You are on page 1of 84

JOB PORTAL SYSTEM

PROJECT DONE UNDER E J O B I N D I A The job portal system is a technological web

based system built to provide an easy interacting interface between the job seekers A T A D A M A S I N S T I T U T E O Fand the recruiters via internet.
PROJECT GUIDE-PRITAM TECHNOLOGY AUGUST 2011 TO JULY 2011

ISHITA CHAKRABORTY(TL) TWISHA BANNERJEE SHREEJA CHAKRABORTY NAIRITA PANJA KALPANA JHA SAHELI MUKHERJEE

Certificate of Originality
To Whom It May Concern
This is to certify that the Project Report entitled JOB PORTAL SYSTEM, submitted to EJOB INDIA PRIVATE LIMITED, in partial fulfillment of the requirement for the award of the degree of Bachelor of Information Technology, is an original work carried out by Ishita Chakraborty, Twisha Bannerjee, Shreeja Chakraborty, Nairita Panja, Kalpana Jha, Saheli Mukherjee under the guidance of Mr Pritam .

The matter in this project is a genuine work done by the student and has not been submitted elsewhere of any course of study.

Pritam

Ejob India Private Limited Industry Seal and Signature

Principal (ADAMAS INSTITUTE OF TECHNOLOGY)

ACKNOWLEDGEMEN T
Acknowledgement is not only a ritual but, also an expression of indebtedness to all those who help the process of project development. One of the most pleasant aspects in collecting the necessary information compiling it is the opportunity to think of those who actively contributed to it. I wish to express my heartfelt thanks to all those who assisted me during this project. My deepest thanks to Pritam, the guide of the project for guiding and correcting my project with attention and care. He had great pain in going through the project and make necessary corrections as and when needed. I express my thanks to the Principal of Adamas Institute of Technology, for extending his support. My deep sense of gratitude to ejobindia for their support. Mostly I would like to thank them for giving me the opportunity to prepare the project under their guidance. I would like to express my profound and deep sense of gratitude to my institution and faculty members for their invaluable help, guidance and suggestions without which this project would not have been successful. I offer my sincere thanks to all my batch mates for their unconditional help and inspiration at Adamas Institute of Technology .Lastly I would like to express my gratitude to all the staff, who helped me in their own way whenever I needed. We are thankful to Microsoft for developing softwares like Microsoft .Net Framework, Microsoft SQL Server, Microsoft Office for providing us with a platform to develop this software quite easily and comfortably. Last but not the least we would like to thank the reader for bearing with us. We would be grateful to them if they forgive us for our mistakes and help us to rectify them by filling up the provided feedback form.

Thanking you.

Table of Contents

Introduction
First, let us narrate our thinking about the project, which we are going to propose. Some of the most important work that the software we are going to propose performs is as follows: 1. Provides a user id and password to every user and use that information to authenticate a user.
2. The software helps the recruiters to post a job and find the

people for the given post. It helps he job seeker to search for their desired job
3. The job seekers can search items and apply for those

online without wasting time and energy.

We all know, these days people have insufficient time to go to the offices and submit their resume or search for their job with desired options .It is also difficult for the rectriuters to search among a huge number of people their desired candidate So here were providing those users to save their time as well as energy . Were offering them a web based job portal by which the recuiters will be able to post their job and get the desired candidate. And the job seekers can very easily search their job accoding to their options.

Why I choose this project

TECHNOLOGIES USED
Microsoft .NET Framework
The Microsoft .NET Framework is a software framework that can be installed on computers running Microsoft Windows operating systems. It includes a large library of coded solutions to common programming problems and a virtual machine that manages the execution of programs written specifically for the framework. The .NET Framework is a Microsoft offering and is intended to be used by most new applications created for the Windows platform. The framework's Base Class Library provides a large range of features including user interface, data access, database connectivity, cryptography, web application development, numeric algorithms, and network communications. The class library is used by programmers, who combine it with their own code to produce applications. Programs written for the .NET Framework execute in a software environment that manages the program's runtime requirements. Also part of the .NET Framework, this runtime environment is known as the Common Language Runtime (CLR). The CLR provides the appearance of an application virtual machine so that programmers need not consider the capabilities of the specific CPU that will execute the program. The

CLR also provides other important services such as security, memory management, and exception handling. The class library and the CLR together constitute the .NET Framework. Version 3.0 of the .NET Framework is included with Windows Server 2008 and Windows Vista. The previous stable version of the framework, 3.5, is included with Windows 7, and can also be installed on Windows XP and the Windows Server 2003 family of operating systems. Version 4 of the framework was released as a public beta on 20 May 2009. In February 2010, Microsoft released a .NET Framework 4 release candidate. On April 12 2010, the final version of the .NET Framework 4 was released. The .NET Framework family also includes two versions for mobile or embedded device use. A reduced version of the framework, the .NET Compact Framework, is available on Windows CE platforms, including Windows Mobile devices such as smart phones. Additionally, the .NET Micro Framework is targeted at severely resource constrained devices

Principal Designing Features:

Interoperability

Because interaction between new and older applications is commonly required, the .NET Framework provides means to access functionality that is implemented in programs that execute outside the .NET environment. Runtime .InteropServices and System Enterprise Services namespaces of the framework; access to other functionality is provided using the P/Invoke feature.

Common Runtime Engine

The Common Language Runtime (CLR) is the virtual machine component of the .NET framework. All .NET programs execute under the supervision of the CLR, guaranteeing certain properties and behaviors in the areas of memory management, security, and exception handling.

Language Independence

The .NET Framework introduces a Common Type System, or CTS. The CTS specification defines all possible data types and programming constructs supported by the CLR and how they may or may not interact with each other conforming to the Common Language Infrastructure (CLI) specification. Because of this feature, the .NET Framework supports the exchange of types and object instances between libraries and applications written using any conforming .NET language.

Base Class Library

The Base Class Library (BCL), part of the Framework Class Library (FCL), is a library of functionality available to all languages using the .NET Framework. The BCL provides classes which encapsulate a number of common functions, including file reading and writing, graphic rendering, database interaction, XML document manipulation and so on.

Simplified Deployment

The .NET framework includes design features and tools that help manage the installation of computer software to ensure that it

does not interfere with previously installed software, and that it conforms to security requirements.

Security

The design is meant to address some of the vulnerabilities, such as buffer overflows, that have been exploited by malicious software. Additionally, .NET provides a common security model for all applications.

Portability

The design of the .NET Framework allows it to theoretically be platform agnostic, and thus cross-platform compatible. That is, a program written to use the framework should run without change on any type of system for which the framework is implemented. Microsoft submits the specifications for the Common Language Infrastructure (which includes the core class libraries, Common Type System, and the Common Intermediate Language), the C# language, and the C++/CLI language to both ECMA and the ISO, making them available as open standards. This makes it possible for third parties to create compatible implementations of the framework and its languages on other platforms.

Common Language Infrastructure (CLI) The purpose of the Common Language Infrastructure, or CLI, is to provide a language-neutral platform for application development and execution, including functions for exception handling, garbage collection, security, and interoperability. By implementing the core aspects of the .NET Framework within the scope of the CLR, this functionality will not be tied to a single language but will be

available across the many languages supported by the framework. Microsoft's implementation of the CLI is called the Common Language Runtime, or CLR. Assemblies The CIL code is housed in .NET assemblies. As mandated by specification, assemblies are stored in the Portable Executable (PE) format, common on the Windows platform for all DLL and EXE files. The complete name of an assembly (not to be confused with the filename on disk) contains its simple text name, version number, culture, and public key token. The public key token is a unique hash generated when the assembly is compiled, thus two assemblies with the same public key token are guaranteed to be identical from the point of view of the framework. A private key can also be specified known only to the creator of the assembly and can be used for strong naming and to guarantee that the assembly is from the same author when a new version of the assembly is compiled (required to add an assembly to the Global Assembly Cache). Metadata All CIL is self-describing through .NET metadata. The CLR checks the metadata to ensure that the correct method is called. Metadata is usually generated by language compilers but developers can create their own metadata through custom attributes. Metadata contains information about the assembly, and is also used to implement the reflective programming capabilities of .NET Framework. Security .NET has its own security mechanism with two general features: Code Access Security (CAS), and validation and verification. Code Access Security is based on

evidence that is associated with a specific assembly. Typically the evidence is the source of the assembly (whether it is installed on the local machine or has been downloaded from the intranet or Internet). Code Access Security uses evidence to determine the permissions granted to the code. Other code can demand that calling code is granted a specified permission. The demand causes the CLR to perform a call stack walk: every assembly of each method in the call stack is checked for the required permission; if any assembly is not granted the permission a security exception is thrown. When an assembly is loaded the CLR performs various tests. Two such tests are validation and verification. During validation the CLR checks that the assembly contains valid metadata and CIL, and whether the internal tables are correct. Verification is not so exact. The verification mechanism checks to see if the code does anything that is 'unsafe'. The algorithm used is quite conservative; hence occasionally code that is 'safe' does not pass. Unsafe code will only be executed if the assembly has the 'skip verification' permission, which generally means code that is installed on the local machine. .NET Framework uses AppDomains as a mechanism for isolating code running in a process. AppDomains can be created and code loaded into or unloaded from them independent of other AppDomains. This helps increase the fault tolerance of the application, as faults or crashes in one AppDomains do not affect rest of the application. AppDomains can also be configured independently with different security privileges. This can help increase the security of the application by isolating potentially unsafe code. The developer, however, has to split the application into subdomains; it is not done by the CLR.

The .NET Framework includes a set of standard class libraries. The class library is organized in a hierarchy of namespaces. Most of the built in APIs are part of either System.* or Microsoft.* namespaces. These class libraries implement a large number of common functions, such as file reading and writing, graphic rendering, database interaction, and XML document manipulation, among others. The .NET class libraries are available to all CLI compliant languages. The .NET Framework class library is divided into two parts: the Base Class Library and the Framework Class Library.The Base Class Library (BCL) includes a small subset of the entire class library and is the core set of classes that serve as the basic API of the Common Language Runtime. The classes in mscorlib.dll and some of the classes in System.dll and System.core.dll are considered to be a part of the BCL. The BCL classes are available in both .NET Framework as well as its alternative implementations including .NET Compact Framework, Microsoft Silverlight and Mono. The Framework Class Library (FCL) is a superset of the BCL classes and refers to the entire class library that ships with .NET Framework. It includes an expanded set of libraries, including Windows Forms, ADO.NET, ASP.NET, Language Integrated Query, Windows Presentation Foundation, Windows Communication Foundation among others. The FCL is much larger in scope than standard libraries for languages like C++, and comparable in scope to the standard libraries of Java.
Memory management

The .NET Framework CLR frees the developer from the burden of managing memory (allocating and freeing up when done); instead it does the memory management itself. To this end, the memory allocated to instantiations of .NET types (objects) is done

contiguously from the managed heap, a pool of memory managed by the CLR. As long as there exists a reference to an object, which might be either a direct reference to an object or via a graph of objects, the object is considered to be in use by the CLR. When there is no reference to an object, and it cannot be reached or used, it becomes garbage. However, it still holds on to the memory allocated to it. .NET Framework includes a garbage collector which runs periodically, on a separate thread from the application's thread, that enumerates all the unusable objects and reclaims the memory allocated to them. The .NET Garbage Collector (GC) is a non-deterministic, compacting, mark-and-sweep garbage collector. The GC runs only when a certain amount of memory has been used or there is enough pressure for memory on the system. Since it is not guaranteed when the conditions to reclaim memory are reached, the GC runs are nondeterministic. Each .NET application has a set of roots, which are pointers to objects on the managed heap (managed objects). These include references to static objects and objects defined as local variables or method parameters currently in scope, as well as objects referred to by CPU registers. When the GC runs, it pauses the application, and for each object referred to in the root, it recursively enumerates all the objects reachable from the root objects and marks them as reachable. It uses .NET metadata and reflection to discover the objects encapsulated by an object, and then recursively walk them. It then enumerates all the objects on the heap (which were initially allocated contiguously) using reflection. All objects not marked as reachable are garbage This is the mark phase. Since the memory held by garbage is not of any consequence, it is considered free space. However, this leaves chunks of free space between objects which were initially

contiguous. The objects are then compacted together, by using memcpy to copy them over to the free space to make them contiguous again. Any reference to an object invalidated by moving the object is updated to reflect the new location by the GC. The application is resumed after the garbage collection is over. The GC used by .NET Framework is actually generational. Objects are assigned a generation; newly created objects belong to Generation 0. The objects that survive a garbage collection are tagged as Generation 1, and the Generation 1 objects that survive another collection are Generation 2 objects. The .NET Framework uses up to Generation 2 objects. Higher generation objects are garbage collected less frequently than lower generation objects. This helps increase the efficiency of garbage collection, as older objects tend to have a larger lifetime than newer objects. Thus, by removing older (and thus more likely to survive a collection) objects from the scope of a collection run, fewer objects need to be checked and compacted.

The .NET Framework Stack


Versio n Version Number Release Date Visual Studio Default in Windows

1.0

1.0.3705.0

2002-0213

Visual Studio .NET

1.1

1.1.4322.57 3

2003-0424

Visual Studio .NET 2003

Windows Server 2003

2.0

2.0.50727.4 2

2005-1107

Visual Studio 2005

3.0

3.0.4506.30

2006-1106

Windows Vista, Windows Server 2008

3.5

3.5.21022.8

2007-1119

Visual Studio 2008

Windows 7, Windows Server 2008 R2

4.0

4.0.30319.1

2010-0412

Visual Studio 2010

ADVANTAGES:
OOP- .NET Framework is entirely based on object-oriented

principles right from the start.


GOOD DESIGN-A base class library, which is designed from

the ground up in a highly intuitive way.


LANGUAGE INDEPENDENCE- With .NET all of the languages

VB.NET, C#, J#, and managed C# compile to a common Intermediate Language. This means that languages are interoperable in a way that has not been seen before.
EFFICIENT DATA ACCESS- A set of .NET components,

collectively known as ADO.NET, provides efficient access to relational databases and a variety of data sources.
CODE SHARING- .NET has completely revamped the way that

code is shared between applications, introducing the concept of the assembly, which replaces the traditional DLL.

IMPROVED SECURITY- Each assembly can also contain built-in security information that can indicate precisely who or what category of user or process is allowed to call which methods on which class.

DEBUGGING- The .NET Framework simplifies debugging which support for Runtime diagnostics

Visual C#:
Microsoft Visual C# 2005, pronounced C sharp, is a programming language designed for building a wide range of applications that run on the .NET Framework. C# is simple, powerful, type-safe, and object-oriented. With its many innovations, C# enables rapid application development while retaining the expressiveness and elegance of C-style languages. Visual Studio supports Visual C# with a full-featured Code Editor, project templates, designers, code wizards, a powerful and easy-touse debugger, and other tools. The .NET Framework class library provides access to a wide range of operating system services and other useful, well-designed classes that speed up the development cycle significantly. Microsoft Visual C# is Microsoft's implementation of the C# programming language specification, included in the Microsoft Visual Studio suite of products. It is based on the ECMA/ISO specification of the C# language, which Microsoft also created. While multiple implementations of the specification exist, Visual C# is by far the one most commonly used. In most contexts, an unqualified reference to "C#" is taken to mean "Visual C#." The term Visual denotes a brand-name relationship with other Microsoft programming languages such as Visual Basic, Visual FoxPro, Visual J# and Visual C++. All of these products are packaged with a graphical IDE and support rapid application
development of Windows-based applications.

ADVANTAGES:

C# supports effective and reusable components. C# is portable at the same time it is cross language compatible for all Microsoft Windows based language.

C# implements the modern programming concepts of objectoriented language.

C# provides the ability of code extension to the developer.

Microsoft SQL Server:


Generically, any database management system (DBMS) that can respond to queries from client machines formatted in the SQL language. When capitalized, the term generally refers to either of two database management products from Sybase and Microsoft. Both companies offer client-server DBMS products called SQL Server. Definition: SQL Server is a relational database developed and sold by Microsoft. Originally bought from Sybase, Microsoft have released versions 6, 6.5, 7, 2000 and 2005. SQL Server uses an enhanced version of SQL called T-SQL. The Express Edition of SQL Server 2005 is used in the C+ + and C# tutorials. Microsoft SQL Server 2008 Reporting Services provides a complete, server-based platform designed to support a wide variety of

reporting needs enabling organizations to deliver relevant information where needed across the entire enterprise. Top New Features: Design reports with any structure by using the new unique layout capabilities of Flexible Report Layout

Benefit from enhanced performance and scalability to reach all Render reports into Microsoft Office Word format Integrate Reporting Services with Microsoft Office SharePoint Create reports with richly formatted text Display data graphically with enhanced visualization

users throughout the enterprise


Services for central delivery and management of business insight


capabilities

ADVANTAGES:
Through this kind of sites you one came to know now a days what kind of products are occupying the markets. Everyone can get various information regarding any new item. Everyone can access the site and do shopping instantly online. They dont have to pay time or money instantly.

Objectives
We have the following objectives in our mind:
To provide the better accessibility to the job seekers to search

jobs and apply to the same


To help the recruiters search for the people and save both time

and energy. To build up a good interacting interface between the seeker and recruiter To make myself familiar with the professional tools like Visual Studio 2008, .Net, Microsoft word, Microsoft Power point, Photoshop CS4 etc.

Category of the Project


This proposed software would be a web application. To develop the website we would be using 3-tier architecture of .net. The complete GUI will be designed with proper care. The GUI Tool which we use in the front end is ASP .net. At the back end we are using SQL server. The language used is C#. The IDE used is Visual Studio 2008. Therefore, we will be using overall C# .net concept in my project

Problem Definition:
Problem faced by an individual during searching for a job are as follows:

They have to spend their time as well as money and energy

searching for a job with their desired options


It also becomes hectic and a difficult job for the recruiters to

search for their desired candidate

Analysis:

Systems Analysis Definition - (SAD) The analysis of the role of a proposed system and the identification of the requirements that it should meet. SAD is the starting point for system design. The term is most commonly used in the context of commercial programming, where software developers are often classed as either systems analysts or programmers. The systems analysts are responsible for identifying requirements (i.e. systems analysis) and producing a design. The programmers are then responsible for implementing it.

In other words system analysis s a detailed study of the various performed by the system and their relationship within and outside of this system. Now one aspect of this analysis is defining the boundaries of the system and determining whether and how this system is interacting with the other related systems. During this analysis stage, data are collected on the available files and decisions points, transactions involve in the current system are noted. Now analyzing the minutes of discussion with the clients and summarizing the problem. I am going to analyze the following user requirement as they face a lot of problem to operating a college management system.

In modern world computerized systems are used almost everywhere. The last couple of years have witnessed an upsurge of interest in computer system. Clear evidence of this is to be found in an unprecedented growth in the software.

Now lots of softwares are found for various works like Graphics software, banking software, voice recognition software etc. Software has its own strength depending on the power of the programmer. The presented software is concerned with a college management system, which can be used in any college.

In modern times faster lifestyles requires the job to be done quickly, and it is hard enough to do that job without the aid of the computer. Many types of software are now available in the market to solve problems. In fact, high-speed digital computer is one of the reasons for the recent growth in software.

Tools and Platforms Used

PLATFORM
Windows 7

TOOLS
Ultimate

PURPOSE
OS Platform

Visual Studio 2008

RAD Tool

C#

Background Programs

MS Word 2007

Typing and editing documents

Documentation

MS PowerPoint 2007

Slide Show

Make presentation for Project

MS Paint

Photo Editing, Screen shorts

Support design.

JOB PORTAL SYSTEM

Requirement Analysis
Software Requirement Specifications
A Software Requirements Specification (SRS) is a complete description of the behavior of the system to be developed. It includes a set of use cases that describe all the interactions the users will have with the software. Use cases are also known as functional requirements. In addition to use cases, the SRS also contains nonfunctional (or supplementary) requirements. Non-functional requirements are requirements which impose constraints on the design or implementation (such as performance engineering requirements, quality standards, or design constraints)

Purpose:
The specification document describes the capabilities and efficiency that will be provided by the SOFTWARE application The Integrated System. It also states the various required constraints by which the system will be abide. The intended audience for this document is the development - term, testing team and end users of the product.

Product Perspective:
30

FRONT END

BACK END

JOB PORTAL SYSTEM

31

JOB PORTAL SYSTEM

System Requirement:
The computer on which you install your Visual Studio .NET edition should meet the following system requirements. Performance has not been tuned for minimum system configuration. Increasing your RAM above the recommended system configuration will increase your performance, specifically when running multiple applications, working with large projects, or doing enterprise-level development. When you start the Visual Studio .NET installer, the default installation location is your system drive, which is the drive that boots your system. However, you can install the application on any drive. Regardless of the application's location, the installation process installs some files on your system drive. Consequently, ensure that the above amount of space is available on your system drive regardless of the application's location, and ensure that additional space, as listed above, is available on the drive on which you install the application. Windows NT 4.0 supports only the installation of remote components. You cannot install Visual Studio on Windows NT 4.0. For information on the hardware requirements for other products that are included in some Visual Studio .NET editions, read their associated readme files. Windows XP Home does not support local Web application development; local Web application development is only supported in Windows XP Professional, Windows 2000, and Windows Server 2003.

32

JOB PORTAL SYSTEM


Microsoft Windows 2000 Datacenter Server is not a supported operating system. The type of media provided with the product determines whether a CDROM or DVD-ROM is required.

Require ment
Processor

Visual Basic
PC with a Pentium II-class processor, 450 MHz Recommended: Pentium III-class, 600MHz Windows 2000 Professional 96 MB; Windows 2000 Server 192 MB; Windows XP Home 96 MB; Windows XP Professional & Windows Server 2003 192 MB Recommended: 128MB for 2000 Professional, 256 MB for 2000 Server, 160 MB for XP Home, 256 MB for XP Professional & Windows Server 2003

Visual C++
Same

Visual C#
Same

Visual J#
Same

RAM

Same

Same

Same

Available Hard Disk Space Operating System

750 MB on system drive, 2.5 GB installation drive Windows 2000, Windows XP, Windows Server 2003, or Windows NT 4.0 Required 800 x 600, 256 colors Recommended: High Color 16-bit Microsoft Mouse or compatible pointing device

Same Same

Same Same

Same Same

CD-ROM or DVD-ROM Drive Video Mouse

Same Same Same

Same Same Same

Same Same Same

33

JOB PORTAL SYSTEM

Specific Requirements:
This section contains the software requirements to a level, sufficient to enable designers to design the system and testers to test the system.

Maintainability:
The application will be designed in a maintainable manner. It will be easy to incorporate new requirements in the individual modules.

Portability:
The application will be easily portable on any window-based system. It can be installed in such a system which does not have .NET installed in it.

34

JOB PORTAL SYSTEM

SOFTWARE & HARDWARE SPECIFICATIONS:a. HARDWARE REQUIREMENT SPECIFICATIONS:

PROCESSOR: 1.6 GHz and above. MEMORY: 256 MB and above. HARD DISK: 40 GB and above. INPUT DEVICE: Multimedia Keyboard and Microsoft mouse or compatible pointing device. OUTPUT DEVICE: VDU (Color Monitor) OPERATING SYSTEM: Windows XP with Service Pack 2 or above.

B. SOFTWARE REQUIREMENT SPECIFICATIONS:


35

JOB PORTAL SYSTEM


Microsoft .Net Framework 3.5 Visual Studio 2008 Sql server

Theoretical Background:
One of the primary reasons for the immense popularity of computers is the speed with which they can accomplish specific tasks. However, computer applications are not always easy to use.

Any applications have two parts: 11 User interface:


This is the screen displayed by the application. We interact with an application via the interface.

A good user interface will be:


Easy to learn Easy to use Attractive

There are two types of user interfaces:


A. Character user interface :

36

JOB PORTAL SYSTEM


Here text is the medium of information exchange. The application displays text, which prompted the user for the required information. It also specifies the valid option, if any. The user then responded to these prompts by specifying the required information using text. The disadvantage with character user interface (CUI) is that, with each new application, the user has to spend effort and time for getting used to the way it works.

B. Graphics user interface :


Interfaces that use graphics is called graphics user interface (GUI).Such interfaces are very popular because they are more user friendly. The user can identify with the graphics displayed on the screen. They are very easy to use .the user must be able to react intuitively to an interface presented in such because it emulates real life
1 Programming 1

Computers need clear out instructions to tell them what to do and when to do. A set of instructions to carry out a specified job is called a program. This is what goes out in the background. All interactions between the user and the application are performed via the user- interface. Thus, for any applications to be successful, it needs to have good user interface. The user interface makes the program easy to use.

37

JOB PORTAL SYSTEM

Feasibility study
A feasibility study is an evaluation of a proposal designed to determine the difficulty in carrying out a designated task. Generally, a feasibility study precedes technical development and project implementation. In other words, a feasibility study is an evaluation or analysis of the potential impact of a proposed project We can also say that a feasibility study is a detailed analysis of a company and its operations that is conducted in order to predict the results of a specific future course of action. Small business owners may find it helpful to conduct a feasibility study whenever they
38

JOB PORTAL SYSTEM


anticipate making an important strategic decision. For example, a company might perform a feasibility study to evaluate a proposed change in location, the acquisition of another company, a purchase of major equipment or a new computer system, the introduction of a new product or service, or the hiring of additional employees. In such situations, a feasibility study can help a small business's managers understand the impact of any major changes they might contemplate. The feasibility study is the important step in any software development process. This is because it makes analysis of different aspects like cost required for developing and executing the system, the time required for each phase of the system and so on. If these important factors are not analyzed then definitely it would have impact on the organization and the development and the system would be a total failure. The feasibility study provides one with objective information to evaluate existing services and strengths. Through feasibility study we gain an understanding of the competition and marketplace indicators that affect the business. This is the best way for one to grasp the impact of future decisions one may be considering. The feasibility study will help one accurately anticipate what will and will not work in varied situations. We will be able to determine what resources are essential to complete varied situations and gain an understanding of how to draw on our strengths.

Steps in Conducting a Feasibility Study:


39

JOB PORTAL SYSTEM

The main objective of a feasibility study is to determine whether a certain plan of action is feasiblethat is, whether or not it will work, and whether or not it is worth doing economically. Although the core of the study is dedicated to showing the outcomes of specific actions, it should begin with an evaluation of the entire operation. For example, a good feasibility study would review a company's strengths and weaknesses, its position in the marketplace, and its financial situation. It would also include information on a company's major competitors, primary customers, and any relevant industry trends. This sort of overview provides small business owners and managers with an objective view of the company's current situation and opportunities. By providing information on consumer needs and how best to meet them, a feasibility study can also lead to new ideas for strategic changes.

The second part of a good feasibility study should focus on the proposed plan of action and provide a detailed estimate of its costs and benefits. In some cases, a feasibility study may lead management to determine that the company could achieve the same benefits through easier or cheaper means. For example, it may be possible to improve a manual filing system rather than purchase an expensive new computerized database. If the proposed project is determined to be both feasible and desirable, the information provided in the feasibility study can prove valuable in implementation. It can be used to develop a strategic plan for the project, translating general ideas into measurable
40

JOB PORTAL SYSTEM


goals. The goals can then be broken down further to create a series of concrete steps and outline how the steps can be implemented. Throughout the process, the feasibility study will show the various consequences and impacts associated with the plan of action.

In most cases, a feasibility study should be performed by a qualified consultant in order to ensure its accuracy and objectivity. To be able to provide a meaningful analysis of the data, the consultant should have expertise in the industry. It is also important for small businesses to assign an internal person to help gather information for the feasibility study. The small business owner must be sure that those conducting the study have full access to the company and the specific information they need.

Advantages of making Feasibility study:


There are many advantages of making feasibility study some of which are summarized below:

This study being made as the initial step

of software development life cycle has all the analysis part in it which helps in analyzing the system requirements completely. .

Helps in identifying the risk factors involved in developing and

deploying the system .

41

JOB PORTAL SYSTEM

The feasibility study helps in planning for risk analysis Feasibility study helps in making cost/benefit analysis which

helps the organization and system to run efficiently. .

Feasibility study helps in making plans for training developers for

implementing the system. .

So a feasibility study is a report which could be used by the

senior or top persons in the organization. This is because based on the report the organization decides about cost estimation, funding and other important decisions which is very essential for an organization to run profitably and for the system to run stable.

Different Types of Feasibility:


In the conduct of feasibility study, the analyst will usually consider seven distinct but inter-related types of feasibility. The different types of feasibility studies are as follows:

Technical feasibility study: It is used to determine the Schedule feasibility study: It is used to determine the time Social feasibility study: It is used to determine whether a

requirements of technologies for the current system.

factor related to the current system.

proposed project will be acceptable to the people or not. This determination typically examines the probability of the project
42

JOB PORTAL SYSTEM


being accepted by the group directly affected by the proposed system change.

Legal feasibility study: It is used to determine the legal scrutiny Marketing feasibility study: It is used to determine the single and

of the current system.

multi-dimensional market forces that affect the current system. There are four types of marketing feasibility study, which are as follows: 1) Economic feasibility 2) Legal feasibility 3) Operational feasibility 4) Schedule feasibility 5) Is it technically feasible or not? The project is made with the help of a PC is easily available. Secondly, the software used for encryption and decryption purpose is alo easily available. Finally, the other software used to develop this project can easily interface with each other and also compatible with Windows 2000, Windows XP, Windows Server 2003, or Windows NT 4.0 operating system. 6) Is it technically feasible or not?: This website is very user friendly. Any user who knows simple English language can use this website. The user does not need to be familiar with .net framework or SQL server to use this website. So we can conclude that the website is operationally feasible as doing any operation in this website is very simple and it does not involve any complicacy.
43

JOB PORTAL SYSTEM


7) Is it economically feasible or not? The project is economically feasible as to install this software we need the minimum hardware configuration that we require installing Windows 2000, Windows XP, Windows Server 2003, or Windows NT 4.0whose cost is minimal. These two softwares will be installed automatically while installing our software. So, now we can easily conclude that this software is economically feasible. 8) Is it schedule feasible or not? The developer required only two month to develop this website. So we can say that the s website is time feasible. 9) Is it socially feasible or not? Yes, the developed website holds obviously social feasibility as this website does not perform any illegal operation and does not break our social law.

44

JOB PORTAL SYSTEM

Screen Design
The purpose of the design phase is to plan a solution of the problem specified by the requirement document. This phase is the first step in moving from the problem domain to the solution domain. In other words, starting with what is needed, design takes us towards how to satisfy the needs. The design of a system is perhaps the most critical factor affecting the quality of the software; it has a major impact on the later phase, particularly testing and maintenance. The output of this phase is the design document. This document is similar to a blueprint or plan for the solution and is used later during implementation, testing and maintenance. The design activity is often divided into two separate phases- system design and detailed design. System design, which is sometimes also called top-level design, aims to identify the modules that should be in the system, the specifications of these modules and how they interact with each other to produce the desired results. At the end of system design all the major data structures, file formats, output formats and the major modules in the system and their specification are decided. During detailed design, the internal logic of the modules specified in system design is decided. During this phase further details of the data structures and algorithmic design of each of the modules is specified in a high-level design description language, which is independent of the target language in which the software will eventually be implemented.

45

JOB PORTAL SYSTEM


In system design the focus is on identifying the logic for each of the modules. In other words, in system design the attention is on what components are needed, while in detailed design how the components can be implemented in software is the issue. A design methodology is a systematic approach to creating a design by application of a set of techniques and techniques. Most methodology focuses on system design. Project design include the desired featured and operations in details. It also includes user interface design, program structure, schema design and normalized tables and date integrity and constraints. It should be included with the requirements given below:

INTERFACE VALIDATION

USER, TASK & ENVIRONMENT ANALY

SIS

46

JOB PORTAL SYSTEM


IMPLEMENTATION INTERFACE DESIGN

47

JOB PORTAL SYSTEM

Flowchart :
A flowchart is a common type of diagram, that represents an algorithm or process, showing the steps as boxes of various kinds, and their order by connecting these with arrows. This diagrammatic representation can give a step-by-step solution to a given problem. Data is represented in these boxes, and arrows connecting them represent flow / direction of flow of data. Flowcharts are used in analyzing, designing, documenting or managing a process or program in various fields. A flow chart, or flow diagram, is a graphical representation of a process or system that details the sequencing of steps required to create output. A typical flow chart uses a set of basic symbols to represent various functions, and shows the sequence and interconnection of functions with lines and arrows. Flow charts can be used to document virtually any type of business system, from the movement of materials through machinery in a manufacturing operation to the flow of applicant information through the hiring process in a human resources department. Each flow chart is concerned with one particular process or system. It begins with the input of data or materials into the system and traces all the procedures needed to convert the input into its final output form. Specialized flow chart symbols show the processes that take place, the actions that are performed in each step, and the relationship between various steps. Flow charts can include different levels of detail
48

JOB PORTAL SYSTEM


as needed, from a high-level overview of an entire system to a detailed diagram of one component process within a larger system. In any case, the flow chart shows the overall structure of the process or system, traces the flow of information and work through it, and highlights key processing and decision points. Flow charts are an important tool for the improvement of processes. By providing a graphical representation, they help project teams to identify the different elements of a process and understand the interrelationships among the various steps. Flow charts may also be used to gather information and data about a process as an aid to decision making or performance evaluation. For example, the owner of a small advertising agency who hopes to reduce the time involved in creating a print ad might be able to use a flow chart of the process to identify and eliminate unnecessary steps. Though flow charts are relatively old design tools, they remain popular among computer programmers working on systems analysis and design. In recent years, many software programs have been developed to assist business people in creating flow charts.

49

JOB PORTAL SYSTEM

Types of Flowchart:
Sterneckert (2003) suggested that flowcharts can be modeled from the perspective of different user groups (such as managers, system analysts and clerks) and that there are four general types:

Document flowcharts, showing controls over a document-flow Data flowcharts, showing controls over a data flows in a system System flowcharts showing controls at a physical or resource Program flowchart, showing the controls in a program within a

through a system

level

system Notice that every type of flowchart focuses on some kind of control, rather than on the particular flow itself.

50

JOB PORTAL SYSTEM


However there are several of these classifications. For example Andrew Veronis (1978) named three basic types of flowcharts: the system flowchart, the general flowchart, and the detailed flowchart. That same year Marilyn Bohl (1978) stated "in practice, two kinds of flowcharts are used in solution planning: system flowcharts and program flowcharts. More recently Mark A. Fryman (2001) stated that there are more differences: "Decision flowcharts, logic flowcharts, systems flowcharts, product flowcharts, and process flowcharts are just a few of the different types of flowcharts that are used in business and government". In addition, many diagram techniques exist that are similar to flowcharts but carry a different name, such as UML activity diagrams.

Constructing Flow Charts:


Flow charts typically utilize specialized symbols. Some of the main symbols that are used to construct flow charts include:

A round-edged rectangle to represent starting and ending activities, which are sometimes referred to as terminal activities. A rectangle to represent an activity or step. Each step or activity within a process is indicated by a single rectangle, which is known as an activity or process symbol.
51

JOB PORTAL SYSTEM

A diamond to signify a decision point. The question to be answered or decision to be made is written inside the diamond, which is known as a decision symbol. The answer determines the path that will be taken as a next step.

Flow lines show the progression or transition from one step to another.

Constructing a flow chart involves the following main steps: 1) Define the process and identify the scope of the flow diagram; 2) Identify project team members that are to be involved in the construction of the process flow diagram; 3) Define the different steps involved in the process and the interrelationships between the different steps (all team members should help develop and agree upon the different steps for the process); 4) Finalize the diagram, involving other concerned individuals as needed and making any modifications necessary; and 5) Use the flow diagram and continuously update it as needed.

52

JOB PORTAL SYSTEM

DFD (Data Flow Diagram):


In the late 1970s data-flow diagrams (DFDs) were introduced and popularized for structured analysis and design (Gane and Sarson 1979). DFDs show the flow of data from external entities into the system, showed how the data moved from one process to another, as well as its logical storage. A data flow diagram (DFD) is a significant modeling technique for analyzing and constructing information processes. DFD literally means an illustration that explains the course or movement of information in a process. DFD illustrates this flow of information in a process based on the inputs and outputs. A DFD can be referred to as a Process Model. Data flow diagrams can be used to provide a clear representation of any business function. The technique starts with an overall picture of the business and continues by analyzing each of the functional areas of interest. This analysis can be carried out to precisely the level of detail required. The technique exploits a method called top-down expansion to conduct the analysis in a targeted way. As the name suggests, Data Flow Diagram (DFD) is an illustration that explicates the passage of information in a process. A DFD can be easily drawn using simple symbols. Additionally, complicated processes can be easily automated by creating DFDs using easy-touse, free downloadable diagramming tools. A DFD can also be referred to as a Process Model. A DFD demonstrates business or technical process with the support of the outside data saved, plus the data flowing from the process to another and the end results.
53

JOB PORTAL SYSTEM


Additionally, a DFD can be utilized to visualize data processing or a structured design. A DFD illustrates technical or business processes with the help of the external data stored, the data flowing from a process to another, and the results. A designer usually draws a context-level DFD showing the relationship between the entities inside and outside of a system as one single step. This basic DFD can be then disintegrated to a lower level diagram demonstrating smaller steps exhibiting details of the system that is being modeled. Numerous levels may be required to explain a complicated system.

Process:
The process shape represents a task that handles data within the application. The task may process the data or perform an action based on the data.

Multiple Processes:
The multiple process shape is used to present a collection of sub processes. The multiple process can be broken down into its sub processes in another DFD.

External Entity:
The external entity shape is used to represent any entity outside the application that interacts with the application via an entry point.

Data Flow:
The data flow shape represents data movement within the application. The direction of the data movement is represented by the arrow.

Data Store:
The data store shape is used to represent locations where data is stored. Data stores do not modify the data, they only store data.

Privilege Boundary:
54

JOB PORTAL SYSTEM


The privilege boundary shape is used to represent the change of privilege levels as the data flows through the application.

Examples of Data Flow Diagrams :These examples demonstrate how to draw data flow diagram. Before it was eventually replaced, a copy machine suffered frequent paper jams and became a notorious troublemaker. Often, a problem could be cleared by simply opening and closing the access panel. Someone observed the situation and flowcharted the troubleshooting procedure used by most people.

When to use Data Flow Diagram :The DFD is an excellent communication tool for analysts to model processes and functional requirements. One of the primary tools of the structured analysis efforts of the 1970's it was developed and enhanced by the likes of Yourdon, McMenamin, Palmer, Gane and Sarson. It is still considered one of the best modeling techniques for eliciting and representing the processing requirements of a system. Used effectively, it is a useful and easy to understand modeling tool. It has broad application and usability across most software development projects. It is easily integrated with data modeling, workflow modeling tools, and textual specs. Together with these, it provides analysts and developers with solid models and specs. Alone, however, it has limited usability. It is simple and easy to understand by users and can be easily extended and refined with further
55

JOB PORTAL SYSTEM


specification into a physical version for the design and development teams. The different versions are Context Diagrams (Level 0), Partitioned Diagrams (single process only -- one level), Functionally decomposed, leveled sets of Data Flow Diagrams.

Principle for Creating Data Flow Diagrams :Therefore, the principle for creating a DFD is that one system may be disintegrated into subsystems, which in turn can be disintegrated into subsystems at a much lower level, and so on and so forth. Every subsystem in a DFD represents a process. In this process or activity the input data is processed. Processes cannot be decomposed after reaching a certain lower level. Each process in a DFD characterizes an entire system. In a DFD system, data is introduced into the system from the external environment. Once entered the data flows between processes. And then the processed data is produced as an output or a result.

Create a Data Flow Diagram :Data flow diagrams can be used to provide a clear representation of any business function. The technique starts with an overall picture of the business and continues by analyzing each of the functional areas of interest. This analysis can be carried out to
56

JOB PORTAL SYSTEM


precisely the level of detail required. The technique exploits a method called top-down expansion to conduct the analysis in a targeted way. The result is a series of diagrams that represent the business activities in a way that is clear and easy to communicate. A business model comprises one or more data flow diagrams (also known as business process diagrams). Initially a context diagram is drawn, which is a simple representation of the entire system under investigation. This is followed by a level 1 diagram; which provides an overview of the major functional areas of the business. Don't worry about the symbols at this stage, these are explained shortly. Using the context diagram together with additional information from the area of interest, the level 1 diagram can then be drawn. The level 1 diagram identifies the major business processes at a high level and any of these processes can then be analyzed further giving rise to a corresponding level 2 business process diagram. This process of more detailed analysis can then continue C through level 3, 4 and so on. However, most investigations will stop at level 2 and it is very unusual to go beyond a level 3 diagram. Identifying the existing business processes, using a technique like data flow diagrams, is an essential precursor to business process re-engineering, migration to new technology, or refinement of an existing business process. However, the level of detail required will depend on the type of change being considered. The process model is typically used in structured analysis and design methods. Also called a data flow diagram (DFD), it shows the flow of information through a system. Each process transforms inputs into outputs.
57

JOB PORTAL SYSTEM


The model generally starts with a context diagram showing the system as a single flowchart connected to external entities outside of the system boundary. This process explodes to a lower level DFD that divides the system into smaller parts and balances the flow of information between parent and child diagrams. Many diagram levels may be needed to express a complex system. Primitive processes, those that don't explode to a child diagram, are usually described in a connected textual specification.

58

JOB PORTAL SYSTEM

59

JOB PORTAL SYSTEM

ERD

60

JOB PORTAL SYSTEM

screenshots

61

JOB PORTAL SYSTEM

Validation Check:
Software testing is one element of a broader topic that is often referred to as verification and validation (V & V). Verification refers to the set of activities that ensure that software correctly implements a specific function. Validation refers to a different set of activities that ensure that the software has been built is traceable to customer requirements.

Boehms states this another way:

Verification: Are we building the product right? Validation: Are we building the right product?

The definition of V & V encompasses many of the activities that we have referred to as software quality analysis (SQA).

62

JOB PORTAL SYSTEM

Defects and Failure:


Not all website defects are caused by coding errors. One common source of expensive defects is caused by requirement gaps, e.g., unrecognized requirements that result in errors of omission by the program designer. A common source of requirements gaps is nonfunctional requirements such as testability, scalability, maintainability, usability, performance, and security. Software faults occur through the following processes. A programmer makes an error (mistake), which results in a defect (fault, bug) in the software source code. If this defect is executed, in certain situations the system will produce wrong results, causing a failure. Not all defects will necessarily result in failures. For example, defects in dead code will never result in failures. A defect can turn into a failure when the environment is changed. Examples of these changes in environment include the software being run on a new hardware platform, alterations in source data or interacting with different software. A single defect may result in a wide range of failure symptoms.

63

JOB PORTAL SYSTEM

System Security Measures


This software itself being a security project provides some of the best software security measures. In this website a user cannot login and use the features and facilities provided by the website without creating a user account. In spite of that every time the user wants to login he has to give his user name and password which adds to the security of the project. Moreover, all the data that are saved using this software are encrypted i.e. no unauthorized user cannot access it.

Security Issues of ISO 74982:

Authentication: It is any process by which a system verifies the identity of an user who wishes to access the resource stored in system.

64

JOB PORTAL SYSTEM

Access Control: Access control is ability to permit or deny the use of a particular resource by particular entity. Data Integrity: With the help of this website everyone can buy various product online.

Non-repudiation:

This website will be user specific i.e. only some user can access specific commands buttons.

The website will use security policy which specifies who is authorized to do the task.

The project aims to provide the following security measures:

Authentication Access Control This project is unable to provide the following security measures: Data Integrity Non-repudiation
65

JOB PORTAL SYSTEM

List of reports
The entire available repository can produce n number of reports. The numbers of reports will definitely be increased over time, for the sake of completeness of the project proposal the following list we are proposing. 1) Details of friends. 2) Details of passwords. 3) Details of personal information.

66

JOB PORTAL SYSTEM

67

JOB PORTAL SYSTEM

limitations

68

JOB PORTAL SYSTEM

69

JOB PORTAL SYSTEM

Future Scope and Future Enhancement of the Project


The initial focus of this project was developing a secured integrated system. This website covers some of the activities needed by an individual for both his personal and professional uses. This project will have a very bright future if the following can be incorporated:
1) Updating the software according the users needs. 2) More efficient and easier categorical search engine. 3) By including a better security for the both the users

4) And by making the communication between the job seeker and the recruiter very easy.

70

JOB PORTAL SYSTEM

Glossary
ASP:
ASP stands for Active Server Pages Active Server Pages or Classic ASP, as it is more commonly known, is a technology that enables us to make dynamic and interactive web pages. ASP uses server-side scripting to dynamically produce web pages that are not affected by the type of browser the web site visitor is using. The default scripting language used for writing ASP is VBScript, although you can use other scripting languages like JAVA Script (Microsoft's version of JavaScript). ASP pages have the extension .asp instead of .htm, when a page with the extension .asp is requested by a browser the web server knows to interpret any ASP contained within the web page before sending the HTML produced to the browser. This way all the ASP
71

JOB PORTAL SYSTEM


is run on the web server and no ASP will ever be passed to the web browser. Any web pages containing ASP cannot be run by just simply opening the page in a web browser. The page must be requested through a web server that supports ASP, this is why ASP stands for Active Server Pages, no server, no active pages. As ASP was first introduced by Microsoft on it's web server, Internet Information Services (IIS), that runs on all versions of Windows from NT4, including Windows 7, Vista, XP Pro, and Windows Server OS's like Windows 2000, 2003, 2008, it is this web server that ASP pages usually run best on.

For those of one running Windows and wish to play around with ASP on their own system they need to install Microsoft's Internet Information Services (IIS). Lucky IIS or its micro version Personal Web Server (PWS) comes free with Windows. For Windows users we can find Internet Information Services (IIS) or Personal Web Server (PWS) in the following places:

Windows XP Pro/2003/2000 - IIS can be found in 'Add/Remove Programs' in the 'Control Panel'. Windows 98 - PWS can be found under 'add-ons' on the Windows 98 CD.
72

JOB PORTAL SYSTEM

Windows NT4/95 - One can get hold of IIS by downloading the NT4
Option Pack from Microsoft (don't be fooled by the name as it also

runs on Windows 95).

Windows ME - IIS and PWS are not supported on this operating system. Windows XP Home Edition - IIS and PWS are not supported on this operating system.

For those that do not wish to mess around attempting to install web servers on their own computer there are many hosting companies that supply Windows ASP Hosting including our own Free ASP Website Hosting
Service.

CMMI:
Capability Maturity Model Integration (CMMI) is a process improvement approach that provides organizations with the essential elements of effective processes that ultimately improve their performance. CMMI can be used to guide process improvement across a project, a division, or an entire organization. CMMI in software engineering and organizational development is a trademarked process improvement approach that provides

73

JOB PORTAL SYSTEM


organizations with the essential elements for effective process improvement. According to the Software Engineering Institute (SEI, 2008), CMMI helps "integrate traditionally separate organizational functions, set process improvement goals and priorities, provide guidance for quality processes, and provide a point of reference for appraising current processes."

CRM:
CRM(Customer Relationship Management) is a process or methodology used to learn more about customers need and behavior in order to develop stronger relationship with them.

DMAI:
Destination Marketing Association International (DMAI) is a professional organization representing destination marketing organizations and convention and visitor bureaus worldwide. As the worlds largest resource for official destination marketing organizations (DMOs), Destination Marketing Association International represents over 1,500 professionals from 658+ destination marketing organizations in more than 25 countries. They provide members professionals, industry partners, students and educators with educational resources, networking opportunities and marketing benefits available worldwide.
74

JOB PORTAL SYSTEM


They maintain an online bookstore and resource center, an e-mail discussion lists for members, professional certificates and designations (PDM, CDME), an accreditation program and an official online travel portal: OfficialTravelGuide.com. DMAI also owns the Meeting Information Network (MINT), the meetings and convention database \

ECMA:
Ecma International (Ecma) is an international, private (membershipbased) non-profit standards organization for information and communication systems. It acquired its name in 1994, when the European Computer Manufacturers Association (ECMA) changed its name to reflect the organization's international reach. As a consequence, the name is no longer considered an acronym and no longer uses full capitalization. The organization was originally founded in 1961 to standardize computer systems in Europe. Membership is open to companies that produce, market or develop computer or communication systems in Europe. It is located in Geneva.

E- BUSINESS:

E- Business (Electronic business), commonly referred to as "eBusiness" or "e-business", may be defined as the utilization of
75

JOB PORTAL SYSTEM


information and communication technologies (ICT) in support of all the activities of business. Commerce constitutes the exchange of products and services between businesses, groups and individuals and can be seen as one of the essential activities of any business. Electronic commerce focuses on the use of ICT to enable the external activities and relationships of the business with individuals, groups and other businesses.

E- MAIL:
Messages, usually text, sent from one person to another via computer. Email (Electronic mail) can also be sent automatically to a large no. of address.

ERP:
Enterprise Resource Planning (ERP) is a term usually used in conjunction with ERP software or an ERP system which is intended to manage all the information and functions of a business or company from shared data stores. An ERP system typically has modular hardware and software units and "services" that communicate on a local area network. The modular design allows a business to add or reconfigure modules (perhaps from different vendors) while preserving data integrity in one shared database that may be centralized or distributed.

GPU:

76

JOB PORTAL SYSTEM


A graphics processing unit or GPU (also occasionally called visual processing unit or VPU) is a specialized processor that offloads 3D or 2D graphics rendering from the microprocessor. It is used in embedded systems, mobile phones, personal computers, workstations, and game consoles. Modern GPUs are very efficient at manipulating computer graphics, and their highly parallel structure makes them more effective than general-purpose CPUs for a range of complex algorithms. In a personal

Computer, a GPU can be present on a video card, or it can be on the motherboard. More than 90% of new desktop and notebook computers have integrated GPUs, which are usually far less powerful than those on a dedicated video card.

GUI:
GUI (Graphical user interface) is a user interface based on graphics (icons and pictures and menus) instead of text; uses a mouse as well as a keyboard as an input device.

IDE:
IDE (Integrated Drive Electronics) is a standard electronic interface used between a computer motherboard's data paths or bus and the computer's disk storage devices. The IDE interface is based on the IBM PC Industry Standard Architecture (ISA) 16-bit bus standard, but it is also used in computers that use other bus standards. Most computers sold today use an enhanced version of IDE

77

JOB PORTAL SYSTEM


called Enhanced Integrated Drive Electronics (EIDE). In today's computers, the IDE controller is often built into the motherboard. It is a type of hard drive interface. Provided as standard on Risc PC motherboards. It can have up to two physical drives, configured as 'master' and 'slave' IDE was adopted as a standard by American National Standards Institute (ANSI) in November, 1990. The ANSI name for IDE is Advanced Technology Attachment (ATA). The IDE (ATA) standard is one of several related standards maintained by the T10 Committee.

IEEE:
IEEE (Institute of Electrical, Electronics and Engineers) is one of the leading standards-making organizations in the world. IEEE performs its standards making and maintaining functions through the IEEE Standards Association (IEEE-SA). IEEE standards affect a wide range of industries including: power and energy biomedical and healthcare,

Information Technology (IT), telecommunications, transportation, nanotechnology, information assurance, and many more. In 2005, IEEE had close to 900 active standards, with 500 standards under development. One of the more notable IEEE standards is the IEEE 802 LAN, MAN group of standards which includes the IEEE 802.3 Ethernet standard and the IEEE 802.11 Wireless Networking standard.

ISO:
78

JOB PORTAL SYSTEM


The International Organization for Standardization (Organization international de normalization), widely known as ISO (pronounced / also/), is an international-standard-setting body composed of representatives from various national standards organizations. Founded on 23 February 1947, the organization promulgates worldwide proprietary industrial and commercial standards. It has its headquarters in Geneva, Switzerland. While ISO defines itself as a nongovernmental organization, its ability to set standards that often become law, either through treaties or national standards, makes it more powerful than most non-governmental organizations. In practice, ISO acts as a consortium with strong links to governments.

SQL:
SQL (pronounced /s.kjul/) , often referred to as Structured Query Language, is a database computer language designed for managing data in relational database management systems (RDBMS), and originally based upon relational algebra. Its scope includes data query and update, schema creation and modification, and data access control. SQL was one of the first languages for Edgar F. Cods relational model in his influential 1970 paper, "A Relational Model of Data for Large Shared Data Banks and became the most widely used language for relational databases. SQL is not a Turing complete programming language.

QTP:
79

JOB PORTAL SYSTEM


QTP is quick test professional. It is functionality testing tool and also advanced keyword driven test tool. It used to recording and playback method. It have a keyword view and Expert view. It is easy to use more than win runner.

2D:
2Dimensional refers to visual objects that are constructed on two planes (X and Y; width and height). Two-dimensional structures are used for 2D images and to simulate 3D images.

3D:
3Dimensional refers to objects that are rendered visually on paper, film or on screen in three planes (X, Y and Z). In the computer, a 2D drawing program can be used to illustrate a 3D object; however, in order to interactively rotate an object in all axes, it must be created as a 3D drawing in a 3D drawing program. For example: 3D modeling, 3D animation, 3D graphics and 3D visualization.

80

JOB PORTAL SYSTEM

Bibliography
During the development of the project, I have used many resources and for that I am grateful to all the people concerned. Given below are the names of some books, which I have used during development and documentation of the project.

NAME OF THE BOOKS


Professional C# 2005

NAME OF THE AUTHORS


Christian Nagel, Bill Evjen, Jay Glymn, Morgan Skinner, Karli Watson, Allen Jones. Kogent Solutions INC.

NAME OF THE PUBLISHER


Witey dreamtech.

C# 2008 Programming Black Book, Platinum Edition


81

Dreamtech Press

JOB PORTAL SYSTEM


SQL Server 2005(Black Book) SQL Server 2008(Black Book) Software Engineering-a practitioners approach. Cryptography and Network Security Data Communication and Networking Atul Kahate William Stallings Dalton, Whitehead and Kogent Kogent Solutions INC Roger S. Pressman Dreamtech Press Dreamtech Press McGraw-Hill International Edition

82

JOB PORTAL SYSTEM

83

JOB PORTAL SYSTEM

84

You might also like