Академический Документы
Профессиональный Документы
Культура Документы
INTRODUCTION
who can easily adapt to the challenging IT industry environment. Our programs are
designed with the current and emerging technologies, techniques, and practices.
industry-focused education at an affordable cost but also get specialized soft skills and
communication skills training, and special grooming and social skills training by
professionals, which run concurrently with the academic program as an integral part.
Since its inception, Global IT Success has been constantly delivering the best value to
programs imparted by us are highly effective and cater to the ongoing needs of the
MICROSOFT, EC-COUNCIL and many more prestigious IT vendors. With us you will
find a big selection of IT CERTIFICATION - starting from the most basic ones such as
MCSE, MCTS, and CCNA etc. right up to the most advanced courses such as MCITP,
1
Focused towards the career advancement while improving the skill set, Global IT
Success has proved to be a leading IT training and certification company in India. In the
past 10 years, we have helped several national and international candidates in achieving
their ultimate career and business goals. The key to our success include focused
Our association does not end here, after the completion of our IT training programs, in
case the students need some subject clarity regarding the courses they have attended, our
aspirants who are eager to build their career in this booming industry. We work closely
with industry and students to update and implement changes taking place in this ever-
changing IT industry. We conduct various online & offline training, testing and
PEARSON VUE, KRYTERION, PSI, MICROSOFT etc. We are in this industry from
This project addresses the growing need of certification that any organization requires
for their IT experts, which will validate their skills that the organization needs to adopt
in managing the latest technology and trends that drives desired business outcomes.
2
Being an IT professional, you may have witnessed immense growth in the Tech industry
over the years. To be a part of this ever-growing industry, it has become essential to
keep up with the technological changes, which demands the IT professionals to build
Organizations that do not value training and certification tend to see higher personnel
Organization benefits from the certified staff because certified staff understands the
common concepts speak in like terms and grow synergy within the organization. This
Other factors that result in lack of acquiring certifications from organizations perspective
are as follows:
1. The employees will have to seek various Centre’s and premises to get certified
which will decrease their working efficiency and will gradually lead to lack of
organization productivity.
2. There are possibilities that the vendor/s is not authorized and certifications
3
3. Organization can be in a state of dilemma with the reimbursement of the
4. Employee may lead to stress which will affect their working efficiency.
1.3. OBJECTIVE
The objective of my website is too aware the employees working in organizations about
an employee may not be aware of all, so this website help them to know and give test for
1.4 RECOMMENDATION
To help your organization succeed through higher win rates and greater efficiency,
c) Once you earn a certification from Global IT Success, then you join a unique
peer resource group when seeking answers to problems or sharing the solutions
4
d) The organization will not be perplexed when issuing reimbursement for varied
certifications.
for many companies rather than an add-on, staff that respond quickly, keep on
Furthermore, when you count industry and country/state-backed credentials among your
list of achievements, you present to your clients a very transparent view of your
capabilities.
There are myriads of reasons why you should seek out certification in a number of IT-
1. Credibility
2. Marketability
Global IT Success offers more than a dozen courses to help intellects achieve a sphere
of knowledge in their respective fields. These certifications help to build the right skills
We offer the latest, best and only industry-recognized certifications for industry seekers.
5
KRYTERION, PSI, MICROSOFT, EC-COUNCIL and many more prestigious IT
vendors.
1.5.2. HTML
It is a language used for the specification of structural markup. HTML give the web
authors the means to publish online documents with headings, texts, tables, lists, photos
etc.HTML is used in our program to create forms in the server side for entering, updating
e. HTML elements are represented by tags .HTML tags label pieces of content such
1.5.3. MYSQL
MySQL provides our small, medium and large enterprise customers with affordable,
open access to their web data warehouses. MySQL allows us to offer our System
Administrator low cost, low maintenance database solution for applications without
a. Easy to maintain & upgrade, does not have a slew of administrative tasks to put
up. It has cleanly separated table handler modules and can mix access to different
6
b. It is a relational database. Over the past several years, this relational database
management systems have become the most widely accepted way to manage
Technology Used
7
CHAPTER 2
REQUIREMENT ANALYSIS
What according to you is the most crucial step in the web design and development
interact with the client and take a lot of things into consideration. We need to have a
complete understanding of the service or product and know the complete requirements
of the client. Our technical experts ask a lot of questions unless they have gathered all
Purpose of the website: Our first goal is to know the purpose of the website so that we
get a clear idea of the business. The purpose of the website will also define its goals
Target audience: This is a very important factor while designing a website. We take
into consideration the age, sex and their interest. We can create a picture of the entire
website, its look and feel. This helps us to choose the ideal website color,
Functionalities and features: We try to know the exact functionalities the client wises
to have in the website and the various features. We ask them to offer reference websites
Even if the client has planned his website minutely, we being the experts offer relevant
8
2.2. Feasibility Considerations:
There are three key considerations to the feasibility study:
2.2.1. Economic
2.2.2. Technical
2.2.3. Behavioral
Economic analysis is the most frequently used method for evaluating the effectiveness of
determine the benefits and savings that are expected from a candidate system and
Technical feasibility centers on the existing computer system (hardware, software etc.)
and to what extent it can support the proposed addition. It involves financial
change. An estimate should be made of how strong a reaction the user staff is likely to
9
2.3 Gantt Chart of The Activity
A Gantt chart is a type of bar chart, developed by Henry Gantt that illustrates a project
schedule. A Gantt chart is a visual view of tasks scheduled over time. Gantt charts are
used for planning projects of all sizes and they are a useful way of showing what work is
scheduled to be done on a specific day. They also help you view the start and end dates
a) Homepage
b) Mobile Testing
c) Certification Offered
d) Contact Us
10
Figure 2.1: Homepage Gantt chart
11
Figure 2.3: Contact us
a) Process
b) Data Object
c) Data Store
d) External entity
12
Process
Transform of incoming data flow(s) to outgoing flow(s).
Dataflow
Movement of data in the system.
DataStore
Data repositories for data that are not moving. It may be as simple as a buffer or a queue or
a s sophisticated as a relational database.
ExternalEntity
Sources of destinations outside the specified system boundary.
Description: This is zero level DFD of our application which show the entity and the
application and the output of the application. There is only one type of user of this
application that is admin. Admin request as login if login id and password is correct than
admin can use the project and generate bill and take report in the form of output.
13
2.4.2: DFD -1 Level
14
2.5: E-R Diagram
15
2.5.1: ER Diagram
Usernam Email
Name Phon
e Password
e
Cad
User login data has User -id
Consist Date
of
Organize
by Timing
Exam Certificated
Id
Admin
Consist Certificated
of Offered
Username Password
Fig: 5.13: Entity Relationship Diagram
Position
16
2.6: Data Dictionaries
2.6.2.:Admin Login-Table
17
2.6.3: Certifications Data
18
2.6.4: Login ID
19
CHAPTER 3
SYSTEM DESIGN
GlobalITSucces
s
Certification
Home Mobile Testing Offered About Us Contact US
20
3.2 UML Diagrams
A use case diagram at its simplest is a representation of a user's interaction with the
system that shows the relationship between the user and the different use cases in which
the user is involved.
21
3.2.2: Class Diagram
A class diagram is an illustration of the relationships and source code dependencies
among classes in the Unified Modeling Language (UML). In this context, a class defines
the methods and variables in an object, which is a specific entity in a program or the unit
of code representing that entity.
22
3.2.3: Object Diagram
"An object diagram is a graph of instances, including objects and data values. A
static object diagram is an instance of a class diagram; it shows a snapshot of the
detailed state of a system at a point in time. The use of object diagrams is fairly limited,
namely to show examples of data structure’s
C: Client
23
3.2.4: Activity Diagram
Activity diagram describes the flow of control in a system. It consists of activities and
links. The flow can be sequential, concurrent, or branched.
Activities are nothing but the functions of a system. Numbers of activity diagrams are
prepared to capture the entire flow in a system.
Activity diagrams are used to visualize the flow of controls in a system. This is
prepared to have an idea of how the system will work when executed.
24
3.4.5: State Chart Diagram
Any real-time system is expected to be reacted by some kind of internal/external
events. These events are responsible for state change of the system.
State chart diagram is used to represent the event driven state change of a system. It
factors.
25
3.4.6: Component Diagram
During the design phase, software artifacts (classes, interfaces, etc.) of a system are
arranged in different groups depending upon their relationship. Now, these groups are
known as components.
Finally, it can be said component diagrams are used to visualize the implementation.
26
3.4.7: Collaboration Diagram
Collaboration diagram is another form of interaction diagram. It represents the
structural organization of a system and the messages sent/received. Structural
organization consists of objects and links.
27
3.4.8: Deployment Diagram
Deployment diagrams are a set of nodes and their relationships. These nodes are
physical entities where the components are deployed.
Deployment diagrams are used for visualizing the deployment view of a system. This is
generally used by the deployment team.
28
Chapter 4
Coding Homepage Screenshot
Figure.4.1
29
Mobile Testing Screenshot
Figure.4.2
30
Figure.4.3
31
ABOUT US SCREENSHOT
Figure.4.4
32
CONTACT US SCREENSHOT
Figure.4.5
33
CHAPTER 5
TESTING AND MAINTENANCE
5.1 Introduction
finding the software bugs. Software testing is any activity aimed at evaluating an
attribute or capability of a program or system and determining that it meets its required
results. Although crucial to software quality and widely deployed by programmers and
testers, software testing still remains an art, due to limited understanding of the
principles of software. The difficulty in software testing stems from the complexity of
software: we can not completely test a program with moderate complexity. Testing is
more than just debugging. The purpose of testing can be quality assurance, verification
and validation, or reliability estimation. Testing can be used as a generic metric as well.
Correctness testing and reliability testing are two major areas of testing. Software testing
It can also be stated as the process of validating and verifying that a software program or
application or product:
a. Meets the business and technical requirements that guided it’s design and
development
b. Works as expected
34
The definition of Software testing into the following parts:
5.1.2 All Life Cycle Activities: Testing is a process that’s take place throughout
a) The process of designing tests early in the life cycle can help to prevent defects from
being introduced in the code. Sometimes it’s referred as “verifying the test basis via
b) The test basis includes documents such as the requirements and design specifications.
c) Static Testing: It can test and find defects without executing code. Static Testing is
done during verification process. This testing includes reviewing of the documents
(including source code) and static analysis. This is useful and cost effective way of
the result of running tests. It’s done during validation process. For example: unit
e) Planning: We need to plan as what we want to do. We control the test activities, we
designing test cases report on testing progress and the status of the software under test.
f) Preparation: We need to choose what testing we will do, by selecting test conditions
and .
35
g) Evaluation: During evaluation we must check the results and evaluate the software
under test and the completion criteria, which helps us to decide whether we have
finished testing and whether the software product has passed the tests.
h) Software products and related work products: Along with the testing of code the
testing of requirement and design specifications and also the related documents like
Software Testing is the process of executing a program or system with the intent of
finding errors. OR, it involves any activity aimed at evaluating an attribute or capability
of a program or system and determining that it meets its required results. Software is not
unlike other physical processes where inputs are received and outputs are produced.
Where software differs is in the manner in which it fails. Most physical systems fail in a
fixed (and reasonably small) set of ways. By contrast, software can fail in many bizarre
ways. Detecting all of the different failure modes for software is generally infeasible.
Unlike most physical systems, most of the defects in software are design errors, not
generally it will not change until upgrades, or until obsolescence. So once the software is
shipped, the design defects -- or bugs -- will be buried in and remain latent until
activation.
Software bugs will almost always exist in any software module with moderate size: not
software is generally intractable -- and humans have only limited ability to manage
36
complexity. It is also true that for any complex systems, design defects can never be
Discovering the design defects in software, is equally difficult, for the same reason of
complexity. Because software and any digital systems are not continuous, testing
boundary values are not sufficient to guarantee correctness. All the possible values need
to be tested and verified, but complete testing is infeasible. Exhaustively testing a simple
program to add only two integer inputs of 32-bits (yielding 2^64 distinct test cases)
would take hundreds of years, even if tests were performed at a rate of thousands per
second. Obviously, for a realistic software module, the complexity can be far beyond the
example mentioned here. If inputs from the real world are involved, the problem will get
worse, because timing and unpredictable environmental effects and human interactions
A further complication has to do with the dynamic nature of programs. If a failure occurs
during preliminary testing and the code is changed, the software may now work for a
test case that it didn't work for previously. But its behavior on pre-error test cases that it
passed before can no longer be guaranteed. To account for this possibility, testing should
An interesting analogy parallels the difficulty in software testing with the pesticide,
known as the Pesticide Paradox .Every method you use to prevent or find bugs leaves a
residue of subtler bugs against which those methods are ineffectual. But this alone will
not guarantee to make the software better, because the Complexity Barrier principle
states: Software complexity (and therefore that of bugs) grows to the limits of our ability
37
to manage that complexity. By eliminating the (previous) easy bugs you allowed another
escalation of features and complexity, but his time you have subtler bugs to face, just to
retain the reliability you had before. Society seems to be unwilling to limit complexity
because we all want that extra bell, whistle, and feature interaction. Thus, our users
always push us to the complexity barrier and how close we can approach that barrier is
largely determined by the strength of the techniques we can wield against ever more
broadly deployed in every phase in the software development cycle. Typically, more
than 50% percent of the development time is spent in testing. Testing is usually
a) To improve quality
As computers and software are used in critical applications, the outcome of a bug can be
severe. Bugs can cause huge losses. Bugs in critical systems have caused airplane
crashes, allowed space shuttle missions to go awry, halted trading on the stock market,
and worse. Bugs can kill. Bugs can cause disasters. The so-called year 2000 (Y2K) bug
has given birth to a cottage industry of consultants and programming tools dedicated to
making sure the modern world doesn't come to a screeching halt on the first day of the
next century. In a computerized embedded world, the quality and reliability of software
Quality means the conformance to the specified design requirement. Being correct, the
38
minimum requirement of quality, means performing as required under specified
find out design defects by the programmer. The imperfection of human nature makes it
almost impossible to make a moderately complex program correct the first time. Finding
the problems and get them fixed, is the purpose of debugging in programming phase.
Just as topic Verification and Validation indicated, another important purpose of testing
is verification and validation (V&V). Testing can serve as metrics. It is heavily used as a
tool in the V&V process. Testers can make claims based on interpretations of the testing
results, which either the product works under certain situations, or it does not work. We
can also compare the quality among different products under the same specification,
We cannot test quality directly, but we can test related factors to make quality visible.
Quality has three sets of factors -- functionality, engineering, and adaptability. These
three sets of factors can be thought of as dimensions in the software quality space. Each
dimension may be broken down into its component factors and considerations at
successively lower levels of detail. Table 1 illustrates some of the most frequently cited
quality considerations. Good testing provides measures for all relevant factors. The
importance of any particular factor varies from application to application. Any system
where human lives are at stake must place extreme emphasis on reliability and integrity.
In the typical business system usability and maintainability are the key factors, while for
39
effective, must be geared to measuring each relevant factor and thus forcing quality to
become tangible and visible. Tests with the purpose of validating the product works are
named clean tests, or positive tests. The drawbacks are that it can only validate that the
software works for the specified test cases. A finite number of tests can not validate that
the software works for all situations. On the contrary, only one failed test is sufficient
enough to show that the software does not work. Dirty tests, or negative tests, refers to
the tests aiming at breaking the software, or showing that it does not work. A piece of
A testable design is a design that can be easily validated, falsified and maintained.
Because testing is a rigorous effort and requires significant time and cost, design for
Software reliability has important relations with many aspects of software, including the
structure, and the amount of testing it has been subjected to. Based on an operational
profile (an estimate of the relative frequency of use of various inputs to the
program, testing can serve as a statistical sampling method to gain failure data for
reliability estimation.
Software testing is not mature. It still remains an art, because we still cannot make it a
science. We are still using the same testing techniques invented 20-30 years ago, some of
which are crafted methods or heuristics rather than good engineering methods. Software
40
testing can be costly, but not testing software is even more expensive, especially in
places that human lives are at stake. Solving the software-testing problem is no easier
than solving the Turing halting problem. We can never be sure that a piece of software is
correct. We can never be sure that the specifications are correct. No verification system
can verify every correct program. We can never be certain that a verification system is
correct either.
a) Correctness testing
Correctness testing will need some type of oracle, to tell the right behavior from the
wrong one. The tester may or may not know the inside details of the software module
under test, e.g. control flow, data flow, etc. Therefore, either a white-box point of view
or black-box point of view can be taken in testing software. We must note that the black-
box and white-box ideas are not limited in correctness testing only.
b) Black-box testing
The black-box approach is a testing method in which test data are derived from the
specified functional requirements without regard to the final program structure. It is also
functionality of the software module is of concern, black-box testing also mainly refers
41
examination of their input and output data. The tester treats the software under test as a
black box -- only the inputs, outputs and specification are visible, and the functionality is
are exercised and the outputs are compared against specification to validate the
correctness. All test cases are derived from the specification. No implementation details
It is obvious that the more we have covered in the input space, the more problems we
will find and therefore we will be more confident about the quality of the software.
Ideally we would be tempted to exhaustively test the input space. But as stated above,
exhaustively testing the combinations of valid inputs will be impossible for most of the
programs, let alone considering invalid inputs, timing, sequence, and resource variables.
worse, we can never be sure whether the specification is either correct or complete. Due
ambiguity is often inevitable. Even if we use some type of formal or restricted language,
we may still fail to write down all the possible cases in the specification. Sometimes, the
every situation that can be encountered using limited words. And people can seldom
specify clearly what they want -- they usually can tell whether a prototype is, or is not,
what they want after they have been finished. Specification problems contributes
The research in black-box testing mainly focuses on how to maximize the effectiveness
42
of testing with minimum cost, usually the number of test cases. It is not possible to
exhaust the input space, but it is possible to exhaustively test a subset of the input space.
Partitioning is one of the common techniques. If we have partitioned the input space and
assume all the input values in a partition is equivalent, then we only need to test one
representative value in each partition to sufficiently cover the whole input space.
Domain testing partitions the input domain into regions and consider the input values in
each domain an equivalent class. Domains can be exhaustively tested and covered by
interest. Experience shows that test cases that explore boundary conditions have a higher
payoff than test cases that do not. Boundary value analysis requires one or more
boundary values selected as representative test cases. The difficulties with domain
testing are that incorrect domain definitions in the specification can not be efficiently
discovered.
Good partitioning requires knowledge of the software structure. A good testing plan will
not only contain black-box testing, but also white-box approaches, and combinations of
the two.
c) White-box testing
box testing, as the structure and flow of the software under test are visible to the tester.
Testing plans are made according to the details of the software implementation, such as
programming language, logic, and styles. Test cases are derived from the program
43
design-based testing
There are many techniques available in white-box testing, because the problem of
software under test. The intention of exhausting some aspect of the software is still
strong in white-box testing, and some degree of exhaustion can be achieved, such as
executing each line of code at least once (statement coverage), traverse every branch
statements (branch coverage), or cover all the possible combinations of true and false
Control-flow testing, loop testing, and data-flow testing, all maps the corresponding
flow structure of the software into a directed graph. Test cases are carefully selected
based on the criterion that all the nodes or paths are covered or traversed at least once.
By doing so we may discover unnecessary "dead" code -- code that is of no use, or never
In mutation testing, the original program code is perturbed and many mutated programs
are created, each contains one fault. Each faulty version of the program is called a
mutant. Test data are selected based on the effectiveness of failing the mutants. The more
mutants a test case can kill, the better the test case is considered. The problem with
mutation testing is that it is too computationally expensive to use. The boundary between
black-box approach and white-box approach is not clear-cut. Many testing strategies
mentioned above, may not be safely classified into black-box testing or white-box
testing. It is also true for transaction-flow testing, syntax testing, finite-state testing, and
many other testing strategies not discussed in this text. One reason is that all the above
44
techniques will need some knowledge of the specification of the software under test.
Another reason is that the idea of specification itself is broad -- it may contain any
We may be reluctant to consider random testing as a testing technique. The test case
selection is simple and straightforward: they are randomly chosen. Study in indicates
that random testing is more cost effective for many programs. Some very subtle errors
can be discovered with low cost. And it is also not inferior in coverage than other
carefully designed testing techniques. One can also obtain reliability estimate using
testing with other testing techniques may yield more powerful and cost-effective testing
strategies.
d) Performance testing
Not all software systems have specifications on performance explicitly. But every
system will have implicit performance requirements. The software should not take
infinite time or infinite resource to execute. "Performance bugs" sometimes are used to
refer to those design problems in software that cause the system performance to degrade.
Performance has always been a great concern and a driving force of computer evolution.
throughput, stimulus-response time and queue lengths detailing the average or maximum
number of tasks waiting to be serviced by selected resources. Typical resources that need
45
to be considered include network bandwidth requirements, CPU cycles, disk space, disk
access operations, and memory usage. The goal of performance testing can be
e) Reliability testing
related to many aspects of software, including the testing process. Directly estimating
profile, software testing (usually black-box testing) can be used to obtain failure data,
and an estimation model can be further used to analyze the data to estimate the present
reliability and predict future reliability. Therefore, based on the estimation, the
developers can decide whether to release the software, and the users can decide whether
to adopt and use the software. Risk of using software can also be assessed based on
reliability information advocates that the primary goal of testing should be to measure
There is agreement on the intuitive meaning of dependable software: it does not fail in
unexpected or catastrophic ways. Robustness testing and stress testing are variances of
The robustness of a software component is the degree to which it can function correctly
46
in the presence of exceptional inputs or stressful environmental conditions. Robustness
testing differs with correctness testing in the sense that the functional correctness of the
software is not of concern. It only watches for robustness problems such as machine
therefore robustness testing can be made more portable and scalable than correctness
testing. This research has drawn more and more interests recently, most of which uses
Stress testing, or load testing, is often used to test the whole system rather than the
software alone. In such tests the software or system are exercised with or beyond the
specified limits. Typical stress includes resource exhaustion, bursts of activities, and
a) Security testing
Software quality, reliability and security are tightly coupled. Flaws in software can be
exploited by intruders to open security holes. With the development of the Internet,
Many critical software applications and services have integrated security measures
against malicious attacks. The purpose of security testing of these systems include
identifying and removing software flaws that may potentially lead to security violations,
and validating the effectiveness of security measures. Simulated security attacks can be
47
b) Testing automation
Software testing can be very costly. Automation is a good way to cut down time and
cost. Software testing tools and techniques usually suffer from a lack of generic
process, we have to have some ways to generate oracles from the specification, and
generate test cases to test the target software against the oracles to decide their
correctness. Today we still don't have a full-scale system that has achieved this goal. In
general, significant amount of human intervention is still needed in testing. The degree
testing, the simple specification and oracle: doesn't crash, doesn't hang suffices. Similar
5.2 Maintenance
The development of your web site is not necessarily over, though. One way to bring
repeat visitors to your site is to offer new content or products on a regular basis. Most
web designers will be more than happy to continue working together with you, to update
the information on your web site. Many designers offer maintenance packages at
reduced rates, based on how often you anticipate making changes or additions to your
web site.
If you prefer to be more hands on, and update your own content, there is something
called a CMS (Content Management System) that can be implemented to your web site.
48
This is something that would be decided upon during the Planning stage. With a CMS,
your designer will utilize online software to develop a database driven site for you.
A web site driven by a CMS gives you the ability to edit the content areas of the web site
yourself. You are given access to a back-end administrative area, where you can use an
online text editor (similar to a mini version of Microsoft Word). You all be able to edit
existing content this way, or if you are feeling more adventurous, you can even add new
It’s really up to you as far as how comfortable you feel as far as updating your own web
site. Some people prefer to have all the control so that they can make updates to their
own web site the minute they decide to do so. Others prefer to hand off the web site
entirely, as they have enough tasks on-hand that are more important for them to handle
directly.
Thats where the help of a your web designer comes in, once again, as they can take over
the web site maintenance for you one less thing for you to do is always a good thing in
Other maintenance type items include SEO (Search Engine Optimization) and SES
(Search Engine Submission). This is the optimization of you web site with elements
such as title, description and keyword tags which help your web site achieve higher
rankings in the search engines. The previously mentioned code validation is something
49
There are a lot of details involved in optimizing and submitting your web site to the
search engines enough to warrant its own post. This is a very important step, because
even though you now have a web site, you need to make sure that people can find it!
After implementation of the system, maintenance phase looks for all the activity that is
mandatory to keep the system operational. There are two major types of maintenance
Even after putting extra efforts and expertise on board for developing flawless software,
it is practically not possible to have fault free system. We do look into the system even
after installed in production for defects. The defects popped up during the usage of the
system need to be fixed and this type of fixing will fall under corrective maintenance.
It has been observed that user come up with some uncovered requirement which was not
a part of requirement analysis phase, but they got to know new things only after using
the system. Usage of the system helps the user to define their requirement more
accurately. This requirement may cause the modification is accepted and installed
Testing the changes were done during adaptive and corrective maintenance
Retesting all old parts, those were not the part of changes.
50
5.3: TEST CASES
Table 5.1 Login: This table includes the information of login module
Valid Login User Id, Login Success Login Success Test Passed!
Password Control
Transferred to
Menu
Invalid Login User Id, Login Failed Login Failed Test Passed!
Password Try Again
Invalid Login Null, Null Login Failed Login Failed Test Passed!
Try Again
51
Table 5.2: This table includes the information of Register module
Output Output
Success
Try again.
52
CHAPTER 6
CONCLUSION
There was a lot of fun in making this project. This project was very useful to us as it
provided us the inside view of the planning and implementation of the data base. In this
project we had to think about the various options which we can provide to user. The
implementation was not easy as we had to look into the minute details in order to
achieve my goals. We have tried to make this project user friendly and also interactive
by providing many features. We are satisfied by achieving the goals for which we had
planned. A lot of experimental work can be done with this project. Looking forward for
The result of the Global It Success is that it supports many type of different-different
criteria for Certificated Offered and the individual user with unique interface, through
which the Candidate Can Solve problems are solved within given time and it shows
efficiency in the internal messaging system and results in accurate task scheduling
In this sense, Data Mining (DM) can contribute with important benefits to the
gathered by Certificated provide and obtain models and patterns which can improve
53
CHAPTER 7
FUTURE SCOPE OF THE PROJECT
a) I’m adamantly in the camp of putting the majority of your focus into the
fundamentals- not the newest fringe technologies simply because everyone is talking
about them.
b) The web development landscape is evolving at such a rapid pace that it’s far more
c) This obviously doesn’t mean the future scope of web development isn’t important.
So long as you’re thinking about it for the right reasons, it can be fun and exciting to
look ahead and make bold predictions about the future of programming.
d) I mention this in other answers, but here are a few things I see on the horizon:
e) ES6 is the future of web development. With JavaScript now dominating the lives of
tons of web developers, its future is bright. ES6 is a superset of JavaScript, and it’s
pretty clear that ES6 is the future of the internet. It supports a lot of features that
thinking ideas in addition to concepts that are easy to understand from a traditional
f) Reacts will start a revolution. React and Flux have sparked a conversation around the
idea of components, or small, reusable widgets of web applications that are easy to
build out.
54
REFERENCES
[1] Graham, I. S. (1995). The HTML sourcebook. John Wiley & Sons, Inc..
[2] Musciano, C., & Kennedy, B. (1996). HTML, the definitive Guide. O'Reilly &
Associates.
[3] Raggett, D., Le Hors, A., & Jacobs, I. (1999). HTML 4.01 Specification. W3C
recommendation, 24.
Comprehensive Resource for HTML, CSS, DOM & JavaScript. " O'Reilly
Media, Inc.".
[5] Robbins, J. N. (2012). Learning web design: A beginner's guide to HTML, CSS,
[6] Stark, J. (2010) with HTML, CSS, and JavaScript. " O'Reilly Media, Inc.".
[7] Powell, T. A. (2010). HTML and CSS: The Complete Reference, Complete
[8] Duckett, J. (2011). HTML and CSS: design and build websites. John Wiley &
Sons.
[9] Lie, H. W., & Saarela, J. (1999). Multipurpose Web publishing using HTML,
[10] Lal, R., & Chava, L. C. (2010). Developing web widget with HTML, CSS, JSON
[11] Robson, E., & Freeman, E. (2005). Head First Html With CSS & XHTML. "
55
[12] Peroni S, Shotton D. 2012. FaBiO and CiTO: ontologies for describing
[13] Spinaci G, Peroni S, Di Iorio A, Poggi F, Vitali F. 2017. The RASH Javascript
[14] Sporny M. 2015. HTML+RDFa 1.1: support for RDFa in HTML4 and HTML5.
[16] Walsh N. 2009. The DocBook Schema Version 5.0. OASIS Standard, 1
Information Standards.
[17] Kamini, Silky Sachar, Sonia Suneja(2017), “Review Paper on Mean Stack for Web
[18] Bonny Alex Ninan, Sooraj S. R. and AnanthakrishnanBaji, Manoj C., Anoop M.
56
Research (IJIR),Vol-2, Issue-4, ISSN: 2454-1362
TCP/ABR and rate adaptive TCP/IP,” M. Eng. thesis, Indian Institute of Science,
[22] Badros, G. J., Borning, A., Marriott, K. and Stuckey, P.; Constraint Cascading
Style Sheets for the Web; Technical Report UW CSE 99-05-01; Reprinted in
Proceedings of the 12th annual ACM symposium on User interface software and
[23] Behlendorf, B.; Re: Cascading HTML style sheets – a proposal; Message posted
[24] Burnard, L.; FOSI/sgml stylesheets; Message posted to www-talk 27 Oct 1993
[25] Furuta, R., Scofield, J. and Shaw, A; Document Formatting Systems: Survey,
[26] Glazman, D.; Simple Tree Transformation Sheets 2; W3C Note 17 Oct 1997
[27] Graham, S. L., Harrison, M. A. and Munson, E. V.; The Proteus Presentation
57
System; University of California, Berkeley, California; The paper appeared in the
[29] Raggett, D.; HTML 3.2 Reference Specification; W3C Recommendation 14 Jan
1997
[31] Raggett, D.; Standardizing new HTML features; Message posted to www-talk 27
Apr 1993
[32] Raggett, D.; Re: Standardizing new HTML features; Message posted to www-
[33] Clark, J. (editor); Associating Style Sheets with XML documents, Version 1.0;
[34] Adler, S., Berglund, A., Caruso, J., Deach, S., Graham, T., Grosso, P., Gutentag,
E., Milowski, A., Parnell, S., Richman, J. and Zilles, S.; Extensible Stylesheet
58
and Analysis
[36] A. Bertolino, G. DeAngelis, and A. Sabetta. VCR: Virtual capture and replay for
http://robertvbinder.com/open-source-tools-for-model-basedtesting.
[38] S. Bucur, V. Ureche, C. Zamfir, and G. Candea. Parallel symbolic execution for
on Computer Systems
Workshop on Program Analysis for Software Tools and Engineering, pages 2–8,
Nov. 2002.
[40] C. Cadar, D. Dunbar, and D. Engler. KLEE: Unassisted and automatic generation
[41] C. Cadar and D. R. Engler. Execution generated test cases: How to make systems
Software
59
and W. Visser. Symbolic execution for software testing in practice: Preliminary
Engineering
[43] N. Chen and S. Kim. Puzzle-based automatic testing: Bringing humans into the
[45] ] D. Garg and A. Datta. Test case prioritization due to database changes in web
[46] M. J. Harrold, R. Gupta, and M. L. Soffa. A methodology for controlling the size
60
[49] H. Hemmati, A. Arcuri, and L. Briand. Achieving scalable model-based testing
[50] P. Puschner and R. Nossal. Testing the results of static worst-case execution-
61