Академический Документы
Профессиональный Документы
Культура Документы
On
MAKEMYTRIP
Completed At
Submitted by:
Sunidhi Manhas(1143983)
H.O.D(IT) : Er.Rajeev Mahajan
Table of Contents
TITLE
PAGE NO.
Title Page
Candidates Declaration
i)
Abstract
ii)
Acknowledgement
iii)
Certificate
iv)
List of figures
v)
List of tables
vi)
S.NO
INDEX
1)
2)
3)
Introduction to Dotnet
4)
5)
6)
7)
Database
PAGE
List of Figures
Contents
Page No.
List of Tables
Contents
Page No.
Preface
Industrial Training is one of the most important components in the
fulfillment of any professional course conducted at any level in any
institute. Each one of us would always have an added advantage if we have
a chance to come face-to-face with the tools and the processes we are being
taught in our course. The main purpose of the training program is to expose
the trainee to the practical experience of actual industrial environment in
which they are required to work in future.
A Lecture helps us to know the theoretical concept and the processes being
followed at industrial level and tools being used to conduct that process but
we would get the complete knowledge of the process only if we have a
chance to witness the process, study it and if possible being able to conduct
that process if authorities allow us to do so. Thus emerges the need of
industrial training. This training has to complete our knowledge about the
project of developing software.
Acknowledgment
I am highly grateful to the Ms.RANJEET KAUR HOD IT, GIMET, for providing this
opportunity to carry out the six weeks industrial training at INFOWIZ.
I would like to expresses my gratitude to other faculty members of Computer Science
& Engineering department of GIMET, for providing academic inputs, guidance &
encouragement throughout the training period.
The author would like to express a deep sense of gratitude and thank
Dr. Seema
Director of Company , without whose permission, wise counsel and able guidance, it
would have not been possible to pursue my training in this manner.
The help rendered Miss Gunjan (Training Incharge) for experimentation is greatly
acknowledged.
Finally, I express my indebtedness to all who have directly or indirectly contributed to
the successful completion of my industrial training.
Declaration
I hereby declare that the project work titled Makemytrip ON ASP.NET is
authenticate work carried out by me under the guidance of Ms.Ranjeet kaur, Head IT,
GIMET for the partial fulfillment for the award of degree of Bachelor of Technology
and has not been submitted anywhere else for the award of any other degree or
diploma.
Abstract
Organisation are made up of people creating value through proven business processes,
innovation, customer service, sales and many other important activities.
MakeMyTrip is Indias leading online travel portal. Created to empower the traveler
with instant booking services and comprehensive options, the company began its
journey with united states India travel market. MakeMyTrip offers a range of best
value products and services, cutting edges technology and round- the -clock customer
support.
MakeMyTrip also stayed ahead of the curve by continually evolving its technology to
meet the ever changing demands of the rapidly developing global travel market.
The User Portal contain the news, events, photogalery pages The application will
have to be completed using Visual Studio 2010 and SQL Server 2008 with help of
other office productivity tools. The application testing criteria and installation
requirements will be part of the detailed application architecture document.
Chapter 1
1.1Organization Profile
INFOWIZ is an ISO certified company. It has been working from more than 5 years in the field of IT
and Web Development and has been providing its clients with its exceptional and quality Web Design,
Development and SEO services. Our clients range from individuals to professionals and small, medium
and large scaled Businesses. In 2008, INFOWIZ entered into IT outsourcing and partnered successfully
with many offshore web and SEO companies of US, UK, France, Ireland, Canada, and Australia etc. to
provide them quality and timely services.
INFOWIZ does not boost itself of being the best Development Company but automatically enjoys
reputable position among top Web Development companies because we of our timely delivery and
quality work. Before taking a project from a client, we ask for all his needs and requirements. After that
our skilled team of professionals analyzes the needs and comes up with a plan as how we can work to
completely satisfy those requirements of our clients. We then work step by step keeping our client
informed about the progress and complete the project in time giving complete contentment to them.
From concept building to implementation of any project, our team manages the projects efficiently up to
its completion. Our tactful strategy and dedication towards quality work has given us the recognition we
enjoy and that is why our clients only come back to us whenever they require any kind of web related
solutions. We do not only emphasize on formulating an attractive solution to our clients, but we believe
in providing a workable solution. INFOWIZ offers research based Search Engine Marketing products
that help achieve greater insights to your online business. Our Research & Development arm offers SEO
tools for SEM professionals.
INFOWIZ is an organization which is established in the field of VLSI-VHDL, Embedded systems, PHP,
.NET, Web Designing, Web Development, Network Support and Network training. We provide Support
and training in the field of Programming Languages, Embedded systems (Micro controller based design,
Electronics system design), VLSI-VHDL and Networking solution.
INFOWIZ also provides Technical Research & Development support and consultancy to some
Electronics companies like Sagitech solutions Panchkula, Jarc InfoTech Mohali etc.
Chapter 2
Packages module
a) 5000-10,000
b) 10,000-20,000
(II) Makemytrip Module
a) Hotels
b) Offers
c) Packages
d) About us
e) Contact us
(III) User Module
a) Registration
b) News
3
c) Events
d) Photo Gallery
e) About Us
Considering the security and privacy aspects, College Association will use HTTPS protocol (A version
of the HTTP protocol that includes data encryption for security.)
The application will have to be completed using Visual Studio 2010 and SQL Server 2008 with help of
other office productivity tools.
The application testing criteria and installation requirements will be part of the detailed application
architecture document.
Project Title
: Makemytrip
Objective Of System
Operating Systems
Hardware
Requirement
Software
Requirement
Front End
Back End
Guided By
2.3 Purpose
The purposes of the travel is to get from the place where you are at present to another place. Travel is
the movement of people relatively distant geographical locations and can involve travel by foot, bicycle,
automobile, train, airplane etc. Travel can also include relatively short stays between successive
movements.
Those people who spend their holidays any other country for trip they should book their trips through
travel agency because they acts as an intermediary. It is beneficial for their costumers to be aware with
every current information thought many ways Fust like online.
Reasons for travelling include recreation, tourism or vacations raiser travel for gathering of information
for holiday to visit people.
2.4 Scope
Once you are certified by the centre of learning your scope as a professional will be limitless.
You can apply your business knowledge and skills in the tourism industry.
Not only will you be handling ticketing but also your operations.
The approach you adopt towards travel and tourism will be appropriate.
2.5 Technologies
Operating System
Technology
Language
Database
Chapter 3
Introduction To Dotnet
3.1 The .net framework
A frame work is commonly though of as a set of class libraries that aid in the development of
applications. The .net framework is more than just a set of classes. The .net framework is targeted by
compliers using a wide variety of applications. Including everything from small components that run on
handheld devices to large Microsoft ASP.ET application that span web farms, where multiple web serves
act together to improve the performance fault tolerance of a web site. The .NET framework is
responsible for providing a basic platform that these applications can share. This basic platform includes
a runtimes set of services that oversee the execution of applications. A key responsibility of the runtime
is to manage execution so that software written by different programming languages uses classes and
other types safely.
It is the execution engine for all .NET applications. Every target computer requires the CLR to
successfully run a .NET application that uses the .NET Framework. The main features of CLR include:
Thread Management
Code Verification
Remoting
All .NET applications are compiled into Intermediate Language code (MSIL). When executed on the
CLR, MSIL is converted into native machine code specific to the operating platform. This process is
done by a Just in Time (JIT) compiler. The code executed by the CLR is called as Managed Code. This
code is type safe and thoroughly checked by the CLR before being deployed. The .NET runtime also
provides a facility to incorporate existing COM components and DLL's into a .NET application. Code
that is not controlled by the CLR is called Unmanaged Code.
The .NET Framework is further comprised of Common Type System (CTS) and Common Language
Specification (CLS). The CTS defines the common data types used by .NET programming languages.
The CTS tells you how to represent characters and numbers in a program. The CLS represents the
guidelines defined by for the .NET Framework. These specifications are normally used by the compiler
developers and are available for all languages, which target the .NET Framework.
To fully interact with other objects regardless of the language they were implemented in, objects must
expose to callers only those features that are common to all the languages they must interoperate with.
For this reason, the Common Language Specification (CLS), which is a set of basic language features
needed by many applications, has been defined. The CLS rules define a subset of the Common Type
System; that is, all the rules that apply to the common ty1pe system apply to the CLS, except where
stricter rules are defined in the CLS. The CLS helps enhance and ensure language interoperability by
defining a set of features that developer can rely on to be available in a wide variety of languages. The
CLS also establishes requirements for CLS compliance; these help you determine whether your
managed code conforms to the CLS and to what extent a given tool supports the development of
managed code that uses CLS features.
10
If your component uses only CLS features in the API that it exposes to other code (including
derived classes), the component is guaranteed to be accessible from any programming language that
supports the CLS. Components that adhere to the CLS rules and use only the features included in the
CLS are said to be CLS-compliant components.
The CLS was designed to be large enough to include the language constructs that are commonly
needed by developers, yet small enough that most languages are able to support it. In addition, any
language constructs that makes it impossible to rapidly verify the type safety of code was excluded from
the CLS so that all CLS-compliant languages can produce verifiable code if they choose to do so.
Although some other implementations of the Common Language Infrastructure run on nonWindows operating systems, the CLR runs on Microsoft Windows operating systems.
The virtual machine aspect of the CLR allows programmers to ignore many details of the
specific CPU that will execute the program. The CLR also provides other important services, including
the following:
Memory management
Thread management
Exception handling
Garbage collection
Security
ASP.NET:
Microsoft, realizing that ASP does posses some significant shortcomings, developed
ASP.net. ASP.net is a set of components that provide developers with a framework with which to
implement complex functionality. Two of the major improvements of ASP.net over traditional ASP are
scalability and availability. ASP.net is scalable in that it provides state services that can be utilized to
manage session variables across multiple web services in a server farm. Additionally, ASP.net possesses
a high performance process model that can detect application failures and recover from them. We use the
fundamentals of programming with VB using Visual Studio .NET and .NET framework.
The project is the starting point for authoring applications, components & services in Visual
Studio.NET 2010. A project is organized as part of a solution, which can contain multiple projects that
are independent of each other. C# project file has .asproj extension where as solution file has .sln
extension.
12
In order to write code against an external component, your project must first contain a reference to it. A
reference can be made to the following types of component.
(1) .NET class libraries or assemblies
(2) Other class libraries of projects in the same solution
Features of ASP.NET:
(1) Component Infrastructure.
(2) Language Integration.
(3) Internet Interoperation.
(4) Simple Development.
(5) Simple Deployment.
(6) Reliability.
(7) Security
13
Like most mainframe or minicomputer databases, SQL Server is a Database that has seen an
evolution from its introduction in the mid-1960s until today. Microsofts SQL Server is founded in the
mature and powerful relational model, currently the preferred model for data storage and retrieval.
Unlike mainframe and minicomputer databases, a server database is accessed by users-- called
clients--from other computer systems rather than from input/output devices, such as terminals.
Mechanisms must be in place for SQL Server to solve problems that arise from the access of data from
perhaps Hundreds of computer systems, each of which can process portions of the database
independently from the data on the server. Within the framework of a client/server database, a server
database also requires integration with communication components of the server in order to enable
connections with client systems.
SQL server also contains many of the front-end tools of PC databases that traditionally havent been
available as part of either mainframe or minicomputer databases. In addition to using a dialect of
Structured Query Language (SQL), GUI applications can be used for the storage, retrieval, and
administration of the database.
Chapter 4
14
Alumni are not encouraged to apply to relevant jobs and benefit from their high-quality training
and experience.
The stored information about the organization and the students is not secure enough.
The information is person dependent. In the system different departments Students have
information only related to their respective department. No other Students know about others
information.
15
2.
3.
Fast response:
4.
Data Integrity:
5.
This system would result in: Fast search and retrieval of information.
Presentation of information in the desired form.
Maintenance of up to date reliable information.
Storage of large voluminous data in manageable form.
16
2) Offers
Book on Makemytrip and two lucky winners will win a mega price of Renault buster. Also, one day
lucky winner will get a free domestic holiday for a couple. This offer is brought to you by Makemytrip.
3) Packages
Package holidays are organized by a tour operator and sold to a consumer by a travel agent. Expansive
suites with unparallel views, complimentary breakfast, internet, airport transfers in a limousine and
much more.
6) Add News
It will show heading, description and images. After the user finishing entering all the input data
correctly, the user can submit the news by clicking on the Insert button.
7) Add Event
17
It will show event name and heading. The user enter all the input data correctly and submit the events by
clicking on the Add button.
(c)Tourist Module:
1) Registration
In this module tourists can become the registered member of the website and he/she can login on this
website to search hotels, offers etc.
2) Hotels
In
this
association
module
tourists
can
see
the
best
hotels
of
the
Makemytrip
3) Events
In this module tourists can get details about events Makemytrip through events details.
4) Facilities
In this module we can give the best facilities to tourist.
5) About us
In this module makemytrip provides vacation packages and best offers in which we provide various
discount on our hotels.
18
Chapter 5
.
19
20
The objective of the organization as a whole has a higher priority then the objective of its
subsystem.
Software can be developed by different techniques. One of the basic and very important procedures
to develop the system software is called SDLC. The complete form of the SDLC is System
Development Life Cycle. System development life cycle gives the meaning and direction for the
development of a project. Before developing a system , there must be a problem.
System Development Life Cycle is a cyclic process in which information is conceived ,
designed and implemented for fulfilling needs of end users. Systems development basically consist
of two major steps (i.e.) Systems Analysis and Design . Besides this , it involves several distinct
phases , each of which often must be complete before a subsequent task can begin .
Thus , SDLC method is classically thought of as a set of activities that analyst , designer and
users carry out to develop and implement an information system . It is not a procedure that deals
with hardware and software , rather , it is building a computer based system to help the user
operate a business or make decisions effectively and manage an enterprise successfully.
SDLC is an organized way to build an information system. For better working the task of
designing a system is divided into a series of phases .
improving an information system or a procedure. This need leads to a preliminary survey or an initial
investigation by the system analyst to determine the requirement of the user and the organization.
Thus, during the need analysis phase, the focus of the development team is on the completion of the
following three tasks:
Defining the problem and deciding whether to proceed.
Analyzing the current system in depth and determining the requirements which are to be met
by the new or modified application.
Selecting the best solution depending upon the capability of computer system, the manpower,
time and budget requirements and defining its function.
Thus , the
22
b) Technical Feasibility: It specifies whether all hardware devices and the software availability for
the development of the system and the different operations done by the available devices are
feasible or not.
c) Behavioral Feasibility: It specifies whether the user want a new computerized change in their
organization or not. For this purpose, proper training must be given to the staff for a new system.
It checks the opposition from the user side and searches its alternatives.
d) Organizational Feasibility: It specifies whether all the rules and regulations by the law and
government are applicable in the system for the organization and the staff or not.
e) Operational Feasibility: It specifies whether all the operations can be done by the system or not.
It checks the working of the system by taking all the views from the users and others.
The final report of the feasibility study is a formal proposal. It is only a
summary about what is known and what is going to be done.
SYSTEM ANALYSIS:
It consists of the following stepsa) Feasibility study.
b) Information gathering.
c) Making algorithms and flowcharts.
Feasibility Study involves the investigation of overall problems to be solved as in our system study,
which Computerization of Investment of Bright Consultant is relating to database handling. It is the
23
main problem to be investigated during system study. It also involves the documents to be handled and
the overall flow and manipulation of data. The system analysis involves the fact finding of problem,
Information gathering, and identification of constraints, specific system objectives, descriptions of
outputs required for the concerned problems.
Information Gathering
After defining the problem, the next step in the system analysis is the information gathering is an art
as well as a science. Information gathering is neither easy nor routine. Much preparation, experience
and training is required before one determines where to go for the information or what tool to user.
The first requirement is to figure out what information to gather, the approach, the manner in which
the information is gathered require a person with sensitivity, skill and commonsense of the following
system is developed in this phase . An estimate of the impact of the candidate system on user /
organization are documented and evaluated by management .
The three main objectives which the designer has to bear in mind are :
1. How fast the design will be able to do the users work given a particular hardware resource .
2. The extent to which the design is secure against the human errors and machine malfunction .
3. The ease with which the design allows the system to be changed .
To meet these objectives analyst and programmers use a combination of top - down and bottom
up design .
24
Top Down Design : It starts with large picture and move to the details .The analyst and team
members look at major functions that the system must provide and break these down into smaller
and smaller activities .
Bottom Up Design : It starts with details and then moves to the big picture .This approach is
appropriate when users have specific requirements for output.
Design physical information flow through the system and a physical design walkthrough.
3. Devise a test and implementation plan and specify any new hardware/software.
4. Update benefits, costs, conversion date and system constraints.
The dataflow diagram (DFD) was first developed by Larry Constantine as a way of expressing system
requirements in a graphical from. A DFD also known as a Bubble Chart has a purpose of clarifying
system requirement and identifying major transformation that will become the program in the system
design. A DFD consists of series of bubbles jointed by lines.
DFD SYMBOLS:
1. Square box: A square box defines sources or origination or destination of the system data. It
is also called Entity.
25
2. Arrow or Line: An arrow or line identifies the data flow i.e. it gives
transformation or transactions are incoming or outgoing having the data passed through it. It is also
called processing box.
26
Chapter 6
27
6.1 Data Flow Diagram for Makemytrip:The dataflow diagrams very helpful while writing code in development stage. The explains the tourist
location maintenance, vehicle maintenance, hotel maintenance, ticket maintenance modules.
.NET is a web based tutorial in which the author gives details about basic concepts of stream which is
originated from UNIX that acts as a channel for data flow.
28
An E-R Model is a high-level conceptual data model developed by Chen in 1976.An entity-relationship
diagram is a data modeling technique that creates a graphical representation of the entities, and the
relationships between entities, within an information system. An entity is a piece of data-an object or
concept about which data is stored. A relationship is how the data is shared between entities.
There is no standard for represent data objects in E-R diagram. Each modeling methodology uses its
own notation. The symbols used for the basic E-R construct are
E-R SYMBOLS:
Entity
An entity is an object or concept about which you want to store information.
Weak Entity
A weak entity is an entity that must defined by a foreign key relationship with another Entity as it cannot
be uniquely identified by its own attributes alone.
Key attribute
29
A key attribute is the unique, distinguishing characteristic of the entity. For example, an employee's
social security number might be the employee's key attribute.
Multivalued attribute
A multivalued attribute can have more than one value. For example, an employee entity can have
multiple skill values.
Derived attribute
A derived attribute is based on another attribute. For example, an employee's monthly salary is based on
the employee's annual salary.
Relationships
Relationships illustrate how two entities share information in the database structure.
30
31
32
Chapter 7
33
Database
8.1 DATABASE DESIGN
In a project database tables are the most important component. It is where the data is actually stored.
These tables are not shown to the user. The user has access to the data stored in these tables through the
forms made in the front-end tool by the programmer. In this project SQL SERVER 2008 is used as a
back-end tool. The database used in our project consists of the following tables:
34
REGISTRATION TABLE
35
36
NEWS TABLE
EVENTS TABLE
37
38
39
40
41
SYSTEM TESTING
Testing is the major quality control measure employed during software development . Testing is
the process of executing any program with the intent of finding an error . No piece of code is
completely ready unless it has been fully tested . This stage is a very important as at this stage it
is verified whether the code developed for software meet the requirement specification or not .
Moreover , all validations are also checked in the testing stage . System testing so checks the
medium and accuracy of the system to access , update and retrieve data from new files .
Need for Testing:
Testing is vital for the success of the system. Testing makes the logical assumption that if all the
parts of the system are correct , the goal will be successfully achieved . Inadequate testing or non
testing leads to errors that may not appear until months later . Small system error can thereby
conceivably explode into larger problem . Effective testing early in the process reduces a large
number of errors . Second reason for testing is its utility as a user oriented vehicle before
implementation . Finally, testing leads software readability. Identifying and removing faults , during
testing can make the software more reliable . This increases users confidence in the system. The basic
levels of testing are:
1. Unit Testing is testing changes made in an existing or a new program.
2. Sequential testing is checking the logic of one or more programs in the candidate system,
where output of one program will affect the processing done by another program.
3. System testing is executing a program to check logic changes made in it and with the
intention of finding errors- making the program fail.
4. Positive testing is making sure that the new programs do in fact process certain transactions
according to specifications.
5. Acceptance testing is running the system with live data by actual user.
The typical approach to testing is to move from the individual component to the system as a
whole . Testing is used to ensure that the software does not fail . The team tests each component
separately (unit testing) and then tests the components of the system with each other (system
testing) . Errors are corrected and necessary changes are made , followed by Installation testing
and Acceptance testing .
42
Thus ,these different levels of testing attempts to detect different types of faults . The relation of
the faults introduced in different phases , and the different levels of testing are as shown :
Client Needs
ACCEPTANCE TESTING
Requirements
SYSTEM TESTING
Design
TEGRATION TESTING
Code
UNIT TESTING
IMPLEMENTATION
In this phase , the project team finishes buying any necessary hardware for the system and then
installs the hardware and software in the user environment. Implementation means the process of
converting a new or a revised system into an operational one. Conversion is one aspect of implementation.
There are three types of implementation:
1) Implementation of a computer to replace a manual system.
2) Implementation of anew computer system to replace an existing system.
3) Implementation of a modified application to replace an existing one, using the same computer.
Conversion means changing from one system to another. The objective is to put the tested system into
operation while holding costs, risks and personnel irritation to a minimum. Various conversion
techniques are:
43
Direct Conversion. All users stop using old system at the same time and then begin using
the new .
OLD SYSTEM
NEW SYSTEM
Parallel Conversion. Users continue use the old system while an increasing amount of data
is processed through the new system .The outs from the two systems are compared , if they agree
, the switch is made .
OLD SYSTEM
NEW SYSTEM
Phased Conversion. Users start using the new system , component by component . This
option works only for systems that can be compartmentalized .
NEW SYSTEM
Pilot Conversion. Personnel in a single pilot site use the new system , and then the entire
organization makes the switch .
Thus , implementation phase is primarily concerned with user training , site preparation and file
conversion .
USER TRAINING
When we implement a system, user training is must in order to minimize the resistance to change and to
give the new system a chance to prove it worth.
Finally during the training demonstration, the user receives encouragement and attention, which prompts
him/her to perform.
We have demonstrated MAISMS system several times so that the user can become familiar either the
system. Live demonstrations are given to the head and data entry operator.
USER DOCUMENTATION
The user documentation comprises of user manual. The User manual explains the working of MAISMS in
an effective manner. It explains the working of each and every screen.
Thus it becomes easy to be acquainted to the system. If any problem occurs, the user can consult the
manual to sort the problem.
SYSTEM EVALUATION
After installation and testing phases , evaluation of candidate system begins . It is carried out to
find whether the system meets the needs of the users comparing what the user expected from
the system and what the system is actually giving .System is evaluated after it has been operated
for a reasonable period and then planning for its improvements is drawn out . The actual
evaluation finds solutions to the following questions:
Do programs give a satisfactory throughput?
Is the output according to the requirement?
Is there operational difficulty.
What changes are made after the last review of the system .
Is documentation explanatory?
How many times has the system failed somewhere?
What further improvement is necessary?
SYSTEM MAINTENANCE
45
After the information systems are implemented and the user staff is adjusted to the changes
created by the candidate system , maintenance phase begins .The importance of maintenance is
to continue to bring the new system to standards .
There is an aging process that requires periodic maintenance of hardware and software. The IS
professionals continue to provide support during the maintenance phase . They monitor various
indices of system performance such as response time , changes in user requirements or federal
regulations of the industry .
Changes and upgrades to the system are made during the remaining
life of the system .However at some point , patch repairs to the system no longer meet user
requirements which may have radically changed since the system was installed . IS professionals
or managers now start calling for a major modification or new system . At this point , the SDLC
has come full circle and the analysis phase begins .
SYSTEM SECURITY
46
As computers have become a part of every day life and more and more are concerned about the security
and integrity of the information residing in these computers. While developing the system proper
measures for maintaining data integrity and controlling security should be taken. This involves built in
features, programs and procedures to protect the candidate system from unauthorized access. Also
proper measures should be taken so that if data is lost due to some unidentified reasons it must be
recovered without much inconvenience.
System security can be threatened due to external as well as internal cases. Some of these are: 1.
2.
3.
Fire
4.
Natural disasters
5.
External attacks
When huge quantities of information are stored in one database, sensitive data can be easily copied.
Information can also be entered directly into the computer without written record or proper authorization
and can be changed without trace.
Control Measures
After system security risks have been evaluated the next step is to select the measures those are internal
and external to the facility. These measures are generally classified under the following points:
1.
2.
Recovery in case of crash due to power failure are hard disk crash
3.
In the proposed system proper care has been taken of first data accesses that a user may take to the
system. Well, nothing can be said or done about disk crashes or system failures. These are unpredictable.
CONCLUSION
47
The study on Makemytrip leads to the proven importance of two mediums of talent pipeline creation
especially when developing mid-level line manages.
Makemytrip does harness on this wealth by involving the leadership team in strategic alignment and
competency framework development stages.
No program or system design is perfect. Communication between the user and the designer is not always
complete or clear, and time is usually short. This results in errors. The number and nature of errors in a
new design depends on several factors:
Communication between the user and the designer.
Personal prejudice on the part of users in disclosing information.
The programmers ability to generate code that reflects exactly the system specifications.
The time frame for the design.
BIBLIOGRAPHY
48
Books
ASP.NET(Black Book).
Professional ASP.NET(Wrox Publication).
C# Vijaymukhi.
ASP.NET Complete Reference.
Software engineering Concepts By Roger S.Presman
UML IN A NUTSHELL By Alhir
Fundamentals of Software Engineering By Rajiv Mall
SQL Server 2005 (Wrox Publication).
www.naukri.com
www.yuvajobs.com
www.monster.com
49