Escolar Documentos
Profissional Documentos
Cultura Documentos
IT(Semester VI)
INDEX
TOPIC NO. SUB TOPIC
1.1
1.2
1.3
Online Advertising Agency (2014-15)
1.4
2
2.1
2.2
[1
]
3.1
3.2
4.1
4.2
Online Advertising Agency (2014-15)
Annexure
Topic no
I.
II.
III.
[2]
]
Online Advertising Agency (2014-15)
[3
E
IS
PHAS
ANALYS
B.Sc.IT(Semester VI)
[4]
B.Sc.IT(Semester VI)
Feasibility study is made to see if the project on completion will serve the
purpose of the organization for the amount of work, effort and the time
that spend on it.
Feasibility study lets the developer foresee the future of the project and
the usefulness.
A feasibility study of a system proposal is according to its workability, which is
the impact of the organization is proposed it normally goes through feasibility
study before it is approved for development.
The document provide the feasibility of the project that is begin designed
and lists various areas that were considered very carefully during the
feasibility
[5]
B.Sc.IT(Semester VI)
In this project, the management will know the details of each project where he
may be presented and the data will be maintained as decentralized and if any
inquires for that particular contract can be known as per their requirements
and necessaries.
It is mainly related to human organizations and political aspects. The points to
be considered are:
What changes will be brought with the system?
What organization structures are disturbed?
What new skills will be required? Do the existing staff members have
these skills? If not, can they be trained in due course of time?
The system is operationally feasible as it very easy for the End users to
operate it. It only needs basic information about System platform.
Online Advertising Agency (2014-15)
Front-end selection:
1. It must have a graphical user interface that assists employees that are not from IT
background.
2. Scalability and extensibility.
3. Flexibility.
4. Robustness.
5. According to the organization requirement and the culture.
6. Must provide excellent reporting features with good printing support.
7. Platform independent.
8. Easy to debug and maintain.
9. Event driven programming facility.
10. Front end must support some popular back end like Ms Access..
Back-end Selection:
1. Multiple user support.
2. Efficient data handling.
3. Provide inherent features for security.
4. Efficient data retrieval and maintenance.
5. Stored procedures.
6. Popularity.
Online Advertising Agency (2014-15)
Computer:-Window 7
RAM:-2GB
Monitor,CPU .
Software Requirements:
[7]
B.Sc.IT(Semester VI)
Economic justification is generally the Bottom Line consideration for most systems.
Economic justification includes a broad range of concerns that includes cost
benefit analysis. In this we weight the cost and the benefits associated with the
candidate system and if it suits the basic purpose of the organization i.e. profit
making, the project is making to the analysis and design phase.
The financial and the economic questions during the preliminary investigation
are verified to estimate the following:
profits.
This feasibility checks whether the system can be developed with the
available funds.
The Online Advertising Agency does not require enormous amount of money
to be developed. This can be done economically if planned judicially, so it is
economically feasible. The cost of project depends upon the number of man-
hours required.
The computerized system will help in automate the selection leading the
profits and details of the organization.
With this software, the machine and manpower utilization are expected
to go up by 80-90% approximately.
The costs incurred of not creating the system are set to be great,
because precious time can be wanted by manually.
Weight system performance and cost data.
Select the best-proposed system.
[8]
B.Sc.IT(Semester VI)
Login form:-The Online Advertisement agency also comes with the customer
registration details page, where the customer can enter his detail and register.
He can also create id and password.
Logout: - After clicking the logout user exit from the system
Hardware Requirements:
Computer:-Window 7
RAM:-2GB
Monitor, CPU.
Software Requirements:
Linux (Apache), Windows (Apache/IIS)
MySQL 4.1 or later (v5 preferred)
PHP 4.3 or later (v5 preferred)
Online Advertising Agency (2014-15)
Introduction:-
[9]
B.Sc.IT(Semester VI)
That means a Agency which has the type system which provide the
facility to the User of the reserve for advertising in different media
without any complexity.
For example any customer wants to register in listed newspaper from the
system than first of all customer choose the day from/to he/she can
see the more than one type of there and then he.
Overall description: - The newly developed system will be invoked mainly when:
The detail of available test provided to a client.
The client who want to choose available media.
It also provides the admin to modify employee detailed or to add new
employee.
Project constraints:-
Compatibility: - The website should run compatibly in browser. It should
allow registering new users and giving them access rights registered by
their duties.
Reliability and availability:-The factor needed to establish the software
expected reliability is the user input should be within given range.
Normal termination of the program. Backup should spot tested to ensure
they are reliable.
Security: - It must be insured that access will be provided to the
authorized person through user ID and password. Network security will be
provided by the use of firewall.
Methodology adopted:-
The methodology that used in my proposed system is waterfall model .The for
selecting this model is very simple to understand and use.
The reason for selecting this model is given below
[10]
B.Sc.IT(Semester VI)
Modules:
The different types of modules of this site are as follows:
Reservation modules:
This modules gives a reservation from to the registration. In this module
which ever user wants to reserve seat from this site.
Modules after reservation by user:
o Personal information
[1
2]
These reports are very beneficial for both user and the admin.
Documentations
Key Features
Feature
Online Advertising Agency (2014-15)
Accurate UML
standard model
Excellent
extensibility
Useful Add-Ins
Online Advertising Agency (2014-15)
The following are the minimum system requirements for running Star UML(tm).
In te l(R ) P e n tiu m (R ) 2 3 3 MHz o r h ig h e r.
W in d o ws (R ) 2 0 0 0 , W in d o ws XP , o r h ig h e r
1 2 8 MB R AM (2 5 6 MB re c o m m e n d e d )
1 1 0 MB ha rd d is c s p a c e (1 5 0 MB s p a c e re c o m m e n d e d )
S VGA o r h ig h e r re s o lu tio n m o n ito r (1 0 2 4 x7 6 8 re c o m m e n d e d )
Mo u s e o r o th e r p o in tin g device
Online Advertising Agency (2014-15)
PHASE
DESIGN
B.Sc.IT(Semester VI)
Design is the first step in the development phase for any techniques
and principles for the purpose of defining a device, a process or system
in sufficient detail to permit its physical realization.
The basic idea of the system development life cycle is that there is a well-
defined process by which an application is conceived and developed
and implemented.
The life cycle gives structure to a creative process.
Association: When two classes are connected to each other in any way, an
association relation is established
Dependency: When a class is formed as a collection of other classes, it
is called an aggregation relationship between these classes.
Generalization: Also called an "is a" relationship, because the child class is
a type of the parent class. Generalization is the basic type of relationship
used to define reusable elements in the class diagram. Literally, the child
classes "inherit" the common functionality defined in the parent class
[16]
B.Sc.IT(Semester VI)
Active Class
Active classes initiate and control the flow of activity, while passive classes
store data and serve other classes. Illustrate active classes with a thicker
border.
Visibility
Use visibility markers to signify who can access the information contained within
a class. Private visibility hides information from anything outside the class
partition. Public visibility allows all other classes to view the marked information.
Online Advertising Agency (2014-15)
Protected
visibility allows child classes to access information they inherited from a parent class
Association
Multiplicity (Cardinality)
[17]
Pla city notations near the ends of an association. These symbols indicate the number
ce of instances of one class linked to one instance of the other class. For example,
mul one company will have one or more employees, but each employee works for one
tipli company only.
B.Sc.IT(Semester VI)
Simple Cons
[18]
B.Sc.IT(Semester VI)
Generalization
Generalization is another name for inheritance or an "is a" relationship. It refers to
a relationship between two classes where one class is a specialized version of
another. For example, Honda is a type of car. So the class Honda would have a
generalization relationship with the class car.
In real life coding examples, the difference between inheritance and aggregation
can be confusing. If you have an aggregation relationship, the aggregate (the whole)
can access only the PUBLIC functions of the part class. On the other hand,
inheritance allows the inheriting class to access both the PUBLIC and PROTECTED
functions of the super class.
Online Advertising Agency (2014-15)
Data models are tools used in analysis to describe the data requirement and
assumptions in the system from a top-down perspective. They also set the stage for
design of databases later on in the SDLC.
entities.
Relationships provide the structure needed to draw information from multiple entities.
elements.
Weak Entity
A weak entity is an entity that must defined by a foreign key relationship with
another entity as it cannot be uniquely identified by its own attributes alone.
Key attribute
A key attribute is the unique, distinguishing characteristic of the entity. For
example, an employee's social security number might be the employee's key
attribute.
Multivalued attribute
A multivalued attribute can have more than one value. For example, an
employee entity can have multiple skill values.
Online Advertising Agency (2014-15)
Derived attribute
A derived attribute is based on another attribute. For example, an
employee's monthly salary is based on the employee's annual salary.
Relationships
Relationships illustrate how two entities share information in the database
structure. Learn how to draw relationships:
First, connect the two entities, then drop the relationship notation on the line.
[21]
B.Sc.IT(Semester VI)
Recursive relationship
In some cases, entities can be self-linked. For example, employees can
supervise other employees.
Online Advertising Agency (2014-15)
[2
2]
2.1.3 Event table
An Event Table is a table that lists events in rows and key pieces of
information about each event in columns. An event table includes rows and
columns, representing events and their details respectively. Each row in
the event tables record information about that event. Each column in the
table represents a key piece of information about that event.
Trigger is an occurrence that tells the system that an event has occurred,
either the arrival of data needing processing or of a point in time.
Source is an external agent or actor that supplies data to the system.
Activity is a behavior that the system performs when an event occurs. Response is
an output, produced by the system that goes to a destination. Destination is an
external agent or actor that receives data from the system.
Event
Registratio n Page
Online Advertising Agency (2014-15)
Login Page
Media
Type page
Select
Radio
Form
ContactUs
Page
Update pages
Admin
Login
Admin
Radio
Page
Admin
Radio
Page
2.1.4 USE CASE DIAGRAM :
A use case diagram depicts the various operations that a system performs. It
contains use cases, actors, and their relationships. Use cases are the sequence of
actions that form a single unit of work for an actor. An actor represents a user who
is external to the system and interacts with the use case.
A use case diagram depicts the various operations that a system performs. It
contains use cases, actors, and their relationships. Use cases are the sequence of
actions that form a single unit of work for an actor. An actor represents a user who
is external to the system and interacts with the use case.
Actors
An actor portrays any entity (or entities) that perform certain roles in a given
system. The different roles the actor represents are the actual business roles of
users in a given system. An actor in a use case diagram interacts with a use case.
For example, for modeling a banking application, a customer entity represents an
actor in the application. Similarly, the person who provides service at the counter is
Online Advertising Agency (2014-15)
also an actor. But it is up to you to consider what actors make an impact on the
functionality that you want to model. If an entity does not affect a certain piece of
functionality that you are modeling, it makes no sense to represent it as an actor.
An actor is shown as a stick figure in a use case diagram depicted "outside" the
system boundary.
Use Cases
System Boundary
A system boundary defines the scope of what a system will be. A system cannot
have infinite functionality. So, it follows that use cases also need to have
definitive limits defined. A system boundary of a use case diagram defines the
limits of the
B.Sc.IT(Semester VI)
system. The system boundary is shown as a rectangle spanning all the use cases
in the system.
Includes: Indicates that function of one use case is included in the function of
another. They include relationship exists among use cases when the function of
a
particular use case are required by another use case
System
Online Advertising Agency (2014-15)
Draw your system's boundaries using a rectangle that contains use cases.
Place actors outside the system's boundaries.
Use Case
Draw use cases using ovals. Label with ovals with verbs that represent the
system's functions.
Actors
Actors are the users of a system. When one system is the actor of another
system, label the actor system with the actor stereotype.
[25]
B.Sc.IT(Semester VI)
Relationships
Illustrate relationships between an actor and a use case with a simple line. For
relationships among use cases, use arrows labelled either "uses" or "extends."
A "uses" relationship indicates that one use case is needed by another in order
to perform a task. An "extends" relationship indicates alternative options under a
certain use case.
Learn how to draw relationships.
Online Advertising Agency (2014-15)
[26]
B.Sc.IT(Semester VI)
The method calls are similar to that of a sequence diagram. But the difference is
that the sequence diagram does not describe the object organization where as
the collaboration diagram shows the object organization.
Now to choose between these two diagrams the main emphasis is given on the type
of requirement. If the time sequence is important then sequence diagram is used
and if organization is required then collaboration diagram is used.
Online Advertising Agency (2014-15)
Class roles
Class roles describe how objects behave. Use the UML object symbol to
illustrate class roles, but don't list object attributes.
Association roles
Association roles describe how an association will behave given a particular
situation. You can draw association roles using simple lines labeled with stereotypes.
Messages
Unlike sequence diagrams, collaboration diagrams do not have an explicit way to
denote time and instead number messages in order of execution. Sequence
numbering can become nested using the Dewey decimal system. For example,
nested messages under the first message are labelled 1.1, 1.2, 1.3, and so on.
The condition for a message is usually placed in square brackets immediately
following
[27]
B.Sc.IT(Semester VI)
the sequence number. Use a * after the sequence number to indicate a loop.
Online Advertising Agency (2014-15)
Because it uses class name and object name references, the sequence
diagram is very useful in elaborating and detailing the dynamic design and the
sequence and origin of invocation of objects. Hence, the sequence diagram is one
of
the most widely used dynamic diagrams in UML.
Object: The primary element involved in a sequence diagram in an object-
an instance of a class. A sequence diagram consists of sequences of interaction
among
[2
8]
B.Sc.IT(Semester VI)
Class roles: Class roles describe the way an object will behave in context. Use
the
UML object symbol to illustrate class roles, but dont list object attributes.
risk.
Lifelines: Lifelines are vertical dashed lines that indicate the objects presence over
time collaboration diagram represent interactions between objects as a series of
sequenced messages. Collaboration diagram describe both the static structure
and
the dynamic behavior of a system
Class roles
Class roles describe the way an object will behave in context. Use the UML
object symbol to illustrate class roles, but don't list object attributes
Activation
Activation boxes represent the time an object needs to complete a task.
[29]
B.Sc.IT(Semester VI)
Messages
Messages are arrows that represent communication between objects. Use half-
arrowed lines to represent asynchronous messages. Asynchronous messages
are sent from an object that will not wait for a response from the receiver before
continuing its tasks.
Online Advertising Agency (2014-15)
Lifelines
Lifelines are vertical dashed lines that indicate the object's presence over time.
[30]
B.Sc.IT(Semester VI)
Destroying Objects
Objects can be terminated early using an arrow labeled "<< destroy >>" that
points to an X.
Online Advertising Agency (2014-15)
Loops
A repetition or loop within a sequence diagram is depicted as a rectangle. Place
the condition for exiting the loop at the bottom left corner in square brackets [ ].
[31]
B.Sc.IT(Semester VI)
Fig:Sequance diagram
Online Advertising Agency (2014-15)
Activity diagrams illustrate the dynamic nature of a system by modeling the flow of
control from activity. An activity represents an operation on some class in the system
that results in a change in the state of the system. Typically, activity diagrams are
used to model workflow or business processes and internal operation.
Action States: Action states represent the no interruptible actions of objects. You
can draw an action state in Smart Draw using a rectangle with rounded corners.
Object Flow: Object flow refers to the creation and modification of objects by
activities. An object flow arrow from an action to an object means that the action
creates or influences the object. An object flow arrow from an object to an action
indicates that the action state uses the object.
Initial State: A filled circle followed by an arrow represents the initial action
state.
Final State: An arrow pointing to a filled circle nested inside another circle
represents the final action state.
Swim lanes: Swim lanes group related activities into one column. Activity
diagrams provide another ability, to clarify which actor performs which activity.
Action states
Action states represent the no interruptible actions of objects. You can draw
an action state in Smart Draw using a rectangle with rounded corners.
Action Flow
Action flow arrows illustrate the relationships among action states.
Online Advertising Agency (2014-15)
Object Flow
Object flow refers to the creation and modification of objects by activities. An
object flow arrow from an action to an object means that the action creates or
influences the object. An object flow arrow from an object to an action indicates
that the action state uses the object.
Initial State
A filled circle followed by an arrow represents the initial action state.
[33]
B.Sc.IT(Semester VI)
Final State
An arrow pointing to a filled circle nested inside another circle represents the
final action state.
Branching
A diamond represents a decision with alternate paths. The outgoing alternates
should be labelled with a condition or guard expression. You can also label one
of
the paths "else."
Online Advertising Agency (2014-15)
Synchronization
A synchronization bar helps illustrate parallel transitions. Synchronization is
also called for king and joining.
Swim lanes
Swim lanes group related activities into one column.
[34]
Online Advertising Agency (2014-15) B.Sc.IT(Semester VI)
[3
5]
2.1.7 State transition Diagram
state machine with two states and two combinational inputs follows:
A B Current State
0 0
0 0
0 1
0 1
1 0
1 0
Events
State
next current
Sm
(S: state, E: event, A: action, -: impossible transition)
A state Transition diagram shows the behaviour of classes in response to
external stimuli. This diagram models the dynamic flow of control from state to
state within a system.
Basic State Transition Diagram Symbols and Notations
States
States represent situations during the life of an object. You can easily
illustrate a state in Smart Draw by using a rectangle with rounded corners.
Transition
A solid arrow represents the path between different states of an object. Label
the transition with the event that triggered it and the action that results from
it.
Initial State
Online Advertising Agency (2014-15)
Final State
An arrow pointing to a filled circle nested inside another circle represents
the object's final state.
Initial state:
This shows the starting point or first activity of the flow. Denoted by a
solid circle. This is also called as a Pseudo state where the state has no
variables describing it further and no activities.
State:
Final state:
The end of the state diagram is shown by a bulls eye symbol, also
called a final state. A final state is another example of a pseudo state because
it does not have any variable or action described.
[39]
B.Sc.IT(Semester VI)
Rectangle
Rectangle represents the process that needs to be carried out in the
system flowchart
Diamond
Oval
The oval shape signifies the start and end of the program in the
system flowchart.
Flow Line
Online Advertising Agency (2014-15)
Flow line, a line with an arrowhead, is used to indicate the flow of data or
logic in the system flowchart.
[40]
B.Sc.IT(Semester VI)
START
SYSTEM FLOW FOR ADMIN:
VALID
Online Advertising Agency (2014-15)
NO
Activate Registration
YES
[41]
B.Sc.IT(Semester VI)
Update User
Update AD
Online Advertising Agency (2014-15)
Delete AD
Update Price
END
[42]
B.Sc.IT(Semester VI)
START
Registered Registration
Valid
NO
YES
Active Registration
[43]
B.Sc.IT(Semester VI)
Update Information
END
[44]
B.Sc.IT(Semester VI)
IMPLEMENTATION
Online Advertising Agency (2014-15)
PHASE
[45]
B.Sc.IT(Semester VI)
3.1 Coding
1 - Welcome Page:-
Online Advertising Agency (2014-15)
2 - AboutUs Page:-
[46]
B.Sc.IT(Semester VI)
3 - ContactUs Page:-
Online Advertising Agency (2014-15)
4 - Registration Page:-
[47]
B.Sc.IT(Semester VI)
5 - SignIn Page:-
Online Advertising Agency (2014-15)
6 - RadioForm Page:-
[48]
B.Sc.IT(Semester VI)
8 - TelevisionForm Page:-
[49]
B.Sc.IT(Semester VI)
9 - BannerForm Page:-
10 - InternetForm Page:-
Online Advertising Agency (2014-15)
[50]
B.Sc.IT(Semester VI)
11 - MagazineForm Page:-
Online Advertising Agency (2014-15)
[51]
B.Sc.IT(Semester VI)
3.1.2 Deployment:-
Software deployment is all of the activities that make
a software system available for use.
The general deployment process consists of several
interrelated activities with possible transitions between
them. These activities can occur at the producer side
or at the consumer side or both. Because every
software system is unique, the
precise processes or procedures within each activity
can hardly be defined.
Therefore, "deployment" should be interpreted as
a general process that has to be customized according to
specific requirements or characteristics. A brief
description of each activity will be presented later.
Deployment activities
Release
deployment process.
Adapt
The adaptation activity is also a process to modify a software
system that has been previously installed.
It differs from updating in that adaptations are initiated by local
events such as changing the environment of customer site, while
updating is mostly started from remote software producer.
Update
The update process replaces an earlier version of all or part of a
software system with a newer release.
Built-In
Mechanisms for installing updates are built into some software systems.
Automation of these update processes ranges from fully automatic to
user initiated and controlled
Version tracking
Version tracking systems help the user find and install updates to
software systems installed on PCs and local networks.
Web based version tracking systems notify the user when updates
are available for software systems installed on a local system. For
example:VersionTracker Pro checks software versions on a user's
computer and then queries its database to see if any updates are
available.
[52]
B.Sc.IT(Semester VI)
Local version tracking system notifies the user when updates are
available for software systems installed on a local system.
Retire
Ultimately, a software system is marked as obsolete and support by the
producers is withdrawn. It is the end of the life cycle of a software
product.
Software testing can also provide an objective, independent view of the software to
allow the Business to appreciate and understand the risks of software
implementation.
Test techniques include, but are not limited to, the process of executing a program
or application with the intent of finding software bugs
Online Advertising Agency (2014-15)
Testing Type
[53]
B.Sc.IT(Semester VI)
There are different Modules of testing. On the basis of testing methods there are two
types of testing:
1. White-box testing.
2. Black-box testing.
Logical errors and incorrect assumption are inversely proportional to the probability that
a program will be executed. Errors tend to creep into our work we design and
implement function; condition that is out of the mainstream tends to be well
understood.
Online Advertising Agency (2014-15)
We often believe that a logical path is not likely to be executed when in fact it may be
executed on a regular basis. The logical flow of a program times counter intuitive.
2).BLACK-BOX TESTING:
For our system periodically we have tested our website using black-box testing.
Thinking as a client we have evaluated the website for its easy going and
convenience.
Unit testing:
During the programming stages each and every form, modules and class
treated unit has been put into the test data. Every module is tested
independently. The steps are follows.
2. Once the manual checking is over the complication has been done.
Syntactical errors if any have to be corrected.
Integration testing:
After the individuals modules were tested out we go the integrated to create a
complete system. This integration process involves building the system and
testing the resultant system for problems that arise from component interaction.
Performance testing
Performance testing is designed to test the runtime performance of the system within
the system context of the system. These tests were performed as module level
as well as system level. Individual modules were tested for required performance.
Interface testing:
Interface sting is integral part of integration. We examined the code to be tested and
explicitly list each call to an external component. Performance testing is the test case
design method that exercises the logical conditions. int the system standards tests for
GUIs have been performed, which are as follows:
Whether the non-editable text controls disabling and it was also verified that it
doesnt exceed the maximum allowed length.
Condition testing:
Performance testing is the test case design method that exercises the logical
conditions.
3.2.2 Methodology adopted for testing:
3.2.2.1 White Box Testing:
o White-box testing is a method of testing software that tests
internal structures or workings of an application, as opposed to its
functionality.
o In white-box testing an internal perspective of the system, as well
as programming skills, are used to design test cases.
o The tester chooses inputs to exercise paths through the code
and determine the appropriate outputs. This is analogous to testing
nodes in a circuit, e.g. in-circuit testing
o In this method of testing the test cases are calculated based on
analysis internal structure of the system based on Code coverage,
[5
5]
B.Sc.IT(Semester VI)
Advantages:
Side effects of having the knowledge of the source code are beneficial to
thorough testing.
Optimization of code by revealing hidden errors and being able to remove
these possible defects.
Gives the programmer introspection because developers carefully
describe any new implementation.
Forces test developer to reason carefully about implementation.
Approximates the portioning done by execution equivalence.
White box tests are easy to automate.
White box testing give clear, engineering-based, rules for when to
stop testing.
without any knowledge of internal implementation. The testers are only aware
of what the software is supposed to do, not how it does it. Black-box testing
methods include: equivalence partitioning, boundary value analysis, all-pairs
testing, state transition tables, table testing, fuzz testing, model-based
testing, use case testing, exploratory testing and specification-based testing.
Specification-based testing aims to test the functionality of software according to
the applicable requirements. This level of testing usually requires thorough test
to be provided to the tester, who then can simply verify that for a given input, the
output value (or behaviour), either "is" or "is not" the same as the expected value
specified in the test case. Test cases are built around specifications and
requirements, i.e., what the application is supposed to do. It uses external
descriptions of the software, including specifications, requirements, and designs
to derive test cases. These tests can be functional or non-functional, though
usually functional.
Specification-based testing may be necessary to assure correct functionality,
but it is insufficient to guard against complex or high-risk situations.
One advantage of the black box technique is that no programming knowledge is
required. Whatever biases the programmers may have had, the tester likely has
a different set and may emphasize different areas of functionality. On the other
hand, black-box testing has been said to be "like a walk in a dark labyrinth
without a flashlight." Because they do not examine the source code, there are
situations when a tester writes many test cases to check something that could
[56]
B.Sc.IT(Semester VI)
have been tested by only one test case, or leaves some parts of the
program untested.
This Black Box testing technique believes and extends the concept that the density
of defect is more towards the boundaries. This is done due to the following
reasons
a) Usually the programmers are not able to decide whether they have to use <=
operator or < operator when trying to make comparisons.
b) DifferentTerminating conditions of For-loops, While loops and Repeat
loops may cause defects to move around the boundary conditions.
BVA is based upon a critical assumption that is known as Single fault assumption
theory. According to this assumption, we derive the test cases on the basis of the
fact that failures are not due to simultaneous occurrence of two (or more) faults.
So, we derive test cases by holding the values of all but one variable at their
nominal values and allowing that variable assume its extreme values.
If we have a function of n-variables, we hold all but one at the nominal values and
let the remaining variable assume the min, min+, nom, max-and max values,
repeating this for each variable. Thus, for a function of n variables, BVA yields (4n +
1) test cases.
[5
7]
The fundamental concept of ECP comes from equivalence class which in
turn comes from equivalence relation. A software system is in effect a
computable function implemented as an algorithm in some implementation
programming language. Given an input test vector some instructions of that
algorithm get covered, ( see code coverage for details ) others do not .
1. Login Page:
1
Online Advertising Agency (2014-15)
Password
<6 Digits
A to Z, a to z
Invalid part
Test Case for Login Page:
2. Registration Page:
1
Online Advertising Agency (2014-15)
5
Equivalence Class Partitioning for Login Page:
UserNAme
<6 Digits
A to Z, a to z
Invalid part
Password
<6 Digits
A to Z, a to z
Invalid part
E-mail
Online Advertising Agency (2014-15)
<6 Digits
A to Z, a to z
Invalid part
Mobile No.
<6 Digits
A to Z, a to z
Invalid part
Phone No.
<6 Digits
A to Z, a to z
Invalid part
[6
0]
Test Case for Login Page:
6
7
9
Online Advertising Agency (2014-15)
10
11
12
13
Online Advertising Agency (2014-15)
&
PHASE
EVOLUTION
MAINTAINANE
B.Sc.IT(Semester VI)
Correction
Adaptation
Enhancement
Prevention
Online Advertising Agency (2014-15)
Correction:
Even with the best quality assurance activities is lightly that the
customer will uncover defects in the software. Corrective maintenance
changes the software to correct defects.
[63]
B.Sc.IT(Semester VI)
ADAPTATION:
Over time, the original environment (E>G., CPU, operating
system, business rules, external product characteristics) for which the
software was developed is likely to change. Adaptive maintenance results
in modification to the software to accommodate change to its external
environment.
ENHANCEMENT:
As software is used, the customer/user will recognize additional
functions that will provide benefit. Perceptive maintenance extends the
software beyond its original function requirements.
PREVENTION:
Computer software deteriorates due to change, and because of this,
preventive maintenance, often called software re engineering, must be
conducted to enable the software to serve the needs of its end users. In
essence, preventive maintenance makes changes to computer programs
so that they can be more easily corrected, adapted, and enhanced.
Software configuration management (SCM) is an umbrella activity that is
applied throughout the software process.
Online Advertising Agency (2014-15)
Future:
This application avoids the manual work and the problems concern with it.
It is an easy way to obtain the information regarding the various products
information that is present in the markets.
Well I and my team members have worked hard
in order to present an improved website better than the existing ones
regarding the information about the various activities. Still, we found out
that the project can be done in a better way. Primarily, when we request
information about a particular Ad it just shows the company, seller details
and no. of quantities available. So, after getting the information
[64]
Online Advertising Agency (2014-15)
[65]
B.Sc.IT(Semester VI)
Online Advertising Agency (2014-15)
[66]
B.Sc.IT(Semester VI)
Online Advertising Agency (2014-15)
[67]
B.Sc.IT(Semester VI)
Online Advertising Agency (2014-15)
[6
8]
B.Sc.IT(Semester VI)
ANNEXURE
As the current system is totally manual.
Due to manually process is requires more time for
Completion of any work.
Existing system is manual.so it increases the chances of
errors. Lots of consumed for each report generation.
More man power is require and timely updating complicated.
1) Data Dictionary:-
A Data Dictionary or metadata repository is defined as a centralized repository
of information about data such as meaning, relationships to other
data,origin,usage and format. The term may have one of several closely
related meanings pertaining to database and database management system.
1-Registration :
Online Advertising Agency (2014-15)
1 C_id
2 Email
3 User_name
4 Pass_word
5 Name
6 Address
7 mobile
8 Phone
9 designation
2 Login
1 uname
2 Password
3 Radio
1 id
2 from
3 to
4 program
5 Broad_time
Online Advertising Agency (2014-15)
6 repeat
7 Ad_duration
8 Pro_duration
9 Station
10 Price
11 Upload_file
12 By
4 television
1 id
2 from
[7
0]
3 to
4 program
5 Telecasting_time
6 repeat
7 Ad_duration
8 Pro_duration
9 channel
10 Price
11 Upload_file
12 By
Online Advertising Agency (2014-15)
5 Internet
1 id
2 dfrom
3 dto
4 size
5 Webname
6 pattern
7 Price
8 Upload_file
9 By
6 Magazine
1 id
2 dfrom
3 dto
4 Mname
5 adpage
6 size
7 pattern
8 Price
Online Advertising Agency (2014-15)
9 Upload_file
10 By
7-Banner
1 id
2 dfrom
3 dto
4 state
5 Location
6 size
7 Banner_type
8 Price
9 Upload_file
10 By
8-NewsPaper
1 id
2 dfrom
3 dto
4 Papername
5 advertisingpage
6 Paperedition
Online Advertising Agency (2014-15)
7 size
8 Issue
9 pattern
10 Price
11 Upload_file
12 By
9-Banner1
1 id
2 state
3 Location
4 Place
10-Radio1
1 id
2 Stn_list
3 Pro_list
4 Pduration
5 Pro_duration
11-Television1
Online Advertising Agency (2014-15)
1 id
2 Channel
3 Program
4 Tel_time
5 Pro_duration
2) List of Abbreviations:
PHP: Hypertext Preprocessor.
ID:- Identity
ER:- Entity Relationship
BVA:-Boundary Value Analysis
ECP:-Equivalence Class Partitioning
i.e.:-that is
PERT:-Project Evolution and Review Technique
SDLC:- Software Development Life Cycle
URL:-Uniform Resource Locator
3) Reference Bibliography and Website used
WEBSITES:
www.google.com
www.wikipedia.com
www.w3school.com
Online Advertising Agency (2014-15)
Online Advertising Agency (2014-15)
[76]
B.Sc.IT(Semester VI)