jobportal documentation

Upload: fcmitc

Post on 12-Oct-2015

135 views

Category:

Documents


0 download

TRANSCRIPT

Online job Recruitment

Online job Recruitment

1.INTRODUCTION1.1 PROJECT OVERVIEW Online job recruitment is a web application built in php. It provides the candidates ability to register to this application and search for jobs, manage their accounts. Each candidate their own account with their own home page.

On the other hand companies that are willing to publish the jobs for their company to candidates can register to the job portal and get their own account created and can post jobs to portals database .

Registered companies can add or remove jobs and these jobs can be seen by various candidates and they can contact the company person for the job. Main aim of this web application is to make a good web application that can make this job search option easy and accessible to everyone who are interested.MODULES Admin module Employer module Jobseeker module Admin module Enter new jobs Update latest news about job Approve the employer Approve the jobseeker View the details of jobseeker and employees

Employer module View and update profile Insert jobs and the details Add the details of interview Job updation Delete existing date of interview

Jobseeker module View the profile Search the new jobs Apply for a job Post the feedback of the site Add the qualification

1.2 ABOUT THE ORGANISATION Teena computers is a global innovation, technology and services company focused mainly on communications. Teena is the strategic supplier for the worlds most innovative applications and develops software for a variety of global needs. Path has been set for application development for telecom service providers and handset manufactures for state of the art technological enhancements for mobile devices. Teenas unique engagement model blends strategy, design, technology and engineering services, delivering exceptional value across each phase of the product and service lifecycle. Through a seamless combination of strategy consulting, design, licensable technology, software development, integration and support services, Teena helps technology and communications-oriented companies create highly differentiated products, services and business models. Teena family is committed to co-create with the customers to meet the business objectives and on-time delivery. The messaging gateways developed by Teena attained wider market demands from the service providers and the service industries because it effectively reduces the traffic in the network and a good revenue assurance for both the ends. By creating the best in-class solutions that enable critical business initiatives, Teena cohort with the clients to create an infrastructure that supports customer specific unique requirements and facilitating the customers to creatively collaborate in new ways, and to eliminate boundaries. Using industry-leading solutions, Teena focuses on helping business to migrate voice, video, and data over different network. The wide spectrum of services Teena offer include application software development for various hand-held devices like mobile phone, PDA etc, data migration over different network, embedded applications for different processing capabilities etc. and passionate towards the messaging gateways and IM tools...

2.SYSTEM STUDY AND ANALYSIS System study is the major aspect of software development. A detailed study of the process must be made by various techniques like interviews, Questioners etc. the data collected by these sources must be scrutinized to arrive to a conclusion. The conclusion is an understanding of how the system functions. This system is called existing system. Now the existing system is subjected to close study and problem areas are identified. The designer now functions as a problem solver and tries to sort outbthe difficulties that the enterprise faces. The solutions are given as proposals. The proposal is then weighed with the existing system analytically and the best one is selected. The proposal is presented to the user for an endorsement by the user. The proposal is reviewed on user request and suitable changes are made. This is looped at ends as soon as the user is satisfied the proposal. Preliminary study is the process of gathering and interpreting fax, using the information for further studies on the system. Preliminary study is problem solving activity that requires intensive communication between the system users and system developers. It does various feasibility studies. In these studies a rough figure of the system activities can be obtained, from which the decisions about the strategies to be followed for effective system study and analyses can be taken. System analysis is a process of gathering and interpreting facts, diagnosing problems and the information to recommend improvements on the system. It is a problem solving activity that requires intensive communication between the system users and system developers. System analyses or study is an important phase of any system development process. The system is studied to the minutest detail and analyzed. The system analyst plays the role of the interrogator and dwells deep into the working of the present system. The system is viewed as a whole and the input to the system are identified. The outputs from the organization are traced to the various processes. The system analyses is concerned with becoming aware of the problem, identifying the relevant and decisional variables, analyzing synthesizing the various factors and determining and optimal or at leased a satisfactory solution or program or action.

2.1 EXISTING SYSTEM The current system is manual. There is no software is created for the recruitment agency for enter; view the details of applicants and jobs. Now, if a client wants to apply for a job he will get the complete details of jobs with the details of company. 2.1.1 LIMITATIONS OF EXISTING SYSTEM It is highly time consuming Greater work load. It is very slow. Cost is very high. Accuracy is missing.2.2 PROPOSED SYSTEM The proposed system has a number of advantages over the existing system. First of all it is very user friendly. So the user can easily understand how to handle the software. It deals with the jb applications and jobs. The clerk can register the new job seeker a, this software provide the facility to know the details of his jobs , ranklist etc. This software gives the complete details about the charge of various jobss. The proposed system has a number of advantages: 2.2.2 ADVANTAGES OF PROPOSED SYSTEM Reduce the manual effort considerably. Easily understandable. List of available courses, fees details, duration etc. understood. Corruption can be minimized. It increases efficiency, speed and accuracy. It reduces the cost. It reduces a lot of paper wastes thereby saving time and money.

2.3FEASIBILITY STUDY Feasibility study is the process of determination of whether or not a project is worth doing. Feasibility studies are undertaken within tight time constraints and normally culminate in a written and oral feasibility report. The contents and recommendations of this feasibility study helped us as a sound basis for deciding how to precede the project. It helped in taking decisions such as which software to use, hardware combinations, etc. The following is the process diagram for feasibility analysis. In the diagram, the feasibility analysis starts with the user set of requirements. With this, the existing system is also observed. The next step is to check for the deficiencies in the existing system. By evaluating the above points a fresh idea is conceived to define and quantify the required goals. Besides that, a set of alternatives and their feasibility is also considered in case of any failure in the proposed system. Thus, feasibility study is an important part in software development.Technical Feasibility : Technical feasibility determines whether the work for the project can be done with the existing equipment, software technology and available personnel. Technical feasibility is concerned with specifying equipment and software that will satisfy the user requirement.This project is feasible on technical remarks also, as the proposed system is more beneficiary in terms of having a sound proof system with new technical components installed on the system. The proposed system can run on any machines supporting Windows and Internet services and works on the best software and hardware that had been used while designing the system so it would be feasible in all technical terms of feasibility. The technologies such as JAVA (JSP, Servlet), JavaScript and the compatible H/Ws are so familiar with the todays knowledge based industry that anyone can easily be compatible to the proposed environment. Economical Feasibility : Economical feasibility determines whether there are sufficient benefits in creating to make the cost acceptable, or is the cost of the system too high. As this signifies cost benefit analysis and savings. On the behalf of the cost-benefit analysis, the proposed system is feasible and is economical regarding its pre-assumed cost for making a system. During the economical feasibility test we maintained the balance between the Operational and Economical feasibilities, as the two were the conflicting.

Behavioral feasibility: People are inherently resistant to change and computers have been known to facilitate change. There is always some reluctance among the users against the introduction of new system but they were told that this system would eliminate the unnecessary overhead of database migration and conversion, which presently had to be carried out on daily basis to facilitate transactions between the different departments. The objective this feasibility phase is to take the operational staff into confidence. As the success of a good system depends upon the willingness of the operating staff, they were taken into full confidence that the new proposed system would make their jobs easier, relieve them from the unnecessary overheads and reduce the possibility of errors creeping into the system.2.4PROCESSING ENVIRoNMENT2.4.1HARDWARE REQUIREMENTS Platform : PC Processor : Pentium IV Processor Speed : 1.8 GHz and Above Cache Memory : 512 MB DDRAM or More Hard disk memory : 160 GB HDD Keyboard : standard keyboard

2.4.2 SOFTWARE REQUIREMENTS Front end : PHP Back end : MySQL Database Server 5.1.37Web Server : Tomcat 7.0.14 Application Server : Apache v3.1 Operating System : Windows 7 / Vista / XP sp3 / Linux Fedora 14

2.6 SOFTWARE DESCRIPTIONS PHP PHP is a server-side scripting language designed for web development but also used as a general purpose programming language. It is an object oriented programming language. PHP stands for Hyper text pre processor PHP code is interpreted by a web server with a PHP processor module which generates the resulting web page.PHP is free software released under the PHP license, which is incompletable with the GNU general public license( GPL).Restrictions on the usage of the term PHP, PHP can be deployed one most web servers and also as a standalone shell on almost every operating system and platform ,free of charge.Advantages of PHP Open Source Simple and easy to learn Support for both Structural and object oriented programming. PHP can used on all major operating systems, including linux,many unix,varients ,Microsoft windows,mac OS X,RISC OS ,and probably others. PHP has also support for most of the webserver today. This include appache microsoft internet information server, personal web server, netscape and Iplant servers. Powerful built in function PHP can plug in with most of the database .It support with MYSQL ,MSSQL,ORACLE,dbaseSQLlite etc.Language features HTML HTML is a language for describing web pages. HTML stands for Hyper Text Markup Language HTML is not a programming language, it is a markup language A markup language is a set of markup tags HTML uses markup tags to describe web pages HTML markup tags are usually called HTML tags HTML tags are keywords surrounded by angle brackets like HTML tags normally come in pairs like and The first tag in a pair is the start tag, the second tag is the end tag Start and end tags are also called opening tags and closing tags.HTML Documents HTML documents describe web pages HTML documents contain HTML tags and plain text HTML documents are also called web pages

CSS A few words about CSS CSS stands for Cascading Style Sheets Styles define how to display HTML elements Styles are normally stored in Style Sheets Styles were added to HTML 4.0 to solve a problem External Style Sheets can save you a lot of work External Style Sheets are stored in CSS files Multiple style definitions will cascade into one CSS provides means to customize inbuilt HTML tags HTML tags were originally designed to define the content of a document. They were supposed to say "This is a header", "This is a paragraph", "This is a table", by using tags like , , , and so on. The layout of the document was supposed to be taken care of by the browser, without using any formatting tags. As the two major browsers - Netscape and Internet Explorer - continued to add new HTML tags and attributes (like the tag and the color attribute) to the original HTML specification, it became more and more difficult to create Web sites where the content of HTML documents was clearly separated from the document's presentation layout. To solve this problem, the World Wide Web Consortium (W3C) - the non profit, standard setting consortium, responsible for standardizing HTML - created STYLES in addition to HTML 4.0. All major browsers support Cascading Style Sheets.Styles sheets define HOW HTML elements are to be displayed, just like the font tag and the color attribute in HTML 3.2. Styles are normally saved in external .css files. External style sheets enable you to change the appearance and layout of all the pages in your Web, just by editing one single CSS document.

JavaScript JavaScript is used in millions of Web pages to improve the design, validate forms, detect browsers, create cookies, and much more. JavaScript is the most popular scripting language on the internet, and works in all major browsers, such as Internet Explorer, Firefox, and Opera. A few words about JavaScript JavaScript was designed to add interactivity to HTML pages JavaScript is a scripting language A scripting language is a lightweight programming language JavaScript is usually embedded directly into HTML pages JavaScript is an interpreted language (means that scripts execute without preliminary compilation) Everyone can use JavaScript without purchasing a license Purpose of using JavaScript JavaScript gives HTML designers a programming tool - HTML authors are normally not programmers, but JavaScript is a scripting language with a very simple syntax! Almost anyone can put small "snippets" of code into their HTML pages JavaScript can put dynamic text into an HTML page - A JavaScript statement like this: document.write("" + name + "") can write a variable text into an HTML page JavaScript can react to events - A JavaScript can be set to execute when something happens, like when a page has finished loading or when a user clicks on an HTML element JavaScript can read and write HTML elements - A JavaScript can read and change the content of an HTML element JavaScript can be used to validate data - A JavaScript can be used to validate form data before it is submitted to a server. This saves the server from extra processing JavaScript can be used to detect the visitor's browser - A JavaScript can be used to detect the visitor's browser, and - depending on the browser - load another page specifically designed for that browser JavaScript can be used to create cookies - A JavaScript can be used to store and retrieve information on the visitor's computer Where to Put the JavaScriptScripts in the head section: Scripts to be executed when they are called, or when an event is triggered, go in the head section. When you place a script in the head section, you will ensure that the script is loaded before anyone uses it.Scripts in the body section: Scripts to be executed when the page loads go in the body section. When you place a script in the body section it generates the content of the page.Using an External JavaScript: When you might want to run the same JavaScript on several pages, without having to write the same script on every page, then you can write a JavaScript in an external file. Save the external JavaScript file with a .js file extension. The external script cannot contain the tag. To use the external script, point to the J1.js file in the "src" attribute of the tag:

3. SYSTEM DESIGN After the analysis phase we have with us the details of the existing system and the requirements of the user for the new system. This phase diverts focus from the problem domain to the solution domain. It acts as a bridge between the requirement phase and its solution. The design phase focuses on the detailed implementation of the system recommended in the feasibility study. Systems design is the process or art of defining the architecture, components, modules, interfaces, and data for a system to satisfy specified requirements. There is some overlap with the disciplines of systems analysis, systems architecture and systems engineering. Object-oriented analysis and design (OOAD) methods are becoming the most widely used methods for computer system design. The UML has become the standard language used in Object-oriented analysis and design. It is widely used for modeling software systems and is increasingly used for high designing non-software systems and organizations.System design has two phases: Logical Physical The logical design reviews the present physical system, prepares the input and output and also prepares a logical design walk-through. We have to deal with how to take entries required and whether and how to process the user data. This design also involves the methodology to store, modify and retrieve data from the data base as per the requirement. Physical design maps out the details of the physical system, plans the system implementation. We have to decide how and where to store the input data and how to process it so as to present it to the user in an easy, informative and attractive manner. A major step in the design is the preparation of input and output report in a form acceptable to the user. In this a data entry operator can feed the relevant details asked by the system for particular task as input.

3.1 OUTPUT DESIGN One of the most important features of an information system for users is the output it produces. Output is the information delivered to users through information system. Computer is the most important source of information to the users. Output design is a process that involves designing necessary outputs that have to be used by various users according to requirement. Efficient intelligent output design should improve the system relationship with the user and help in decision making. Since the reports are directly required by the management for taking decision and to draw the conclusion must be simple, descriptive and clear to the user. The output design is an ongoing activity almost from the beginning of the project, and follows the principles of form design. The primary consideration in the design of the output is the requirement of the information of the objectives of the end user. A major form of output is a hardcopy from the printer, however softcopies are also available.

When analyst design computer output Identify the specific output that is needed to meet the information requirements. Select methods for presenting information. Create documents, report, or other formats that contain information produced by the system. Determine what information to present. Decide whether to display, print or speak the information and select the output. Arrange the presentation of information in an acceptable format. Design how to distribute the output to intend recipient.

The system output may be A report A document A message

Output contents originate from one or more of these sources: Retrieval from a data store. Transmission from a process or system activity. Directly from an input source. The output design should efficient intelligible so that system relationship with the end user is improved and thereby enhancing the process decision making. The contents of the output are then defined in detail of outputs.3.2 INPUT DESIGN Input design is the link between the information system and the users and those steps that are necessary to put transaction data into a usable form for processing data entry. The activity of putting data into the computer for processing can be activated by instructing the computer to read data from a written printed document or it can occur by keying data directly into the system. The designs of input focusing on controlling the amount of input required controlling the errors, avoid delay extra steps, and keeping the process simple. The design decisions for handling input specify how data are accepted for computer processing. Analyst decides whether the data are enters directly or by using source documents. The quality of the system describes the manner in which the data enter the system for processing. It ensures the reliability of the system and produce result for accurate data.Perspective guide the design of the input focus on Effectiveness Accuracy Ease of use Consistency Simplicity Attractiveness The nature of the input design is determined partially during logical system design. However the nature of the input is made more explicitly during the physical design. The impact of inputs of the system is also determined.

The proposed system satisfies the following input design objectives. A cost effective method of input. The highest possible level of accuracy. Input is acceptable to and understood by the user.

3.3 DATA BASE DESIGN Like other software engineering activities, data design (data architecting) creates a model of data and/or information that is represented in at a higher level of abstraction (the customer/users view of data). James Martin defines database as A collection of data designed to be used by different programs. It can also be defined as a collection of interrelated data stored together with controlled redundancy to serve one or more application in an optional fashion. A database is a collection of interrelated data stored with minimum redundancy to serve users more quickly and efficiently. The general theme behind a database is to handle information as an integrated whole. The general objective of a database is to make information access easy, quick, inexpensive, integrated and shared by different applications users. Applications or users can access data through the Data Base Management System (DBMS). The data is stored so that they are independent of the programs that use them. A controlled common approach is used in inserting new data, modifying and retrieving existing data within the database. The data within software that allows one or more person to use and/or modify this data is termed as Data Base Management System (DBMS).

A good database design does the following: Provide minimum search time when locating specific records. Stored data in the most efficient manner possible to keep the database from growing too large. Makes data update as easy as possible. Is flexible enough to allow inclusion of new functions required of the programs.

3.3.1 NormalizationThe process of refining the data model and creating with a database is called normalization. Database designers can implement several levels of normalization. Each level builds on previous levels by reducing the amount of redundancy between tables. This typically increases performance and avoids problems with data consistency.

Advantages of normalization are Help in reduction in the complexity of maintaining data integrity by removing the redundant data. It reduces inconsistency of data. Eliminate the repeating fields.

1. First normal form First normal form is the most basic level of the database normalization. The keys to creating tables in the 1NF: Eliminate repeating groups in individual tables. Create a separate table for each set of related data. Identify each set of related data with a primary key.

2. Second normal form The first normal form is not a good database design, but it is a start. The keys to creating tables in the 2NF Create separate tables for sets of values that apply to multiple records. Relate these tables with a foregin key. 3. Third normal form The third normal form is typically the last form that most database designers will normalize to. After 3NF, the number of relationships between tables becomes very large, and performance begins to decrease on the database server. The goal of the third normal form is to remove all data that does not depend on the primary key of a table.

TABLES1. Application_master Description: details of the application Primary key: applicationidForeign key:jobidColum name Data typeConstrainDescription

applicationidInt(11)Primary keyApplication id of the applicant

JobseekeridInt(11)Foreign keyjobseekid

JobidInt(11)Foreign keyjobid

StatusVarchar(30)Not nullstatus

DescriptionVarchar(200)Not nulldescription

2. Employer_regDescription: details of employerPrimary key: employer idColum name Data typeConstrainDescription

Employer idInt(11)Primery keyEmployer id of the employer

Company nameVarchar(20)Not nullName of the company

Contact personVarchar(20)Not nullContact person

AddressVarchar(100)Not nullAddress of the employer

CityVarchar(20)Not nullCity of the employer

EmailVarchar(40)Not nullEmail of the employer

Mobile numberbigint(20)Not nullMobile number of the employer

Area workVarchar(40)Not nullArea work

StatusVarchar(10)Not nullstatus

User nameVarchar(10)Not nullUser name of the employer

PasswordVarchar(20)Not nullPass word of the employer

QuestionVarchar(100)Not null

3.FeedbackDescription: Feedback of the companyForeign key:JobseekeridColum name Data typeConstrainDescription

FeedbackidInt(11)Not nullId of the employer

JobseekidInt(11)Not null

FeedbackVarchar(200)

Not null

FeedbackdatedateNot null

4.Jobseeker-Education Description: jobseeker-EducationPrimary key: EduldForeign key: Jobseekid

Colum name Data typeConstrainDescription

EduldInt(11)Primery keyEduid of the jobseeker

JobseekidInt(11)Foreign keyId of the jobseeker

DegreeVarchar(20)Not nullDegree of the jobseeker

UniversityVarchar(100)Not nulluniversity

Passing yearMediumint(9)Not nullPassing year

PercentageFloat

Not nullpercentage

5.Job_Master Description: details of the job masterPrimary key: JobidColum name Data typeConstrainDescription

JobidInt(11)Primery keyid

Company nameVarchar(20)Not nullCompany name

Job titleVarchar(50)Not nullJob title

VacancyInt(11)Not nullvacancy

MinqualificationVarchar(50)Not nullMinqualification

DescriptionVarchar(200)Not nullDescription

6.New_MasterDescription : news masterPrimary key :Newsid

Colum name Data typeConstrainDescription

NewsidInt(11)Primary keyNewsid

NewsVarchar(200)Not nullNews

News datedateNot nullNews date

7.Jobseeker_RegDescription: Registration of jobseekerPrimary key :JobseekeridColum name Data typeConstrainDescription

JobseekeridInt(11)Primary keyId of the employer

Jobseeker nameVarchar(20)Not nullJobseeker name

mobileBigint(20)Not nullContact person

AddressVarchar(100)Not nullAddress

CityVarchar(20)Not nullCity

EmailVarchar(40)Not nullEmail

ResumeVarchar(40)Not nullResume of the jobseeker

StatusVarchar(10)Not nullStatus

User nameVarchar(20)Not nullName of the user

PasswordVarchar(20)Not nullPassword

QuestionVarchar(100)Not nullQuestion

AnswerVarchar(50)Not nullAnswer

Qualification Varchar(10) Not null Qualification

Gender Varchar(6) Not null Gender

Birthdate Date Not nullBirth date of the jobseeker

8.User_MasterDescription: user masterPrimary key : Userid Colum nameData typeConstrainDescription

UseridInt(11)Primary keyId of the user

UsernamesVarchar(20)Not nullName of the user

PasswordVarchar(20)Not nullPassword of the user

9.Walkin_MasterDescription:walkin-masterPrimary key : Walkintid

Colum nameData typeConstrainDescription

WalkintidInt(11)Primary keyWalkintid

Company nameVarchar(20)Not nullCompany name

Job titleVarchar(50)Not nullJob title

VacancyInt(11)Not nullVacancy

Min qualificationVarchar(50)Not nullMin qualification

DescriptionVarchar(100)Not nullDescription

Interview datedateNot nullInterview date

Interview timetimeNot nullInterview time

3.4 DATA FLOW DIAGRAM Analysis model helps us to understand the relationship between different components in the system design. Analysis model shows the user clearly how a system will function. This is the first technical representation of a system. The analysis modeling must achieve three primary objectives: To establish a basis for creation of software design. To describe what the user requires. To define set of requirements that can be validated once the software is built. A dataflow diagram is a graphical technique that depicts information and transforms that are applied as data move from input to output. The DFD is used to represent increasing information flow and functional details. A level-0 DFD is also called a fundamental system model represents the entire software elements as a single bible with input and output indicated by incoming and outgoing arrows respectively. Additional process and information flow parts are represented in the next level, i.e., level 1 DFD. Each of the process represented at level 1 are sub functions of overall system depicted in the context model. Any processes that are complex in level 1 level will be further represented into sub functions in the next level, i.e., level 2. Data flow diagrams is a means of representing a system at any level of detail with a graphic network of symbols showing data flows, data stores, data process and data stores. The purpose of data flow diagram is to provide a semantic bridge between users and system developers. The diagram is graphical, eliminating thousands of words, logical representations, modeling what system does; hierarchical, showing systems at any level of details; and jargon less, allowing user understanding and reviewing.The goal of data flow diagramming is to have a commonly understood model of a system. The diagram is the basis of the structural analysis. Data flow diagrams are supported by other techniques of structured system analysis data structured diagram, data dictionaries and procedure representing techniques such as decision tables, decision tree and structured English.

Components of Data Flow Diagram There are only four symbols that are used in the drawing of data flow diagrams. These are explained below together with the rules that apply to them. External Entities

External entities represent the sources of data that enter the system or the recipients of data that leave the system. They can be duplicated, one or more times on the diagram to avoid line crossing. Process

Processes represent activities in which data is manipulated by being stored or retrieved or transformed in some way. A circle represents it. The process will show the data transformation or change. Data coming into a process must be worked-on or transformed in some way. Thus all process my have an input and output. Data Stores

Data stores represent stores of data within the system. Data stores may be long-term files such as sales ledgers, or may be short-term accumulations: For example batches of documents that are waiting to be processed. Each data store should be given a reference followed by an arbitrary number. Data Flow

A data flow shows the flow of information from its source to its destination. A line represents a data flow, with arrowheads showing the direction of flow. Information always flows to or from a process and may be written, verbal or electronic. Each data flow may be referenced by the processes or data stores at its head and tail, or by a description of its contents.

CONTEXT DIAGRAM ( Level 0)

Job RecruitmentAdminEmployerJobseekerAdminEmployerJobseekerResponseResponseResponseRequestRequestRequest

Level 1 of Admin

Level 1 of Employer

Level 2 of employer : Manage Walking

Level 1 of JobSeeker

3.5 SYSTEM FLOW CHART

3.6 STRUCTURE CHART

Search New JobsSearch New InterviewsPost feedbackView ProfileView Job seekers profileprView Job seekers ApplicationDelete interview datesUpdate JobUpdate Interview detailsInsert JobView ProfileView jobseekerView EmployerJob ApprovalUpdate NewsJob seeker ApprovalEmployer ApprovalJob seekerEmployerAdminOnline Job Recruitment

4. SYSTEM CODING The coding is the process that transforms design into a programming language. It translates a detailed design representation of software into a programming language realization. The translation process continues when a compiler aspects code as input and produces machine depended object code as input. Quality of source code can be improved by the users structure coding techniques: good coding style and readable, consistent code format. During coding, some coding standards are to be followed. this has two purposes: reducing the chance of making it easier for sometimes to modify the code later on. Coding phase affects both testing and maintains profoundly.Sample code:

Untitled Document

Untitled Document

Untitled Document

Untitled Document

5. SYSTEM TESTING Testing is the last stage of the software development before we release the product to the customer. Software testing is a critical element of software quality assurance and represents the ultimate review of specification, design and coding. Software testing can be looked upon as one among the many processes. Testing is the process of executing a program with the explicit intention of finding errors. Testing cannot show the absence of defects, it can only show that software defects are present. Software Testing TechniquesThe importance of testing and its impact on software cannot be underestimated. The greater visibility of software systems and the cost associated with the software failure are motivating factors for planning through testing. It is not uncommon for a software organization to spent 40% of its effort on testing.A number of rules that act as Testing Objectives are: Testing is a process of executing a program with the aim of finding errors. A good test case will have a good chance to find an undiscovered error. A successful test case uncovers a new error.

Need For Testing Testing is essential as Existence of program defects of inadequacies is inferred. Test the performance of the system. Verifies whether the software behaves as intended by its designer. Checks conformance with requirement specification/user needs. Assesses the operational reliability of the system. Reflects the frequency of actual user input.

Unit Testing

The first level testing is unit testing. Unit testing concentrates on each unit of the software as implemented in source code. Initially tests focus on each module individually, ensuring that it functions properly as a unit. The modules must then be assembled or integrated to form the complete software package.

There are tests that occur as part of unit testing. The module interfaces are tested to ensure that information properly flows into and out of a program under test. The data structures are also tested for integrity. Boundary conditions are tested to ensure that the module operates properly at boundaries established to limit or restrict processing. All independent paths through the control structures are exercised to ensure that all statements in a module have been executed at least once. Finally all error handling paths are tested.

In this project, after coding each module have been individually tested to determine whether they are coded correctly so that they satisfy the requirements in the specifications and execute effectively as individual units was tested and run individually. All unnecessary coding were removed and it was ensured that all modules worked, as programmer would expect. Logical errors found were corrected. So, by working all the modules independently and verifying the output of each module in the presence of staff concluded that the program was functioning as expected. Integration Testing

The next level of the testing is often called as Integration testing in which many tested modules are combined into sub-system, which are then tested. The output from the unit testing becomes the input to the integration testing. The goal here is to see if the modules can be integrated properly, the emphasis being on testing interfaces between modules. Modules in this software are combined and tested after the unit testing. After connecting all the sub modules into whole module, the connections between the modules are correctly established. The back end and front end are working as a whole module and the data entered in the front end once submitted were successfully entered into the database. On request the data was successfully retrieved. After performing the integration testing, the next steps should be the output testing of the developed system, because no system could be useful if it does not produce the required output in a specific format.

The output generated by the developed system should be compared with the format required by the user. The format can be presented by using the screen or in the printed form.According to this project, using integrated test plans prepared in the design phase of system developed as a guide, the integration test was carried out. All the errors found in the system were corrected for the next testing steps. In the project, Home Anywhere individually tested sections are integrated to form a single module and test whether the output is still maintained after integrating.

Validation Testing

In validation testing the requirements established as part of software requirement analysis are validated against the software that has been constructed. Validation testing provides the final assurance that software meets all functional, behavioral and performance requirements.

After the project was made from all the logical and interface errors, the project is input with dummy data to ensure that the software developed satisfied all the requirements of the user.

In this project, validation testing is done with all the forms. All forms were validated completely. In case of email ids, entered according to the format and chunk size should contain only numeric values. The validation checking also includes boundary checking for various fields. System Testing System testing is actually a series of different tests whose primary purpose is to fully exercise the computer- based system. Although each test has different purpose, all work to verify that system elements have been properly integrated and perform allocated functions.

User Acceptance Testing User acceptance testing of a system is a key factor for the success of any system. The System under consideration is tested for user acceptance by constantly keeping in touch with the prospective system users at time of developing and making changes whenever required. Test results emphasize how the actual results differ from the expected results. This suggests the need for re-testing, and to discover the source of differences. The test phase of systems development process involves defining the criteria by which the system will be tested and measuring the criteria against the acceptance failure rate. Errors detected during the development are corrected and re-tested. Each input, output and process are tested to verify that it performs as specified in design. The test data included illegal as well as out of range of data .It is found that the system is able to handle all the possibilities. The units in the system are re-compiled and errors found are corrected as indicated by the compiler. The tests are repeated until all known errors are eliminated and the program matched the design specifications. Separate tests are performed to ensure that program units are properly interfaced with each other to form a complete system.

6. SYSTEM IMPLEMENTATION Implementation is the process in which the working product is installed at the client site and configured and customized to its operational environment. Implementation is less creative than software design, but it may tend to be the source of new bugs if procedures arent followed strictly. Utmost patience and very good technical are a must for the Application Developer. Implementation procedure normally begins with preparing the target machine/s. The risk of crashes and failures can be reduced to the bare minimum if the correct system configurations are strictly enforced. Implementation stages involves following tasks: Careful planning. Investigation of system and constraints. Design of methods to achieve the changeover Evaluation of changeover method. Training of the staff in changeover phase.The method of implementation and the time scale to be adopted are found out initially. Next the system is tested properly and the same time users are trained in new environment.Implementation Procedure: Implementation of software refers to the final installation of the package in its real environment, to the satisfaction of intended users and operation of the system. In the initial stage, the doubt about the software but have to ensure that the resistance does not built up, as one has to make sure that Active user must be aware of benefits of using a new system Their confidence in software is built-up Proper guidance is imparted to the user so that he is comfortable in using that system Periodical changes must be adapted in to the system to make customers always using the system

7. SYSTEM MAINTANANCE Once the software is delivered and deployed, then maintenance phase starts. Software requires maintenance because there are some residual errors remaining in the system that must be removed as they discovered. Maintenance involves understanding the existing software (code and related documents), understanding the effect of change, making the changes, testing the new changes, and retesting the old parts that were not changed. The complexity of the maintenance task makes maintenance the most costly activity in the life of software product. It is believed that almost all software that is developed has residual errors, or bugs, in them. These errors need to be removed when discovered that leads to the software change. This is called Corrective Maintenance. Corrective maintenance means repairing, processing or performance failures or making alterations because of previously ill-defined problems. Software undergoes change frequently even without bugs because the software must be upgraded and enhanced to include more features and provide more services. This also requires modification of the software. The changed software changes the environment, which in turn requires further change. This phenomenon is called the law of software evaluation. Maintenance due to this phenomenon is called adaptive maintenance. Adaptive maintenance means changing the program function. Perfect maintenance means enhancing the performance or modifying the programs according to the users additional or changing needs. The keys to reduce the need for maintenance are: More accurately defining the users requirement during system development. Using Preparation of system documentation in a better way. More effective ways for designing processing logic and communicating it to project team members. Making better use of existing tools and techniques Managing the system engineering process effectively

. 8. SYSTEM SECURITY This software produces some security features. Before registering admins and staffs details, they have to authenticate by providing the appropriate username and password. Securities are provided in the software so that the data remains confidential. Password facility is implemented to avoid unauthorized access. For providing more security they has to change their password with their wishes Applications only control the use of resources granted to them, and not which resources are granted to them. they ,in turn, determine the use of these resources by users of the application through application security. Security testing techniques scour for vulnerabilities or security holes in applications. these vulnerabilities leave applications open to exploitation. Ideally, security testing is implemented throughout the entire software development life cycle(SDLC) so thast vulnerabilities may be addressed in a timely and thorough manner. Unfortunately, testing is often conducted as an after thought at end of the development cycle. ONLINE JOB RECRUITMENT is secured by means of providing password protection for every type of users. It is also less vulnerable to external attacks by using php for its development non repudications are avoided by logging all activities of users.

9. UPGRADABLE POSSIBILITIES Software must be in such a way that it should adapt to changes easily. Our system is capable of meeting all future changes without much modification. The program is coded in more structured manner. So we can include more future enhancements. There is scope for improvement of this system. Apart from these, there is a scope for generating many more features. I believe that this application can be extended easily with out affecting the functioning. Up gradation is made possibly by means of Increased reliability and integrity of data User-friendly and flexible aspects Data entry and updating is quite easy Effective table manipulation as facilitated by the rich My SQL. Good validation check Reduce complexity in data entry. Easy maintenance is providing More user friendly designing Attractive product searching and sorting optionSome future enhancements to the current system are listed below. Good product viewing capability Very easy sorting of product Live bidding options and advisement More payment options Sending alert to all type of users over SMS gateways Very rich set of insights and report generations of admin Product market values, as chart info for handcrafters Mobhile application for quik access of store

10.CONCLUSION The conventional system is time consuming and laborious. The online jobrecruitment helps the users to select the job and register to it..It also provide a facility for selecting appropriate field.It provides maximum security. The package is very much user friendly in nature. So here in this software we have tried our level best to over the difficulties faced by the existing manual system. This software reduces the labour work that was required before automating it. Developing this application has been a learning experience. We are able to explore PHP as much as possible. Since the project involved all the important features of PHP and its application it helped me to a great extent. There was a lot of positive feedback when the final testing of the project was over. This software is designed with the aim of providing fast, reliable and secure access to end users. On the whole it was an excellent experience and we feel satisfied at the end of the project. Of course, this is not all that is possible. There are several features that could be added and the application made better but we have really done maximum in the stipulated time and feel happy at the end of it.

BIBLIOGRAPHY

Rajib Mall,Fundamentals of Software Engineerin.Third Edition,PHI Learning Private Limited 2009 System Analysis and Design By Elias M Awad Elmarsi,Navathe:Fundamentals of Database Systems,ThirdEdition,Pearson Education,2000 Ramakrishnan,Gehre:Database Management Systems,Third Edition McGraw-Hill Higher Education,2003 Pankaj Jalote An Integrated Approach to Software Enginering Home PVT LTD 2006 Lee Purcell, Mary Jane Mara approach to the ABCs of Java Script Paul Haine approach to HTML Mastery Rasmus Lerdorf,Kevin Tatroe and Peter MacIntyre approaches to Programming PHP Tim Converse and Joyce Park with Clark Morgan approach to PHP5 and My SQL

WEBSITES www.mysql.org www.java.com/j2ee/index.html www.java.com/jsp/index.html

Appendix I: FORM LAYOUTHomepage

Admin homepage

Control panelJobseekersHomepageJobseakerProccesInterview details

EmployersHomepage

Employer,s Controlpanel

Appendix II: MEETING MINUTES Group Members Anju S (320-12958007) Aswathy.S.P (320-12958009) Athira.U (320-12958012) Monija.M (320-12958024)MinutesDate : 22/02/2014Time : 10amLocation : Teena Computers, Anchal We decide to do a project named ONLINE JOBPORTAL. And we choose PHP language for doing the project. Language study and system study and analysis are done in between 22/02/2014to02/03/2014.MinutesDate : 02/03/2014Time : 10amLocation : Teena Computers Anchal We start form design and many forms are included in the project. So completed our form design on 09/03/2014.MinutesDate : 09/03/2014Time : 10amLocation : Teena Computers,Anchal Since the form design is over, we decided to do the table creation and design.PHP language is used for coding and for database design MY SQL is used. Also we complete data flow diagram neatly.MinutesDate : 24/03/2014Time : 10:.30 aMLocation : Teena Computers,Anchal About 80% of code design is completed, we started testing process. It can take a long time to complete the process.MinutesDate : 10/05/2014Time : 10 AMLocation :Teena Computers, AnchalSince the implementation and testing is completed, we started documentation preparation work.

Appendix IIIGANTT CHART

TASKSTART(DD/MM/YY)END(DD/MM/YY)

System study and analysis22/02/201402/03/2014

Form design03/03/201408/03/2014

Database design09/03/201423/03/2014

Coding24/03/201410/052014

Testing11/05/201415/05/2014

Documentation09/03/201422/05/2014

Feb22 to Mar3 Mar3 to Mar 8 Mar9 to Mar23 Mar24 to May10 May11 to May15 May16 to May22

System Study and analysisAnd analysis

System design

Coding

Testing

Documentation

B.sc Computer Science UIT ,Yerror 2012-2015Page 62