companies are also
working on native-machine-architecture compilers for Java. These will
produce executable code that does not require a separate interpreter, and
that is indistinguishable in speed from C++.
Dynamic
Java programs carry with them substantial amounts of run-time type
information that is used to verify and resolve accesses to objects at run-
time. This makes it possible to dynamically link code in a safe and
expedient manner. The java programming language is unusual than other
programming languages it first compiles and then interprets the program.
Compile first translate the program into intermediate language called
intermediate language called java byte code. Java byte code is platform
12
independent code, which is further interpreted by the interpreter on the
java platform. Interpreter parses and run each java byte code instruction
on
the computer. Compilation occurs only once, interpretation occurs each
time when the program is executed.
Java byte code helps in making the program “write once, run anywhere”.
The program can be compiled into byte code by any platform that is
having the java compiler; the compiled java byte code program is read
to run on any machine having the java virtual machine (JVM). JVM is
an interpreter for byte code.
Effective:
Java has caused more excitement than any development on the Internet
since Mosaic. Java was the first way to include inline sound and
animation in a web page. Java also lets users interact with a web page.
Instead of just reading it and perhaps filling out a form, users can now
play games, calculate spreadsheets, chat in real-time, get continuously
updated data and much, much more.
13
2.2 OOPs Principles
The object oriented programming languages provide mechanisms that help
you implement the object oriented model.
Data Hiding and Encapsulation
One of the important object-oriented techniques is hiding the data within
the class and making it available only through the methods. This
technique is known as encapsulation because it seals the data (and
internal methods) safely inside the "capsule" of the class, where it can be
accessed only by trusted users (i.e., by the methods of the class).
The most important reason is to hide the internal implementation details
of your class. If you prevent programmers from relying on those details,
you can safely modify the implementation without worrying that you will
break existing code that uses the class.
There are other reasons to hide fields and methods of a class, as well:
Internal fields and methods that are visible outside the class just
clutter up
the API. Keeping visible fields to a minimum keeps your class tidy
and therefore easier to use and understand.
If a field or method is visible to the users of your class, you have to
document it. Save yourself time and effort by hiding it instead.
14
Inheritance
Inheritance is the process by which one object acquires the properties of
another object. This is important because it supports the concept of
hierarchical classification. Most knowledge is made by hierarchical
classification.
Inheritance is a compile-time mechanism in Java that allows you to
extend a class (called the base class or super class) with another class
(called the derived class or subclass).
In Java, inheritance is used for two purposes:
Class inheritance - create a new class as an extension of another class,
primarily for the purpose of code reuse. That is, the derived class
inherits the methods of the base class.
Interface inheritance - create a new class to implement the methods
defined as part of an interface for the purpose of sub typing. That is a
class that implements an interface “conforms” to the interface.
In Java, unlike C++, these two types of inheritance are made distinct by
using different language syntax. For class inheritance, Java uses the
keyword extends and for interface inheritance Java uses the keyword
implements.
In Java, unlike C++, only single class inheritance is supported i.e. for a
given class, there is only one super class.
15
Polymorphism
Polymorphism is the capability of an action or method to do different
things based on the object that it is acting upon. This is the third basic
principle of object oriented programming.
Two types of polymorphism:
Overloading and Overriding.
Dynamic method binding.
16
2.3 JAVA PLATFORM
A java platform is the hardware or software environment in which a
program runs. The java platform has two components:
1) Java Virtual Machine (JVM)
2) Java Application Programming Interface (Java API)
JVM is a standardized hypothetical computer, which is emulated inside
your computer by a program.
17
Java Source Code
Java Compiler Java
Object Code
Java Virtual Machine
Java interpreter
The Java API is a large collection of ready-made software components
that provide many useful capabilities, such as graphical user interface
(GUI). The java API is grouped into libraries of related classes and
interfaces these libraries are known as packages.
18
2.4 Java language fundamentals
Java is purely object-oriented programming language.
It is neither a superset nor a subset of C / C++.
Difference between Java and C
Java does not include keywords like goto , sizeof and typedef.
Java does not contain data types like struct, union and enum.
Java does not define the type modifiers keywords like auto, register, signed.
Java does not support an explicit pointer type.
Java does not have preprocessor.
Java does not support variables arguments to functions.
Java adds many features required for Object-Oriented Programming.
19
C++ C Java
Difference between Java and C++
Java does not support operator overloading.
Java does not support multiple inheritances.
Java does not support global variables.
Java has replaced the destructor function with a finalize() function.
Java is a true object-oriented language while C++ is basically C with object-
oriented extension.
Java does not provide the access to the pointers.
General Style
In order to write a program in Java, one has to follow the well-defined structure
of the Java program and should have the basic idea of all the programming
constructs like statements, tokens, etc.
Following points are to be noted:
Java is case-sensitive language.
In Java, uppercase and lowercase letters are not the same.
Java is freeform language.
Freeform means that one need not have to indent any lines to make the
program work properly, but it is good practice to use indent to make the
program readable.
20
2.5 JSP
Java Server Pages (JSP) is a technology that helps software
developers create dynamically generated web pages based on HTML, XML, or
other document types. Released in 1999 by Sun Microsystems and JSP is
similar to PHP, but it uses the Java programming language.
Java Server Pages (JSP) technology provides a simplified, fast way to create
dynamic web content. JSP technology enables rapid development of web-based
applications that are server- and platform-independent. The JSP Standard Tag
Library (JSTL) is a collection of tag libraries that implement general-purpose
functionality common to many Web applications.
The focus of Java EE 5 has been ease of development by making use of Java
language annotations that were introduced by J2SE 5.0. JSP 2.1 supports this
goal by defining annotations for dependency injection on JSP tag handlers and
context listeners.
To deploy and run Java Server Pages, a compatible web server with a servlet
container, such as Apache Tomcat or Glass Fish is required.
21
Overview:
Architecturally, JSP may be viewed as a high-level abstraction of Java
servlets. JSPs are translated into servlets at runtime; each JSP's servlet is
cached and re-used until the original JSP is modified.
JSP can be used independently or as the view component of a server-
side model–view–controller design, normally with JavaBeans as the
model and Java servlets (or a framework such as Apache Struts) as the
controller. This is a type of Model 2 architecture.
JSP allows Java code and certain pre-defined actions to be interleaved
with static web markup content, with the resulting page being compiled
and executed on the server to deliver a document. The compiled pages, as
well as any dependent Java libraries, use Java byte-code rather than a
native software format. Like any other Java program, they must be
executed within a Java virtual machine (JVM) that integrates with the
server's host operating system to provide an abstract platform-neutral
environment.
JSP pages are usually used to deliver HTML and XML documents, but
through the use of Output-Stream, they can deliver other types of data as
well.
Syntax:
22
JSP pages use several delimiters for scripting functions. The most basic
is <% ... %>, which encloses a JSP scriptlet. A scriptlet is a fragment of
Java code that is run when the user requests the page. Other common
delimiters include <%= ... %> for expressions, where the value of the
expression is placed into the page delivered to the user, and directives,
denoted with <%@ ... %>.
Java code is not required to be complete or self-contained within its
scriptlet element block, but can straddle markup content providing the
page as a whole is syntactically correct. For example, any Java
if/for/while blocks opened in one scriptlet element must be correctly
closed in a later element for the page to successfully compile. Markup
which falls inside a split block of code is subject to that code, so markup
inside an if block will only appear in the output when the if condition
evaluates to true; likewise, markup inside a loop construct may appear
multiple times in the output depending upon how many times the loop
body runs.
The following would be a valid for loop in a JSP page:
<p>Counting to three:</p>
<% for (int i=1; i<4; i++) { %>
<p>This number is <%= i %>.</p>
<% } %>
The output displayed in the user's web browser would be:
Counting to three:
23
This number is 1.
This number is 2.
This number is 3.
Compiler
A Java Server Pages compiler is a program that parses JSPs, and
transforms them into executable Java Servlets. A program of this type is
usually embedded into the application server and run automatically the
first time a JSP is accessed, but pages may also be precompiled for better
performance, or compiled as a part of the build process to test for errors.
Some JSP containers support configuring how often the container checks
JSP file timestamps to see whether the page has changed. Typically, this
timestamp would be set to a short interval (perhaps seconds)
during software development, and a longer interval (perhaps minutes, or
even never) for a deployed Web application.
2.6 JSF(Java Server Faces )
24
Java Server Faces (JSF) is a Java-based Web application
framework intended to simplify development integration of web-based user
interfaces.
JSF is serverbased, e.g. the JSF UI components and their state are
represented on the server with a defined life-cycle of the UI components.
JSF is part of the Java EE standard.
A JSF application run in a standard web container, for
example Tomcat or Jetty.
This articles provides an introduction to JSF using only standard JSF
features. For the usage of special Apache Trinidad features please
see Apache Myfaces Trinidad with Eclipse - Tutorial .
JSF Application:
A JSF application consists of web pages with JSF UI components. A JSF
application requires also some configuration files ("faces-config.xml" and
"web.xml").
The faces-config.xml defines:
25
Managed Bean - the data elements of the JSF application (managed beans
and backing beans) represents a Java class which will be created
dynamically during runtime of the JSF application. It can be defined for
which scope the bean is valid (Session, Request, Application or none).
the navigation between web pages
data validators - Used to check the validity of UI input
data converters -Used to translate between UI and model
Managed beans are simple Java objects (POJO's) which are declared in
"faces-config.xml" and can be used in an JSF application. For example you
can define a Java object "Person". Once you define the object in faces-
config.xml you can use the attributes of Person in your JSF UI components,
e.g. by binding the value "firstName" of this object to an JSF input field.
JSF uses the Unified Expression Language (EL) to bind UI components to
object attributes or methods.
Value and Method Binding
In JSF you can access the values of a managed bean via value binding. For
value binding the universal Expression Language (EL) is used (to access
bean and / or methods). In JSF you do not need to specify the get() or set()
method but just the variable name.
Method binding can be used to bind a JSF component, e.g. a button to an
method of a Java class.
26
Expression Language statements either start with "${" or with "#{" and end
with "}". JSP EL expressions are using the ${...} syntax. These EL
expressions are immediately evaluated. JSF EL expressions are of the type
#{...}. These are only evaluated when needed (and otherwise stored as
strings).
Prerequisites to use JSF: JSF Implementation (in the form of the JSF jars)
The JSTL tags library
A Java runtime environment
A web-container to use JSF in (for example Tomcat)
JSF Main features
JSP has the following main features:
JSP is based on the Model-View-Controller concept
JSP has a stateful UI component model, e.g. each component is aware of
its data
JSF separates the functionality of a component from the display of the
component. The renderer is responsible of displaying the component for a
certain client. This renderer can get exchanged. The standard renderer for
JSF components is the HTML renderer.
27
JSP support listeners on UI components
JSP support data validation, data binding and data conversion between
the UI and the model
3. Introduction to Microsoft access.
Database
A database is a tool for collecting and organizing information. Databases
can store information about people, products, orders, or anything else.
Many databases start as a list in a word-processing program or
spreadsheet. As the list grows bigger, redundancies and inconsistencies
begin to appear in the data. The data becomes hard to understand in list
form, and there are limited ways of searching or pulling subsets of data
out for review. Once these problems start to appear, it's a good idea to
transfer the data to a database created by a database management system
(DBMS), such as Office Access 2007.
A computerized database is a container of objects. One database can
contain more than one table. For example, an inventory tracking system
that uses three tables is not three databases, but one database that contains
three tables. Unless it has been specifically designed to use data or code
from another source, an Access database stores its tables in a single file,
along with other objects, such as forms, reports, macros, and modules.
28
Databases created in the Access 2007 format have the file
extension .accdb, and databases created in earlier Access formats have the
file extension .mdb. You can use Access 2007 to create files in earlier file
formats (for example, Access 2000 and Access 2002-2003).
Using Access, you can:
Add new data to a database, such as a new item in an inventory
Edit existing data in the database, such as changing the current
location of an item
Delete information, perhaps if an item is sold or discarded
Organize and view the data in different ways
The parts of an Access database
Tables
Forms
Reports
Queries
Macros
Modules
29
Creating New, and Opening Existing Databases Create a New Database from scratch
Use the wizard to create a New Database
Open an existing database
o The white box gives you the most recent databases you have used.
If you do not see the one you had created, choose the More Files
option and hit OK. Otherwise choose the database you had
previously used and click OK.
Create a database using the Database Wizard
1. When Microsoft Access first starts up, a dialog box is automatically
displayed with options to create a new database or open an existing one.
If this dialog box is displayed, click Access Database Wizards, pages,
and projects and then click OK.
If you have already opened a database or closed the dialog box that
displays when Microsoft Access starts up, click New Database on the
toolbar.
2. On the Databases tab, double-click the icon for the kind of database you
want to create.
30
3. Specify a name and location for the database.
4. Click Create to start defining your new database
Create a database without using the Database Wizard
1. When Microsoft Access first starts up, a dialog box is automatically
displayed with options to create a new database or open an existing one.
If this dialog box is displayed, click Blank Access Database, and then
click OK.
If you have already opened a database or closed the dialog box that
displays when Microsoft Access starts up, click New Database on the
toolbar, and then double-click the Blank Database icon on the General
tab.
2. Specify a name and location for the database and click Create.
31
32
Tables
A database table is similar in appearance to a spreadsheet, in that data is
stored in rows and columns. As a result, it is usually quite easy to import
a spreadsheet into a database table. The main difference between storing
your data in a spreadsheet and storing it in a database is in how the data is
organized.
To get the most flexibility out of a database, the data needs to be
organized into tables so that redundancies don't occur. For example, if
you're storing information about employees, each employee should only
need to be entered once in a table that is set up just to hold employee
data. Data about products will be stored in its own table, and data about
branch offices will be stored in another table. This process is called
normalization.
Each row in a table is referred to as a record. Records are where the
individual pieces of information are stored. Each record consists of one or
more fields. Fields correspond to the columns in the table. For example,
you might have a table named "Employees" where each record (row)
contains information about a different employee, and each field (column)
contains a different type of information, such as first name, last name,
address, and so on. Fields must be designated as a certain data type,
whether it's text, date or time, number, or some other type.
Another way to describe records and fields is to visualize a library's old-
style card catalog. Each card in the cabinet corresponds to a record in the
database. Each piece of information on an individual card (author, title,
and so on) corresponds to a field in the database.
33
Create a Table from scratch in Design view 1. If you haven't already done so, switch to the Database Window You can
press F11 to switch to the Database window from any other window.
2. Double-Click on "Create table in Design view".
(DESIGN VIEW)
3. Define each of the fields in your table.
o Under the Field Name column, enter the categories of your table.
o Under Data Type column, enter the type you want for you
categories.
The attribute of a variable or field that determines what kind
of data it can hold. For example, in a Microsoft Access
database, the Text and Memo field data types allow the field
to store either text or numbers, but the Number data type will
allow the field to store numbers only. Number data type
fields store numerical data that will be used in mathematical
calculations. Use the Currency data type to display or
calculate currency values. Other data types are Date/Time,
Yes/No, Auto Number, and OLE object (Picture).
o Under the Description column, enter the text that describes what
you field is. (This field is optional).
Primary Key
One or more fields (columns) whose value or values uniquely identify
each record in a table. A primary key does not allow Null values and
must always have a unique value. A primary key is used to relate a table
to foreign keys in other tables.
34
4. Java – JDBC
JDBC stands for "Java Database Connectivity". It is an API (Application
Programming Interface) which consists of a set of Java classes, interfaces
and exceptions and a specification to which both JDBC driver vendors and
JDBC developers adhere when developing applications.
4.1 JDBC Architecture
The JDBC API supports both two-tier and three-tier processing models for
database access.
1.Two-tier Architecture for Data Access.
35
In the two-tier model, a Java application talks directly to the data source.
This requires a JDBC driver that can communicate with the particular data
source being accessed. A user's commands are delivered to the database or
other data source, and the results of those statements are sent back to the
user. The data source may be located on another machine to which the
user is connected via a network. This is referred to as a client/server
configuration, with the user's machine as the client, and the machine
housing the data source as the server.
2.Three-tier Architecture for Data Access.
In the three-tier model, commands are sent to a "middle tier" of services,
which then sends the commands to the data source. The data source
processes the commands and sends the results back to the middle tier,
which then sends them to the user. MIS directors find the three-tier model
very attractive because the middle tier makes it possible to maintain
control over access and the kinds of updates that can be made to corporate
data. Another advantage is that it simplifies the deployment of
applications. Finally, in many cases, the three-tier architecture can provide
performance advantages.
36
5. PROJECT
INDUSTRIAL MANPOWER RESOURCE ORGANIZER(IMPRO)
5.1 Introduction:
Every Organization has many managers, who are responsible for all
the activities in the organization. These managers manage different
aspects of the organizational management issues, such as
manufacturing, production, marketing, etc.; one such essential
management issue is IMPRO.
As years progressed, the approach of the management changed
towards the human capital. Now Hierarchical Organization is part of
every organization, and has its own identity and importance. In this
scenario, the bigger organizations need to put lot of effort in the
management of human Resources, as they are underlying capital asset
to the organization. In doing so, along with times, the Organization
Information changed from its basic operations to more strategic
approach.
37
5.2 Objective:
The objective behind developing IMPRO (Industrial Manpower Resource
Organizer) is to maintain the hierarchy of the employee’s within an
organization. It provides the manger and administrative department an
overall hierarchical view of the complete enterprise and helps them in
managing employees.
5.3 Features:
1. Maintenance of profile details of the employees and retrievals as and
when required.
2. Overall detailed view of the organization hierarchy which is very much
essential in making effective decisions.
3. Maintenance of the data when the organization has many branches spread
over wide geographical area.
4. Accessing one branch information from another branch.
5. Accessing one department information from another branch.
6. Vacancy situations and their priority /effect on the organizations
performance.
7. Job Rotation.
8. Assigning Designation.
38
5.4 Software and Hardware Specifications
Hardware Specification
Processor : Intel Core i3, i5 or i7 CPU
RAM : 2 GB
Hard disk : 250 GB
Mouse : 3 Button scroll
Keyboard : 108 keys
Software Specification
Operating System : Windows 2000/XP/Vista/7
Front End : JAVA
Platform : J2EE
Web Servers : GlassFish Server 3.1.2
Backend : Microsoft Access
Browser Program : Mozilla Firefox, Google Chrome
39
5.5 Limitations of Manual System:
The various limitations of manual system are given below:
1.) Data Duplication: The same data gets repeated over and over since the
workers find it hard to keep track of the documents, information and
transactions.
2.) Lack of Security: Since data is stored in filing cabinets it is freely
available to anyone. If information falls into the wrong hands it can be used
against the company and customers and can blackmail them.
3.) Common Errors: When entering data customers might have accidentally
switched details and data since it is hand written.
4.) Inconsistency of Data: There will be unavailability for future use, since
data might get misplaced during manual filing.so data won’t be preserved
properly for future use.
5.) Repetition of work: If there are any changes to be made, the data will
have to be entered again.at times the worker would forget to make the
changes or forget that they had already altered it and might redo it again, its
again time consuming.
40
6.) Too much paper work: Since everything and every detail is written
down manually in paper there will be too much paper work.
7.) Space consuming: Since the data and paper is stored in filing cabinets it
consumes too much place, as the amount of work done on paper increases
the filing cabinets too increases.
8.) Slow retrieval of Data: The information of customers and details are
stored in different parts of the site and so takes a long time to retrieve the
data.it takes a long time to find the information about a relevant person.in
case of a Delivery, the delivery will be held back. This results in a sharp
drop in sales, unhappy customers and a bad impression on the company.
5.6 Objectives of Computerised System:
The various objectives of computerized system are given below:
1.)Speed: They understand the importance of timing, of getting there before
the competition. A rich portfolio of reusable, modular frameworks helps jump-
start projects. Tried and tested methodology ensures that we follow a
predictable, low - risk path to achieve results. Our track record is testimony to
complex projects delivered within and evens before schedule.
2.)Expertise: Our teams combine cutting edge technology skills with rich
domain expertise. What’s equally important - they share a strong customer
orientation that means they actually start by listening to the customer. They’re
41
focused on coming up with solutions that serve customer requirements today
and anticipate future needs.
3.) A full service portfolio: They offer customers the advantage of being able to
Architect, integrate and manage technology services. This means that they
can rely on one, fully accountable source instead of trying to integrate
disparate multi-vendor solutions.
5.7 Number of Modules
The system after careful analysis has been identified to be presented with the
following modules:
Guest
Administrator
Employee.
Web Registration.
Report.
Authentication.
42
5.8 Module Description:
Guest:
1. He can view the profile of the company.
2. He can view the department wise vacancies.
3. He can apply for the vacancies.
4. He can send his queries to the company.
5. He can view the news updates of the company.
Administrator:
Administrator is treated as the super user in this system.
1. He manages the profile of the company.
2. He manages all the branches of the company.
3. He manages all the departments of various branches.
4. He manages vacancies in various branches.
5. He manages the profiles of all the employees in the company.
6. He can update the profiles of the employees.
7. He updates the news related with the company.
43
Employee:
1. He has to login with username and password provided by the
administrator.
2. He can view his profile.
3. He can update his profile.
Web Registration:
The system has a process of registration. Every User need to submit his
complete details in the form of registration. Whenever a User registration
completed automatically he/she can get a user id and password. By using
that user id and password he/she can log into the system.
Reports:
Different kind of reports is generated by the system which is given below:
1. Branch Report
2. Employee Report
3. Vacancy Report.
4. Department Report.
Authentication:
44
Authentication is nothing but providing security to the system. Here
every must enter into the system throw login page. The login page will
restrict the unauthorized users. A user must provide his credential like
user Id and password for log into the system. For that the system
maintains data for all users. Whenever a user enters his user id and
password, it checks in the database for user existence. If the user is exists
he can be treated as a valid user. Otherwise the request will throw back.
45
5.9 Data flow Diagram:
A dataflow diagram (DFD) is a significant modeling technique for
analyzing and constructing information processes. DFD literally
means an illustration that explains the course or movement of
information in a process. DFD illustrates this flow of information in a
process based on the inputs and outputs. ADFD can be referred to a
Process Model.
Additionally, a DFD can be utilized to visualize data processing or a
structured design. A DFD illustrates technical or business processes
with the help of the external data stored, the data flowing from
process to another and the results.
A designer usually draws a context level DFD showing the relationship
between the entities inside and outside of a system as one single step. This
basic DFD can be disintegrated to a lower level diagram demonstrating
similar steps exhibiting details of the system that is being modeled.
Numerous levels may be required to explain a complicated system.
Therefore, the principle for creating a DFD is that one system may be
disintegrated into subsystems, which in turn can be disintegrated into
subsystems at a much lower level, and so on and so forth. Every subsystem
in a DFD represents a process. In this process are activity the input data is
processed. Processes cannot be decomposed after reaching a certain lower
level. Each process in DFD characterizes an entire system. In a DFD
system, data is introduced into the system from the external environment.
Once entered the data flows between processes. And then processed data is
produced as an output or a result.
46
DFD Symbols:
In the DFD, there are four symbols:
1.A square defines a source (originator) or destinations of the system
data
2.An arrow identifies data flow. It is the pipeline through which the
information flows
3. A circle or a bubble represents a process that transforms incoming
data flow into outgoing data flows.
4. An open rectangle is a data store, data at rest or a temporary
repository of data.
47
DFD’s Of IMPRO:
Top Level DFD:
48
Login DFD
Admin Home Page:
49
Employee Home Page:
50
5.10 System Design:
The Hierarchical Organization Information software has been
modularized into following modules:
Branches
Departments
Employee
Vacancy
Profiles
Test Rounds
View Reports
Payroll
5.11 System Description:
51
Home Page of guest
Home Page of Admin:
52
Admin is the super User.
He manages the profile of the company.
53
Home Page of employee:
Employee can update his profile.
He can register in the company.
He view the vacancies, departments and branches of the company.
Branches:
54
Branches represent various centres of the organisation across the world.
These are further divided into:
Add Branches: New branches can be added in the database.
Modify Branches: Branches can be modified.
View Branches: All the branches of the organisation can be
viewed.
Delete Branches: Any branch can be removed from database.
A new Branch of the Organisation has been added to the database.
55
Branches of the organisation are viewed.
56
Departments:
These are further divided into:
Add Department: New departmentss can be added in the database.
Modify Department: Departments can be modified.
View Departments: All the departments in various branches can be
viewed.
Delete Department: Any department can be removed from
database.
Assign Department: Departments are assigned to the new
employees
Which are recruited in the organisation.
57
A new Department has been added to the database
58
A Department has been removed from the database
59
Departments in various branches
60
Employee:
These are further divided into:
Employee Registration: New Employees register in the
organisation.
Update Registration: The details of the employees can be updated.
Update Password: The Employees can update their password.
List of all employees: All the employees in the organisation can be
viewed.
Present status of employees: Information regarding their present
branch, department and designation can be viewed.
Sign Up new employees: Admin provides password to the new
employees. Employees can login with the password provided to
them.
Mark Attendance: Attendance of employees is marked.
Leave Status: Information is provided about the employees which
are on leave.
61
New Employee registered in the organisation.
62
List of all employees in the organisation.
63
Attendance of an employee marked
64
Leave Status of an employee
65
Vacancy:
This is further divided into:
Add Vacancy: New vacancies can be created.
ModifyVacancy: Vacancies can be modified.
View Vacancy: All the vacancies in various branches can be
viewed.
Delete Vacancy: Vacancies which have been filled can be
removed.
New Vacancy added.
66
List of Vacancies
67
Profiles:
This is further divided into:
Application: Applicants can apply for various vacancies.
Job Rotation: Employees can be transferred from one branch to
another branch/departments of the employees can be changed.
Update Job Rotation
Assign Designation: Employees can be promoted/demoted.
Update Designation
Employee transferred from one department to another.
68
Applicant applying for a vacancy
69
Test Rounds:
Represents the recruitment process of the organisation. It consists of
three stages: Written Round, Technical Round, HR Round.
This is further divided into:
Applicant Tests: New tests for various vacancies can be created.
Written Round: Result of Written Test is updated. Applicants
which clear the Written test move to the Technical Interview.
Technical Round: Result of Technical Interview is updated.
Applicants which clear the Technical Round move to the HR
Interview.
HR Round: Result of HR Interview is updated.
Selected Candidates List: Applicants which clear theHR interview
are recruited in the organisation.
View Reports:
This is further divided into:
Employee: All the employees in the organisation can be viewed.
Branches: The various centres of the organisation can be viewed.
Departments: All the departments in various branches can be
viewed.
Vacancy: Vacancies created in the organisation can be viewed.
70
Payroll:
Payroll helps in determining the salary details of all the employees and
other agreement related information.
Agreement: The information regarding the salary of various
employees can be recorded in the database.
Salary Detail: The salary detail of all the employees in the
organisation can be viewed.
About Us:
All the information about organisation is provided on this page.
Enquiry:
All the applicants can send their queries to the organisation.
71
Contact Us:
DEOL TOWER , 745/1,Opp. HDFC Bank
LUDHIANA (141001)
Tel:0161-2403654,2404193
Mobile: 9988299002
Email: [email protected]
72
6.BIBLIOGRAPHY AND REFRENCES
List of websites:
http://www.wikipedia.org/
http:// www.google.com
http:// www.java.sun.com
http://www.roseindia.net/
Books:
The Complete Reference Java 2 by Herbert Schildt.
Java Server Programming Java EE5 (Black Book) by Kogent Learning
Solutions Inc.
73