Professional Documents
Culture Documents
JOBFINDER.COM
Mini - Project Report
By,
Krishna V P
krishna_vp@yahoo.co.in
CERTIFICATE
2
Year 2010
Register No. :
Name : Krishna V P
Email : krishna_vp@yahoo.co.in
Semester : V1
CERTIFICATE
Department of information TECHNOLOGY
3
Uce, KARYAVATOM
TABLE OF CONTENTS
1. CERTIFICATION
2. ACKNOWLEGMENT
4
3. INTRODUCTION……...……………………..………..….……….01
4. ABSTRACT………………………………………………………..03
5. J2EE-AN OVERVIEW………………………………………….…05
i. INTRODUCTION…………. ……………...…….…06
ii. SECURITY………………. ……….….……………07
6. TECHNOLOGIES USED…………………………….…………..10
i. HTML……………………...………………………..11
ii. CSS……………………….…..…………………….11
iii. JAVASCRIPT……………..….………..…………..12
iv. SQL…………………………………...…………….12
v. SERVLET……………...………………….………..13
vi. JSP………………….…………………..…………..14
vii. SYNTAX SUMMARY………………………...……18
viii. THE JSP PAGE DIRECTIVE……………………. 21
ix. THE jsp:usebean ACTION………………………. 23
x. THE jsp:setProperty ACTION…………………….24
xi. CONVENTIONS……………………………………26
xii. AJAX………………….……………………………..27
xiii. APACHE TOMCAT………………………………..27
9. SYSTEM ANALYSIS……………………………………………...34
14. CONCLUSION………….…………………………………..58
15. REFERENCES…………….……………………………….60
16. APPENDIX………...…….….………………………………62
6
INTRODUCTION
System” the same thing is done. Employers and job seekers have got separate
areas for registering. The employers can also post the job opportunities,
minimum qualification for the job and the details regarding the job. The job
seekers can search their jobs according to their skills and qualifications.
The platform used is J2EE (Java 2 Enterprise Edition). The front end of the
project is JSP (Java Server Pages) and the back end or database used is
MySQL.
The project is having high degree of security. The project is very user friendly.
The colorful and spectacular interface is another thing about the project.
Advanced technology is used for searching the job, viewing the resume and
posting the job. Advanced type of search technology will help the jobseekers to
find a very suitable job. The job seekers can also view the status of their applied
jobs .The employers can recruit skilled job seekers after viewing their resume
.The database used for the project is highly encrypted .The database is up-to-
date .Therefore the job seekers can apply for the latest and better jobs available.
This will help the employers to have the very best persons in their organization.
As told earlier ,the database is highly encrypted . Therefore no intruders can get
into it
or duplicate or edit the details. The project is having a logical 3 tier structure. This
is another feature of the project. The multi tiered structure will give a fast access
to all the places.
8
ABSTRACT
Through a Job Management System the candidates can post their profile and
can be expected to be noticed by suitable employers. The employers can search
for suitable candidates matching their needs for qualifications and previous
experience.
1. Administrator
2. Employers
3. Job Seeker
ADMINISTRATOR:
Administrator has the overall control.
User Registration Process
Database Control
View Details
Job Seekers
The person looking for job. He can perform the following functions
Post personal details
Search for companies
Apply for job
Employers
Job seeker is the person who applies to the company for getting
job. He can perform the following functions.
Search for candidates
Post their vacancy details
Objective
J2EE- AN OVERVIEW
INDRODUCTION
11
Enterprises today need to extend their reach, reduce their cost, and lower their
responses times by providing easy-to-access services to their customers,
employees, and suppliers. Typically, applications that provide these services
must combine existing Enterprise Information Systems (EISs) with new business
functions that deliver services to a broad range of users. These services need to
be:
The Java 2 Platform, Enterprise Edition (J2EE) reduces the cost and complexity
of developing these multi-tier services, resulting in services that can be rapidly
deployed and easily enhanced as the enterprise responds to competitive
pressures.
J2EE Compatibility Test Suite A suite of compatibility tests for verifying that a
J2EE platform product complies with the J2EE platform standard.
Security
An enterprise contains many resources that can be accessed by many users.
Sensitive information often traverses unprotected open networks (example
Internet). In such an environment, almost every enterprise has security
requirements and specific mechanisms and infrastructure to meet them. Although
the quality assurances and implementation details may vary, they all share some
of the following characteristics:
In the following example the web client relies on the web server to act as its
authentication proxy by collecting user authentication data from the client and
using it to establish an authenticated session.
In the first step of this example, the web client requests the main application URL
Since the client has not yet authenticated itself to the application environment,
the server responsible for delivering the web portion of the application (here after
referred to as web server) detects this and invokes the appropriate authentication
mechanism for this resource.
The web server returns a form that the web client uses to collect authentication
data (for example, user name and password) from the user. The web client
forwards the authentication data to the web server, where it is validated by the
webserver.
The credential is used for future determinations of whether the user is authorized
to access restricted resources it may request. The web server consults the
security
policy (derived from the deployment descriptor) associated with the web resource
to determine the security roles that are permitted access to the resource. The
web container then tests the user’s credential against each role to determine if it
can map the user to the role.
14
The web server’s evaluation stops with an “is authorized” outcome when the web
server is able to map the user to a role. A “not authorized” outcome is reached if
the web server is unable to map the user to any of the permitted roles.
If the user is authorized, the web server returns the result of the original URL
request,
the response URL of a JSP page is returned, enabling the user to post form data
that needs to be handled by the business logic component of the application.
15
TECHNOLOGIES USED
16
HTML
HTML stands for Hyper Text Mark-up Language. HTML is not a programming
language, but rather a markup language. HTML is a set of code symbols used to
format text files for electronic display.
When a tag envelopes a particular part of a text file, the text is affected by a
web browser, the text that is surrounded by the tag appears in a formatted
manner. Unlike C or C++, there is no separate compiler for HTML.
While the author of a document typically links that document to a CSS style
sheet, readers can use a different style sheet, perhaps one on their own
computer, to override the one the author has specified.
JAVASCRIPT
17
Uses of JavaScript:
1. Creating Forms: The most efficient use of JavaScript is to handle the client
side forms which traditionally has been done with CGI.
2. Input Validations: When a user inputs data in a text field of a form, the user
has to submit the data to a server and wait to find out if he or she made any
mistake. With JavaScript you can check the type of data as users keep fill out
each field.
SQL
SQL stands for Structured Query Language. SQL lets you access and
manipulate databases. SQL is an ANSI (American National Standards Institute)
standard. SQL is a standard language for accessing databases.
The most common operation in SQL is the query, which is performed with the
declarative SELECT statement. SELECT retrieves data from one or more tables, or
expressions.
SQL can execute queries against a database. SQL can retrieve data from a
database. SQL can insert records in a database. SQL can update records in a
database. SQL can delete records from a database. SQL can create new
databases. SQL can create new tables in a database. SQL can create stored
procedures in a database. SQL can create views in a database. SQL can set
permissions on tables, procedures, and view
To build a web site that shows some data from a database, you will need the
following: An RDBMS database program (i.e. MS Access, SQL Server, MySQL),
A server-side scripting language, like PHP or ASP, SQL, HTML / CSS.
SERVELETS
18
A servlet is a java class that dynamically extends the function of web server.
Because it is written in java, it has full access to java’s advances features-
database connectivity, network awareness, object orientation and built-in support
for multithreaded processes. These features can be used to deliver full
functional applications to web clients without requiring any special client side
configuration. Because they use the ordinary HTTP as their interface, they run
same in any browser environment.
A servlet runs in a java virtual machine (JVM) managed by a servlet engine. Like
a CGI script, it is invoked to handle a request a from a web client. But unlike CGI,
which requires a new process to be created, a servlet remains loaded in the
virtual machine, available to handle new request. Each new request uses the
same copy of the servlet in memory while running its own thread of execution for
optimal performances.
The life cycle of a servlet is controlled by the container in which the servlet has
been deployed. When a request is mapped to a servlet, the container performs
the following steps.
2. Invokes the servlet instances method, passing a request and response object.
If the container needs to remove the servlet, it finalizes the servlet by calling the
servlet’s destroy method
There are three types of events in the life of each servlet instances and they
correspond to three methods that are invoked by the servlet engine.
Init() when a servlet is first loaded ,the servlet engine calls its init() method
exactly once. A servlet is guaranteed to be not handle any request until its()
method has completed successfully.
Service This is the heart of the servlet, the place where request are actually
handled.
For each request, the servlet engine will call the servlet’s service method,
passing it references to a servlet request object and a servlet response object.
19
The request object, which implements ate servlet request interface, encapsulates
the information about the clients and particulars about the request . Similarly, the
response object which implements the servlet response, contains a reference to
the output stream that will be used to write the results back to the client
Destroy This is the optional counterpart to init(), called by the servlet engine
when the servlet is about to be unloaded . Ordinarily, servlet classes remain
loaded and active until the servlet engine is shutdown. However, if the servlet
engine detects that a servlet has been recompiled since the last time it serviced a
request, the new servlet class will be loaded, replacing the old one.
The following shows the typical web server, different clients connecting via the
internet to a web server. In this example, the web server is running on UNIX and
is the very popular Apache web server.
First static web pages were displayed . Typically these were people’s first
experience with making web pages so considered of My Home Page sites and
company marketing information. Afterward perl and c were language used on the
web server to provide dynamic content. soon most language including Visual
Basic, Delphi, C++ and java could be used to write applications that provided
dynamic content using data from text files or database requests. These were
known as CGI server side applications. ASP was developed by Microsoft to allow
Html developers to easily provide dynamic content supported as standard by
Microsoft’s free web server. Internet Information server (IIS). JSP is the
equivalent from sun Microsystems, a comparison of ASP and JSP will be
presented in the following section.
20
The following diagram shows a web server that supports JSP files. Notice that
the web server also is connected to database.
JSP source code runs on the web server in the JSP servlet Engine. The JSP
servlet Engine dynamically generates the HTML and sends the HTML output to
the client’s web browser.
SCRIPTING IN JSP
JSP scripting elements allow you to use java programming language statements
in your JSP pages. Scripting elements are typically used to create and access
objects, define methods ,and manage the flow of control. Many tasks that
require the use of scripts can be eliminated by using custom tag libraries, in
particular the JSP Standard Tag Library. Since one of the goals of JSP
technology is to separate static template data from the code needed to
dynamically generate content, very sparing use of JSP scripting is
recommended. Nevertheless, there may be some circumstances that require its
use. There are three ways to create and use objects in scripting elements
:Instance and class variables of the JSP page's servlet class are created in
declarations and accessed in scrip lets and expressions.
Local variables of the JSP page's servlet class are created and
used in script lets and expressions
Attributes of scope objects are created and used in scrip lets and
expressions.
JSP is easy to learn and allows developers to quickly produce websites and
applications in and open and standard way. JSP is based on java, an object
oriented language. JSP offers a robust platform for web development.
HTML and graphics displayed on the web browser are classed as the
presentation layer. The Java code(JSP) on the server is classed as the
implementation. By having a separation of presentation and Java developers
concentrate on implementing the application.
JSP and ASP are fairly similar in the functionality that they provide. JSP may
have
slightly higher learning curve. Both allow embedded code in an HTML page,
session
variables and database access and manipulation. Where as ASP is mostly found
on
Microsoft platforms, i.e.NT. JSP can operate on any platform that conforms to
the J2EE specification. JSP allow component reuse by using JavaBeans and
EJBs.
ASP provides the use of COM/ActiveX controls.
1. The user goes to a website made using JSP. The user goes to JSP page.
The
browser makes the request via the internet.
2. The JSP request gets sent to the web server
3. The web server recognizes that the file required is special, therefore passes
the
JSP file to the JSP servlet Engine.
4. If the JSP file has been called the first time, the JSP file is parsed, otherwise
go
22
to step 7.
5. The next step is to generate a special servlet from the JSP file. ALL the HTML
required is converted to println statements.
6. The servlet source code is compiled into a class.
7. The servlet is instantiated, calling the init and service methods.
8. HTML from the servlet output is sent via the Internet.
9. HTML results are displayed on the user’s web browser.
Syntax Summary
"true/false"
buffer=
"sizekb/none"
autoflush="true
/false"
extends=
"package.class"
info=
"message"
errorPage=
"url'
*isErrorPage
="true/false"
language=
"java"
JSP include < A file on the local XML equivalent is
Directive %@includefile="ur system to be included <jsp:directive.includ
l"%> when the JSP page is e file="url"\>.The
translated into a URL must be
servlet relative one.Use the
jsp:include action to
include a file at
request time instead
of translation time.
24
"parameterName"
value="val"
ATTRIBUTE DESCRIPTION
import="package.class" This lets you specify what packages should
be imported. The import attribute is the only
one that is allowed to appear multiple times.
contentType="MIME- This specifies the MIME type of the
TYPE or output.The default is text/html.The directive
contentTYPE="MIME- has the same effect as the Scriplet.
TYPE;charSet=Character-
Set"
isThreadSafe="true/false" A value of true indicates normal servlet
processing,where multiple requests can be
processed simultaneously with a single
servlet instance, under the assumption that
the author synchronized access to instance
variables.A value of false indicates that the
servlet should implement"Single Thread
Model",with requtss being given seperate
26
servlet instances
session="true/false" A value of true indicates that the predefined
variable session should be bound to the
existing session if one exists,otherwise a
new session should be created and bound
to it. A value of false indicates that no
sessions willbe used and attempts to access
the variables session will result in errors at
time the JSP page is translated into a
servlet.
ATTRIBUTE DESCRIPTION
id Gives a name to the variable that will reference
the bean. A previous bean object is used intead
of insantiating a new one if one can be found with
the same id and scope.
class Designates the full package name of the bean.
scope Indicates the context in which the bean should be
made available.Therefore possible
values:page,request,session,and application.The
default, page,indicates that the bean is only
available on the current page. A value of request
indicates that the the bean is only available for the
current client request. A value of session indicates
that the object is available to all pages during the
life of the current HTTP session. Finally, a value of
application indicates that it is available to all pages
28
ATTRIBUTE DESCRIPTION
name This required attribute designates the bean
whose property will be set . The jsp:useBean
element must appear before the jsp:setProperty
element .
property This required attribute indicates the property you
want to set . However, there is one special
case:a value of "*" means that all request
parameters whose names match bean property
names will be passed to the appropriate setter
methods .
value This required attribute specifies the value for the
property . String values are automatically
converted to numbers,
Boolean,Boolean,byte,Byte,char and Character
via the standard "valueOf" method in the target or
29
Syntax Description
<%--comment--%> A JSP comment. Ignored by JSP-
to-scriplet translator. Any
embedded JSP scripting
elements ,directives or actions
are ignored.
<!—comment--> An HTML comments. Passed
through to resultant HTML. Any
embedded JSP scripting
elements, directives or actions
are executed normally.
<\% Used in template text (static
HTML) where you really want "<
%".
%\> Used in scripting elements where
31
AJAX
Ajax stands for Asynchronous JavaScript and XML. is a group of
interrelated web development techniques used on the client-side to create
interactive web applications. With Ajax, web applications can retrieve data from
the server asynchronously in the background without interfering with the display
and behavior of the existing page. The use of Ajax techniques has led to an
increase in interactive or dynamic interfaces on web pages. Data are usually
retrieved using the XMLHttpRequest object. Despite the name, the use of XML is
not actually required, nor do the requests need to be asynchronous.
Security User applications will run in applet like sandboxes, and should
not be able to get out of the box. Servlet API is the only API that can
provide this kind of feature. That means an ISP should be able to let its
users to deploy WARS without having to worry about the system security
or about the possible interference between the users .It also means
companies can use JSPs and applications without having to review them
for security flaws.
existing optimizations and maturity of web servers like Apache, and make
sure most of the modules and extensions work well with Tomcat.
SCOPE OF THE
PROJECT
Light weight data classes used for the interface between the business logic
layer and user interface layer.
INTRODUCTION TO
SYSTEM DESIGN AND
IMPLEMENTATION
The most creative and challenging phase of system development life cycle is
system design. The term “design” describes the final system and the process by
which it is developed.
System design is the process by which the detailed design of the system
selected in the study phase is accomplished. The system design goes through
logical and physical state of development. In this phase the user oriented
performance specification is expanded into a design specification. While
37
designing the new system, the developer should have in mind a clear picture of
inputs that may be required in order to achieve the desired outputs.
1. Administrator
2. Employees
3. Job Seeker
ADMINISTRATOR:
Administrator has the overall control.
User Registration Process
Database Control
View Details
EMPLOYEE:
The person looking for job. He can perform the following functions
Employers
Job seeker is the person who applies to the company for getting
job. He can perform the following functions.
38
INPUT/OUTPUT DESIGN
Input Design is the process of converting user oriented input into a computer
based format. The goal of designing input date is to make the automation as
easy and free from error as possible. For providing a good input design for the
application easy date input and selection features are adopted.
The presentation layer is responsible for the user interface and communicates
directly with the business logic layer.
A quality output is one that meets the requirement of the end user and presents
the information clearly. In any system results of processing are communicated to
the users and to other systems through outputs. Outputs from computers are
required primarily to communicate the results of processing to the users. They
are also used to provide a permanent copy of these results for future reference.
The main tabs located at the top of each screen are implemented as user control
to take advantage of code reuse. Authorization is enforced by the user control as
it decides whether to display the Administration tad based on the users login.
39
SYSTEM ANALYSIS
40
INTRODUCTION
To meet the ever-growing demand of uses and to handle all the processing in
an efficient and faster manner, making the system online is attempted. With the
conversion of the present computerized system to an online system the
organization can achieve better co-ordination among their various reservation
centers and easy access to up-to-date information. There by making profit and
gaining customer satisfaction. Online is economical as it reduces much of the
manual processing, cost and time. The proposed online system is developed in
such a manner that almost all the problems faced by the computerized system
can be easily tackled using it. Most of the user requirements are considered
while developing the proposed system. The provision of timely, accurate and
comprehensive information improves the decisions-making. One important
aspect of the proposed system is that it can easily incorporate changes. The
proposed system is developed using JSP; hence it is user-friendly package, in
Client/Server model and is easily upgradeable.
Database Design
43
Tables Used
Address
Applied jobs
Employer
Jobs
Jobseeker
Users
44
Schema Description
address Table
appliedjobs Table
employer Table
jobs Table
jobseeker Table
users table
USECASE DIAGRAMS
AND CLASS DIAGRAM
48
49
50
51
52
INTRODUCTION TO
SYSTEM TESTING AND
IMPLEMENTATION
53
METHOD OF TESTING
The testing methods used for “JMS” include Unit Testing.
Integration Testing, User Acceptance Testing, Output Testing, and Validation
Testing.
UNIT TESTING
Unit testing or function testing is the basic level of testing where functions
making up a module are tested to ensure that they operate correctly. Unit testing
exercises specific paths in a module’s control structure to ensure complete
coverage and maximum error detection. In JMS application unit testing was
used to test each function. And the output generated by the individual function
agrees with the output generated by the computerized system and manually.
Thus the application proved to satisfy unit testing.
54
INTEGRATION TESTING
Integration Testing addresses the issues associated with the dual
problems for verification and program construction. After the software has been
integrated as set of high order tests are conducted. The main objective in this
testing process is to take unit tested modules and build a program structure that
has been dictated by design. The integration testing has been done in such a
way that all the modules are integrated under a few links like Job search,
Resume Uploading etc.
BOTTOM UP INTEGRATION
This method begins the construction and testing with the modules at the
lowest level in the program structure. Since the modules are integrated from the
bottom up.
It processing required for modules subordinate to a given level is always
available and the need for the stubs is eliminated.
OUTPUT TESTING
After performing the validation testing the next step is output testing of the
proposed system, as no system could be useful unless it produces the required
output in the specified format. Asking the users about the format required by
them tests the outputs generated or displayed by the system under
consideration. Hence the output format is considered into ways :
55
a. On screen
b. Printed format
TEXT FIELD
The text field can contain only a specified number of character (lesser than
or equal to its size). The text fields are alphanumeric in some cases such as Job
details. Vacancies, city, state, country etc. An incorrect entry always pops up a
dialogue box with the relevant message.
NUMERIC FIELD
The numeric fields can contain only numbers from 0 to 9 and a decimal
point (.). The entry of any character or other symbols leads to the display of
message box with suitable message.
VALIDATION CONTROLS
The following validations controls are also used in the JMS application.
The Range Validator Control validates that the values of another control
fall within an allowable range, where the minimum and maximum are provided
either directly or by reference to another control.
QUALITY ASSURANCE
Quality Assurance consists of the auditing and reporting functions of the
newly developed system. The goal of Quality Assurance is to provide the
management with the data necessary to be informed about product quality,
thereby gaining insight and confide that product quality is meeting its goals. This
is an Umbrella activity that is applied through out the engineering process.
Software Quality Assurance encompasses :
QUALITY FACTORS
The factors that affect the quality can be categorized into two broad groups :
a. Factors that can be directly measured
b. Factors that can be indirectly measured
There are only a few factors that can be measured directly but a lot of factors
that can be measured indirectly. The Quality factors were verified at the time of
testing itself.
57
GENERIC RISKS
A risk is an unwanted event that has negative consequences. Project
managers will engage in risk management to understand and control the risks on
their projects. Risks can be distinguished from other project events by looking for
3 things.
SYSTEM IMPLEMENTATION
Implementation includes all those activities that take place to convert from
the existing system to the new system. The new system may be a totally new,
replacing an existing manual or automated system or it may be a modification to
an existing system. Proper implementation is essential to provide a reliable
system to meet organization requirements. The process of putting the developed
system in actual use is called system implementation. This includes all those
activities that take place to convert from the old system to the new system. The
system can be implemented only after through testing is done and if it is found to
58
Careful planning
Investigation of system and constraints
Design of methods to achieve the changeover
Training of the staff in the changeover phase
Evaluation of the changeover method
The method of implementation and the time scale to be adopted are found
out initially. Next the system is tested properly and the users are trained in the
new procedures.
IMPLEMENTATION PROCEDURES
Implementation of software refers to the final installation of the package in
its real environment, to the satisfaction of the intended uses and the operation of
the system. In many organizations someone who will not be operating it, will
commission the software development project. In the initial stage people doubt
about the software but we have to ensure that the resistance does not build up,
as one has to make sure that
The active user must be aware of the benefits of using the new system
Their confidence in the software is built up
Proper guidance is imparted to the user so that he is comfortable in using
the application.
Before going ahead and viewing the system, the user must know that for
viewing the result, the server program should be running in the server. If the
server object is not up running on the server, the actual process will not take
place.
USER TRAINING
User training is designed to prepare the user for testing and converting the
system To achieve the objective and benefits expected from computer based
system, it is essential for the people who will be involved to be confident of their
role in the new system. As system becomes more complex, the need for training
is more important. By user training the user comes to know how to enter data,
59
respond to error messages, interrogate the database and call up routine that will
produce reports and perform other necessary functions.
OPERATIONAL DOCUMENT
Once the implementation plans is decided, it is essential that the user of
the system is made familiar and comfortable with the environment. Education
involves right atmosphere and motivating the user. A documentation providing
the whole operations of the system is being developed in such a way that the
user can work with it in well consistent way. The system is developed user
friendly so that the user can work the system from the tips given in the
application itself. Useful tip and guidance is given inside the application itself to
help the user. Users have to be made aware that what can be achieved with the
new system and how it increases the performance of the system. The user of the
system should be given a general idea of the system before he uses the system.
SYSTEM MAINTENANCE
Maintenance is the enigma of system development. The maintenance
phase of the software cycle is the time in which a software product performs
useful work. After a system is successfully implemented, it should be maintained
in a proper manner. System maintenance is an important aspect in the software
development life cycle. The need for system maintenance is for it to make
adaptable to the changes in the system environment. Software maintenance is of
course, far more than Finding Mistakes. Maintenance may be defined by
describing four activities that are undertaken after a program is released for use.
CORRECTIVE MEASURES
This maintenance activity occurs because it is unreasonable to assume
that software testing will uncover all latent errors in a large program, errors will
occur and it will be reported to the developer (s). The process that include the
diagnosis and correction of one or more errors is called corrective maintenance.
ADAPTIVE MAINTENANCE
60
PERFECTIVE MAINTENANCE
The third activity that may be applied to a definition of maintenance occurs
when a software package is successful. As a software is used, recommendations
for new capabilities, modifications to existing functions and general
enhancements are received from user. To satisfy requests in this category.
Perfective maintenance is performed. This activity accounts for the majority of all
effort expended on software maintenance.
PREVENTIVE MAINTENANCE
The fourth maintenance, activity occurs when software is changed to
improve future maintainability or reliability, or to provide a better basis for future
enhancements. Often called preventive maintenance, this activity is
characterized by reverse engineering and re-engineering techniques.
61
SYSTEM
REQUIREMENTS
62
Hardware Requirements
RAM : 128 MB
HDD : 20 GB
Monitor : 15 inch
CD Drive : 52 X
Software Requirements
Platform : J2EE
Backend : MYSQL
Conclusion
64
Now a days manual process of searching a job of the appropriate choice and
searching the appropriate candidate for a specific job has become a huge task.
So realizing the need of easy management of this process this site has been
developed. Its very easy to update and maintain information through this site.
Flexibility
Storage
Most economical
The project could very well be enhanced further as per the requirements.
65
REFERENCES
66
1. J2EE and Beyond: Design, Develop, and Deploy World Class Java
Software.
Art Taylor