Professional Documents
Culture Documents
Unified University
Management System
Submitted by
DECLARATION
I hereby declare that the project work entitled “Unified University Management System” is
an authentic record of my own work for XONOVIA TECHONOLGIES(Faridabad) carried
out at the site SIMPL Consulting(Chandigarh) as requirements of Industry Internship project
for the award of degree of, under the guidance of Mr. Karamvir Singh and (Name of Faculty
coordinator), during August to December 2010.
(Signature of student)
Certified that the above statement made by the student is correct to the best of our knowledge
and belief.
I have been putting continuous efforts in this project. However, it would not have been
possible without the kind support and help of many individuals and organizations. I would
like to extend my sincere thanks to all of them.
I am highly indebted to Xonovia Technologies., Faridabad for accepting me as an intern in
their reputed organization and deploying me in such a big project which is the designing
website for “Vinoba Bhave University,Jharkhand”, their constant guidance and supervision
throughout, as well as for providing necessary information regarding the project.
I would also like to extend my heartiest gratitude to SIMPL Consulting which provided me
platform to work on . They accepted me as a part of their organization and granted me all the
privileges of being a member of their organization and above all for the environment they
provided to work on the project.
I would also like to thank my university” and my faculty coordinator, Mr. Chandra Prakash
for the valuable guidance, advice and inspiring me throughout to work in this project.
Besides, I would like to thank the authority of Lovely Professional University.
Lastly, I would like to express my gratitude towards my parents, colleagues & members of
Xonovia as well as of SIMPL Consulting for their kind co-operation and encouragement
which is helping me in making of this project. I would like to express my special gratitude
and thanks to industry persons for giving me such attention and time.
Highly obliged:
1.Organization Overview…………………………………………………………………………………….6
2.Profile of Problem…………………………………………………………………………………………..8
3.Existing System……………………………………………………………………………………………..10
i. Introduction
4.Problem Analysis…………………………………………………………………………………………..13
i. Product Defination
i. Introduction
6.Design……………………………………………………………………………………………………….30
i. System Design
iv. Flowcharts
v. PsuedoCode
8.Implementation……………………………………………………………………………………………….
10.Bibliograrhy………………………………………………………………………….
1.Organization Overview
Technology Integration/Consulting
"Many company's view of Infrastructure is like that of plumbing - pay no attention to it
until it goes wrong."
Your company's infrastructure is the foundation for all the IT solutions that sit on top of it.
Therefore, it is important to ensure that the infrastructure is solid, that it is flexible and that it
is fit for the job - for supporting your business Xonovia has expertise in all areas of
infrastructure choice and design - from network issues through hardware choice to operating
systems, from storage to management, from quality of service to convergent technologies.
Telecommunication Consulting
XONOVIA Technologies understand the sh ort and long-term costs and benefits associated
Document management is the conversion of paper documents into electronic images on your
computer. Once on your desktop, these documents can be retrieved effortlessly in seconds.
Thousands of organizations around the world use document management every day instead of
paper filing systems
The requirement of the customer is a full-fledged system which handle all activities involved
in day to day at a glance on the web. The customer seeks an interactive website. They already
have their information in the form of paper work documents,which is quite difficult to handle
and maintain.Our work is to develop automated system which can easily handle all activities
like counseling,examination system, student record,account section etc. Hence we can draw
the various conclusions out of this:
Maintenance:
Upadation:
Complexity:
Data Redundancy:
a. Maintaining separate files for each department can lead to duplication of data
present in files. This can lead to:
b. Inconsistencies
d. Decentralization problems
Human Errors:
Human kind of errors may be generated in typing errors and slow arithmetic
calculations, fatigue and boredom.
No Security:
No Report Generation:
There is no report generation. This can lead to difficulties in the later stage. If the
executive wants information regarding anything, he has to search whole database
which leads to a lot of time wastage.
Less Efficient:
The existing system is less efficient.
Less Reliable:
Less Accurate:
Difficult To Implement:
The existing system is difficult to implement.
The existing system is not user friendly and also it is not interactive.
Not Flexibility:
The existing system is less flexible.
Proposed solution: I am required to design a website that is user friendly and handle all the
activities and maintain the information in digital form.Inspite of being informative it has to be
UMS link present as a link on the official website on the University Website and now
it can browse through another domain.
Proposed solution:- Develop a website and purchase a domain and publish the website on
the internet so that it can be accessed individually.
Putting efficiently all the collections of modules on web which include information
and records using database connectivity so that the website is not heavily loaded.
Proposed solution:- Constructing a database to hold all the information and then connecting
it to the website so that the user can view all the information for which it has priviliges
without wasting much time in downloading them.
A website that is designed using latest technologies rather than just an asp.net based
website which presently exists.
Proposed solution:- Using only html in designing website would not allow database
connectivity hence we can use combination of various other technologies like asp.net and
softwares like visual studio along with html to design the complete website.
Introduction
University presently has no proper management system for maintaining all the
activities and record in its day to day work..It`s quite complex and difficult to manage
and handle various activities in the university..All the information present in the form
of paper work which result into difficulties faced by various department of
universities in sharing information between inter-departments of university. Moreover
it is quite expensive in form of time, resources, to maintain the records and it is quite
possible in the terms of losing records.
Existing Software
Till Date there is no existing software in university and everythinh works on paper
based.For that purpose Xonovia Technologies get project to automate all the
department of the university so that there will be less chance of errors and maintain
record proper and smoothly.
a) The system to be developed is being designed keeping in mind it covers all the
blockholes of the existing system.
b) The new system will provide all the information that is being provided by the existing
system and also it will provide a more user-friendly kind of interface and will provide
a more interactive kind of platform.
d) Efforts are on to design a website where the viewer can understand and use the system
and what it does, how it functions, the infrastructure, the updates of the events and
happenings in university and then also leave comments over different articles and
f) The website has to encompass all the features and functionalities of the existing one
and in addition, it should exhibit other advanced features and give a real new and
fresh look to the arena.
g) The website will use technologies the existing team is already familiar with:
Microsoft Windows.
h) To keep things simple, the website will be built with HTML and CSS for cross-
browser compatiblity among browsers (IE 4 and Netscape 4.7 and above).
j) Provide forms for users to fill out. Most "free" websites help you send form input as
email to webmasters.
4.Problem Analysis
Product definition
Product definition is a critical starting point in the development of any new product. Yet for
its importance, there are a number of common things that should be kept in mind as:
In my project the product is a full fledged website of Unfied University Management System.
It should be a website that provides all the necessary information about the
organization and on the same side makes it an interactive one too. It should provide
database connectivity as said before so that data is accessed easily without
overloading the website and avoiding the wastage of time. It has to be an attractive
one and this can be attained by using certain flashes, animations and proper designs
of each and every element being used to develop the website. It can be developed
using various softwares and tools that provide the required features like: Flash
CS4, Photoshop CS4, Microsoft Office XP FrontPage, Dreamweaver CS4, HTML
and other basic programming languages and their features. For database
connections we will be making use of MySQL commands and tables.
Feasibility Analysis
The feasibility analysis is designed to determine whether or not, given the project
environment, a project will be successful. It is a determination as to the likelihood of success
and a description of how that determination was achieved. It includes various elements like:
Based on the outline design of system requirements in terms of inputs, outputs, files,
procedures and staff, the technical issues raised during technical feasibility include:
According to the computerized system we propose, the costs can be broken down to two
categories.
Legal feasibility
Determines whether the proposed system conflicts with legal requirements and we can say
that this system will not face any such issues as it has to be implemented for a highly secured
organization.
Operational feasibility
A proposed system is beneficial only if it can be turned into an information system that will
meet the operational requirements of an organization. A system often fails if it does not fit
within existing operations and if users resist the change.
If we are considering the performance and response time for each task, it is very much faster
since there is less paper work to be completed. When entering data into the system to relieve
the user from additional work and typing incorrect data, the system provides options such as
combo boxes, check boxes, option buttons and etc. if the users type in incorrect data they
would be informed immediately about the error by the error detection control.
Another important fact to be regarded is the security control, which is handled by the system.
Since data regarding each contractor and the company is confidential, security is a key issue.
Information falling into the wrong hands could jeopardize the entire organization. Unlike in
semi-computerized systems the proposed system offers adequate control to protect the
organization against fraud and embezzlement and guarantees the accuracy and security of
data and information. This is handled by the system providing each department and
individuals with separate login names and passwords.
The new system is more user-friendly, which enables the end-user to complete his/her work
efficiently and accurately with interest. After taking the above fact into consideration we can
state the operating of the proposed system within the organization is feasible.
In this phase of the feasibility study the following two main topics
In the current system which is the semi computerized system the information may be lost in
the process of sending from one place to another. This is mainly due to human interaction in
the process of the transferring information from one place to another.
• Whether the new system affect the current users in the system
The new proposed system will affect the users in the following areas
• Accuracy
• Efficiency
• Productivity
• Robustness
• Lesser time consuming
A project will fail if it takes too long to be completed before it is useful. Schedule feasibility
is a measure of how reasonable the project timetable is. The timespan is not defined and it is
on going process. In the absence of expertise this duration seems genuine and affordable.
Being a beginner and a learner it becomes mandatory to use the given time as efficiently as
possible and comply with the deadlines.
Resource feasibility
This involves questions such as how much time is available to build the new system, when it
can be built, whether it interferes with normal business operations, type and amount of
resources required, dependencies, etc. Considering this factor as well, the project seems to be
feasible as the training period given to us by the university also extends till December and we
expect our project to complete till December and this in no way interferes with the
functioning of the departments of University
b) System Security
System security is a vital aspect when it comes to developing a system. The system should
ensure the facility of preventing unauthorized personnel from accessing the information and
the data within the system. The system should provide total protection for each user’s
information so that the integrity of data is sustained and also prevent hackers from hacking
the system.The proposed system ensures the security and the integrity of data. This is done by
providing a password login system for each authorized users. And for example the System
Administrator has access to all kinds of information.By providing this facility information is
properly managed and information is protected. For example the system administrator’s day
to day tasks are lessened and easier because he doesn’t have to have a constant eye on the
system and worry about hackers hacking the system
Project Plan
A project plan, is a formal, approved document used to guide both project execution and
project control. It helps us to tell the need and use of project and how the project is to be
implemented and who all are involved within the project and what will be the estimated time
taken by the them for its completion.
• Why? - What is the problem or value proposition addressed by the project? Why is it
being sponsored? The purpose why the project is designed is the need of separate
system. As presently it only has the link within the University and the separate
website is not published yet. So the project is being sponsored so that the individual
website is launched.
• What? - What is the work that will be performed on the project? What are the major
products/deliverables? The individual website of University with all its pages will be
created. All the updates regarding the upcoming events and other news will be
displayed on it. The website site will contain separate sections so that people can
interact with the website. It will also consists of blog for the interaction and news and
events purpose.
• Who? - Who will be involved and what will be their responsibilities within the
project? How will they be organized? Being the developers we are the team of three
people who are currently involved in the designing of the website and our
responsibility is to develop an interactive as well as attractive website of University.
• When? - What is the project timeline and when will particularly meaningful points,
referred to as milestones, be complete? For the completion of project within the
allotted time interval we have set certain milestones so that our project is completed
on time. The time duration with us is 5 months and we need to complete our website
with the database connectivity within this time.
Introduction
Software Requirements analysis encompasses those tasks that go into determining the
needs or conditions to meet for a new or altered product, taking account of the possibly
Software requirements:
• HTML
• Photoshop CS4
Hardware requirements:
Atleast 2GB RAM to support the working of Flash CS4 and other softwares
Functional requirements:
• Website must be accessible to all and should present all the information about the
organization
• The web sites should allow the public easy access to information about the properties
listed.
• The web sites should integrate data that already have been collected about the properties
listed.
• The web sites should provide direct links to other sources of information, including
independent databases.
• The web sites should be designed to minimize the amount of time required for the
management and updating of data and operation of the system.
• Automatic e-mail notification of registered users when new properties are added to the
database
• Monitoring the use of the system for administrative purposes
• Automatic warning to data providers by e-mail when property listings expire or when
status updates are needed
• Automatic expiration of outdated property listings
Non-functional requirements:
General Description
Languages used for the purpose of designing as well as for database connectivity includes :
• Hyper Text Markup Language (HTML): HTML, which stands for HyperText
Markup Language, is the predominant markup language for web pages. It is written
in the form of HTML elements consisting of "tags" surrounded by angle brackets
within the web page content. It is the building blocks of all basic websites. It allows
images and objects to be embedded and can be used to create interactive forms. It
provides a means to create structured documents by denoting structural semantics for
text such as headings, paragraphs, lists, links, quotes and other items. It can embed
scripts in languages such as JavaScript which affect the behavior of HTML
webpages.HTML can also be used to include Cascading Style Sheets (CSS) to define
the appearance and layout of text and other material. The W3C, maintainer of both
HTML and CSS standards, encourages the use of CSS over explicit presentational
markup.
• Active Server Pages (ASP.NET): ASP.NET is a web programming platform
developed by Microsoft. It is the successor to Active Server Pages. The term "classic
ASP" is often used to distinguish previous versions of Active Server Pages with
the .NET (pronounced "dot net") versions. Many ASP.NET developers
use Microsoft's Visual Studio to develop ASP.NET sites. But there are less expensive
and free alternatives as well. Microsoft's Visual Web Developer Express Edition is
free. Web Matrix is useful in that it also provides a simplified version of the Internet
Information Services (IIS), Microsoft's web server. The version of IIS included with
Web Matrix allows you to test locally hosted applications. Since January 2006
Microsoft has made available free Express Editions of Visual Studio, including Visual
Web Developer, which uses the later ASP.NET 2.0, and also has the same local IIS
(called Cassini). All require in addition the appropriate .NET framework also
available from Microsoft, and for development the appropriate .NET framework SDK
as well.
• Flash CS4: Adobe Flash (formerly Macromedia Flash) is a multimedia platform used
to add animation, video, and interactivity to Web pages. Flash is frequently used for
advertisements and games. More recently, it has been positioned as a tool for "Rich
Internet Applications" ("RIAs")
• Cascade Style Sheet (CSS): CSS is designed primarily to enable the separation of
document content written in HTML or a similar markup language from document
presentation, including elements such as the layout, colors, and fonts This separation
can improve content accessibility, provide more flexibility and control in the
• Div Tag (Layout Design): The <div> tag in XHTML is a tag that defines logical
divisions within the content of a page. What this means is that a <div> tag defines
sections of a Web page to make it easier to manage, style, and manipulate. You can
use the <div> tag when you want to center a block of content or position a content
block on the page. The <div> tag is a very powerful tool for Web developers.
• Notepad (for coding): Notepad is a common text-only or plain text editor. The
resulting files typically saved with the .txt extension have no format tags or styles,
making the program suitable for editing system files that are to be used in a DOS
environment. Notepad supports both left-to-right and right-to-left based languages,
and one can alternate between these viewing formats by using the right or left Ctrl+
Shift keys to go to right-to-left format or left-to-right format, respectively .Coding of
HTML is done in notepad only.
Specific Requirements
Why .NET?
The .NET in ASP.NET stands for the .NET Framework, a set of objects and
blueprints from Microsoft for building applications. All applications developed under
the .NET Framework; including ASP.NET applications, have certain key features that
ensure compatibility, security, and stability.
• Classic ASP was built on the top of the Windows operating system and
IIS (Internet Information Server). It was always a separate entity, and therefore
its functionality was limited. ASP.NET, on the other hand, is an integral part
of the system under the .NET Framework. It shares many 9f the same objects
that traditional applications would use and all .NET objects available for ASP.
NET’s consumption.
• ASP also made it abundantly clear that client and server were two
separate entities, Whereas ASP. NET ties together the client and the server
through clever use of server-side and client-side code, all invisible to the
developer.
• In classic ASP, nearly all of the code was executed in code render
blocks (that is, inside <%...%> tags). In ASP.NET, this type of code isn’t
compiled and isn’t recommended for frequent use. Instead, you use the code
declaration blocks, which are compiled and provide better performance.
SQL Server is an SQL-compliant RDBMS. SQL-compliant means it use the ANSI (American
National Standard Institute) version of Structured Query Language or ‘SQL’. Structured
Query Language is a command that allow us to modify or retrieve information from the
database.
Client server means that SQL Server is designed to store data in the central location (the
server) and deliver it on demand to numerous other locations (the client). SQL Server is also
a Relational Database Management System (RDBMS).
• Information representation
• Guaranteed access
• Optimizing queries
Query Analyzer:
System Design:
System design is the process of developing specifications for a candidate system that meet the
criteria established in the system analysis. Major step in system design is the preparation of
the input forms and the output reports in a form applicable to the user.
The main objective of the system design is to make the system user friendly. System
design involves various stages as:
• Data Entry
• Data Correction
• Data Deletion
• Processing
• Report Generation
System design is the creative act of invention, developing new inputs, a database,
offline files, procedures and output for processing business to meet an organization
objective. System design builds information gathered during the system analysis.
• Accessibility
• Economy
• Flexibility
• Reliability
• Simplicity
Design Notations
Snapshots
Detailed Design
In database design, several views of data must be considered along with the persons
who use them. In addition to data structuring, where relationships are reflected
between and within entities, we need to identify the application program’s logical
views of data within an overall logical data structure. The logical view is what the
data look like, regardless of how they are stored. The physical view is the way data
exist in physical storage. It deals with hoe data are stored, accessed, or related to other
data in storage The schema is the view that helps the DBMS decide in storage act
upon as requested by the application program.
a) RELATIONAL MODEL:
Certain rules followed in creating and relating databases in the relational databases.
This governs how to relate data and prevent redundancy of the data in the databases.
The first set of rules called relational rules ensures that the database is a relational
database. The second set called the normalization rules simplifies the database and
reduce the redundancy of the data.
CODE DESIGN
When large volumes of data are being handled, it is important that the item be identified,
stored or selected easily and quickly. To accomplish this, each data item must have unique
identification and must be related to other items of the same type. Codes can provide brief
identification of each item, which replace longer description that would be more awkward to
store and manipulate.The ability to interrupt codes, evaluate coding schemes and devices new
or improved codes are important skills for a system analyst. Common types of codes are:
b) SEQUENCE CODES:
It is a code in which the number describes measurable physical characteristics of the item.
d) ALPHABETIC CODE:
Here, the item are specified by the user of letter and number combinations,
It uses a check digit to check the validity of codes. These types of codes are an
important means of controlling the validity of data that are being processed.
VALIDATION CHECKS:
Sometimes incorrect data can actually cause a computer system to stop work
temporarily. This is a particular problem in batch processing systems when data may
be processed overnights. If incorrect data stops a batch processing systems for
working then a whole night processing time may be lost.
People who develop computer systems go to a lot of trouble to make it difficult for
incorrect data to be entered. The two main techniques used for this purpose are:
VERIFICATION
VALIDATION
Verification:
A verification check ensures that data i9s correctly transferred into a computer
from the medium that it was originally stored on. Verification checks are usually
used to check that a data entry worker has correctly typed information written
on a data collection form into a computer Methods of Verification:
On-Screen prompts: After a user has entered some data it is redisplayed on the screen.
The user is prompted to read the data and confirm that it has been entered correctly. If
the user has entered any data incorrectly he should response that the data is inaccurate
and retypes the incorrect parts.
Dual Inputs: This method is used when data is entered through the keyboard.
The data to be entered is typed in twice by two different operations. The two copies of
VALIDATION:
A validation check is an automatic check made by computer to ensure that any data
entered into the computer is sensible. A validation check does not make sure that data
has been entered correctly. It only ensures that data is sensible. For this reason
validation checks are not usually as effective as verification checks. They can
however be carried out automatically by the computer and therefore require less work
by the computer operators making them cheaper to use.
Methods of validation:
There are many different methods of validations. The most appropriate method to use
will depend upon what data is being entered. The most common methods are listed
here.
Presence Checks: checks that data has been entered into the field and that it has not
been left blank, e.g. checks that Project ID is always entered into each record in a
database of project details.
Validation checks can be performed by any piece of software. If the user tries to do
unauthorized operations the appropriate error messages are produced by the systems.
DATA DICTIONARY:
In our DFD, we give names to data flows, processes, and data stores. Although the
names are descriptive of the data, they do not give details. So the following the DFD,
our interest is to build some structured place to keep details of the contents of data
• INPUT DESIGN:
The input design is the link between the information system and the user. It comprises
developing specification and procedure for data preparation and those steps that are
necessary to put transaction data into a usable form for processing data entry. The
activity of putting data into the computer for processing can be achieved by
instructing the computer to read data from a written or printed document or it can
occur by having people key data directly into the system. The design of inputs focuses
on controlling the amount of inputs required, controlling errors, avoiding delay,
avoiding extra steps and keeping the process simple.
OUTPUT DESIGN:
It is common practice to draw a context-level data flow diagram first, which shows the
interaction between the system and external agents which act as data sources and data sinks.
On the context diagram (also known as the Level 0 DFD) the system's interactions with the
outside world are modelled purely in terms of data flows across the system boundary. The
context diagram shows the entire system as a single process, and gives no clues as to its
internal organization.
This context-level DFD is next "exploded", to produce a Level 1 DFD that shows some of the
detail of the system being modeled. The Level 1 DFD shows how the system is divided into
sub-systems (processes), each of which deals with one or more of the data flows to or from an
external agent, and which together provide all of the functionality of the system as a whole. It
also identifies internal data stores that must be present in order for the system to do its job,
and shows the flow of data between the various parts of the system.
• Process
Graphical representation:
Graphical Representation:
• Data flows
A data flow connects the output of an object or process to input of another object or
process. It represents the intermediate data value within a computation. It is represented by an
arrow and labeled with a description of data, usually its name or type.
Graphical Representation:
• Actors
An actor is active object that drives the data flow graph by producing or
consuming values.
• Data store
A data store is a passive object with in a data flow diagram that stores data for later
access.
Graphical Representation:
• External Entity
• OutPut Symbol
Graphical Representation:
Examinati
on
Manageme
Online
nt System
Registrati
Student on
Record
Data
Process
Databas
e
Account
Library
Manage
Managem met
ent System
System
Adminstrativ
e
Add/Delete Add/Delete
Members
Members Search
Magazine Newslett
Issue/Retur `s err
n
Books CD`s
Application Form
Admit Card
Registration No.
Choices of
colleges NO
Provisional
YES
Letter Allotment
Fees
Payment
Document
Verification
Students Faculty
Members
Salary
Mode of Fees
Pay
College
Cash Draft
Cheque Online
Faculty
Student
Marks View
SCREEN SHOTS :-
2)LIBRARY SYSTEM
3)ADD/REMOVE MEMBER
5)ADD ITEMS
ACCOUNT MANAGEMENT
1)LOGIN PAGE
3)ADMIT CARD
6)INDICATIVE SEAT
8)VERIFIACTION BY ADMIN
10)INITIALIZE REGISTRATION
1)LIBRARY
• IMPLEMENTATION TOOLS:
Training personnel
Conversion Procedures
Post-implementation review
Even well designed system can succeed or fail because of the way they are operated
and used. Therefore, the quality of training received by the personal involved with the
system in various capacities helps or hinders and may even prevent the successful
implementation of management information system.
Those who are directly or indirectly related with the system development work must
know in detail what must know in detail what their roles will be, how they can make
efficient use of the system and what the system will or will not do for them. Both
system operators and users need training.
Running of the system successfully depend on the personnel working in the Computer
Centre. They are Responsible for providing the necessary support. Their training must
ensure that they are able to handle all possible operations, both routine and extra-
ordinary in nature.
If the system calls for the installation of new equipment, such as new computer
system, special terminals or different data entry machines, the operators training
should include such fundamentals as how to turn the equipment on and use it, how to
power off and a knowledge of what constitutes normal operations. The operators
Lovely Professional University Page 74
should also be trained on different type of malfunctioning, how to recognize them and
what steps should also be taken whenever they arise.
User Training
User may be trained on use equipment, particularly in the case where, e.g. a micro
computer is in use and individual involved is both operator and user. In such cases,
user must be given training on how to operate and user. In such cases, user must be
given training on how to operator the system also. Questions that may be trivial to the
analyst, such as how to turn on a terminal, how to insert a diskette into a micro-
computer or when it is safe to turn off equipment with out danger of data loss are
significant problems to new users who are not familiar.
Inmost of the cases user training deals with the operation of the system itself, with
proper attention given to data handling techniques. It is imperative that users be
properly trained in methods of entering transaction, editing data, formulating
inquiries, deleting and inserting of records. No training is complete without
familiarizing users with simple systems maintenance activities. Weakness in any
aspect of training may lead of awkward situation that creates user frustration and
error.
Conversion Methods:A conversion is the process of changing from the old system to
the new one. It must be properly planned and executed. Four methods are common in
use. They are Parallel Systems, Direct Conversion, Pilot System and Phase In method.
Each method should be considered in the light of the opportunities that it offers and
problems that it may create. In general, system conversion should be accomplished in
shortest possible time. Long conversion periods create problems for all persons
involved including both analysts and users.
Parallel systems: The most secure method of converting from an old to new system
is to run both systems in parallel. This method is safest one because it ensures that in
case of any problem in using new system, the organization can still fall back to the old
system without the loss of time and money.
Direct conversion: This method converts from the old system to new
system abruptly, sometimes over a weekend or even overnight. The old system
is used until a planned conversion day, when it is replaced by the new system.
Pilot system: Pilot approach is often preferred in the case of the new
system which involves new techniques or some drastic changes in
organization performance. In this method, a working version of the system is
implemented in one part of the organization, such as a single work area or
department.
9.SYSTEM TESTING
INTRODUCTION:
The purpose of system testing is to identify and correct errors in the candidate system.
Testing is and important element of software quality assurance ad represents the
ultimate review of specification, design and coding. The increasing visibility of the
software as a system element and the cost associated with a software failure are
motivated forces for well planned, through testing.
Unit testing was conducted first. Different modules of the software were tested against
the specifications produced during design of the modules. Verification of the code
produced during the coding phase was done. Each module was tested separately.
Unit testing focuses verification effort on the smallest unit of software design module.
This uncovers errors within the boundary of a module. Unit testing is actually White
box testing both the external things as well as the internal codes are tested. In testing,
the interfaces are tested in order to ensure the proper flow of data in and out of the
module. The boundary testing is done to ensure that the module keeps the limit of it.
All independent paths are tested to ensure that all statements are tested at least once.
At last the error path is also tested.
Unit testing comprises the set of tests performed by an individual programmer prior to
integration of the unit into a larger system. There are four categories of test that can be
performed on a program unit
Functional Unit
Performance Unit
• Stress Unit
• Structure Unit
System Testing:
Then system testing was conducted. Here the entire software system was tested.
The reference document used for this process was requirement document and the goal
was to see if the software meets its requirements.
System testing includes the thorough testing of the product. System testing is actually
a series of different tests whose primary purpose is to fully exercise the computer
based system. The tests are recovery testing: this checks the recovery of the system
when failure occurs. This is to ensure that there are recovery procedures for error
occurrences.
System testing involves unit testing, integration testing, acceptance testing. Careful
planning and scheduling are required to ensure that modules will be available for
• Compile/Assemble program
Before applying methods to design effective test cases, software engineer must understand
the basic principles that guide the software testing process. Some of the most commonly
followed principles are:
All test should be traceable to customer requirements as the objective of testing is to uncover
errors, it follows that the most severe defects (from the customers point of view) are those
that causes the program to fail to meet its requirements.Tests should be planned long before
the testing begins. Test planning can begin as soon as the requirement model is complete.
Detailed definition of test cases can begin as soon as the design model has been solidated.
Therefore, all tests can be planned and designed before any code can be generated.The Pareto
principle applies to software testing stated simply the Pareto principle implies that 80 percent
of all errors uncovered during testing will likely be traceable to 20 percent of all program
modules. The problem of course, is to isolate these suspects’ modules and to thoroughly test
them.Testing should begin “in the small “and progress towards testing “in large”. The first
tests planned and executed generally focus on individual modules. As testing progresses,
testing shifts focus in an attempt to find errors in integrated clusters of modules and
ultimately in the entire system.Exhaustive testing is not possible. The number of paths
permutations for impossible to execute every combination of paths during testing. It is
possible however to adequately cover program logic and to ensure that all conditions in the
procedural design have been exercised.To be most effective, an independent third party
should conduct testing. By “most effective”, we mean testing that has the highest probability
of finding errors (the primary objective of testing).Software project management is an
umbrella activity within software engineering. It begins before any technical activity is
intimated and continues throughout the definition, development, and maintenance of
computer software.Three p’s 1 have a substantial influence on software project management
–people, problem, and process. People must be organized into effective teams, motivated to
do high quality software work, and coordinated to achieve effective communication. The
problem communicated from customer to developer, partitioned (decomposed) into its
constitute parts, and positioned for work by the software team. The process must be adapted
to the people and the problem. A common process framework is selected, an appropriate
software engineering paradigm is applied, and a set of work is chosen to get the job done.
The project management activity encompasses measurement and metrics, estimation, risk
analysis, schedules, tracking and control, and control. Each of these steps was followed
during project also.
Test cases are required to know what specific situations need to be tested. When tests are
evaluated, test results are compared with actual results and if there is some error, then
debugging is done to correct the error. Testing is a way to know about quality and reliability.
Error rate that is the occurrence of errors is evaluated. This data can be used to predict the
occurrence of errors in future.
We know, test cases are integral part of testing. So we need to know more about test cases
and how these test cases are designed. The most desired or obvious expectation from the test
cases is that it should be able to find most errors with the least amount of time and effort.
A software product can be tested in two ways. In first approach, only overall functioning of
the product is tested. Inputs are given and outputs ate checked. This approach is called black
box testing. It does not care about the internal functioning of the product.
White box testing is performed to reveal problems with the internal structure of a program.
This requires the tester to have detailed knowledge of the internal structure. A common goal
of white box testing is to ensure a test case exercises every path through a program. A
fundamental strength that all white box strategies share is that the entire software
implementation is taken into account during testing, which facilitates error detection even
when software specification is vague or incomplete. The effectiveness or thoroughness of
white box testing is commonly expressed in terms of test or code coverage metrics, which
measure the fraction of code exercised by test cases.
It is a white box technique. It was proposed by Tom McCabe. These tests guarantee to
execute every statement in the program at least one time during testing. Basic set is the set of
all execution paths of a procedure.
Black box tests are performed to access how well a program meets its requirements, looking
for incorrect or missing functionality. Functional tests typically exercise code with valid or
nearly valid input for which the expected output is known. This includes concepts such as
‘boundary values’.Performance tests evaluate response time, memory usage, throughput,
device utilization and execution time. Stress tests push the system to or beyond its specified
limits to evaluate its robustness and error handling capabilities. Reliability tests monitor
system response to representative user input, counting failures over time to measure or certify
reliability.