Вы находитесь на странице: 1из 25

Q what is the objective of job-portal project?

Objective:

This project is aimed at developing an online search Portal for the Placement
Details for job seekers. The system is an online application that can be accessed
throughout the organization and outside as well with proper login provided. This system
can be used as an Online Job Portal for job seekers. Job Seekers logging should be able
to upload their information in the form of a CV. Visitors/Company representatives logging
in may also access/search any information put up by Job aspirants.

Functional components of the project:

1. A person should be able to


Access/ Search CVs/information from the first page (only read access).
Login to the system through the first page of the application
Change the password after logging into the system
Upload his/her CV.
See/change his/her details.
Get help about the application on how to use the different features of the
system.

MAIN POINTS OF THE PROJECT

This is a web-based Job Portal intended to provide automated solution to Job Seekers as
well as Employers on the basis of various categories of Jobs , Job Requirement in different
Cities of India and even abroad.

This job Portal provides some innovative features:-

Provides platform to other consultant is highly commendable


It is extremely User friendly
Help placing candidates with high focused on the profile and business
requirement.

Job Seekers from different areas and of various profiles can register and make
there resume available to consultants and employers as well.
Even if job seeker does not have idea about resume making and other job
criteria then he or she can directly take suggestions from career counseling
zone.
Consultants and Employers from different locations get registered and post
the job according to the requirement so that job seekers can look for it and
apply for same if they have desired profile.

Consultants Benefits & Solutions:-

Get Right Resume in shortest time.


Paperless database hence paperless office.
Track placement progress and billing through CBMS by maintaining
complete MIS.
Organise Walk-In Interview in shortest time.
MODULES OF THE PROJECT

NEW USER REGISTRATION MODULE


LOGIN MODULE
SEARCH ENGINE MODULE
VACANCY MODULE
EMAIL TO HR MODULE
RESUME RETRIEVAL AND FORWARD MODULE
JOB PROVIDING MODULE.

Job Seeker:- It is a core of this web Portal. It involves creating new account so that
job seeker can get registered and post his or her resume on net.Candidate can take
suggestions from experts in case of inability to strike right job because of lacking
knowledge of creating professional resume and other details etc...Job messenger
can also be created so that immediate matched jobs will directly sent to the
candidates mail-id. New account detail is get stored in Job Seekers database.
Employer:- Free account for employers where company Type, No. of employees,
turnover and contact details etc. get stored in employers database. After getting
registered Employer can post the job requirements, key skills and eligibility criteria
they are looking for. Even employer can look for already posted resume of job seekers
and can send alert messages to matched profiles.
Consultants:- This module is more or less as Employer module but consultant comes
between jobseekers and companies. Consultant get registered first by opening new
account and provide details about his own company like URL details, revenue,
Category and all. After getting registered Consultant can post the job requirements,
key skills and eligibility criteria they are looking for. Consultant can look for already
posted resumes of job seekers according to their requirement and send alert messages
to matched resume, store interview, placement status and all.

Search Jobs Module:- This module is divided into three parts. Job seeker can
directly look for appropriate opening according to their profile, city, category and
company.
City Wise Search
Quick Search
Company Wise Search
Search Your Dream Job
Location
Category
Sub-Category
Experience
Key skills/Key words

Q what is the future scope of job portal

Ans

FUTURE SCOPE OF JOBPORTAL

Categorisation:-Some new services can be added as and when required so that more
and more job-seekers, employers, consultants explore it and refer it to others.
Sub-Categorisation :-Easy to find out your dream job , as jobs are available to you in
categorised manner that helps you not to waste time for garbage or fake companies.
Some more user-friendly environment can be provided.

Q what is the Scope of the project?

). Scope of the project

Our project has a big scope to do. We can store information of all thestudents. CVs are
categorized according to various streams. Various companies can access the information.
Students can maintain their information and can update it. Notifications are sent to students
about the companies. Students can access previous information about placement.

RECOGNITION OF NEED:-
For the purpose of training and placement of the student in colleges, TPOs have to collect
the information and CVs of students and manages them manually and arranges

them according to various streams. If any modification is required that is to be also done
manually. So, to reduce the job required to manage CVs and the information of various
recruiters, a new system is proposed which is processed through computers.

Q Explain about your project ?


INTRODUCTION

1.1. INTRODUCTION TO PROJECT

This project is developed an online Job Portal for the Placement Dept. of the company. The system is
an online application that can be accessed throughout the organization and outside as well with proper
login provided. This system can be used as an Online Job Portal for the Placement Dept of the
organization to manage the student information with regards to placement. Students logging should be
able to upload their information in the form of a CV. Visitors/Company representatives logging in may
also access/search any information put up by Students.

The project has been planned to be having the view of distributed architecture, with
centralized storage of the database. The application for the storage of the data has been planned.
Using the constructs of MS-SQL Server and all the user interfaces have been designed using the
ASP.Net technologies. The database connectivity is planned using the SQL Connection
methodology. The standards of security and data protective mechanism have been given a big choice
for proper usage. The application takes care of different modules and their associated reports, which
are produced as per the applicable strategies and standards that are put forwarded by the
administrative staff.

The entire project has been developed keeping in view of the distributed client server computing
technology, in mind. The specification has been normalized up to 3NF to eliminate all the anomalies
that may arise due to the database transaction that are executed by the general users and the
organizational administration. The user interfaces are browser specific to give distributed accessibility
for the overall system. The internal database has been selected as MYSQL.The basic constructs of
table spaces, clusters and indexes have been exploited to provide higher consistency and reliability for
the data storage. The MYSQL was a choice as it provides the constructs of high-level reliability and
security. The total front end was dominated using the ASP.Net technologies. At all proper levels high
care was taken to check that the system manages the data consistency with proper business rules or
validations.

1.2. PROBLEM IN EXISTING SYSTEM

Cannot Upload and Download the latest updates.


No use of Web Services and Remoting.
Risk of mismanagement and of data when the project is under development.
Less Security.
No proper coordination between different Applications and Users.
Fewer Users - Friendly.

1.3. SOLUTION OF THESE PROBLEMS

The development of the new system contains the following activities, which try to automate the entire
process keeping in view of the database integration approach.

1. User friendliness is provided in the application with various controls.


2. The system makes the overall project management much easier and flexible.

3. Readily upload the latest updates, allows user to download the alerts by clicking the URL.
4. There is no risk of data mismanagement at any level while the project development is under
process.
5. It provides high level of security with different level of authentication.
NUMBER OF MODULES

The system after careful analysis has been identified to be presented with the following modules:

The modules involved are:

Admin
Job Seeker
Job Provider
Notification
Search
Report
Authentication

Admin

In this module Admin will add all the qualifications, skill, experience, city, state, country and update
and delete information about the job provider or job seeker he can also search for the job seeker and
he can send mail to offer the job to job seeker and he can also see the jobs add by the job provider.

Job Seeker

In this module Job Seeker register him self and upload his resume and fill the profile give by admin
and after login he will search for the job on various conditions and he can change his profiles and
resume and he can apply for the jobs based on various conditions. He can see the response of the
company and he can call the company person for the interview.

Job provider

In this module Job Provider register him self and his company and after login he will add new job and
he can search for the job seekers on various condition and he can offer the job to job seeker according
to the job profile and he can also see the response from the job seekers and send the mail.

Notification

In this module admin and job provider send the notification to the job seeker in the form of email.

Reports:-

This module contains all the information about the reports generated by the admin based on the
particular job seeker, particular job provider, all job seeker and job provider, all jobs generated by the
job providers.

Authentication:-
This module contains all the information about the authenticated user. User without his username and
password cant enter into the login if he is only the authenticated user then he can enter to his login.

PROJECT INSTRUCTIONS:

Based on the given requirements, conceptualize the Solution Architecture. Choose the domain of your
interest otherwise develop the application for ultimatedotnet.com. Depict the various architectural
components, show interactions and connectedness and show internal and external elements. Design the web
services, web methods and database infrastructure needed both and client and server.

Provide an environment for upgradation of application for newer versions that are available in the same
domain as web service target.

2.4. HARDWARE SPECIFICATIONS


HARDWARE REQUIREMENTS:

PIV 2.8 GHz Processor and Above


RAM 512MB and Above
HDD 20 GB Hard Disk Space and Above

SOFTWARE REQUIREMENTS:

WINDOWS OS (XP/2000/SEVEN / 2000/ 2003 Server)


PHP 5.3, MYSQL
XAMPP SERVER

SQL Server 2005/2008 Enterprise Edition

2.5. PROPOSED SYSTEM

To debug the existing system, remove procedures those cause data redundancy, make navigational
sequence proper. To provide information about audits on different level and also to reflect the current
work status depending on organization/auditor or date. To build strong password mechanism.
FUNCTIONAL FEATURES OF THE MODEL

As far as the project is developed the functionality is simple, the objective of the proposal is
to strengthen the functioning of Audit Status Monitoring and make them effective and better. The
entire scope has been classified into five streams knows as Coordinator Level, management Level,
Auditor Level, User Level and State Web Coordinator Level. The proposed software will cover the
information needs with respect to each request of the user group viz. accepting the request, providing
vulnerability document report and the current status of the audit.

WORKING OF THE SYSTEM

The entire scope has been classified into five streams known as: -

Coordinator Level

(Addressing the information management needs of coordinator)

Management Level

(Addressing the information management needs of management)

Auditor Level

(Addressing the information management needs of auditors)

User Level

(Addressing the information management needs of the user group)

State Web Coordinator level

(Addressing the needs of coordinator of the state)

FUTURE IMPROVEMENT
This System being web-based and an undertaking of Cyber Security Division, needs to be
thoroughly tested to find out any security gaps.

A console for the data centre may be made available to allow the personnel to monitor on the
sites which were cleared for hosting during a particular period.

Moreover, it is just a beginning; further the system may be utilized in various other types of
auditing operation viz. Network auditing or similar process/workflow based applications...

TOOLS AND PLATFORM USED:-

TECHNOLOGY USED: PHP

History of PHP

The first version of what came to be known as PHP was created in 1995 by a man named
Rasmus Lerdof. Rasmus, now an engineer at Yahoo!, needed something to make it easier to
create content on his web site, something that would work well with HTML, yet give him
power and flexibility beyond what HTML could offer him. Essentially, what he needed was
an easy way to write scripts that would run on his web server both to create content, and
handle data being passed back to the server from the web browser. Using the Perl language,
he created some technology that gave him what he needed and decided to call this technology
"Personal Home Page/Forms Interpreter". The technology provided a convenient way to
process web forms and create content.
The name "Personal Home Page/Forms Interpreter" was later shortened to PHP/FI and
eventually renamed to represent "PHP: Hypertext Preprocessor". The name is said to be
recursive because the full name also includes the acronym "PHP" - an odd geeky joke that is
common in technology circles when people have trouble naming things. GNU is another
recursive name that represents "GNU's Not Unix".

PHP/FI version 1.0 was never really used outside of Rasmus' own web site. With the
introduction of PHP/FI 2.0 this began to change. When PHP 3 was released in 1997, adoption
of PHP exploded beyond all belief.

PHP 3 Hits the Big Time


By the time 1997 arrived the number of web sites on the internet was growing exponentially
and most of these web sites were being implemented using the Apache web server. It was
around this time that Andy Guttmann and Zee Saransk launched the PHP 3 project, a project
designed to take PHP to the next level. One of the key achievements of the PHP 3 project was
to implement PHP as a robust Apache Module.

PHP 3 was implemented using a modular approach that made it easy for others to extend
functionality, and also introduced the first elements of object-orientation that would continue
to evolve through subsequent releases. The combination of PHP 3 and Apache quickly lead to
the widespread adoption of PHP, and it is commonly estimated that, at its peak adoption level,
PHP3 was used to power over 10% of all web sites on the internet.

PHP 4 - Optimization, Scalability and More


With PHP 4 Andi Guttmann and Zeev Saransk once again re-architected PHP from the
ground up. PHP 4 was built upon a piece of technology called the Zed Engine. The move to
the Zed Engine brought about a number of key improvements in PHP:

Support for other web servers (Microsoft's Internet Information Server (IIS)
being of particular significance).

Improved memory handling to avoid memory leaks (one of the most


difficult types of problems to isolate in a program).

Improved efficiency and performance to support large scale, complex,


mission critical enterprise application development using PHP.
In addition PHP 4 also built on the earlier Object Oriented Programming features of PHP 3
with the introduction of classes.

PHP 5 - Object Orientation, Error Handling and XML


The main, though far from only, feature of PHP 5 is the improved support for Object Oriented
Programming (OOP). In addition, PHP 5 introduced some features common in other
languages such as Java like try/catch error and exception handling.

PHP 5 also introduced new extensions aimed at easing the storage and manipulation of data
and easy to use database interface.

What exactly is PHP?


PHP is an intuitive, server side scripting language. Like any other scripting language
it allows developers to build logic into the creation of web page content and handle data
returned from a web browser. PHP also contains a number of extensions that make it easy to
interact with databases, extracting data to be displayed on a web page and storing information
entered by a web site visitor back into the database.

How Does PHP Work?


To develop an understanding of how PHP works it is helpful to first explore what happens
when a web page is served to a user's browser. When a user visits a web site or clicks on a
link on a page the browser sends a request to the web server hosting the site asking for a copy
of the web page. The web server receives the request, finds the corresponding web page file
on the file system and sends it back, over the internet, to the user's browser.

The following HTML contains some PHP script that is designed to output an HTML
paragraph tag as an example given below:-

<html>
<head>
<title>A PHP Example</title>
</head>
<body>

<?php
echo '<p>This line of HTML was generated by a PHP script embedded into an HTML
document</p>';
?>

</body>
</html>

The Difference between Cookies and PHP Sessions.


Both cookies and PHP sessions allow you to store data that is accessible across
different pages of your web site, but there are differences between the two approaches.
Cookies are stored on the hard drive of the visitor to your site and are, therefore, visible to
other domains you may host and run. They also have a long life and can be configured to
persist long after the user has left your site. Cookies are limited in size and quantity (4kb each
and a maximum of 20 cookies per domain).

PHP sessions, on the other hand, are stored on the web server. This means they are not
visible to other web servers you may have hosting your domain. They are also not limited in
size and can be used for storing secure data, since they are not transmitted to the client
browser in the way that cookies are.

The Structure of a Cookie


Cookies allow data to be stored in the form a name/value pair. Both the name and the
value are set at your discretion. For example you might want to write a cookie that store the
user name in the form username=JohnW. The cookie also contains additional information
such as an expiration date and a domain.

The format of a cookie is as follows:

name=value; expires=expirationDateGMT; path=URLpath; domain=site Domain

What is a PHP Session?


PHP Sessions allow web pages to be treated as a group, allowing variables to be shared
between different pages. One of the weaknesses of cookies is that the cookie is stored on the
user's computer (and by user we mean the person with the browser visiting your web site).
This provides the user the ability to access, view and modify that cookie for potentially
nefarious purposes. PHP sessions, on the other hand, store only an ID cookie on the user's
system which is used to reference the session file on the server. As such, the user has no
access to the content of the session file, thereby providing a secure alternative to cookies.
PHP sessions also work when the user has disabled the browser's cookie support. In this
situation it includes the session ID information in the web page URLs.

Creating a PHP Session


PHP sessions are created using the session_start() function which should the first function
call of the PHP script on your web page (i.e before any output is written to the output stream).

The following example demonstrates the creation of a PHP session:

<?php
session_start();
?>
<html>
<head>
<title>A PHP Session Example</title>
</head>
<body>
</body>
</html>

The PHP Code Delimiters


The first thing to understand is the need to use PHP code delimiters to mark the areas of PHP
code within the web page. By default, the opening delimiter is <?php and the closing
delimiter is ?>. You can insert as many or as few blocks of PHP into a web page as you need
as long as each block is marked by the opening and closing delimiters.

A sample PHP script block would, therefore, appear in an HTML file as follows:

<?php
echo '<p>This is a PHP script

</p>';

?>

Testing the PHP Installation


Before embarking on even the simplest of examples, the first step on the road to learning
PHP is to verify that the PHP module is functioning on your web server. To achieve this, we
will create a small PHP script and upload it to the web server. To do this start up your favorite
editor and enter the following PHP code into it:

<?php
phpInfo();
?>
This PHP script calls the built-in PHP phpInfo() function, the purpose of which to output
information about the PHP pre-processing module integrated into your web server.

Save this file as phpInfo.php and upload it to a location on your web server where it will be
accessible via a web browser. Once you have done this open a browser and go to the URL for
this file. If all is well with your PHP installation you will see several pages of detailed
information about your PHP environment covering topics such as how and when the PHP
module was built, the version of the module and numerous configuration settings. If you do
not see this information it is possible you do not have the PHP module integrated into your
web server. If you use a web hosting company, check with them to see if your particular
hosting package includes PHP support (sometimes PHP support is only provided with
premium hosting packages so you may need to upgrade). If you run your own web server
consult, the documentation for your particular type of server (Apache, Microsoft IIS etc) for
details on integrating the PHP module. There are vastly superior resources available on the
internet to assist in installing PHP than we could never match in this book. A healthy PHP
installation should result in output similar to the following:
1)Echo :- The PHP command /echo/ is a means of outputting text to the web browser.

2) Open :- The function /fopen/ to create a new file.

The three basic ways to open a file and the corresponding character that as:-

* *Read: 'r'*.

Open a file for read only use. The file pointer begins at the front of

the file.

* *Write: 'w'*.

The file pointer begins at the start of the file.

* *Append: 'a'*.

3) Close :- The function /fclose/ to close down a file after we done with it.

4) Read :- The function /fopen/ to open the file for reading.


5) Write :- Before we can write information to our test file we have to use the

function /fopen/ to open the file for writing.

6) Delete:- Before you can delete (unlink) a file, you must first be sure that it is not open in
your program. Use the /fclose/ function to close down an open file then use Unlink function
through which it will delete the file.

7) Truncate:- In this, it will shorten the files as it is used on files that contain data will only
that will only be used for a short time, before needing to be replaced.
INTRODUCTION TO HTML

HTML: an acronym for HyperText Markup Language, is the predominant markup


language for web pages. It provides a means to describe the structure of text-based
information in a documentby denoting certain text as links, headings, paragraphs, lists, etc.
and to supplement that text with interactive forms, embedded images, and other objects.
HTML is written in the form of "tags" that are surrounded by angle brackets. HTML can also
describe, to some degree, the appearance and semantics of a document, and can include
embedded scripting language code (such as JavaScript) that can affect the behavior of Web
browsers and other HTML processors.

Example
<html>
<body>

<h1>My First Heading</h1>

<p>My first paragraph.</p>

</body>
</html>

HTML Tags

HTML markup tags are usually called HTML tags.HTML tags are keywords surrounded by
angle brackets like

<html>

HTML tags normally come in pairs like <b> and </b>.The first tag in a pair is the start tag,
the second tag is the end tag. Start and end tags are also called opening tags and closing tags.

HTML Documents = Web Pages

HTML documents describe web pages

HTML documents contain HTML tags and plain text


HTML documents are also called web pages

The purpose of a web browser (like Internet Explorer or Firefox) is to read HTML
documents and display them as web pages. The browser does not display the HTML tags, but
uses the tags to interpret the content of the page:<html>

<body>

<h1>My First Heading</h1>

<p>My first paragraph</p>

</body>

</html>.

CSS

CSS is used to control the style and layout of multiple Web pages all at once. With CSS, all
formatting can be removed from the HTML document and stored in a separate file.CSS gives
you total control of the layout, without messing up the document content.

How to Use Styles

When a browser reads a style sheet, it will format the document according to it. There are
three ways of inserting a style sheet:

External Style Sheet

An external style sheet is ideal when the style is applied to many pages. With an external
style sheet, you can change the look of an entire Web site by changing one file. Each page
must link to the style sheet using the <link> tag. The <link> tag goes inside the head section.

<head>

<link rel="stylesheet" type="text/css" href="mystyle.css">

</head>
Internal Style Sheet

An internal style sheet should be used when a single document has a unique style. You define
internal styles in the head section with the <style> tag. <head>

<style type="text/css">

body {background-color: red}

p {margin-left: 20px}

</style>

</head>

Inline Styles

An inline style should be used when a unique style is to be applied to a single occurrence of
an element.

To use inline styles you use the style attribute in the relevant tag. The style attribute can
contain any CSS property. The example shows how to change the color and the left margin of
a paragraph:<p style="color: red; margin-left: 20px">

This is a paragraph

</p>

To learn more about styles, visit our CSS tutorial.

Style TagsTag Description

<style> Defines a style definition

<link> Defines a resource reference

<div> Defines a section in a document

<span>Defines a section in a document


<font> Deprecated. Use styles instead

<basefont> Deprecated. Use styles instead

<center> Deprecated. Use styles instead

HISTORY OF MYSQL SERVER

We started out with the intention of using the mySQL database system to connect to our
tables using our own fast low-level (ISAM) routines. However, after some testing, we came
to the conclusion that mSQL was not fast enough or flexible enough for our needs. This
resulted in a new SQL interface to our database but with almost the same API interface as
mySQL. This API was designed to allow third-party code that was written for use with
mySQL to be ported easily for use with MySQL.

MySQL is named after co-founder Monty Widenius's daughter, My.

The name of the MySQL Dolphin (our logo) is Sakila, which was chosen by the founders
of MySQL AB from a huge list of names suggested by users in our Name the Dolphin
contest. The winning name was submitted by Ambrose Twebaze, an Open Source software
developer from Swaziland, Africa. According to Ambrose, the feminine name Sakila has its
roots in SiSwati, the local language of Swaziland. Sakila is also the name of a town in
Arusha, Tanzania, near Ambrose's country of origin, Uganda.

What is a Database?

A database is a structure that comes in two flavors: a flat database and a relational database. A
relational database is much more oriented to the human mind and is often preferred over the
gabble-de-gook flat database that are just stored on hard drives like a text file. MySQL is a
relational database.

In a relational structured database there are tables that store data. The columns define which
kinds of information will be stored in the table. An individual column must be created for
each type of data you wish to store (i.e. Age, Weight, Height).
On the other hand, a row contains the actual values for these specified columns. Each row
will have 1 value for each and every column. For example a table with columns (Name, Age,
Weight-lbs) could have a row with the values (Bob, 65, 165). If all this relational database
talk is too confusing, don't despair. We will talk about and show a few examples

in the coming lessons.

Why Use a Database?

Databases are most useful when it comes to storing information that fits into logical
categories. For example, say that you wanted to store information of all the employees in a
company. With a database you can group different parts of your business into separate tables
to help store your information logically. Example tables might be: Employees, Supervisors,
and Customers. Each table would then contain columns specific to these three areas. To help
store information related to each employee, the Employees table might have the following
columns: Hire, Date, Position, Age, and Salary.
Introduction to Structure Query Language

Structured Query Language (SQL) is a language that provides an interface to relational


database systems. SQL was developed by IBM in the 1970s for use in System R, and is de
facto standard, as well as an ISO and ANSI standard. In common usage SQL also
encompasses DML (Data Manipulation Language), for INSERTs, DELETEs, UPDATEs and
DDL (Data Definition Language), used for creating and modifying tables and other database
structures.

The development of SQL is governed by standards. The American National Standard


Institute (ANSI) is an organization that approves certain standards in many industries. SQL
has been deemed the standard language in relational database communication, originally
approved in 1986 based on IBMs implementation. In 1987, the International Standards
Organization (ISO) accepted the ANSI SQL standard as the international standard.

SQL has been a command language for communication with the oracle 9i server from
any tool or application. Oracle SQL contains many extensions. When SQL statement is
entered, it is stored in a part of memory called the SQL buffer and remains there until a new
SQL statement is entered.

Features of SQL

1. SQL can be used by a range of users, including those with little or no programming
experience
2. It is a non procedural language
3. It reduces the amount of time required for creating and maintaining systems
4. It is an English-like language
Components of SQL

1. DDL (Data Definition language) It is a set of SQL commands used to create,


modify and delete database structures but not data. These commands are normally not
used by a general user, who should be accessing the database via an application. They
are normally used by DBA to a limited extent, a database designer or application
developer. These statements are immediate that is they are not susceptible to
ROLLBACK commands.
Examples:

Create
Alter
Drop etc
2. DML (Data Manipulation Language) It is the area of SQL that allows changing
data within database.
Examples:

Insert
Update
Delete
Lock etc
3. DCL (Data Control Language) It is the component of SQL statement that control
access to data and to the database. Occasionally DCL statements are grouped by DML
statements
Examples:

Commit
Savepoint
Rollback etc

4. DQL (Data Query Language) It is component of SQL statement that allows


getting data from the database and imposing ordering upon it. It includes the SELECT
statement. This command is the heart of SQL. It allows getting data out of database
perform operations with it. When a SELECT is fired against a table or tables the result
is compiled into a further temporary table, which is displayed or perhaps received by
the program that is a front end

Creating a MySQL User Account


The first task is to create a MySQL user account we can use for the purposes of
this chapter. To set up as user account you will need to log into MySQL using an
account that has suitable privileges. If you are unsure about which user account
to use speak to your system administrator or refer to the My SQL Documentation

Вам также может понравиться