Professional Documents
Culture Documents
Project Work
RDVV, JABALPUR
Examinar-2
Group Evaluation
(Max.30)
(Max.30)
(M.G.)
(Max.60)
Roll
No.
No.
Name of Candidate
Int. Marks
Ext.
Total
(IM)given
Marks
Marks
by Head of
(EM)
(Max.
Study
given
100)
Centre
by UNI
MT=
(Max.20)
Examiner
MG+
(Max.80)
IM+ME
Manisha Thakur
RDVV, JABALPUR
Affiliated to
MAKHANLAL CHATURVEDI RASHTRIYA PATRAKARITA EVAM
SANCHAR VISHWAVIDYALAYA
CERTIFICATE
This is certifying that this project report entitled: -
Submitted By:
(Director/Center
Head)
Manisha Thakur
RDVV, JABALPUR
Affiliated to
MAKHANLAL CHATURVEDI RASHTRIYA PATRAKARITA EVAM
SANCHAR VISHWAVIDYALAYA
CERTIFICATE
This is certifying that this project report entitled: -
Submitted By :
of :
Manisha Thakur
Agrahari
RDVV, JABALPUR
Ms. Swati
4
Affiliated to
MAKHANLAL CHATURVEDI RASHTRIYA PATRAKARITA EVAM
SANCHAR VISHWAVIDYALAYA
CERTIFICATE
This is certifying that this project report entitled: -
RDVV, JABALPUR
External
Examiner
Manisha Thakur
RDVV, JABALPUR
Affiliated to
MAKHANLAL CHATURVEDI RASHTRIYA PATRAKARITA EVAM
SANCHAR VISHWAVIDYALAYA
DECLARATION
We the Student of Advance Courses Of Computer
Application, Declare That This Project Has Been Designed
By Me, under the Guidance of Ms. Swati Agrahari. It Is
Our Original Work. It Has Been Created As Major Project
Work For The Degree Of BCA.
Submitted By :
Manisha Thakur
RDVV, JABALPUR
Affiliated to
MAKHANLAL CHATURVEDI RASHTRIYA PATRAKARITA EVAM
SANCHAR VISHWAVIDYALAYA
ACKNOWLEDGEMENT
We thank to Ms. Swati Agrahari and all the faculty
and non-teaching staff of this institute for their
support .we are very much thankful to all our friends
who knowingly or unknowingly helped for the
completing of this project.
Last but not the least we extend our gratefulness to
our parents who help us throughout our studies in
many ways.
Submitted
By:
Manisha Thakur
RDVV, JABALPUR
Contents
Preface............................................................................................viii
Acknowledgement....ix
Chapter 1: Introduction...1
Introduction ...........................2
Scope and purpose of document............3
Motivation .........4
Chapter 2: System Analysis............................................................................... 5
2.1 Problem statement.6
2.2 Survey and evaluation of available solution..7
Chapter 3: Proposed solution .............................................................................8
3.1 Introduction9
3.2 Features ...11
3.3 Approach .12
Chapter 4: Technical description ................................................................... 13
4.1 Technology and Environment......14
4.2 System requirement ....15
4.3 Underlying technology domain .......16
Chapter 5: Software engineering approach ....................................................23
5.1 Introduction .24
5.2 Conception
Phase.....................................................................25
5.2.1 Problem definition ......25
5.2.2 Aim to be achieved .........25
5.2.3 Expected benefits ........25
5.2.4 Scope ......25
5.3 General phase ..........................................................................26
5.3.1 Phase definition ...26
5.3.2 Development phase .....26
5.3.3 Maintenance phase ..26
Chapter 6: Process model ..................................................................................27
6.1 Description ..28
6.2 Why model was chosen? .30
Chapter 7: Requirement analysis .....................................................................31
RDVV, JABALPUR
7.1
7.2
7.3
RDVV, JABALPUR
10
INTRODUCTION
Statement of Introduction
Welcome to On-line banking system is a website dedicated to those people, who are
anxious to get their dream Banking system. An online bank is banking facilities
available on internet. The main services offered by an online bank are as follows:
1. Balance Enquiry and Statement
2. Transaction History
3 Transfer funds online
4 Card-2-Card Funds Transfer
5 Prepaid Mobile Recharge
6 Send a Smart Money Order
7 Stop Payment Request
8 Open Fixed Deposit and Recurring Deposit account
9. Request for cheque book
RDVV, JABALPUR
11
Motivation
Networks are changing the way we do business and the way we live. The
availability of data and facility to update the data being anywhere is the main reason why
we implemented the information system using web technology.
The development of personal computer has brought about a tremendous change
for business, industry, science and education. The problem of managing the data on single
machine is becoming more critical, but with the event of web technology distances are
meaningless and data can be viewed or updated from anyplace.
RDVV, JABALPUR
12
SYSTEM ANALYSIS
Problem Statement
Manual banking system has following sets of problems:
Limited hours of transactions.
When day-to-day to transaction volume is high then customer has to wait for
simple services such as account statement and balance check.
Problem of incorrect entries.
Loan application disposal.
Prolonged wait to know about the status of a loan application.
Problem in obtaining information about installment payments and balance
installments.
Problem in transferring amount from one account to another
After surveying we found that existing websites do not provide all the facilities
for a on-line banking at the same system. Some of the websites are available but with
many drawbacks. Such as hacking Account information at these sites is not regular. .
Therefore such websites dont fulfill the perfect -ness of a online-banking site.
RDVV, JABALPUR
13
PROPOSED SOLUTION
Introduction
An online bank is banking facilities available on internet. The main services
offered by an online bank are as follows:
Balance Enquiry and Statement
Check out your last 10 transactions in your bank account with real
Time balance.
Transaction History
14
Features
Managing Account
This software provide support for on line deposit, Money transfers, withdrawal in all type
of account.
Loan facility
You can apply and pay your loan installments using our software.
RDVV, JABALPUR
15
Approach
First and foremost the major task was to hide the administrative work from
general users. Every type of user must have isolated working unrelated or un-disturbing
others area of work. Therefore we designed the website with three different perspectives.
The major task is to authenticate users and provide them links to pages for which they are
actually authenticated. Our approach was quite simple as we used the authenticating
procedures to verify authorized users. Any user to access dynamic information, must first
login in his area of concern. This login page then directs him to his field of work
otherwise he may not be able to gain access to the database of the system. We simply
chose .Net platform to work with the specific use of ASP.Net which is useful for
development in web related fields.
1
2
3
4
5
6
7
Reduced manpower.
Increased operational efficiency.
Increased accuracy and reliability.
Improved moral.
Reduced operational time.
Data security.
Reduced paper work.
RDVV, JABALPUR
16
TECHNICAL DESCRIPTION
Technology and Environment
RDVV, JABALPUR
17
System Requirements
System Requirements for Installing Visual Studio .NET Versions
Visual Studio .NET
Enterprise
Architect
Processor
Enterprise
Developer
Professional
Academic
RAM1
CD-ROM or
DVD-ROM
Drive5
Required
Video
Mouse
RDVV, JABALPUR
18
RDVV, JABALPUR
19
20
21
Language independence:
ASP pages must be written with scripting. In other words, ASP pages must be
written in a language that is interpreted rather than compiled. ASP.NET allows compiled
languages to be used, providing better performance and cross-language compatibility.
Simplified deployment:
RDVV, JABALPUR
22
RDVV, JABALPUR
23
Introducing Oracle9i
Oracle9i takes business where it needs to be: meeting and exceeding stringent demands
for high-quality service in a service-driven marketplace. Oracle9i is designed to optimize
traditional, internet and intranet applications, and to stimulate the emerging hosted
application market on the internet.
Oracle9i builds on historic strengths to offer the first complete and simple software
infrastructure for the internet's next generation of intelligent, collaborative applications.
The Oracle9i new features expedite delivery of critical performance, scalability, and
availability essential to providing hosted service software for anyone, anywhere, anytime.
Oracle9i architecture is depicted in Figure 1-1.
Oracle9i Database
The Oracle9i Database introduces the following advanced and automated design features
that refine Oracle9i Application Server and Oracle9i Developer Suite to optimize
performance for traditional applications and the emerging hosted application market.
Oracle9i Real Application Clusters
Replacing Oracle Parallel Server, Oracle9i Real Application Clusters provides out-of-thebox, linear scaling transparency, compatibility with all applications without redesign, and
the ability to rapidly add nodes and disks.
RDVV, JABALPUR
24
RDVV, JABALPUR
25
Business Intelligence
Oracle9i Application Server has built-in reporting and ad hoc query functionality to
derive business intelligence after Web site deployment.
Tools
Oracle Internet Developer Suite tools include: Oracle Forms Developer; Oracle Designer;
Oracle Developer and Business Components for Java; Oracle Reports Developer; and
Oracle Discoverer.
RDVV, JABALPUR
26
1. Availability
2. Scalability
3. Performance
4. Security
5. Manageability
6. Development Platform for E-Business Applications
7. Windows Integration
8. Internet Content Management
9. E-Business Integration
10. Packaged Applications
11. Business Intelligence
12. Heterogeneous Services
RDVV, JABALPUR
27
Tools
Methods
Process
A Quality Focus
RDVV, JABALPUR
28
Conception Phase
In the software development, before going to the design issue, software
requirement analysis is done. At this stage, different methods are applied to calculate
what and how. That is what functions and performance are needed, what interfaces
are to be established and how those functions are to be achieved. For this purpose, some
methods are used which are as follows:
Problem definition
Aim to be achieved
Expected benefits
Problem Definition:
Aim to be achieved:
System must provide the best suitable jobs for the job seekers.
Information regarding campus recruitments is to be available.
Latest company papers should be available.
Mailing facility should be available.
Search engines are provided for best search results.
Semester projects should be available.
The system should provide interview experiences of different candidates.
Expected benefits
Educational institutions will provide information inputs on a large pool of
educated resources, which are their outputs, into the E-CS. Engineering graduates,
Medical Students, Accountants, MBAs, Vocationally trained resources, Computer
Trainees and a whole host of educational institution outputs may now figure in the E-CS
database as available pool of resources which the employee organizations can choose and
pick.
Scope:
Because, this system is developed on the .NET platform using SQL server as for
database, the chance for this platform to be out-dated or to crash is almost negligible. So,
there is a great chance to establish this system in market.
RDVV, JABALPUR
29
General Phase
Regardless to the area of application, size of project, or its complexity, the
software engineering work can be categorized into the following three generic phases:
Definition phase
Development phase
Maintenance phase
Definition Phase:
The definition phase helps in answering what, that is, it emphasizes on what.
During this phase, the software engineer tries to get what information is to be processed,
what functions and performance are needed, what system behavior is likely to be, what
interfaces are to be established, what design constraint present, and what validation
criteria are required to have a successful system. Thus, the major requirements of the
system and software are identified.
Development Phase:
The development phase emphasizes on how. During this phase, a software
engineer tries to know how data are to be structured, how function is to be applied in
software architecture, how procedural details are to be implemented, how interfaces are
to be defined. How the design will be transformed into any nonprocedural programming
language and how testing will be done.
Maintenance Phase:
This phase emphasizes on change related with the error correction, adaptations
(according to the software environment), and changes due to enhancements brought about
by the changing needs of the customer. This phase actually reapplies the steps of
definition and development phases. During maintenance phase, the following four types
of changes are found:
Correction
Adaptation
Enhancement
Prevention
RDVV, JABALPUR
30
PROCESS MODEL
RDVV, JABALPUR
31
Code Generation:
The code will be generated at the platform of Visual Studio .Net. We use MS SQL
server to handle data base activity.
Testing:
The testing will be done after code generation by our management team that
includes all the process that tested the working of our system.
RDVV, JABALPUR
32
RDVV, JABALPUR
33
REQUIREMENT ANALYSIS
Introduction
Requirement analysis is a software engineering task that bridges the gap between
system level requirements engineering and software design. Requirements engineering
activities result in the specification of softwares interface must meet. Requirements
analysis allows the software engineer to refine the software allocation and build models
of the data, functional & behavior that can be translated to data, architectural, interface
and component-level designs. Finally the requirements specification provides the
developer and the customer with the means to access quality once software is built.
RDVV, JABALPUR
34
Developers.
Testers.
Users.
Testers and Users: Testers and users are required to thoroughly read and
understand the document. All notations and references should be unearthed. The
tester should experiment with the prototype in conjunction with the use cases to
develop a complete understanding of correct functionality. The tester and user
should read and develop a clear understanding of all the technical terms. A
reference may be taken from glossary or the referential documents.
RDVV, JABALPUR
35
Requirement specification:
Specification, regardless of the mode through which we accomplish it, may be
viewed as a representation process. A number of specification principles adapted are as
under:
1. Separate functionality from implementation.
2. Develop a model of the desired behavior or a system that encompasses
data & the functional responses of a system to various stimuli from the
environment.
3. Establish the context in which software operates by specifying the manner
in which other system components interact with software.
4. Establish the content & structure of a specification in a way that will
enable it to be amenable to change.
5. Create a cognitive model rather than design or implementation model. The
cognitive model describes a system as perceived by its user community.
RDVV, JABALPUR
36
RDVV, JABALPUR
37
RISK MANAGEMENT
Risk Management
Risk Analysis: - Risk analysis involves evaluating risks and risk interactions to
assess the range of possible project outcomes. It is primarily concerned with
determining which risk events warrant response.
Risk Tracking & Control: - Risk Tracking & Control follows the progress of the
risk and its probability, as well as the status of any mitigation strategies that have
been executed. When changes occur, the basic cycle of identify, analyze, and
respond is repeated.
RDVV, JABALPUR
38
There may be specific risks associated with a particular phase also, such as in
implementation and Maintenance and Operations (M&O)
Contingency Plans:
For those risks where it is unlikely or uncertain that the mitigation will be
effective, a contingency plan should be developed. Contingency plans attempt to
minimize the effects of the risk assuming the event does occur (also known as "damage
control").
A trigger mechanism should be identified that indicates when the contingency
plan should be initiated. In some cases, the plan may be initiated before the risk occurs or
in parallel with the mitigation activities in order to be prepared for the risk occurrence.
Typical components of a contingency plan include:
RDVV, JABALPUR
39
Risk Implementation
The identified metrics and/or events are tracked to determine if there are any
changes in the risk profile. In the event the risk exposure increases significantly, the risk
should be elevated to project management. Refer to the SID Policy on Risk Management
for a sample risk escalation matrix.
Any mitigation activities should be tracked to determine if they are having the
desired effect of reducing risk exposure. If the mitigation strategies do not appear to be
having a positive effect, new approaches should be implemented.
The status of significant risks should be discussed at the project management
status meetings. The Project Manager may assign additional staff if necessary to assist
with additional mitigation activities.
The vendor should report their current high priority risks in their status meetings.
The project is also required to report the project risks in status reports to the department.
RDVV, JABALPUR
40
Types of Risks
Project risks:
It threatens the project plan. That is if project risks become real, it is likely that
project schedule will slip & that costs will increase. Project risk identifies potential
budgetary, schedule, personnel resource & their impact on a software project.
Technical risks:
Technical risks threaten the quality & timeliness of the software to be produced. If
a technical risk becomes a reality, implementation may become difficult or impossible.
Technical risks identify potential design, implementation, interface, verification, and
maintenance problems. Technical risk occurs because the problems harder to solve than
we thought it would be.
Business model:
It threatens the viability of the software to be built. Business risks often jeopardize
the project or the product. Candidates for the top five business risks are:
RDVV, JABALPUR
41
REVIEW
Review
Introduction:
A Post Implementation Review (PIR) is a formal review of a program or project.
It is used to answer the question: Did we achieve what we set out to do, in business terms
and if not, what should be done?
For a construction, development or procurement project, a PIR is undertaken
when there has been time to demonstrate the business benefits of a new service or
building. For a major program of change there may be several PIRs over time.
Why is it important?
A PIR is an essential component of the benefits management process. It checks
whether benefits, including these set out in the business case have been achieved and
identifies opportunities for further improvement. Without a PIR, you cannot demonstrate
that your investment in the programmed of business change was worthwhile.
Who is involved?
Team members conducting the review will typically include:
people with working knowledge of the business area under review and its
processes
people with relevant technical knowledge
strategy planners with knowledge of the organizations business strategy and the
business change contribution to it
Principles:
Projects vary in their scope, method of delivery and the environment in which
they are implemented. The reviews of such projects vary similarly. There is, however, a
set of fundamental principles, which apply to all projects; they have implications for the
conduct of the review.
Reviews help organizations to assess the contribution of business change projects
to business objectives these objectives and the metrics that will be applied to measure
RDVV, JABALPUR
42
RDVV, JABALPUR
43
SYSTEM DESIGN
System Design
System development can generally be thought of having two major components:
1)
2)
Systems Analysis
Systems Design
RDVV, JABALPUR
44
Bad Design
45
Simplicity
One
conceptual
change
requires changes to many parts
of the system.
Logic has to be duplicated.
Cost of a bad design becomes
overwhelming.
Can't remember where all the
implicitly linked changes have
to take place.
Can't add a new function
without breaking an existing
function.
Table 13.1
RDVV, JABALPUR
46
User Home
Login
Verificatio
n
User
Login
If User
If
Administrator
Loan
Applic
ation
process
Administrator
Home
Master
entry
process
Master
Tables
New
Account
Cust_acc
table
Money
Trans.
To User
Loan
verific
ation
process
Trans
Acc.t
Displa
y
Loan
Dtl.
ER-Diagram
RDVV, JABALPUR
47
Acc_type
trans
trans_id
Ty_id(p.k.)
User_ty
Cust
uty_id(p.k.)
cust_id (p.k.)
Cust_acc
acc_id(p.k.)
Loan_ty
Loans
Loan_dtl
Lty_id (p.k.)
Lty_id (p.k.)
Lty_id (p.k.)
Lty_dtl(p.k.)
RDVV, JABALPUR
48
DATA BASE
A CC_TY PE
T Y_ID
A CC_NA ME
MIN_B AL
INTRES T_P E R_A NA M
NUMBE R(3)
V ARCHAR2(60)
NUMBE R(10 ,2)
NUMBE R(5,2 )
TY_ID = TY_ID
ACC_ID = ACC_ID
CUS T_A CC
A CC_ID
NUMBE R(5)
CUS T _ID
NUMBE R(5)
T Y_ID
NUMBE R(3)
A CC_NO
V ARCHAR2(10)
UTY_ID = UTY_ID
OPE NING_DA TE
DAT E
OPE NING_B A L
NUMBE R(10 ,2)
LOAN_TY
LT Y_ID
NUMBE R(3)
LT Y_NAME
V ARCHAR2(30)
INTE RE ST
NUMBE R(10 ,2)
T RA NS
LTY_ID
= LTY_ID
T RA NS _ID
NUMBE R(20 )
A CC_ID
NUMBE R(5)
DEB IT
NUMBE R(10 ,2)
CRE DIT
NUMBE R(10 ,2)
T R_DTL
V ARCHAR2(30)
P TRANS_ID
NUMBE R(20 )
LOAN_ID = LOAN_ID
CUST_ID = CUST_ID
CUST_ID = CUST_ID
CUS T
CUS T_ID
UTY _ID
CNA ME
A DDR
T ELNO
P WD
CCRNO
LOANS
LOAN_ID
NUMBE R(8)
CUS T_ID
NUMBE R(5)
LT Y_ID
NUMBE R(3)
LOAN_DT
DAT E
LOAN_AMT
NUMBE R(10 ,2)
LOAN_PE RI OD
NUMBE R(2)
NO_OF_INS T A
NUMBE R(3)
P ENALT Y
NUMBE R(10 ,2)
INST A_A MT
NUMBE R(10 ,2)
IS PA ID
CHA R(1)
TRANS_ID = TRANS_ID
IS CCR
CHA R(1)
IS GRANTE D
CHA R(1)
A PP _NO
V ARCHAR2(30)
UTY _ID
UTY PE
USE R_T Y
NUMBE R(5)
V ARCHAR2(10)
LOAN_DT L
LOAN_ID
NUMBE R(8)
LOAN_DT L
NUMBE R(8)
T RA NS _ID
NUMBE R(20 )
CUS T_ID
NUMBE R(5)
A MT _PA ID
NUMBE R(10 ,2)
P AY _DT
DAT E
RECIPT _NO
V ARCHAR2(5)
NUMBE R(5)
NUMBE R(5)
V ARCHAR2(40)
V ARCHAR2(50)
V ARCHAR2(30)
CHA R(30)
V ARCHAR2(20)
Web Pages
Home Page
RDVV, JABALPUR
49
RDVV, JABALPUR
50
Login Page
RDVV, JABALPUR
51
Account Type
RDVV, JABALPUR
52
Customer screen
RDVV, JABALPUR
53
RDVV, JABALPUR
54
Transaction screen
RDVV, JABALPUR
55
RDVV, JABALPUR
56
RDVV, JABALPUR
57
RDVV, JABALPUR
58
RDVV, JABALPUR
59
RDVV, JABALPUR
60
RDVV, JABALPUR
61
USER
CHARACTERISTICS
Implementation
We divide the on-line banking for Two types of user they are as under:
1. Administrator.
2. Customers.
.
1. Administrator:
In on-line banking administrator can perform the following function:
Can create new account types.
Can create new loan types.
Can create new customers.
Can create new accounts.
Can deposit money and withdrawal.
Can approve loans.
2. customers:
Customers are the regular user of our site. Customers can perform the various
functions as a user they are as under:
RDVV, JABALPUR
62
12
12
SYSTEM
TESTING
Fundamentals
Fundamentalsofofsoftware
softwaretesting
testing
Strategic
approach
toward
software
Strategic approach toward software
testing
testing
Unit
Unittesting
testing
Integration
Integrationtesting
testing
Validation
Validationtesting
testing
System
Systemtesting
testing
RDVV, JABALPUR
63
RDVV, JABALPUR
64
Client Needs
Acceptance Testing
Requirements
System Testing
Integration Testing
Design
Code
Unit Testing
RDVV, JABALPUR
65
Testing begins at the module level and works outward: tests which are carried
out are done at the module level where major functionality is tested and then it
works toward the integration of the entire system.
The developer of the software conducts testing and if the project is big then there
is a testing team: All programmers should test and verify that their results are
according to the specification given to them while coding. In cases where
programs are big enough or collective effort is involved for coding,
responsibilities for testing lies with the team as a whole
Debugging and testing are altogether different processes. Testing aims to finds the
errors whereas debugging is the process of fixing those errors. But debugging
should be incorporated in testing strategies A software strategy must have lowlevel tests to test the source code and high-level tests that validate system
functions against customer requirements
RDVV, JABALPUR
66
Unit Testing
We know that smallest unit of software design is a module. Unit testing is
performed to check the functionality of these units. It is done before these modules are
integrated together to build the overall system. Since the modules are small in size,
individual programmers can do unit testing on their respective modules. So unit testing is
basically white box oriented. Procedural design descriptions are used and control paths
are tested to uncover errors within individual modules. Unit testing can be done for more
than one module at a time.
The following are the tests that are performed during the unit testing:
Local data structures: these are tested to see if the local data within it (module) is
stored properly by them.
Independent paths: All independent paths are tested to see that they are properly
executing their task and terminating at the end of the program.
Error handling paths: These are tested to check if errors are handled properly by
them.
67
Integration Testing
Unit testing ensures that all modules have been tested and each of them works
properly individually. Unit testing does not guarantee if these modules will work fine if
these are integrated together as a whole system. It is observed that many errors crop up
when the modules are joined together. Integration testing uncovers errors that arise when
modules are integrated to build the overall system. Following types of errors may arise:
Data can be lost across an interface. That is data coming out of a module is not
going into the desired module.
Sub-functions, when combined, may not produce the desired major function.
Global data structures can present problems: For example, in a system there is a
global memory. Now these modules are combined. All are accessing the same
global memory. Because so many functions are accessing that memory, low
memory problem can arise.
RDVV, JABALPUR
68
Validation Testing
After the integration testing we have an assembled package that is free from
modules and interfacing errors. At this stage a final series of software tests, validation
testing begins. Validation succeeds when software functions in a manner that can be
expected by the customer. Software validation is achieved through a series of black-box
tests that demonstrate conformity with requirements.
Alpha and Beta testing:
For a software developer, it is difficult to foresee how the customer will really use
a program. When custom software is built for one customer, a series of acceptance tests
are conducted to enable the customer to validate all requirements. Acceptance test is
conducted by customer rather than by developer. If software is developed as a product to
be used by many customers, it is impractical to perform formal acceptance tests with each
one. Most software product builders use a process called alpha and beta testing to
uncover errors that only the end user seems able to find. Customer conducts the alpha
testing at the developers site. The software is used in a natural setting with the developer.
The developer records errors and usage problem. Alpha tests are conducted in a
controlled environment.
The beta test is conducted at one or more customer sites by the end user(s) of the
software. Here, developer is not present. Therefore, the beta test is a live application of
the software in an environment that cannot be controlled by the developer. The customer
records all problems that are encountered during beta testing and reports these to the
developer at regular intervals. Because of problems reported during beta test, the software
developer makes modifications and then prepares for release of the software product to
the entire customer base.
RDVV, JABALPUR
69
System Testing
System testing is actually a series of different tests whose primary purpose is to
fully exercise the computer-based system. Although each test has a different purpose, all
work to verify that all system elements have been properly integrated and perform
allocated functions. In the following section, different system tests are discussed.
Testing Strategies:
Unit testing - based on the unit test plan for various screens and their outputs.
System testing - based on the system test plan for concurrency and performance issues
Sample Unit Test Cases:
For Login Screen
SN. Test Condition
Enter an invalid
Password
1
2
3
5.
Expected Result
Press "Login"
without entering the
username
Enter the Password
less than four character
Log on to the
system using the
same username and
password from two
Computers.
Log on to the system using
different user-ids
from different machines
and try editing the same
enquiry
RDVV, JABALPUR
70
13
13
LIMITATION
RDVV, JABALPUR
71
Limitations
Possibilities of fraud.
RDVV, JABALPUR
72
14
14
FUTURE
ENHANCEMENT
RDVV, JABALPUR
73
Future Enhancements
RDVV, JABALPUR
74
15
15
CONCLUSION
RDVV, JABALPUR
75
Conclusion
RDVV, JABALPUR
76
16
16
REFERENCES
RDVV, JABALPUR
77
References
BOOKS:
Software engineering
ASP.Net Unleashed
.Net Web Services
Database Management System
Professional VS .NET 2005
RDVV, JABALPUR
R.Pressman
Stephen Walther
Keith Ballinger
Henry F.Korth,Navathe
Worn Publication
78
RDVV, JABALPUR
79