Top Banner
(Approved by AICTE & Affiliated to Rajiv Gandhi Prodyogihy Vishwavidhyalaya, Bhopal) Indore Road, Khandwa (M.P.) Session- 2010 A Project Report on “Investment.com” (Information System) Submitted in partial fulfillment of the requirements for the degree of Master of Computer Application To Rajiv Gandhi Prodyogiki Vishwavidhyalaya, Bhopal 1
69
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Trading

(Approved by AICTE & Affiliated to Rajiv Gandhi Prodyogihy Vishwavidhyalaya, Bhopal)

Indore Road, Khandwa (M.P.)

Session- 2010 A Project Report on

“Investment.com”(Information System)

Submitted in partial fulfillment of the requirements for the degree of

Master of Computer Application To

Rajiv Gandhi Prodyogiki Vishwavidhyalaya, Bhopal

Guided by : Submitted by: Mr. Hemendra patidar Name: SavitaAgrawal

Roll No:0823ca091021

Department of Master of Computer ApplicationShri Dadaji Institute of Technology & Science, Khandwa(M.P.)

1

Page 2: Trading

(Approved by AICTE & Affiliated to Rajiv Gandhi Prodyogihy Vishwavidhyalaya, Bhopal)

Indore Road, Khandwa (M.P.)___________________________________________________________________________

EVALUATION CERTIFICATE

This is to certify that the undersigned have assessed and evaluated the

Project “investment.com” submitted by Savita Agrawal. The project report

has been accepted / rejected for the partial fulfillment of the degree of

Master of Computer Application.

Internal Examiner External Examiner

Signature : Signature :

Name : Name :

Date : Date :

2

Page 3: Trading

DECLARATION BY THE STUDENT

I hereby declare that this project titled “investment.com” based on actual

work carried out by me under the guidance and supervision of Any

reference to work done by any other person or institution or any material

obtained from other sources have been duly cited and referenced. It is further

to state that is work is not submitted anywhere else for any examination.

Signature :

Name :Savita Agrawal

Roll No. 0823CA091021

3

Page 4: Trading

CERTIFICATE FROM THE GUIDE

This is to certify that Savita Agrawal has completed the Project

“investment.com” under my guidance and supervision and submitted the

project report as laid down by Rajiv Gandhi Prodyogiki

Vishwavidhyalaya, Bhopal.

The material that has been obtained from other sources is duly

acknowledged in the project report. It is further certified that the work or its

part has not been submitted to any other university for examination under

my supervision. I consider this work admirable for the award of the degree

of Master of Computer Application.

Signature of Guide:

Name:

Date:

4

Page 5: Trading

(Approved by AICTE & Affiliated to Rajiv Gandhi Prodyogihy Vishwavidhyalaya, Bhopal)

Indore Road, Khandwa (M.P.)___________________________________________________________________________

CERTIFICATE FROM INSTITUTE

This is to certify that SAVITA AGRAWAL has completed the Project

“investment.com” satisfactorily and submitted the project report as laid

down by Rajiv Gandhi Prodyogiki Vishwavidhyalaya, Bhopal.

Principal

SDITS, Khandwa

5

Page 6: Trading

ACKNOWLEDGEMENT

The successful completion of this project is the result of many dedicated effort and

this report would be incomplete without giving due credit them. This

acknowledgment is but a small token of this help in our endeavor. First and

foremost, we wish to express our deepest gratitude to guide “” and we are also

heartily thankful to our HOD “” Sir and other faculty for their kind cooperation in

order to completion of this project .Who led us inspires and motivated us with his

guidance at all times providing us with best faculty and environment for

completion of this work. Their keen interest and decision has defined has benefited

us to extent that cannot be spanned in words.

We are thankful to “”Sir (principal of SDITS KHANDWA) and

all lecturers and lab assistants for their co-operation on all possible manners. Many

other persons helped us in the course of the project but there do not figure here.

Our most sincere thanks to them unknown’s they remain.

Date;- Submitted By:- Name:

6

Page 7: Trading

INDEX

Introduction

System requirement analysis

Preliminary Design

Detailed Design

Module Description

Preliminary Testing

Detailed Testing

Concluding Remarks

References

7

Page 8: Trading

INTRODUCTION

In the present scenario every one uses computer.

Todays busy life, people have no time waiting response. This project

“investment.com” is very customized and user-friendly project customer. It

has been designed to easily manage, and look after the over all processing of

even very large market. In this project capable of managing enquiry such as

company name, company share It also provide help for managing the record

a of sell and buy share . Shares are the best investment available over a long

period of time. The growth of share prices comfortably out-paces inflation

most years because the best share prices represent the growth in earnings of

the best companies. Although the stock market is seen as "high risk" this

depends very much on timing and the sort of shares you invest in. It is very

useful for the customer.

8

Page 9: Trading

SYSTEM REQIREMENT ANALYSIS

In system analysis phase we are doing the job of identifying the need

of the system enhancement. And various types of investigation are made

according to the need of the candidate system.

For analyzing the system there are two basic steps have to followed

Identification of need

Preliminary investigation

IDENTIFICATION OF FICATION:

Identification of need for this step of SDLC for software development needs

are generally generated from the customer , managerial staff , competition

employees and agent. in our case and user are person , who are requesting

for a change , honor’s need is to make various types of reports about

student and other transaction ,which are required for taking any action ,if

report are present then it provides the supporting information to make any

rigid action based on quantitative details.

PRELIMINARY INVESTIGATION:

Preliminary investigation for the candidate is the second step of SDLC for

software development. Here needs are evaluate at are at this step our

intention is to find out what is actual problem. In this phase we are not

dealing with the solution domain. For evaluate of needs we are not first

collecting the details about the system, working process of the system is

studied and information gathered according to the problem. For information

9

Page 10: Trading

we are using the four basic tools given by the software engineering

methodology they are given below.

Record Review

Onsite observation

Interview

Questionnaire

10

Page 11: Trading

SYSTEM REQUIREMENT

SOFTWARE REQUIREMENT:

Operating system-window XP

Front-end Netbean editor

Back end as MY SQL server

Querying language SQL query

HARDWARE REQUIREMENT:

Ram :512 MB Ram for memory access

Hard Disk 2GB Hard Disk

Processor Intel dual or Higher processor

11

Page 12: Trading

FRONT END

Java is a programming language developed by Sun

Microsystems. It implements a strong security model, which prevents

compiled Java programs from illicitly accessing resources on the system

where they execute or on the network. Popular World-Wide Web browsers,

as well as some World-Wide Web servers and other systems

implement Java interpreters. These are used to display interactive user

interfaces, and to script behaviour on these systems.

While implementation problems have opened security

vulnerabilities in some Java interpreters (Java Virtual Machines or JVM's),

the design of this language makes it at least theoretically possible to execute

program with reasonable assurances about its Security, and in particular its

ability to cause harm.

WHAT IS JSP

Java Server Pages (JSP) is a server-side programming

technology that enables the creation of dynamic web pages and applications.

This is accomplished by embedding Java code into HTML, XML, DHTML,

or other document types. When a client such as a web browser makes a

request to the Java application container, which is typically a web server, the

static page is converted behind the scenes, and displayed as dynamic content

to the viewer. It has been speculated that JSP was released to compete with

PHP, a commonly used open-source programming language. While JSP is

sometimes associated with Active Server Pages (ASP), these are actually

12

Page 13: Trading

two different technologies. The biggest difference is that ASP is developed

by Microsoft®, and largely considered as a framework. This is due to its

ability to support a wide variety of programming languages enabled by

Microsoft's® Component Object Model (COM). Created by Sun

Microsystems®, JSP is considered an object-orientated programming

language. Stands for "Java Server Page." This standard was developed by

Sun Microsystems as an alternative to Microsoft's active server page (ASP)

technology. JSP pages are similar to ASP pages in that they are compiled on

the server, rather than in a user's Web browser. After all, they don't call them

"server pages" for nothing. However, JSP is Java-based, whereas ASP is

Visual Basic-based. JSP pages are useful for building dynamic Web sites

and accessing database information on a Web server. Though JSP pages may

have Java interspersed with HTML, all the Java code is parsed on the server.

Therefore, once the page gets to the browser, it is only HTML. JavaScript,

on the other hand, is usually parsed by the Web browser, not the Web server.

INTRODUCTION OF NEATBEAN EDITOR

NetBeans is a great little tool for those who build web applications and for

software developers. It is an IDE ( Integrated Development Environment )

which is available as open source software. Best of all, you can run this

program on most operating systems including Windows, Linux, Mac OS X

and Solaris.

13

Page 14: Trading

What Can It Do?

With NetBeans you can develop applications for use via the desktop or on

the web. You can also develop software for use with mobile devices. The

applications can be developed with NetBeans using a variety of coding

languages including Java, Ruby (with support for Rails), and C/C++. The

feature rich software gives you great options and visual abilities that allow

you to not only create the applications that you want but to view them and

perform testing to work out all of the kinks and bugs in your software.

What is glassfish server

GlassFish is an open source application server project started by Sun

Microsystems for theJava EE platform and now sponsored by Oracle

Corporation. The supported version is calledOracle GlassFish Server.

GlassFish is free software, dual-licensed under two free software licences:

the Common Development and Distribution License (CDDL) and the GNU

General Public License (GPL) with the classpath exception.

GlassFish supports all Java EE API specifications (by definition since it is

the Java EEReference implementation), such as JDBC, RMI, e-mail, JMS,

web services, XML, etc., and defines how to coordinate them. Java EE also

features some specifications unique to Java EE for components. These

include Enterprise JavaBeans, Connectors, servlets, portlets (following the

Java Portlet specification), JavaServer Pages and several web service

14

Page 15: Trading

technologies. This allows developers to create enterprise applications that

are portable and scalable, and that integrate with legacy technologies.

15

Page 16: Trading

BACK END

My SQL SERVER:

Modern day web sites seem to be relying more and more

on complex database systems. These systems store all of their critical data,

and allow for easy maintenance in some cases. The Structured Query

Language (SQL) is a very popular database language, and its standardization

makes it quite easy to store, update and access data. One of the most

powerful SQL servers out there is called MySQL and surprisingly enough,

its free. Some of the features of MySQL Include: Handles large databases, in

the area of 50,000,000+ records. No memory leaks. Tested with a

commercial memory leakage detector (purify). A privilege and password

system which is very flexible and secure, and which allows host-based

verification. Passwords are secure since all password traffic when

connecting to a server is encrypted.

The aim of backend software is to maintain the data base

used to store the records for customer so the SQL server has distinguished

and select for this job. If lets us to group multiple list together and related

to each other creating a type of data base called relational data base each

list is stored in a different table every data base begins with a problem or

need that can be solved by creating a systematic data tracking system.

My SQL is a powerful relational data base management system

(RDMS) which are will used to learn principals of data base and data

16

Page 17: Trading

manipulation using structured query language statements. SQL is a data base

language this is used to access, insert, deleted and update stored data

17

Page 18: Trading

PRELIMINARY DESIGN

Software actually starts from the requirement analysis. The requirement gathering

process is intensified & focused specially on software. To understand the actual

nature of the program to be built the software engineer must understand the

information domain for the software. As well as the required function behavior

performance & interface. Requirement for both software & system are

documented & reviewed with customer. Software Requirement analysis is

software engineering task that bridges the gap between system level requirement

engineering & software design. In problem recognition we have some regular

meeting with the customer & classified the customer requirements into three

categories.

- Normal Requirements: These include the objectives & the goals that are started

for a product. If these requirements are there the customer is satisfied.

- Expected Requirements: These requirements are implicit to the product or the

system & are so fundamental that customer does not explicitly state them but their

absence may cause considerable dissatisfaction to the customer.

- Exciting Requirements: These features go beyond the customer’s expectation &

prove to be very satisfying when present.

18

Page 19: Trading

1.Database Tables

Database tables which have been created in the project

“Investment.com” are as follow:-

1. customer_master

2. Feed back

3. buyller

4. Seller

5. CB_balance

19

Page 20: Trading

1 Database Design:-

Customer_master Table primary key: Cid

CB_balance table primary key & unique key : Cid

20

Column Name Data Type Allow null

Cid Integer Unchecked

Name Nvarchar(50) Unchecked

Address Nvarchar(50) checked

Phone_R Nvarchar(50) Unchecked

Phone_M Nvarchar(50) Unchecked

Phone_O Nvarchar(50) Unchecked

Fax Nvarchar(50) Unchecked

City Nvarchar(50) Unchecked

State Nvarchar(50) Unchecked

DOB Date Unchecked

Pincode Integer Unchecked

Email Id Nvarchar(30) Unchecked

Occupation Nvarchar(30) Unchecked

Income Nvarchar(20) Unchecked

Loginname Nvarchar2(20) Unchecked

Password Nvarchar2(20) Unchecked

Longname Nvarchar2(30) Unchecked

Page 21: Trading

Buyller tabley: primary key : Cid

21

Column Name Data Type Allow null

Cid Integer Unchecked

Balance Integer Unchecked

Mode_of_pay Varchar210) Unchecked

Card_type Varchar2(10) Unchecked

Card_no Integer Unchecked

Card_holdername Varchar2(20) unchecked

Expiry_date Date Unchecked

Cheque_no Integer Unchecked

Cheque_date Date Unchecked

Bank_drawn Varchar2(20) Unchecked

Location Varchar2(20) Unchecked

Column Name Data Type Allow null

Cid Integer Unchecked

Company name Varchar2(10) Unchecked

No_of_shares Integer Unchecked

Rate_per_share Integer Unchecked

Type_share Varchar2(20) Unchecked

Date Date Unchecked

Flg_B Varchar2(10) unchecked

Page 22: Trading

Seller table primary key:Cid

Feedback table primary key:Sno

22

Column Name Data Type Allow null

Cid Integer Unchecked

Company name Varchar2(10) Unchecked

No_of_shares Integer Unchecked

Rate_per_share Integer Unchecked

Type_share Varchar2(20) Unchecked

Date Date Unchecked

Flg_S Varchar2(10) unchecked

Column Name Data Type Allow null

Sno Integer Unchecked

Name Varchar2(10) Unchecked

Email Varchar2(10) Unchecked

Comments Varchar2(30) Unchecked

Page 23: Trading

DETAILED DESIGEN

1. E-R Diagram

The overall logical structure of database can be expressed graphically by an E-R

diagram. It consist a set of basic objects called entities and of relationships among

these objects.An entity is represented by a set of attributes. Attributes are

descriptive properties possessed by each member of

an entity set.The ER diagram consist of the following major components.

The rectangle represents entity sets.

The ellipses represents attributes.

The diamond box represents relationship sets.

The line links attributes to entity sets ans entity sets to

relationship sets.

The double ellipses represents multivalued attributes.

23

Page 24: Trading

2) Data Flow Diagram(DFD)

1. Data Flow Analysis:-

Documents are the finding in data flow diagrams, which data flow analysis studies

the use of data in each activity. It graphically shows the relation between process

and data. Data flow analysis examines the use of data to carry out specific business

processes within the scope of systems investigation. You might think of it as

viewing the activities of system from the viewpoint of the data originate, how they

are used or changed, and where they go including the steps along the way their

origin to their destination.

Data flow analysis means use of the following tools:

2.Data flow diagram:-

A data flow diagram (DFD) is a graphical technique that depicts information flow

and transforms that are applied as data moves from input to output.The DFD is

also known as data flow graph or bubble chart.

Named circles show the processes in DFD or named arrows entering or

leaving the bubble represent bubbles and data flow. A rectangle represents a

source or sinks and is a net originator or consumer of data .

3.Data Dictionary:-

The data dictionary is a repository that contains description of the entire data

object consumed or produced by the software . The associated data dictionary

states precisely the structure of each data flow in the DFD.Components in the

structure of a data flow may also be specified in the data dictionary, as well as the

structure of file shown in the DFD. In other words, it shows:

What goes in

24

Page 25: Trading

How it is changed

What comes out

The following symbols are generally used:

Data flow is represented by a labeled arrow

Processes are represented by labeled circles (bubbles)

Information sources and sinks are represented by boxes

Files are represented by a double line

2.DATA FLOW DIAGRAM: 1. DFD showing the flow of Data at the Top Abstract Level

\

25

Registration&

searchingServer DatabaseUser

Page 26: Trading

2.CONTEXT LEVEL DFD(DFD Level 0)

Sign up :-

2) Data Flow Diagram (DFD Level 1)

1.Login

26

User Website on Book Gallery

Create, View

Requirements are fulfilled

Registration

AUTHENTICATION

Select applicant profile

View all applicant

USER AUTHENTCATION

LOGIN PAGE

LOGIN ERROR

Registration

Search

Page 27: Trading

2.Appllicant Login:-

Applicant Registration admin information

confirmation

3.Registration:-

Applicant Registration User information

confirmation

4.Result:-

Request result

Result information

Display

27

AdminLoginPage

Admin DB

ROLES Admin Login

Sign Up error

User registrationLoginPage

Registration Db

ROLESReturn msg

pageRegistration error page

Fetching Result

LoginPage

Book DB

Result information

Page 28: Trading

3)UML DIAGRAM:

USE CASE DIAGRAM

A Use Case is a named capability of a structural entity in a model. Use Case define

a System-Level capability without revealing or implying any particular

implementation of that capability. Use Cases are implemented by collaboration of

classes.

28

User Admin

Registration

Login

Sell

buy

Update

Logout

Page 29: Trading

29

Login

User Email id

Password

UserId

Page 30: Trading

MODULE DESCRIPTION

Project Will contain following modules:-

We separate modules into two categories:

Admin Part:-

In this site Admin is person which is responsible for maintaining a website(s). The

duties of the webmaster may include generating and revising web pages, replying

to user comment, and examination traffic through the site.

1. Registration

2. Home

3. Login

4. Add new company name

5. check the user information

.

30

Page 31: Trading

USER PART:-

1.Registration page

2.Login page

3.Home page

4.Get current business news

5.terms and condition

6.logout

31

Page 32: Trading

PRELIMINARY TESTING

When we have completed the coding part then the important work is to test them.

Before that we should know what is Testing and what are its types, which are

described as under:

1. SOFTWARE TESTING FUNDAMENTALS

The development of software system involves a series of production activities,

where there are very natural that there will be some human faults.Software testing

in critical element of software quality assurance and represents the ultimate review

of specification, design and coding.

Testing presents an interesting errors or inconsistencies for the software

engineers. The engineer attempts to build software from system. Now comes

testing. The engineer creates a series of test cases that are intended to destroy

errors in the software that has been build. In fact, testing is the one step in software

engineering process.

1.TESTING OBJECTIVES:-

There are number of rules that can serve well as testing objectives.

1.) Testing is a process of executing a program with the intent of finding an

error.

2.) A good test case is one that has a high probability of finding an as yet

Undiscovered error.

3.) A successful test is one that uncovers an as yet undiscovered error.

32

Page 33: Trading

These objectives implies that a successful test is one in which no errors are found.

Our objective is to design tests that systematically uncover different classes of

errors and do so with minimum amount of time and effort.

If testing is conducted successfully it will uncover errors in software.

The secondary benefit, testing demonstrates that software functions are working

according to specification and requirement appears to have been met.

2. TESTING PRINCIPLES:-

Before applying methods to design effective test cases a software engineer must

understand the basic principles that guide, software testing.

* All tests should be traceable to customer requirements.

* Test should be planned long before testing begins.

* There is one principle that implies, that 80% of all errors uncovered during

testing, will likely be traceable to 20% of all program modules.

* The testing should focus on individual program modules. Then testing

should progress towards "in the large" that is progresses should go

towards the final errors in entire system.

* Exhaustive testing is not possible.

* To be most effective, testing should be conducted by an independent third

party.

3. TYPES OF TESTING

WHITE BOX TESTINGWhite Box Testing, sometimes called Glass Box Testing or Structured Testing is a

test case design method that uses the control structure of the procedural design to

derive test cases. The tester can analyze the code and use knowledge about the

structure of a component to derive test data. "Knowing the internal working of a

33

Page 34: Trading

product, test can be conducted to ensure that internal operation performs according

to specification and all internal components have been adequately exercised", is

called White Box Testing.

White Box Testing of software is predicted on close

examination of procedure detail. Logical paths of the white software are tested by

providing test cases that exercise specific sets of condition or loops.

Using White Box Testing methods, the software engineer can derive test cases

that:-

1.) All independent paths within a module have been exercised at least once.

2.) Exercise all logical decisions and their true and false sides.

3.) Execute all loops at their boundaries and within their operational bounds.

4.) Exercise internal data structure to ensure their validity.

The advantage of White Box Testing is that an analysis of the code can be used to

find how many test cases are needed to guarantee a given level of test coverage.

BLACK BOX TESTINGSometimes called Behavioral Testing or Particular Testing. Black Box Testing

focuses on the functional requirements of the software. That is, Black Box Testing

enables the software engineer to derive sets of input condition that will fully

exercise all functional requirements for a program. Black Box Testing is not an

alternative to White Box techniques. Rather, it is a complementary approach that

is likely to uncover a different class of errors than White Box methods.

Black Box Testing attempts to find errors in the following categories:-

1.) Incorrect or missing function.

2.) Interface errors.

3.) Errors in data structures or external data base access.

34

Page 35: Trading

4.) Performance errors.

5.) Initialization and termination errors.

Unlike White Box Testing which is performed easily in the testing process Black

Box Testing tends to be applied during data stages of testing. Because Black Box

Testing purposely disregards control structure, attention is focused on the

information domain. Tests are designed to answer the following question:-

* How is functional validity tested?

* What classes of input will make good test cases?

* Is the system particularly sensitive to certain input values?

* How are the boundaries of data class isolated?

* What data rates and data volume can the system tolerate?

* What effect will specific combinations of data have on system operations?

By applying Black Box techniques we derive a set of test cases that satisfy the

following criteria:

1.) Test cases that reduce, by a count that is greater than one, the number of

additional test cases that must be designed to achieve reasonable testing.

2.) Test cases that tell us something about the presence or absence of classes

of errors, rather than errors associated only with the specific test at hand.

35

Page 36: Trading

ALPHA AND BETA TESTING

It is virtually impossible for a software developer to foresee how the customer will

really use a program. When custom software is built for one customer, a series of

acceptance tests are conducted to enable the customer to validate all requirements.

Conducted by the end user rather than the system developer, an acceptance test

can range from an informal “test drive” to a planned and systematically executed

series of tests. If software is developed as a product to be used by many customers,

it is impractical to perform formal acceptance tests with each one.

Most software product builders use a process called alpha and beta testing to uncover errors that only the end user seems able to find.

ALPHA TESTING

The alpha test is conducted at the developer’s site by a customer. The software is

used in a natural setting with the developer “looking over the shoulder” of the user

and recording errors and usage problems. Alpha tests are conducted in a controlled

environment.

BETA TESTING

The beta test is conducted at one or more customer sites by the end user(s) of the

software. Unlike alpha testing, the developer is generally not present. Therefore,

the beta test is a “live” application of the software in an environment that cannot

be controlled by the developer. The customer records all problems that are

encountered during beta testing and reports these to the developer at regular

intervals. As a result of problems reported during beta test, the software developer

36

Page 37: Trading

makes modifications and then prepares for release of the software product to the

entire customer base.

While performing testing following errors were encountered which

are handled properly and prompts where required

37

Page 38: Trading

DETAILED TESTING

TESTING

INTRODUCTION TO SOFTWARE TESTING:-

Testing is a process used to help identify the correctness, completeness and quality

of developed computer software. With that in mind, testing can never completely

establish the correctness of computer software.

There are many approaches to software testing, but effective testing of complex

products is essentially a process of investigation, not merely a matter of creating

and following rote procedure. One definition of testing is "the process of

questioning a product in order to evaluate it", where the "questions" are things the

tester tries to do with the product, and the product answers with its behavior in

reaction to the probing of the tester. Although most of the intellectual processes of

testing are nearly identical to that of review or inspection, the word testing is

connoted to mean the dynamic analysis of the product—putting the product

through its paces.

The quality of the application can and normally does vary widely from system to

system but some of the common quality attributes include reliability, stability,

portability, maintainability and usability. Refer to the ISO standard ISO 9126 for a

more complete list of attributes and criteria.

Testing helps is verifying and Validating if the Software is working as it is

intended to be working. Thins involves using Static and Dynamic methodologies

to Test the application.

38

Page 39: Trading

Because of the fallibility of its human designers and its own abstract, complex

nature, software development must be accompanied by quality assurance

activities. It is not unusual for developers to spend 40% of the total project time on

testing. For life-critical software (e.g. flight control, reactor monitoring), testing

can cost 3 to 5 times as much as all other activities combined. The destructive

nature of testing requires that the developer discard preconceived notions of the

correctness of his/her developed software.

SOFTWARE TESTING FUNDAMENTALS:-

1. Testing is a process of executing a program with the intent of finding an error.

2. A good test case is one that has a high probability of finding an as yet

undiscovered error.

3. A successful test is one that uncovers an as yet undiscovered error.

Testing should systematically uncover different classes of errors in a minimum

amount of time and with a minimum amount of effort. A secondary benefit of

testing is that it demonstrates that the software appears to be working as stated

in the specifications. The data collected through testing can also provide an

indication of the software's reliability and quality. But, testing cannot show the

absence of defect -- it can only show that software defects are present.

39

Page 40: Trading

TEST PLAN:-

We want to product to be bug free. We want also want this document describes the

plan for testing for “Hospital Management” software and basic modules like check

in module, checkout module, main form module, and view module.

In this module we will perform two levels of testing Unit Testing and system

testing. Because the system is small, it is felt that there is no need for elaborate

integration testing. The basic unit to be tested given below:--

Feature to be tested:

All the functional features specified in the requirement document are tested.

TESTING START PROCESS

Testing is sometimes incorrectly thought as an after-the-fact activity; performed

after programming is done for a product. Instead, testing should be performed at

every development stage of the product. Test data sets must be derived and their

correctness and consistency should be monitored throughout the development

process.

If we divide the lifecycle of software development into “Requirements Analysis”,

“Design”, “Programming/Construction” and “Operation and Maintenance”, then

testing should accompany each of the above phases. If testing is isolated as a

single phase late in the cycle, errors in the problem statement or design may incur

exorbitant costs. Not only must the original error be corrected, but the entire

structure built upon it must also be changed. Therefore, testing should not be

isolated as an inspection activity. Rather testing should be involved throughout the

SDLC in order to bring out a quality product.

40

Page 41: Trading

TESTING STOP PROCESS:-

The Software Assurance Technology Center (SATC) in the Systems Reliability

and Safety Office at Goddard Space Flight Center (GSFC) is investigating the use

of software error data as an indicator of testing status. Items of interest for

determining the status of testing include projections of the number of errors

remaining in the software and the expected amount of time to find some

percentage of the remaining errors.

To project the number of errors remaining in software, one needs an estimate of

the total number of errors in the software at the start of testing and a count of the

errors found and corrected throughout testing. There are a number of models that

reasonably fit the rate at which errors are found in software, the most commonly

used is referred to in this paper as the Muse model. This model is not easily

applicable at GSFC, however, due to the availability and the quality of the error

data.

At GSFC, useful error data is not easy to obtain for projects not in the Software

Engineering Laboratory. Of the projects studied by the SATC, only a few had an

organized accounting scheme for tracking errors, but they often did not have a

consistent format for recording errors. Some projects record errors that were found

but did not record any information about resources applied to testing. The error

data frequently contained the date of entry of the error data rather than the actual

date of error discovery. In order to use traditional models such as the Musa model

for estimating the cumulative number of errors, one needs fairly precise data on

the Time of discovery of errors and the level of resources applied to testing. Real

world software projects are generally not very accommodating when it comes to

41

Page 42: Trading

either accuracy or completeness of error data. The models developed by the SATC

to perform trending and prediction on error data attempt to compensate for these

shortcomings in the quantity and availability of project data.

In order to compensate for the quality of the error data, the SATC developed a

software error trending models using two techniques, each based on the basic

Musa model, but with the constant in the exponential term replaced by a function

of time that describes the 'intensity' of the testing effort. The shape and the

parameters for this function can be estimated using measures such as CPU time or

staff hours devoted to testing. The first technique involves fitting cumulative error

data to the modified Musa model using a least squares fit that is based on gradient

methods. This technique requires data on errors found and the number of staff

hours devoted to testing each week of the testing activity. The second technique

uses a Kalman filter to estimate both the total number of errors in the software and

the level of testing being performed. This technique requires error data and initial

estimates of the total number of errors and the initial amount of effort applied to

testing.

42

Page 43: Trading

TESTING STRATEGY

Testing is a set of activities that can be planned in advance and conducted

systematically. For this reason a template for software testing –a set of steps into

Which we can place specific test case design methods –should be defined for the

software engineering process.

There are a number of software testing strategies, all of which have following

general characteristics:

1. Testing begins at the module level and works outwards the integration of the entire computer based system.

2. Different testing techniques are appropriate at different points in time.

3. Testing and debugging are different activities, but debugging must be

accommodated in any testing strategy.

LEVEL OF TESTING

1. UNIT TESTING: This is also called program testing. The unit in a

system is modules and routines that are assembled and integrated to perform

a specific function. In a large system, many modules independently of one

another to locate error.

2. SYSTEM TESTING: When unit testing are satisfactorily concluded the

system, as a complete entity must be tested. System testing must verify that

file size is adequate and that indexes have been built properly.

43

Page 44: Trading

ESTIMATING THE COST OF PROJECT

In developing cost estimates for a system, we need to consider several cost

elements. Among them is hardware, facility, operating and supply cost.

Hardware case relates to the actual purchase or lease of the computer and for

example printer’s disc, drive, and peripherals tape unit. Determining the actual

cost of hardware is generally more difficult.

when various users for a dedicated stand along system share the system. In

some cases the best way to control is to treat as an operating system.

Personal cost includes EDP staff salaries and benefit health insurance, vacation

time, sick pay, etc. As well as pay for those involved in developing the system.

Costs insured during the development of a system are one time cost and are the

labeled development cost. Once the system is installed, the cost operating and

maintaining the system.

Facility cost are expensive insured in the physical side where the application of

the computer will be in operation this include wiring, lighting and air one time

cost and is in corporate into overall estimate of the candidate system.

Operating cost include all cost associated with the day-to-day system. The

amount demands on the number o operating staff. There are various ways of

covering operating cost. One approach is to treat operating as overhead.

Another approach is to charge an unauthorized user for the amount of

processing the request from the system. The amount charged is based on

necessary to determine how operating costs should be handled. Supply costs

are variable costs that increased with use of paper, ribbon, and disks. A

systemis also expected to provide benefits. The first task is to identify each and

assign an analysis. Benefits may be tangible, direct or indirect.

44

Page 45: Trading

Conclusion remark

In the world of Market and industry today ,in order to survive and business

Beat the completion business needs to manage the future. Managing the

future means managing the information .the real success of orgnization

depends upon resolving gaps in the communication of this information This

project is based on making web based system of “Online share trading” Any

user easily search the company name. This project“Investment.com”

customized and user-friendly project for college. It has been designed to

easily manage, and look after the over all processing of even very large. In

this project capable of managing enquiry such as customer name, company

name. It also provides help for managing the information about the share.

While working in the terms and by the friends help we also learnt many

technical and non technical thing thus ,improve our skills.

45

Page 46: Trading

REFERENCES

References books

Herbert Schlitz “The complete reference-Java”

Software Engineering: Pressman

Operating System:-”Gallvin” , William stalling Data Base:-”Korth” for (database design and ER-Diagram and DFD)

Bill Kennedy.”HTML Guide”

References Sites

http//www.GOOGLE.COM (search engine)

http//www.wikipedia.Org

46

Page 47: Trading

47

Page 48: Trading

48

Page 49: Trading

49