Software Requirement Specifications

Youth information website, allowing young people to have an easy access to online information. Young people visiting this site will have the opportunity to become part of an online information website, youth view about youth related concerns and it is not restricted to youth related issues only, there will be articles which are related economic state of country . Young people usually seek for interesting blogs to read, they like to stay updated with the latest trend.

There are several stages during the process of a web application project, and every stage is important to achieve a positive end result. The purpose of our system "youth search" is to provide the latest information and current happening all over the world and our site is not limited to current affairs only it also have fun-zone which will provide a space for youth to view videos, blogs and many more attractions. One more advantage of Youth Search is that a user can apply for jobs also as per their qualification.

Software project management is concerned with activities involved in ensuring that software is delivered on time and on schedule and in accordance with the requirements of the organizations developing and procuring the software. Project management is needed because software development is always subject to budget and schedule constraints that are set by the organization developing the software. Project management is the discipline of planning, organizing, motivating, and controlling resources to achieve specific goals. A project is a temporary endeavor with a defined beginning and end (usually time-constrained, and often constrained by funding or deliverables), undertaken to meet unique goals and objectives, typically to bring about beneficial change or added value. The temporary nature of projects stands in contrast with business as usual (or operations), which are repetitive, permanent, or semi-permanent functional activities to produce products or services. In practice, the management of these two systems is often quite different, and as such requires the development of distinct technical skills and management strategies.

The project comprises of many useful features for youth and which will benefits youth in all way. This website will be very beneficial for young people. We would like to conclude that this system would be beneficial to student, youngster and teenager who like to explore world and are seeking for fun and entertainment.

Our project follows spiral model.(figure 1.1)

Figure 1.1

This model is iterative in nature and has a six task regions as follows

1. Customer Communication: - In this region, it is suggested to establish customer communication.

2. Planning: - All the planning activities are carried out in order to define resources time line and other project related activity.

3. Risk analysis: - The task required calculating technical and management risks are carried out.

4. Engineering: - In this region, tasks required to build one or more representations of applications are carried out.

5. Construction and release: - All the necessary tasks required constructing, testing, install the application are constructed. Some tasks are required to provide user support are also carried out in this task region

6. Customer evaluation: - Customer's feedback is obtained and based on customer evaluation required tasks are performed and implemented at installation stage.

1.1.1 Purpose

The purpose of our project to provide a proper medium for young people so that they can share their views and enjoy the attractions of the project. The project comprises of many useful features for youth and which will benefits youth in all way. This website will be very beneficial for young people.

Also young people visiting this site will have the opportunity to become part of an online information website, youth can post their opinions about youth related concerns and it is not restricted to youth related issues only, it have many more attractions

1.1.2 Scope

The main goal of our system is to provide a proper medium which involves multiple attractions for the user which make this website more convenient to use.

This system comprises of many such features which youth demand the most hence making the system very useful.

This system can be used anywhere, anytime as it is a web application, no special software is used to run this system.

1.2 General Description

1.2.1 Organization Profile

' The Innoventaa Technocrats is founded to promote latest and in demand educational courses in the field of information technology.

' Innoventaa as a leading software development company operating globally since 2008 acting a trustable web provider to both small and large companies.

' Innoventaa software training team has extensive knowledge and experience in any kind of website development project.

1.2.2 Short Description about Activities of the Organization

Innoventaa Technocrats is reputed Software and Website Development Company who also provides IT training to fresher and professionals. This company is based in Ahmedabad-Gujarat, India. The company as a leading software development company operating globally since 2008 acting a trustable web provider to both small and large companies. This company is a team of 50+ tech-minded enthusiasts, certified senior specialists in .NET, PHP, Java technologies. This company helps its clients to reach a new level of their business aims and bring the quality innovation by providing customer centric full cycle development approach.

The company software training team has extensive knowledge and experience in any kind of website development project. We at Innoventaa provide ASP.Net training,PHP programming training, Java training, software testing and other IT programs.

This company assure to provide professional and quality course modules to every student in institute. The trained faculty give extensive practical session to have better understanding over the course opted by students. The faculty team is very qualified and has several years of industry experience in their specific field. As this company is also Website Development Company hence students get an opportunity to work on live project to get real time experience.

The goal of this company is

' To provide high quality training program

' To tackle with unemployment issues by creating more and more industry specific professionals

' Cost effective programs for all segments

' To be a best career builder software institute in the industry

1.2.3 Project introduction

Our project 'Youth Search' goal is to provide a proper medium for young people so that they can view the latest news, trend and enjoy the attractions of the project. The project comprises of many useful features for youth and which will benefits youth in all way.

This system consists of three actors

''User

''Admin

''Seller

''User Activities:-

''View home.

''Registration/Sign in.'

''View current affairs.

''View Vellabuddy.

' View blogs.

''View Fun zone

' View games videos.

' View game details.

' Buy game

''View places to visit.

' View place name.

' View place details.

' View place location.

''View Bussinessbuddy.

''Complain/feedback

' Submit complain/feedback

''Contact us

''Logout.

' Admin Activities

' Manage user

' Add & Search User

' Manage country

' Add & Search country.

' Manage state

' Add & Search state.

' Manage city

' Add & Search city

' . Manage job.

' Add & Search jobr.

' Manage categories

' Add & Search categories.

' Manage subcategories

' Add & Search subcategories.

' Manage News

' Add & Search funzone

' Manage blogs

' Add & Search funzone

' Manage funzone.

' Add & Search funzone

' Manage places to visit.

' Add & Search ptv

' Manage business buddy

' Add & Search business buddy

' Manage Report

' View buyer game.

' View applied jobs.

' Seller Activities

' Registration and Sign in

' View and Search products.

' Provide payment by paypal

' Receive payment by paypal

' View and post complaints

' View feedback

' Logout

1.2.4 Project Profile

Project definition

Youth Search: Online Web application for youth

Project description

Our project 'Youth Search' goal is to provide a proper medium for young people so that they can share their views and enjoy the attractions of the project. The project comprises of many useful features for youth and which will benefits youth in all way.

Youth information website, allowing young people to have an easy access to online information. Young people visiting this site will have the opportunity to become part of an online information website, youth can post their opinions about youth related concerns and it is not restricted to youth related issues only, there will be articles which are related economic state of country . Young people usually seek for interesting blogs to read, they like to stay updated with the latest trend.

Developed for

Innoventaa technocrats pvt. Ltd.

External Project Guide

Mr.Harshal Trivedi

Internal project guide

Prof. S.G. Desai

Team-size

There are 2 people in our team.

Hardware Configuration

' Processor : Pentium IV or Higher Processor

' Hard disk : 100 GB

' RAM : Up to 2 GB or Higher

Front-End tool

Visual studio .NET

Back-End tool

SQL Server 2005+

1.3 Security and Reliability Requirements

1) Security

''There must be a log in id and password to every user. The user can view the whole site.

''The Information should be Secure; there should not be any kind of malfunctioning. System Information will not be changed by any person rather than the management (admin).

2) Reliability

''System should be reliable. It should keep secure all the information regarding to particular User, Seller and Products. It should work effectively in tremendous rush.

''The system must give the perfect results in kind of damn situation. The Particular result must be listed in to the particular user only; there should not be any kind of data integrity or other problem between Administrator, User and Seller.

3) Availability

''The information and data about each module should perfectly available in the system.

4) Efficiency

''System should be efficient enough to meet all kinds of requirements as required by the Administrator, User and Seller. The system should not hang or lose its efficiency in any kind of worse conditions. It should provide the correct output in all manners.

5) User Friendliness

''System should be user friendly, so that any user can access the system.

6) Maintainability

''The application should be maintainable in such a manner that if any new requirement occurs then it should be easily incorporated in an individual module.

1.4 Organizational Requirements

1.4.1 Implementation Requirements

It requires good skill for implementation of project. As this project is using n- tier business architecture. All the classes, functions, procedures and objects are created in the system wise architecture. The n tiers are given below.

1) GUI

2) Business Logic Layer

3) Data Access Layer

4) Web Services layer

5) Common layer

Entire coding will be done using Microsoft Visual Studio and SQL Server 5. Soft copy for the documentation is provided in Microsoft Word Format. Entire coding would not be shown to the client for any reasons. Implementation does not require any more software support without as mentioned below in the system requirements.

1.4.2 Standards Requirements

Industry standards will be followed by us in any negotiation or deal related to the product software. Coding, Documentation and final product delivery will be followed by the standards.

1.5 External Requirements

1.5.1 Ethical Requirements

Product Software should be negotiated with human ethics and it is wished that the software should be used with ethical requirements. Any non-ethical use of this software will be at the user's own risk.

1.5.2 Legislative Requirements

Privacy Requirements

Privacy of any particular things and strategy will be served based on prior negotiation and it should be cleared purposed for that requirement.

Safety Requirements

Safety will be provided based on the requirement of the members and necessary critical points.

1.6 Study and Weakness of the Current System

There are dozens of websites on internet which attracts youth a lot as in websites of blogging, websites, and websites of games and many entertainment websites. Blogging is very popular today because it allows people to interact with each other. Blogging has also become a popular search engine optimization (SEO)tool because search engines like Google and Yahoo know that a blog is frequently updated with content or visitor comments, so their spiders visit blogs frequently looking for new content to include in their index.

Additionally, blog content can be delivered automatically via electronic RSS (Really Simple Syndication) data feeds. Visitors subscribe to a blog's feeds in order to stay up to date with content that's being posted on subjects that interest them. Blog feeds are then read by what's known as blog feed reader software, widely available for free, so users can scan for recent blog posts of interest on the blogs to which they subscribe.

Finally, blogging doesn't require that writers and contributors know a lot about HTML (Web page code). If a blogger or visitor can fill in an online form, they can blog and post comments on other blogs. There are any blogging sites such as Tumblr, Twitter which attracts youth a lot.

People should be aware of world and the latest news so there are websites available for that even. There are current affair websites like Civil Services India and Best Current Affair which have latest information about the world and political issues.

PC games, also known as computer games, are video games played on a general-purpose personal computer rather than a dedicated video game console or arcade machine. Youth really like computer games and now a day there are amazing games which available online. We have searched many gaming sites and the most popular gaming sites are Zynga, Pogo, Yahoo! Games, and Y8.com.

Millions of teens who grew up with a mouse in one hand and a remote control in the other, young people should go out and explore various places. There are websites which tells us the best places to visit such as City8, Mapjack.com, and Slight walk.

Shopping sites are a latest hit now days. Online shopping or online retailing is a form of electronic commerce which allows consumers to directly buy goods or services from a seller over the Internet using a web browser. Alternative names are: e-web-store, e-shop, e-store, Internet shop, web-shop, web-store, online store, and virtual store. Most popular sites for online shopping are Myntra, Jabong.com etc.

Weakness in current system

The above mentioned site are individually very good and beneficial for youth but the problem is that the user have to go through these sites separately so there is a need of such a system which will provide all the benefits of above system in a single website.

1.7 Requirements of New System

1.7.1 User Requirements

1. The User requirements for the new system are to make the system fast, flexible, less prone to errors and reduce expenses and save time.

2. Time can be saved as this website is a multipurpose website.

3. The system should have User and Seller information which can be used as per required only by authorized personnel for security purpose.

4. The New system should be more secure in managing user records and reliable enough to be used in any condition.

1.7.2 Feasibility Study

A key part of the preliminary investigation that reviews anticipated costs and benefits and recommends a course of action based on operational, technical, economic, and time factors. The purpose of the study is to determine if the systems request should proceeded further.

1.7.3 Features of the New System

The new system has been designed as per the user requirements so as to fulfill almost all them. Our project comprises of various panels such as current affairs, fun zone, music zone, blogging, e- commerce, event management, payment,jobs. So for the efficient work of these panels we will require a person for the management of the system and that person will be the administrator who will manage the whole system.

Our project requirements are fulfill by three actors

1) ADMIN

2) USER

3) SELLER

The execution of our project is responsible by three actors-Admin, User, Seller. Each person has their own work and responsibility. Admin is responsible for managing user, categories and sub categories. Admin will manage the whole system and provide a proper system to the user and seller. The user will manage his own profile and do the registration for the one. The user work is just to view the activities of the project. The seller work is to place his product on the website and sell it.

From the technical viewpoint the system is made up of the following components:

' Manage user.

' Manage categories.

' Manage sub-categories.

' Manage current affairs

' Manage Product.

' Manage schemes.

' Manage seller package.

' Manage events.

' Manage blog.

' Manage fun zone.

' Manage notification.

' Manage payment.

' Manage complains.

' Manage feedback.

' Manage music.

' Manage places.

So as user this system can provide these functionalities:-

' Registration.

' Profile management.

' View and search current affairs.

' View, search and buy the product.

' View events.

' View and posting.

' Upload post.

' Receive notification.

' Provide payment.

' Post complains.

' View and post feedback.

' Uploading and downloading music files.

' View places.

1.8 Interface Requirement

1.8.1 Hardware Interface

The user can able to run the system, the minimum requirements of the hardware for this system are:

RAM: - Up to 2 GB or Higher

Disk space: - 100GB

Processor: - Pentium IV or Higher Processor

1.8.2 Software Interface

'' Development Tools:

Front End : Visual studio .NET

Back End : SQL Server 2005+

Other Tools : AJAX Control toolkit.

Web Server : IIS.

''Documentation & Presentation Tools:

Microsoft Word 2003 or above

Microsoft PowerPoint 2003 or above

Visio

''Technology Used

About Visual Studio 2008:

' Visual Studio is a complete set of development tools for building ASP.NET Web applications, XML Web Services, desktop applications, and mobile applications. Visual Basic, Visual C#, and Visual C++ all use the same integrated development environment (IDE), which enables tool sharing and eases the creation of mixed-language solutions. In addition, these languages use the functionality of the .NET Framework, which provides access to key technologies that simplify the development of ASP Web applications and XML Web Services.

' Visual Studio 2008 is the latest version of Microsoft's flagship IDE. Along with it comes the .NET Framework 3.5, new versions of Visual Basic and C#, a data query model known as LINQ, improvements to the .NET Framework technologies that were released alongside Windows Vista, and out-of-the-box access to ASP.NET AJAX and Visual Studio Tools for Office.

' The Microsoft .NET Framework is a software framework that can be installed on computers running Microsoft Windows operating systems. It includes a large library of coded solutions to common programming problems and a virtual machine that manages the execution of programs written specifically for the framework. The .NET Framework is a Microsoft offering and is intended to be used by most new applications created for the Windows platform.

' The framework's Base Class Library provides a large range of features including user interface, data access, database connectivity, cryptography, web application development, numeric algorithms, and network communications. The class library is used by programmers, who combine it with their own code to produce applications.

' Version 3.0 of the .NET Framework is included with Windows Server 2008 and Windows Vista. The previous stable version of the framework, 3.5, is included with Windows 7, and can also be installed on Windows XP and the Windows Server 2003 family of operating systems.

What is .NET Framework?

' Applied .NET Framework Programming

[Fig. 3.1.1 .NET Framework]

' If you use the .NET Framework, your code targets the common language runtime (CLR), which affects your decision about a programming language.

' The common language runtime is just what its name says it is: A runtime that is usable by different and varied programming languages.

' The features of the CLR are available to any and all programming languages that target it-period. If the runtime uses exceptions to report errors, then all languages get errors reported via exceptions.

' If the runtime allows you to create a thread, then any language can create a thread. In fact, at runtime, the CLR has no idea which programming language the developer used for the source code.

' You may develop your code in any programming language you desire as long as the compiler you use to compile your code targets the CLR.

' Microsoft is creating several language compilers that target the runtime: C++ with managed extensions, C# (pronounced 'C sharp'), Visual Basic.NET, JScript, Java, and an intermediate language (IL) Assembler.

' In addition to Microsoft, there are several other companies creating compilers that produce code that targets the CLR. At this writing,

About .NET 3.5:

' Version 3.5 of the .NET Framework was released on 19 November 2007, but it is not included with Windows Server 2008. As with .NET Framework 3.0, version 3.5 uses the CLR of version 2.0. In addition, it installs .NET Framework 2.0 SP1, (installs .NET Framework 2.0 SP2 with 3.5 SP1) and .NET Framework 3.0 SP1 (installs .NET Framework 3.0 SP2 with 3.5 SP1These changes do not affect applications written for version 2.0, however.

' As with previous versions, a new .NET Compact Framework 3.5 was released in tandem with this update in order to provide support for additional features on Windows Mobile and Windows Embedded CE devices.

' The source code of the Base Class Library in this version has been partially released (for debugging reference only) under the Microsoft Reference Source License.

SQL Server 2005:

' SQL Server 2005 (codenamed Yukon), released in October 2005, is the successor to SQL Server 2000.

' It included native support for managing XML data, in addition to relational data. For this purpose, it defined an xml data type that could be used either as a data type in database columns or as literals in queries.

' XML columns can be associated with XSD schemas; XML data being stored is verified against the schema. XML is converted to an internal binary data type before being stored in the database.

' Specialized indexing methods were made available for XML data.

' XML data is queried using XQuery; Common Language Runtime (CLR) integration was a main features with this edition, enabling one to write SQL code as Managed Code by the CLR.

' SQL Server 2005 added some extensions to the T-SQL language to allow embedding XQuery queries in T-SQL.

' In addition, it also defines a new extension to XQuery, called XML DML, which allows query-based modifications to XML data.

' SQL Server 2005 also allows a database server to be exposed over web services using TDS packets encapsulated within SOAP (protocol) requests. When the data is accessed over web services, results are returned as XML.

' For relational data, T-SQL has been augmented with error handling features (try/catch) and support for recursive queries with CTEs (Common Table Expressions).

' SQL Server 2005 has also been enhanced with new indexing algorithms, syntax and better error recovery systems.

' Data pages are check summed for better error resiliency, and optimistic concurrency support has been added for better performance.

' Permissions and access control have been made more granular and the query processor handles concurrent execution of queries in a more efficient way. Partitions on tables and indexes are supported natively, so scaling out a database onto a cluster is easier.

' SQL CLR was introduced with SQL Server 2005 to let it integrate with the .NET Framework.

' SQL Server 2005 introduced "MARS" (Multiple Active Results Sets), a method of allowing usage of database connections for multiple purposes.

' SQL Server 2005 introduced DMVs (Dynamic Management Views), which are specialized views and functions that return server state information that can be used to monitor the health of a server instance, diagnose problems, and tune performance.

' SQL Server 2005 introduced Database Mirroring, but it was not fully supported until the first Service Pack release (SP1).

' In the initial release (RTM) of SQL Server 2005, database mirroring was available, but unsupported.

' In order to implement database mirroring in the RTM version, you had to apply trace flag 1400 at startup. Database mirroring is a high availability option that provides redundancy and failover capabilities at the database level.

' Failover can be performed manually or can be configured for automatic failover. Automatic failover requires a witness partner and an operating mode of synchronous (also known as high-safety or full safety).

.1.9 Preliminary schedule

Software project planning involves estimation of ' Money, - Effort, - Resources and Time it will take to build a specific software base system.

' PROJECT DEVELOPMENT APPROACH AND JUSTIFICATION

For the project development, we have chosen the spiral model. The Spiral Model is an evolutionary software process model that couples the iterative nature of prototyping with the controlled and systematic aspects of the Linear Sequential Model. It provides the potential for rapid development of incremental versions of the software. Using the spiral model, software is developed in a series of incremental releases. A spiral model is divided into a number of framework activities, also called task regions . Typically, there are between three and six task regions. Figure shows a Spiral model that contains six task regions:

' User communication'tasks required to establish effective communication between developer and user

' Planning' tasks required to define resources, timelines,

' Risk analysis'tasks required to assess both technical and management risks.

' Engineering'tasks required to build one or more representations of the application.

' Construction and release'tasks required to construct, test, install, and provide user support (e.g., documentation and training).

Chapter 2

Data Dictionary

'

A Data Dictionary is Catalog-Responsibility of the Element in a System. As the Name Suggests, these Element are Structured around Data in a Way to Meet the Use and the Organization Requirements. A Data Dictionary is a List of Elements that composes all the Data Flow Process through the System. It Stores Detail and Description of Data Flow, Data Store and Processes.

' If Analysts Wants to Know by What Other Means is a Table or a Data Item Referenced in the System or where it is Being Used the Answers are Properly Developed in the Data Dictionary.

' The Dictionary Id Developed During Data Flow Analysis and Assists the Analysts Involved in Requirements. However it's Content is used during System Design as Well.

Feature of Data Dictionary

' The Volume of Data in Most Information System is Substantial More then a Single Analyst Can Easily Keep Track of the same. When the Teams of Analyst Work on Assistance the Task of Co-Coordinating Data Definition Becomes More Complex. Individual Depends on the Information provided by others with their Assumption and the Specification made by them.

' Data Dictionary is Integral Component of Structured Analysis. Since Dataflow Diagram by them do not Fully Describe the Subject of the Investigation. The Data Dictionary Provides Additional Information About System.

2.1 Data dictionary: Admin

' Table Name: categories

Table Description: Use to add category into the system.

Table 2.1.1 categories

Column Name Datatype Constraint

categoryid int Primary key

categoryname nvarchar(max) Not Null

categorydescription Nvarchar(max) Not Null

' Table Name: subcategories

Table Description: Use to add sub-category and fetch the description of the category from the system.

Table 2.1.2 subcategories

Column Name Datatype Constraint

subcatid int Primary Key

categoryid int not null

subcategoryname nvarchar(max) not null

subcategorydescription nvarchar(max) not null

' Table Name: country

Table Description: Use to add Country

Table 2.1.3 country

Column Name Datatype Constraint

countryid int Primary Key

countryname nvarchar(max) not null

' Table Name: state

Table Description: Use to add state

Table 2.1.4 state

Column Name Datatype Constraint

stateid int Primary Key

countryid int not null

statename nvarchar(max) not null

' Table Name: city

Table Description: Use to add City

Table 2.1.5 city

Column Name Datatype Constraint

cityid int Primary key

countryid int not null

stateid int not null

cityname nvarchar(max) not null

Data dictionary: User

' Table Name: registrationform

Table Description: Use to take the personal details from the User and register the User with Username and password.

Table 2.2.1 registrationform

Column Name Datatype Constraint

userid int Primary key

firstname nvarchar(max) not null

lastname nvarchar(max) not null

gender nvarchar(max) not null

education nvarchar(max) not null

countryid int not null

stateid int not null

cityid int not null

Dob datetime not null

contactno decima(18,2) not null

emailid nvarchar(max) not null

password nvarchar(max) not null

confirmpassword nvarchar(max) not null

username nvarchar(max) not null

' Table Name: Contact Us

Table Description: Use to Add Contact-detail of user

'

Table 2.2.2 ContactUs

Column Name Datatype Constraint

Contact_id Int Primary key

Name nvarchar(max) not null

Email nvarchar(max) not null

Details nvarchar(max) not null

' Table Name: Feedback/Complain

Table Description: Use to Add feedback Or Complain about site.

Table 2.2.3 feedback/complain

Column Name Datatype Constraint

Feedback_id int Primary key

Type nvarchar(max) not null

Name nvarchar(max) not null

Email nvarchar(max) not null

Subject nvarchar(max) not null

Details nvarchar(max) not null

Data dictionary: Current Affairs

' Table Name: currentaffairs

Table Description: Use to view and search current affair's information into the system .

Table 2.3.1 currentaffairs

Column Name Datatype Constraint

Caid int Primary key

Catid int not null

Subcatid int not null

News Nvarchar(max) not null

Photos Nvarchar(max) not null

Description Nvarchar(max) not null

Data dictionary: Vella-buddy

' Table Name: vellabuddy

Table Description: Use to view blogs into the system .

Table 2.4.1 vellabuddy

Column Name Datatype Constraint

Id int primary Key

blogname nvarchar(max) not null

photos nvarchar(max) not null

blogdescription nvarchar(max) not null

Data dictionary: Fun-zone

' Table Name: funzones

Table Description: Use to view Game-videos in funzone into the system .

Table 2.5.1 funzones

Column Name Datatype Constraint

GameID int primary key

gamename nvarchar(max) not null

GameVideo nvarchar(max) not null

gamedescription nvarchar(max) not null

Price decimal(18,2) not null

' Table Name: PayMents

Table Description: Use to Game's payment into the system .

Table 2.5.2 PayMents

Column Name Datatype Constraint

Payid int Primary key

userid int not null

GameID int not null

buydate datetime not null

Status nvarchar(max) not null

Data dictionary: PTV(Places To Visit)

' Table Name: ptvs

Table Description: Use to view and search information about places by PTV into the system .

Table 2.6.1 ptvs

Column Name Datatype Constraint

Ptvid int Primary key

Placename nvarchar(max) not null

Location nvarchar(max) not null

Description nvarchar(max) not null

Data dictionary: BusinessBuddy

' Table Name:businessbuddies

Table Description: Use to view the items for sell in the system.

Table 2.7.1 businessbuddies

Column Name Datatype Constraint

addid int Primary key

adname nvarchar(max) Not null

photos nvarchar(max) Not null

adddescription nvarchar(max) Not null

status nvarchar(max) Not null

Data dictionary: Job

' Table Name: jobs

Table Description: Use to view Jobs in the system.

Table 2.8.1 jobs

Column Name Datatype Constraint

Jobid int Primary key

Jobtitle nvarchar(max) not null

interviewdate datetime not null

Time nvarchar(max) not null

branchname nvarchar(max) not null

Skills nvarchar(max) not null

Salary int not null

Location nvarchar(max) not null

Company nvarchar(max) not null

Qualification nvarchar(max) not null

' Table Name: ApplyJobs

Table Description: Use to view job applicant's detail in the system.

Table 2.8.2 ApplyJobs

Column Name Datatype Constraint

ApplyId int Primary key

userid int Foreign key(jobs)

jobid int Foreign key(registrationform)

ApplyDate datetime not null

Status nvarchar(max) not null

Chapter 3

Diagram

3.1 UML Diagrams

Unified Modeling Language

In The Unified Modeling Language User Guide, the original developers of the UML-Grady Booch, James Rum Baugh, and Ivar Jacobson--provide a tutorial to the core aspects of the language in at wo-color format designed to facilitate learning. Starting with a conceptual model of the UML, the book progressively applies the UML to a series of increasingly complex modeling problems across a variety of and assumes no responsibility for errors or omissions. No liability is assumed for incidental or consequential to advanced modeling problems.

Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks where those designations appear in this book, and Addison Wesley LongmanInc. was aware of a trademark claim, the designations have been printed in initial caps are all in caps. The author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind damages in connection with or arising out of the use of the information or programs contained herein. application domains. This example-driven approach helps readers quickly understand and apply the UML. For more advanced developers, the book includes a learning track focused on applying the UML

List of UML Diagrams Shown.

1) Use Case Diagram

2) Activity Diagram

3.2 E-R Diagram

Entity Relationship is Described by their dependence on each other, As Well as by extent of the relationship among We Will Begin by Examining the Basis of Database Management Drawing on the Relationship Data and the Sharing of Data Across Different Application.

Entity Relationship Analysis uses Three Major Abstraction to Described Data.

1. Entities: Entities are Distinguishable Object That can be represented in

The Database.

2. Relationship: It is meaningful interaction between the entities.

3. Attributes: It is nothing but properties of entities.

In E-R Diagram three types of Relationship exists:-

1. One-to-One (1:1)

Relationship is associated between two objects.

2. One-to-Many (1: M or M: 1)

Relationship describes an entity that may more

Entities related to it.

3. Many-to-Many (M: M)

Relationship describes an entities multiple

Relationship with other entities.

E-R diagram contains following components:

1. Rectangle: This represents entity sets.

2. Ellipse: This represents attributes.

3. Diamonds: This represents relationship sets.

4. Line: Links attributes to entity sets and entity sets to Relationship sets

3.3 Data flow Diagram

Data flow diagram (DFD) represents the flows of data between different processes in a business. It is a graphical technique that depicts information flow and the transforms that are applied as data move form input to output. It provides a simple, intuitive method for describing business processes without focusing on the details of computer systems. DFDs are attractive technique because they provide what users do rather than what computers do.

5.1Security Features

Security is an important aspect of any software development. Without reasonable level of security, the availability, the reliability and safety may be compromised if external attack damage to the system.

''For security purpose we have various validations.

Validation provided to every input ensures there are no take entries and redundant data.

Enterprise library validation provides various validation formats. So exact input format is decided, thus ensuring a correct input to the system.

''Authorization at the time of login enables access to valid users.

''Other security feature we have used is roll base architecture. So the

''access to different functions can be specified access to the roles

''We provide login for users, with using event log viewer are maintained in the database so admin can check any error if at all generated as per the users.

5.2 Coding Standards

The coding standard is well defined and standard style of coding. With the help of coding standards any person can find the exact meaning of code and understand the working of the system. A coding standard includes the way the variables are to be named, the code that is to be laid out, the comments that are to be described etc. To develop reliable and maintainable applications, you must follow coding standards and best practice.

General Coding Standard:

The coding standard we have used is Pascal case that includes proper naming and programming conventions. It includes first letter in identifier as capital letter and first letter of each subsequent concatenated word also capitalized.

File Naming Conventions:

The files created in the project are named in such a way that all letters are in small.

The files in the same module are grouped together in a folder with appropriate name. This makes it easier for the developer to navigate to the appropriate file. Thus it is a good coding technique that enables faster access to the files.

Identifier Standard:

The other variable names must also be relevant and must be descriptive.

Comment Standard:

The other technique used for programming is comments. The few lines of comments make the code more elegant. Sometimes it makes the code easier to understand and works as a help for the programmers.

Tables:

The tables created in the project are named in such a way that all characters are in small letters.

Chapter 6

Testing

6.1Testing Plan

1) System Testing is an expensive but critical process that can take as much as 50 % of the budget for the program development. The common view of testing held by user is that it is performed to prove that there are no errors in a program. However this is virtually impossible since analyst cannot prove that is software is free and clear of errors.

2) Software testing is a critical element of software quality assurance and represents the ultimate review of specification design and coding.

3) Some of the Testing Objectives are:

''Testing is a process of executing a program with the intend of finding the errors.

''A good test case is one that has a high probability of finding undiscovered errors.

''A successful test on the other hand is one that uncovers all the undiscovered errors.

4) Testing is set of activities that can be planned in advance and conducted systematically to carry out the testing procedures of the proposed system. Testing is generally done at two levels- Testing of individual screens and testing of the entire system. Testing is the process of executing a program with the explicit intention of finding errors, which makes the program fail. The tester is actually trying to make the program fail. A successful test is the one that find an error. During Systems testing, the system is used experimentally to ensure that the software does not fail, i.e. that it will run according to its specifications and in the way users expect.

5) A test case is a set of data that the system will process as normal input. However, the data are created with the express intend of determining whether the system will process them correctly or not.

Features are tested:

''All the functional features specified in the System Requirement specification are tested.

''System level integration for the various screens that were developed has been done.

''Performance testing has been done for acceptable response and correctness of data.

Testing Principles:

Some of the basic testing principles are as followed:

''All tests should be traceable to customer requirements.

''Tests should be planned long before testing begins.

''Testing should begin 'in the small' and progress towards testing 'in the large'.

6.2 Testing Strategy

UNIT TESTING

1) The starting point of testing is unit testing. In this, each and every module is tested separately and is often performed by the developer himself simultaneously along with the coding of the form. Each and every in the software is tested for consistency and attempt is made to make the software error free.

2) In the Login Form it is checked that the user exist and the password entered is correct, otherwise the error message is developed and the system waits for the correct input. Proper messages are displayed on occurrence of errors.

3) In each and every form it is checked that the information provided by the user is valid and complete, otherwise it will display proper message and system waits for the correct input. Proper messages are displayed on occurrence of errors.

4) In every form it is checked that if the user has rights to perform the specific action and if user doesn't have rights then that action will not be performed.

5) In the update action it is checked that the information provided by the user for updating is valid and complete, otherwise proper error message is displayed and the system waits for the correct input. Proper messages are displayed on occurrence of errors.

INTEGRATION TESTING

1) After unit testing the forms are gradually integrated into subsystems which are then integrated to eventually form the entire system. During integration of forms, integration testing is performed to detect design errors by focusing on testing the interconnection between forms.

2) After linking of each form's integration testing is performed. In this testing it is checked that the user can not directly visit the forms, which can't be visited login. E.g. User can't view, Inert, Update or verify entries without login into the system.

SECURITY TESTING

1) This is testing which is conforms that the program can restrict access authorized personal and that authorized personal can access the function available to that level.

2) User can not visit or perform action for which he is not given access rights. As the system is role based so security is provided based on role.

COMPATIBILITY TESTING

1) Compatibility Testing is testing whether software is compatible with other element of a system with which it should operate. E.g. Browser, hardware or Operating Systems.

2) Compatibility testing is performed by running it on different browsers. Here it is verified that the display or functionality of controls is not changed when used in other projects.

RECOVERY TESTING

1) Recovery Testing is testing how well a system recovers from crashes hardware failure or other catastrophic problem.

SYSTEM TESTING

1) After developing entire application/project or product or major portion of it is tested at once, this is called system testing.

6.3 Testing Methods

BLACK BOX TESTING

1) Black box testing alludes to test that are conducted at the software interface. Although they are design to uncover errors, black box tests are used to demonstrates that software functions are operational, that input is properly accepted and output is correctly produce, that the integrity of external information is maintained.

2) Black Box Testing, also called behavioural testing, focuses on the functional requirements of the software. That is, black box testing enables the software engineer to derive sets of input conditions that will fully exercises all functional requirements for a program. Black Box Testing is not an alternative to White Box techniques. Black- Box testing attempts to find errors in the following categories:

''Incorrect or missing functions.

''Interface errors.

''Errors in data structures or external database access.

''Behavior or performance errors.

''Initialization and termination errors.

WHITE BOX TESTING

1) White box testing of software is predicted on close examination of procedural detail. Logical parts through the software are tested by providing test cases that exercises specific sets of conditions and /or loops. The 'Status of the program' may be examined at various points to determine if the expected or asserted status corresponds.

2) White-Box testing sometimes called Glass-Box testing; it is a test case design method that uses the control structure of the procedural design to derive test cases. Using white-Box testing methods, the software engineer can derive test cases that: Guarantee that all independents paths within a module have been exercised at least once.

''Exercise all logical decisions on their true and false sides.

''Execute all loops at their boundaries and within their operational bounds.

''Exercise internal data structures to ensure their validity

' Table 6.1:- Test Case #1

Module Name: Youth Search

Test Title: Verify login with valid username and password

Description: Testing the Login Form

Pre-conditions: User (admin) has valid username and password.

Test # Description Input Expected

Result

Actual

Result

Status

1 Username admin Control passes to password field

Control passes to password field

Pass

2 Password admin Control passes to admin home

page

Control do not pass to admin

home page

Pass

Post-conditions: User (admin) is validated with database and successfully login to account. The account session details are logged in database.

' Table 6.2:- Test Case #2

Module Name: Youth Search

Test Title: Verify the registration information of User.

Description: Testing the User registration form

Pre-conditions: User entering valid information details.

Test # Description Input Expected Resul

t Actual Result

Status

1 First Name ina Control passes

Last Name field

to Control passes to

Last Name field

Pass

2 Last Name

moza Control passes

gender field

to Control passes to

gender field

Pass

3 gender female Control passes

gender field

to Control passes to

gender field

Pass

4 Education b.e. Control passes

Education field

to Control passes to

Education field

Pass

6 Country name india Control passes to

state field

Control passes to state field Pass

7 State Gujarat Control passes

city field

to Control passes to city field

Pass

8 City Ahmedabad Control passes

Dob field

to Control passes to Dob field Pass

9 Dob 7/11/1991 Select form calendar or enter the date and Control passes to Dob field Control passes to

Dob field

Pass

10 Contact number India Control passes

emailid field to Control passes to emailid field Pass

11 Emailid [email protected] Control passes to

password field Control passes to password id field Pass

12 Password 1234 Control passes to

Confirm Password field

Control passes to

Confirm Password field

Pass

13 Confirm password 1234 Control passes to user home page

Control passes to user home page

Pass

Post-conditions: User is validated with database and successfully account is created.

' Table 6.3:- Test Case #3

Module Name: Youth Search

Test Title: Verify Category with category name

Description: Testing the Manage Category Form

Pre-conditions: Admin has manage category name and category description.

Test # Description Input Expected

Result

Actual

Result

Status

1 Category name Category's name Control passes to category description field

Control passes to category description field

Pass

2 Category description Category's description Control passes to manage category

page

Control pass to manage category page

Pass

Post-conditions: Category is successfully enter into database.

' Table 6.4:- Test Case #4

Module Name: Youth Search

Test Title: Verify subcategory with subcategory name.

Description: Testing the Manage subcategory form

Pre-conditions: Admin has subcategory name and description.

Test # Description Input Expected

Result

Actual

Result

Status

1 Subcategory name Subcategory's name Control passes to subcategory description field

Control passes to subcategory description field

Pass

2 Subcategory Description Subcategory's description Control passes to manage subcategory page Control passes to manage subcategory

Pass

Post-conditions: Subcategory is successfully enter into database.

'

' Table 6.5:- Test Case #5

Module Name: Youth search

Test Title: Verify country

Description: Testing the Manage Country Form

Pre-conditions: Admin has manage country name.

Test # Description Input Expected

Result

Actual

Result

Status

1 Country name country's name Control passes to manage country page

Control passes to manage country page

Pass

Post-conditions: Country name is successfully enter into database.

' Table 6.6:- Test Case #6

Module Name: Youth search

Test Title: Verify state

Description: Testing the Manage state Form

Pre-conditions: Admin has manage state name.

Test # Description Input Expected

Result

Actual

Result

Status

1 State name State's name Control passes to manage state page.

Control passes to manage state page

Pass

Post-conditions: State name is successfully enter into database.

' Table 6.7:- Test Case #7

Module Name: Youth search

Test Title: Verify city

Description: Testing the Manage City Form

Pre-conditions: Admin has manage city name.

Test # Description Input Expected

Result

Actual

Result

Status

1 City name city's name Control passes to manage city page

Control passes to manage city page

Pass

Post-conditions: City name is successfully enter into database.

' Table 6.8:- Test Case #8

Module Name: Youth search

Test Title: Verify news.

Description: Testing the Manage news Form

'

Pre-conditions: Admin has manage news, photos description.

'

Test # Description Input Expected

Result

Actual

Result

Status

1 Category name category's name Control passes to subcategory name field

Control passes to subcategory name field

Pass

2 Subcategory subcategory's name Control passes to News name field

Control passes to News name field

Pass

3 News News name Control passes to photo name field

Control passes to photo name field

Pass

4 Photo News photo Control passes to Description name field

Control passes to Description name field

Pass

5 Description Add description Control passes to manage news page

Control passes to manage news page

Pass

Post-conditions:

News is successfully entered into database.

' Table 6.9:- Test Case #9

Module Name:

Test Title: Verify business buddy

Description: Testing the Manage businessbuddy Form

Pre-conditions: Admin has manage name, description & photos.

Test # Description Input Expected

Result

Actual

Result

Status

1 Advertisement name Advertisement's Name Control passes to photo's field

Control passes to photo's field

Pass

2 Photos Advertisement 's photo Control passes to description field

Control pass to description field

Pass

3 Description Advertisement 's Description Control passes to status field

Control passes to status field

Pass

4 Status Advertisement 's

Status Control passes to manage businessbuddy page

Control passes to manage businessbuddy page

Pass

Post-conditions: Advertisement is successfully enter into database.

' Table 6.10:- Test Case #10

Module Name: Youth Search

Test Title: Verify Fun zone

Description: Testing the fun zone Form

Pre-conditions: Admin has manage game name, video & description.

Test # Description Input Expected

Result

Actual

Result

Status

1 Game name Game 's name Control passes to game' video field

Control passes to video field field

Pass

2 Game video Game 's video Control passes to game description

Control pass to game description field

Pass

3 Game Description Game 's description Control passes to manage fun zone page

Control passes to manage fun zone page

Pass

Post-conditions: Game name and video is successfully enter into database.

' Table 6.11:- Test Case #11

Module Name: Youth Search

Test Title: Verify job

Description: Testing the manage job forms.

Pre-conditions: Admin has manage job's title, interview date, time etc

Test # Description Input Expected

Result

Actual

Result

Status

1 Job title Job 's title Control passes to interview date field

Control passes to interview date field

Pass

2 Interview date Interview 's date Control passes to time field

Control pass to time field

Pass

3 Time Interview's time Control passes to branch name field Control passes to branch name field Pass

4 Branch name Branch's name Control passes to skills field Control passes to skills field Pass

5 Skills Skills Required Control passes to salary field Control passes to salary field Pass

6

Salary Salary amount Control passes to location field Control passes to location field Pass

7 Location Company location Control passes to company field Control passes to company field Pass

8 Company Company's name Control passes to qualification field Control passes to qualification field Pass

9 Qualification User's qualification Control passes to manage jobs page Control passes to manage jobs page Pass

Post-conditions: Jobs are successfully entered into database.

' Table 6.12:- Test Case #12

Module Name: Youth search

Test Title: Verify blog

Description: Testing the Manage blog Form

Pre-conditions: Admin has manage blog's name, photos description.

Test # Description Input Expected

Result

Actual

Result

Status

1 Blog name Blog's name Control passes to photos field

Control passes to photos field

Pass

2 Photos Blog's photo Control passes to blog description field

Control passes to blog description field

Pass

3 Blog description Blog's description Control passes to manage blog page

Control passes to manage blog page Pass

Post-conditions:

Blog is successfully enter into database.

' Table 6.13:- Test Case #13

Module Name: Youth search

Test Title: Verify PTV

Description: Testing the Manage PTV Form

Pre-conditions: Admin has manage place's sname, location & description.

'

Test # Description Input Expected

Result

Actual

Result

Status

1 Place name Place 's name Control passes to location field

Control passes to location field

Pass

2 Location Location 's name Control passes to description field

Control passes to description field

Pass

3 Description Place description Control passes to manage ptv page

Control passes to manage ptv page

Pass

Post-conditions:

Places are successfully enter into database.

Chapter 7

References & Conclusions

'

7.1 References

We got the idea of making such a system by viewing many youth oriented websites.Following are some references from where we have been through:

1) We have gone through current affair websites like Civil Services India and Best Current Affair which have latest information about the world and political issues.

2) We have searched many gaming sites and the most popular gaming sites are Zynga, Pogo, Yahoo! Games, and Y8.com.

3) There are websites which tells us the best places to visit such as City8, Mapjack.com ,and Slight walk.

4) We have searched many blogging site and the most popular blogging sites are Tumblr, Twitter and Weebly.

5) There is website called oxygen.org.au which have many good features for youth,we have gone through this website also.

7.2Conclusions

1) To provide current affairs , so that youth can gain knowledge and current information about the world.

2) To provide blogs which gives youth a medium to exchange their views and ideas.

3) The purpose of our system "youth search" is to provide the latest information and current happening all over the world and our site is not limited to current affairs only it also have fun-zone which will provide a space for youth to upload videos,galleries,blogs and many more attractions.

7.3Future Enhancement

1) The future enhancement of the Youth Search will include all the updates of various places, current affairs, games etc.

2) In our system user password save in database as it is but in future we will make an encryption algorithm for save password of user in database for security of site and clients.

Source: Essay UK - http://www.essay.uk.com/free-essays/information-technology/software-requirement-specifications.php



About this resource

This Information Technology essay was submitted to us by a student in order to help you with your studies.


Search our content:


  • Download this page
  • Print this page
  • Search again

  • Word count:

    This page has approximately words.


    Share:


    Cite:

    If you use part of this page in your own work, you need to provide a citation, as follows:

    Essay UK, Software Requirement Specifications. Available from: <https://www.essay.uk.com/free-essays/information-technology/software-requirement-specifications.php> [27-05-20].


    More information:

    If you are the original author of this content and no longer wish to have it published on our website then please click on the link below to request removal: