Академический Документы
Профессиональный Документы
Культура Документы
Submitted by:
Vaibhav Kumar (16/FCA/BCA/114)
Sonu Kashyap (16/FCA/BCA/107)
Mayank Gupta (16/FCA/BCA/087)
SIGNATURE
Page 2 of 72
Certificate from the Guide
This is to certify that the project report entitled
“_________________________________________” submitted in partial fulfillment of the
degree of BACHELOR OF COMPUTER APPLICATIONS (BCA) to Manav Rachna
International Institute of Research and Studies, Faridabad is carried out by Mr./
Ms.______________(RollNo), _______________(RollNo), ______________(RollNo) under
my guidance.
Name:
Date:
Head of Department
Name:
Date:
Page 3 of 72
ACKNOWLEDGEMENT
The satisfaction that accompanies that the successful completion of any work or task would
be incomplete without the mentioned people, whose constant guidance and encouragement
crowned all efforts with success.
We are grateful to our project guide Mr. Siddharth Verma for the guidance, inspiration and
constructive suggestions that helped us in the successful preparation and completion of the
project.
Page 4 of 72
Table of Content
Page
S. No Title
No
System Study
a. Introduction
1 6
b. Existing System Along with Limitations
c. Proposed System Along with Advantages
Feasibility Study
a. Technical Feasibility
2 10
b. Economic Feasibility
c. Operational Feasibility
Project Monitoring System
3 14
a. Gantt Chart
System Analysis
a. Requirement Specification
4 19
b. System Flow Chart
c. DFD’s and ERD’s
System Design
5 22
a. File/Data Design
Input/Output Form Design
6 a. Screen Design 30
b. Report Diagram
System Testing
a. Preparation of Test Data
7 37
b. Testing live data
c. Test cases with result
System Implementation
8 54
a. System Requirement
9 Documentation 56
Page 5 of 72
Chapter-1
System Study
Page 6 of 72
Introduction
1. Overview
We are developing an online event managing system which is capable on organizing
event for the faculty, making his/her work easy.
Project include a user management module which is capable on enrolling new users
and providing login portal to the existing users.
As users records are maintained within the system, so student can directly enroll in an
event without disturbing the faculty in charge.
With one click faculty in charge and can check and update enrolled students data.
As the data is centralized so it can be directly shared with any faculty member which
gives other faculties advantage of checking attendance whenever they want.
Registered users can any time access the event details and also they will be
automatically informed about any upcoming event that faculty updates.
2. Objective
Management of Event Organized within organisations.
Generate reports of student and events.
Able to hold important documents in repositories for faculty.
Allow users to update their information.
Enrolment of users by request method to protect system from fake ids.
Current system for managing event is somewhat technical. Still it is not fully automated in
college. Most of the records of the students and their enrolment in an event is maintained on a
piece of paper. This make it difficult for the faculty in charge of that event to maintain
records. If somehow any document is lost it also causes problem. Also informing other
faculties and departments about the updated event details is very hard. Due to not proper
information sharing the students are able to get proxy attendance of the lecture by giving the
excuse of the event. Records of event is hard to maintain for long period of time and can
easily get lost which can make organising new event a bit difficult.
Page 7 of 72
After study of current system we found following problems and weaknesses in the
system:-
As discussed above there are many problem with the currently working system. It is problem
for both faculties and students those are organising an event in the campus. To overcome of
the problem and weakness the current system we provide a much better and automated
system.
Page 8 of 72
Proper records are maintained of events by the system of occurring, current and past
events.
These records are easily accessible by all the faculties enrolled in system.
System also provide another advantage to faculties by providing a repository which
stores templates of important documents in it.
Faculty can check and search for any students details using our system.
2. Features
Registration and Login portal for all users.
Password recovery module.
Easy to create and maintain event.
Enrolment super simple.
Online event attendance.
Quickly access student details.
Repository to store important documents.
Conclusion
At the end I would like to say that the web application named “Event Management Web
Application” will make organising events in organisations much easier and will also help
management team in organizing an event.
Page 9 of 72
Chapter-2
Feasibility Study
Page 10 of 72
Introduction
A feasibility study aims to objectively and rationally uncover the strengths and weaknesses of
an existing business or proposed venture, opportunities and threats present in the natural
environment, the resources required to carry through, and ultimately the prospects for
success. In its simplest terms, the two criteria to judge feasibility are cost required
and value to be attained.
A feasibility study evaluates the project's potential for success. Therefore, perceived
objectivity is an important factor in the credibility of the study for potential investors and
lending institutions. It must therefore be conducted with an objective, unbiased approach to
provide information upon which decisions can be based.
After doing the project Event Management Web Application, study and analysing all the
existing or required functionalities of the system, the next task is to do the feasibility study
for the project. All projects are feasible–given unlimited resources and infinite time.
Feasibility study includes consideration of all the possible ways to provide a solution to the
given problem. The proposed solution should satisfy all the user requirements and should be
flexible enough so that future changes can be easily done based on the future upcoming
requirements.
The feasibility we did while creating our project are listed as follows:-
1. Technical Feasibility
2. Economic Feasibility
3. Operational Feasibility
Page 11 of 72
1. Technical Feasibility
In this feasibility study we studies the base line of the project.
We Checked that we have enough technical support to finish this project i.e. have
required set of software and hardware.
We checked that is possible to make this project with the technical skills we have.
We check that do we have enough technical knowledge to solve any problem that we
encounter while creating this project.
Also we studied all the modules that we need to make this project.
We also check that we have enough technical support to make this project possible.
We also checked that we have enough men power to finish this project in time.
We also studied and created this project flexible.
We wanted this product to easily adapt requirement provided by the end user.
We also studied to create this in a way that we add more modules in future that can
make it more user-friendly.
2. Economic Feasibility
In this study about the cost and time this project can take in completion.
This first thing we needed was an online database on a server and for that we need to
purchase a server space.
As our project is a web application in needed to host on a server for which we needed
to purchase a hosting space.
For working on this project we need some software like Visual Studio Ultimate which
was a paid application.
For connecting to the database we are using a software known as Database.net pro
which is again a paid version.
We also calculated that after completion of the project we can sell this project in
organisations like schools and colleges.
We studied that these projects are in high demand in market as every organisation
wants to save time and man power.
Page 12 of 72
3. Operational Feasibility
In this study we focused on making a user friendly UI.
We also focused on creating less screens for completing a task.
Website is divided in well-defined section which makes it easy for the user to
navigate which the web application.
Application UI is simple and mostly self-explanatory to the user.
Well defined instructions are provided in the page if any page requires user’s input.
Only needed data is asked from the user. No unnecessary data is asked in order to
irritate the user.
We also checked that the students are not able to access any admin or faculty related
pages by typing faculty or admin URL.
In website navigation is provided because of security reasons.
Page 13 of 72
Chapter-3
Project Monitoring
System
Page 14 of 72
Introduction
Project Monitoring System is the process of planning, organising, motivating, and controlling
resources, procedures and protocols to achieve specific goals in scientific or daily problems.
A project is a temporary endeavour designed to produce a unique product, service or result
with a defined beginning and end (usually time-constrained, and often constrained, funding or
deliverables), undertaken to meet unique goals and objectives, typically to bring about
beneficial change or added value. The temporary nature of projects stands in contrast with
business as usual, which are repetitive, permanent, or semi-permanent functional activities to
produce products or services. In practice, the management of these two systems is often quite
different, and as such requires the development of distinct technical skills and management
strategies.
Gantt chart
1. Introduction
A Gantt chart is a type of bar chart, first developed by Karol Adamiecki in 1986, and
independently by Henry Gantt in the 1910’s, that illustrates a project schedule. Gantt
charts illustrate the start and finish dates of the terminal elements and summary
elements of the project. Terminal elements and summary elements comprise the work
breakdown structure of the project. Modern Gantt charts also show the dependency
(i.e., precedence network) relationships between activities. Gantt charts can be used to
show current schedule status using percent-complete shadings.
Page 15 of 72
members can find Gantt charts meaningful as they plug their own work habits into the
overall project schedules.
Coordination: for project managers and resource schedulers, the benefits of a Gantt
chart include the ability to sequence events and reduce the potential for overburdening
team members. Some project managers even use combinations of charts to break
down projects into more manageable sets of tasks.
Creativity: sometimes, a lack of time or resources forces project managers and teams
to find creative solutions. Seeing how individual tasks intervene on Gantt charts often
encourages new partnerships and collaborations that might not have evolved under
traditional task assignment systems.
Time Management: most managers regard scheduling as one of the major benefits of
Gantt charts in a creative environment. Helping teams understand the overall impact
of the project delays can foster stronger collaboration while encouraging better task
organisation.
Flexibility: whether you use excel to generate Gantt charts or you load tasks into a
more precise chart generator, the ability to issue new charts as your project evolves
lets you react to unexpected changes in project scope or timeline. While revising your
project schedule too frequently can eliminate some of the other benefits of Gantt
charts, offering a realistic view of a project can help team members recover from
setbacks or adjust to other changes.
Manageability: for project managers handling complex assignments, like software
publishing or event planning, the benefits of Gantt charts include externalising
assignments. By visualising all of the pieces of a project puzzle, managers can make
more focused, effective decisions about resources and timetables.
Page 16 of 72
Data Table for Gantt chart
No. Of Days
Tasks Start Date
to Complete
repository 29-Mar-19 5
Page 17 of 72
Gantt Chart of Event Management Web Application
create database
Registration form
Login form
password reset
admin dashboard
student dashboard
create event
update event
display event
enrol student
student attendance
profile page
student request
edit profile
repository
finalizing project
Page 18 of 72
Chapter-4
System Analysis
Page 19 of 72
Data Flow Diagram
It is a graphical representation of the data. It identifies the path the data will take, what
process will take place and how the project will move from one step to another. Basically it is
the pictorial representation of the project to show diagrammatically the working of the
project.
A DFD as a graphical representation of the flow of data through an information system. It can
be used to provide a clear and simple picture of any function or process. It does not provide
information or detailed content about anything but gives an overlook of the project.
Data flow diagrams are composed of the four basic symbols shown below:
The external entity symbol represents sources of data to the system or destination of
data from the system.
The data flow symbol represents the movement of data.
The data store symbol represents data that is not moving (delayed data at rest).
The process symbol represents an activity that transforms or manipulates the data
(combines, reorders, converts, etc.).
Any system can be represented at any level of detail by these four symbols.
Process Symbol
Page 20 of 72
Context Diagram
The context diagram is a top-level view of an information system but shows the boundaries
and scope of the system. It describes the main objective of the system and the entities
involved.
Entity-Relationship Diagram(ERP)
Page 21 of 72
Chapter-5
System Design
Page 22 of 72
The purpose of System Design is to create a technical solution. That satisfies the functional
requirements for the system. At this Point in the project lifecycle there should be a
Functional Specification, written primarily in business terminology, containing a complete
description of the operational needs of the various organizational entities that will use the
new system. The Challenge is to translate all of this information into Technical Specifications
that accurately describe the design of the system, and that can be used as input to System
Construction. Thee Functional Specification produced during System Requirements Analysis
is transformed into a physical architecture. System components are distributed across the
physical architecture, usable interfaces are designed and prototyped, and Technical
Specifications are created for the Application Developers, enabling them to build and test the
system. Many organizations look at System Design primarily as the Preparation of the system
component specifications; however, Constructing the various system components is only one
of a setoff major steps in successfully building a system. The preparation of the environment
needed to build the system, the testing of the system, and the migration and preparation of the
data that will ultimately be used by the system are equally important. In addition to
designing the technical solution, System Design is the time to initiate focused planning
efforts for both the testing and data preparation activities.
The term database design can be used to describe many different parts of the design of an
overall database system. Principally, and most correctly, it can be thought of as the logical
design of the base data structures used to store the data. In the relational model these are the
tables and views. In an Object database the entities and relationships map directly to object
classes and named relationships. However, the term database design could also be used to
apply to the overall process of designing, not just the base data structures, but also the forms
and queries used as part of the overall database application within the Database Management
System or DBMS.
Page 23 of 72
All information systems create, read, update, and delete data. This data is stored in files and
databases. A file is a collection of similar records. A database is a collection of interrelated
files. A database is not merely a collection of files. The records in each file must allow for
relationships to the records in other files.
There is a fundamental difference between the file and database environments. In the file
environment, data storage is built around the applications that will use the files. In the
database environment, applications will be built around the integrated database.
In most organizations, many existing information systems and applications are built around
conventional files. Conventional files are relatively easy to design and implement because
they are normally designed for use with a single application or information system. If the end
user’s output requirements are clearly understood, then the data that will be have to be
captured and stored to produce those outputs can be easily determined and the best file
organization for those requirements can be defined.
Another advantage of conventional files has been processing speed. They can be optimized
for the access of the application. At the same time, they can rarely be optimized for shared
use by different applications or systems.
Conventional files also have numerous disadvantages. Duplication of data items in multiple
files is normally cites as the principal disadvantage of file-based systems. Files tend to be
built around single applications without regard to other applications. Over time, because
many applications have common data needs, the common data elements get stored
redundantly in many different files. This duplicate data results in duplicate inputs, duplicate
maintenance, duplicate storage and possibly data integrity problems. A significant
disadvantage of files is their inflexibility and non-scalability. Files are typically designed to
support a single application’s current requirements and programs. Future needs such as new
reports and queries often require that these files be restructured because the original file
structure cannot effectively or efficiently support the new requirements. Thus, the
inflexibility and redundancy problems tend to complicate one another.
Page 24 of 72
Data Dictionary
Page 25 of 72
Table Name: Tbl_Event_EventDetails
Maximum no of seats
16 maxSeats int Null --
in event
Page 26 of 72
TABLE NAME: Tbl_Clubs
Description: Enrolment table which contains the list of student (user) who enrolled of events.
Page 27 of 72
TABLE NAME: Tbl_Event_Prerequisite
Description: Table which contains study Material for students given in events.
Page 28 of 72
TABLE NAME: Tbl_Repo_FileInformation
Name of main
2 MainDirectory nvarchar Not Null 300
directory
Description: Table which stores all the skill information on the enrolled students.
Page 29 of 72
Chapter-6
Input/Output From
Design
Page 30 of 72
Login Page
As soon as we will open the website, a page will be displayed on the screen asking the user to
enter the correct user id and password. Once all the fields are filled by the user then user is
supposed to click on ‘Sign In’ button.
Registration Page
If a user has not registered in event Management web application, he/she can register using
registration page. User needs to fill up some fields such as roll number, first and last name,
and password and re-enter password. After that if he/she clicks on Register Now button that
it takes user to the next page called as Course detail page where he needs to fill up his/her
college details. After that if user click on next button after filling all required field than he
moved to Photo upload page where user needs to upload his/her passport size photo. User
also can crop his photo using cropping tool given in the page. Than after uploading photo, if
user click on save and submit button than his/her registration would be completed and user’s
registration request will be sent to the admins who can either accept or deny their requests.
Page 31 of 72
Dashboard Page
After signing in to the website, a dashboard page of the website will appear. This dashboard
page is divided into two types of user given below
1. Student Dashboard
Upcoming events grid view: - this grid view shows upcoming events and if we
click on this grid view it takes the student to Event Display Panel page.
Pending events grid view: - this grid view shows pending events to the
students in which student can enrol.
4 live tiles: - there are 4 live tiles on student dashboard page which helps the
student to know about current status and different type of information.
Page 32 of 72
2. Admin Dashboard
Admin dashboard shows following option for the admin:-
Event Manipulation: - Admin dashboard takes to event manipulation pages
such as create event and edit event pages where admin can create as well as
edit events.
Repository: - Admin dashboard page takes admin to the repository page in
which admin can download important repository files.
Search student: - Admin dashboard page takes admin to the search student
page where he/she can search student data.
Pending request grid view: - This grid view shows the pending request of
student to the admin.
Upcoming events grid view: - this grid view shows upcoming events and if we
click on this grid view it takes the student to Event Display Panel page.
Page 33 of 72
Create Event Page
Only admins can enter into create event page and only they have rights to create events. This
page contains different fields of textboxes, radio buttons, grid views etc. which helps the
admin to create a desirable event.
This page can only be access by admin who created the event and further want to make
changes in the event. Like create event it has same kind of fields.
Page 34 of 72
Search Student Page
This page also can only be access by admins. This page helps admins to search for the
student’s list data. Than he can see the details of that particular student.
This page can access by both admin (Faculties) and students. Using this user can see all
events list at single page from where user can select their desirable event which they want to
see. User can also search for event using searching mechanism in this page.
Page 35 of 72
Events Details Page
This page shows all the details of the event to the user. By using this page user can enrol for
that particular event. Admins can use this page checking students’ enrolments and can also
go the edit page using this page.
Profile Page
This page shows the user’s profile. This page contains all the major details of the user. User
can also edit their profile using this page.
Admins has rights to see the student’s profile. This page is also be used when admin
Page 36 of 72
Chapter-7
System Testing
Page 37 of 72
Software testing methods
Software testing methods are traditionally divided into white- and black-box testing. These
two approaches are used to describe the point of view that the tester takes when designing test
cases.
White-box testing
White-box testing (also known as clear box testing, glass box testing, and transparent box
testing and structural testing, by seeing the source code) tests internal structures or
workings of a program, as opposed to the functionality exposed to the end-user. In white-
box testing, an internal perspective of the system, as well as programming skills, is used
to design test cases. The tester chooses inputs to exercise paths through the code and
determine the appropriate outputs. This is analogous to testing nodes in a circuit, e.g. in-
circuit testing (ICT).
While white-box testing can be applied at the unit, integration and system levels of the
software testing process, it is usually done at the unit level. It can test paths within a unit,
paths between units during integration, and between subsystems during a system–level
test. Though this method of test design can uncover many errors or problems, it might not
detect unimplemented parts of the specification or missing requirements.
API testing – testing of the application using public and private APIs (application
programming interfaces).
Code coverage – creating tests to satisfy some criteria of code coverage (e.g., the
test designer can create tests to cause all statements in the program to be executed
at least once).
Fault injection methods – intentionally introducing faults to gauge the efficacy of
testing strategies.
Mutation testing methods.
Static testing methods.
Page 38 of 72
Code coverage tools can evaluate the completeness of a test suite that was created with any
method, including black-box testing. This allows the software team to examine parts of a
system that are rarely tested and ensures that the most important function points have been
tested. Code coverage as a software metric can be reported as a percentage for:
100% statement coverage ensures that all code paths or branches (in terms of control flow)
are executed at least once. This is helpful in ensuring correct functionality, but not sufficient
since the same code may process different inputs correctly or incorrectly.
Black-box testing
Black-box testing treats the software as a "black box", examining functionality without any
knowledge of internal implementation, without seeing the source code. The testers are only
aware of what the software is supposed to do, not how it does it. Black-box testing methods
include: equivalence partitioning, boundary value analysis, all-pairs testing, state transition
tables, decision table testing, fuzz testing, model-based testing, use case testing, exploratory
testing, and specification-based testing.
Page 39 of 72
designs to derive test cases. These tests can be functional or non-functional, though usually
functional.
One advantage of the black box technique is that no programming knowledge is required.
Whatever biases the programmers may have had, the tester likely has a different set and may
emphasize different areas of functionality. On the other hand, black-box testing has been said
to be "like a walk in a dark labyrinth without a flashlight. Because they do not examine the
source code, there are situations when a tester writes many test cases to check something that
could have been tested by only one test case or leaves some parts of the program untested.
This method of test can be applied to all levels of software testing: unit, integration, system
and acceptance. It typically comprises most if not all testing at higher levels, but can also
dominate unit testing as well.
2. Visual testing
The aim of visual testing is to provide developers with the ability to examine what was
happening at the point of software failure by presenting the data in such a way that the
developer can easily find the information she or he requires, and the information is expressed
clearly.
At the core of visual testing is the idea that showing someone a problem (or a test failure),
rather than just describing it, greatly increases clarity and understanding. Visual testing,
therefore, requires the recording of the entire test process – capturing everything that occurs
on the test system in video format. Output videos are supplemented by real-time tester input
via picture-in-a-picture webcam and audio commentary from microphones.
Page 40 of 72
Visual testing is particularly well-suited for environments that deploy agile methods in their
development of software since agile methods require greater communication between testers
and developers and collaboration within small teams.
Ad hoc testing and exploratory testing are important methodologies for checking software
integrity, because they require less preparation time to implement, while the important bugs
can be found quickly. In ad-hoc testing, where testing takes place in an improvised,
impromptu way, the ability of a test tool to visually record everything that occurs on a system
becomes very important in order to document the steps taken to uncover the bug.
Visual testing is gathering recognition in customer acceptance and usability testing, because
the test can be used by many individuals involved in the development process. For the
customer, it becomes easy to provide detailed bug reports and feedback, and for program
users, visual testing can record user actions on screen, as well as their voice and image, to
provide a complete picture at the time of software failure for the developers.
3. Grey-box testing
However, tests that require modifying a back-end data repository such as a database or a log
file does qualify as grey-box, as the user would not normally be able to change the data
repository in normal production operation. Grey-box testing may also include reverse
engineering to determine, for instance, boundary values or error messages.
By knowing the underlying concepts of how the software works, the tester makes better-
informed testing choices while testing the software from outside. Typically, a grey-box tester
will be permitted to set up an isolated testing environment with activities such as seeding a
database. The tester can observe the state of the product being tested after performing certain
Page 41 of 72
actions such as executing SQL statements against the database and then executing queries to
ensure that the expected changes have been reflected. Grey-box testing implements intelligent
test scenarios, based on limited information. This will particularly apply to data type
handling, exception handling, and so on.
Testing types
1. Installation testing
Most software systems have installation procedures that are needed before they can be used
for their main purpose. Testing these procedures to achieve an installed software system that
may be used is known as installation testing.
2. Compatibility testing
A common cause of software failure (real or perceived) is a lack of its compatibility with
other application software, operating systems (or operating system versions, old or new), or
target environments that differ greatly from the original (such as a terminal or GUI
application intended to be run on the desktop now being required to become a Web
application, which must render in a Web browser). For example, in the case of a lack of
backward compatibility, this can occur because the programmers develop and test software
only on the latest version of the target environment, which not all users may be running. This
results in the unintended consequence that the latest work may not function on earlier
versions of the target environment, or on older hardware that earlier versions of the target
environment were capable of using. Sometimes such issues can be fixed by proactively
abstracting operating system functionality into a separate program module or library.
Smoke testing consists of minimal attempts to operate the software, designed to determine
whether there are any basic problems that will prevent it from working at all. Such tests can
be used as build verification test.
4. Regression testing
Page 42 of 72
Regression testing focuses on finding defects after a major code change has occurred.
Specifically, it seeks to uncover software regressions, as degraded or lost features, including
old bugs that have come back. Such regressions occur whenever software functionality that
was previously working correctly, stops working as intended. Typically, regressions occur as
an unintended consequence of program changes, when the newly developed part of the
software collides with the previously existing code. Common methods of regression testing
include re-running previous sets of test cases and checking whether previously fixed faults
have re-emerged. The depth of testing depends on the phase in the release process and the
risk of the added features. They can either be complete, for changes added late in the release
or deemed to be risky, or be very shallow, consisting of positive tests on each feature, if the
changes are early in the release or deemed to be of low risk. Regression testing is typically
the largest test effort in commercial software development, due to checking numerous details
in prior software features, and even new software can be developed while using some old test
cases to test parts of the new design to ensure prior functionality is still supported.
5. Acceptance testing
A smoke test is used as a build acceptance test prior to further testing, e.g., before
integration or regression.
Acceptance testing performed by the customer, often in their lab environment on their
own hardware, is known as user acceptance testing (UAT). Acceptance testing may be
performed as part of the hand-off process between any two phases of development.
6. Alpha testing
7. Beta testing
Beta testing comes after alpha testing and can be considered a form of external user
acceptance testing. Versions of the software, known as beta versions, are released to a limited
audience outside of the programming team known as beta testers. The software is released to
groups of people so that further testing can ensure the product has few faults or bugs. Beta
Page 43 of 72
versions can be made available to the open public to increase the feedback field to a maximal
number of future users and to deliver value earlier, for an extended or even indefinite period
of time (perpetual beta).
Usability testing
Usability testing is to check if the user interface is easy to use and understand. It is concerned
mainly with the use of the application.
Page 44 of 72
Test Cases
Login Pages
Test
Test Case Name Input Expected Result Status
Case ID
Page 45 of 72
Figure 5: Login Page Screenshot-2
Page 46 of 72
Member Registration Page
Test
Test Case Name Input Expected Result Status
Case ID
Page 47 of 72
Figure 7: Member Registration Screenshot-1
Page 48 of 72
Registration Page
Test EXPECTED
TEST CASE NAME INPUT STATUS
Case ID RESULT
Checking the Registration Input all the correct It should accept the
TC 14 values and open the Pass
Page functionality details of user next page to upload
profile picture
Checking the Registration Collage not Display message”
TC 15 Pass
Page functionality selected please select
Collage”
Page 49 of 72
Other rating not
Checking the Registration Display a message”
TC 26 select when check rate yourself Pass
Page functionality
box is selected
Page 50 of 72
Figure 11: Registration Page Screenshot-3
Page 51 of 72
Upload Profile Pic Page
Test EXPECTED
TEST CASE NAME INPUT STATUS
Case ID RESULT
Checking the profile pic Upload the image It should accept the
TC 29 image and open the Pass
Page functionality correctly
login page
Display a message”
Checking the profile pic Try to upload a Selected file type
TC 30 not allowed!
Pass
Page functionality document
”
Display a message”
Checking the profile pic Try to upload a large size must be less
TC 31 than 5mb
Pass
Page functionality size media
Display a message”
Checking the profile pic
TC 32 File not selected please select file Pass
Page functionality ”
Page 52 of 72
Figure 14: Upload Profile Pic Page Screenshot-2
Page 53 of 72
Create Event
Checking the create event Leave empty the fees Display a message
TC 38 “Please Enter the Pass
Page functionality text box Organised By field ”
Checking the create event Leave empty the event Display a message
TC 39 “Please select event Pass
Page functionality date date ”
Checking the create event Leave empty the max Display a message
TC 40 “Please enter max seats Pass
Page functionality seats field for the event”
Checking the create event Faculty not select from Display a message
TC 42 “Please select a faculty Pass
Page functionality the grid view control for event”
Display a message
Checking the create event “Event date should be
TC 43 Event date is wrong greater than current
Pass
Page functionality
date ”
Display a message
Checking the create event
TC 44 Event type not select “Please select an Event Pass
Page functionality
type for event”
Display a message
Checking the create event “Please select an Event
TC 45 Event scope not select Pass
Page functionality to be displayed for
event”
Page 54 of 72
Checking the create event Entering character in Display a message
TC 46 “Please input valid Pass
Page functionality fees field amount”
Page 55 of 72
Figure 17: Create Event Page Screenshot-2
Page 56 of 72
Forget Password Page
Page 57 of 72
Figure 20 : Forget password screenshot-2
Page 58 of 72
Change forget Password Page
Page 59 of 72
Figure 22 : Change Password Screenshot-1
Page 60 of 72
Edit Event
Checking the Edit event Leave empty the fees Display a message
TC 68 “Please Enter the Pass
Page functionality text box Organised By field ”
Checking the Edit event Leave empty the event Display a message
TC 69 “Please select event Pass
Page functionality date date ”
Checking the Edit event Leave empty the max Display a message
TC 70 “Please enter max seats Pass
Page functionality seats field for the event”
Checking the Edit event Faculty not select from Display a message
TC 72 “Please select a faculty Pass
Page functionality the grid view control for event”
Display a message
Checking the Edit event “Event date should be
TC 73 Event date is wrong greater than current
Pass
Page functionality
date ”
Display a message
Checking the Edit event
TC 74 Event type not select “Please select an Event Pass
Page functionality
type for event”
Display a message
Checking the Edit event “Please select an Event
TC 75 Event scope not select Pass
Page functionality to be displayed for
event”
Page 61 of 72
Display a message
Checking the Edit event
TC 76 Event time not select “Please select an Event Pass
Page functionality
time for event”
Checking the Edit event No certificate will be
TC 77 certification not input Pass
Page functionality distributed
Display a message”
Checking the Edit event
TC 78 Enter no in title box enter correct title Pass
Page functionality ”
Display a message”
Checking the Edit event Enter no in description enter correct
TC 79 description Pass
Page functionality box
”
Page 62 of 72
Figure 25 : Edit Event Page ScreenShot-1
Page 63 of 72
Edit Profile Page
Page 64 of 72
Figure 27 : Edit Profile Page ScreenShot-1
Page 65 of 72
Search Student Page
Checking the Search Empty all details for It should display all
TC 93 Pass
Student Page functionality Search Student Page records
Checking the Search Try to input incorrect Display a message” no
TC 94 records are found Pass
Student Page functionality Roll no ”
Checking the Search Try to input incorrect Display a message” no
TC 95 Pass
Student Page functionality first name records are found”
Checking the Search Try to input incorrect Display a message” no
TC 96 Pass
Student Page functionality last name records are found”
Page 66 of 72
Figure 30 : Search Student Screenshot-2
Page 67 of 72
Upload Edit Profile-Pic Page
Test EXPECTED
TEST CASE NAME INPUT STATUS
Case ID RESULT
Display a message”
Checking the Edit pic
TC 100 File not selected please select file Pass
Page functionality ”
Page 68 of 72
Chapter-8
System
Implementation
Page 69 of 72
System Requirement
1. Software Requirement
Operating System
Front-end
Back-end
Database
2. Hardware Requirement
Processor Intel Pentium 4 or later
Screen Resolution 720X480 pixel or larger
Page 70 of 72
Chapter-9
Documentation
Page 71 of 72
Introduction
Professionals educated in this field are termed documental lists. This field changed its name
to information science in 1968, but some uses of the term documentation still exists and there
have been efforts to reintroduce the term documentation as a field of study.
Internal Documentation
This contrast with external documentation, where programmers keep their notes and
explanation in separate documents.
Page 72 of 72