Your SlideShare is downloading. ×
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
E-Tender System
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

E-Tender System

4,770

Published on

E-tender System Presentation

E-tender System Presentation

Published in: Education
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
4,770
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
295
Comments
0
Likes
2
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. E-Tender System J.G.College of Computer Application Page 1 A System Development Project On E-Tender System A DISSERTATION SUBMITTED FOR THE PARTIAL FULFILLMENT TOWARDS Submitted By: Patel Smit
  • 2. E-Tender System J.G.College of Computer Application Page 2 Part I Introduction 1. Preface 2. About organization 3. Project Profile 4. Tools & Platform Part II System Analysis and Design 5 Analysis 5.1 Requirement Analysis 5.2 E-R Diagram 5.3 Data Flow Diagram (DFD) 6 Design 6.1 Data Dictionary 6.2 User Interface Design Part III Testing & Quality Assurance 7 Unit Testing 8 Integrity Testing Part IV Conclusion 9 Future Enhancement 10 Bibliography Index
  • 3. E-Tender System J.G.College of Computer Application Page 3 Part 1 IInnttrroodduuccttiioonn 1. Preface 2. About organization 3. Project Profile 4. Tools & Platform
  • 4. E-Tender System J.G.College of Computer Application Page 4 PREFACE It gives us great pleasure in placing in the hands of ower esteemed Faculties this individual report which, We believe, will go through the documentation of the project work done by us. The objective of this report is to provide both a conceptual understanding of the system as well as working guide. Surely no other technology the Information Technology is proven as the driving force of the Nation. I.T. not only decides the present but also the future. The need for software development today is a competence in a G.U.I based front-end tool as far as the database programming is concerned. In highly competitive world of today all the business have to be alert and advance in order to survive in the market and for this, company has to be on constant look out for changing trends and technology in the market. A typical scenario today involves an application consisting of a visual front end for presenting data and reporting options to the enterprise users, and a connection to a database for piping data to controls such as text boxes, tables, and list boxes. Moreover We have found DBMS/RDBMS to be the most exciting environment to work with, especially when the G.U.I Tool like Visual Basic .NET.
  • 5. E-Tender System J.G.College of Computer Application Page 5 About organization Virtual Softech And InfoTech. Is established in Ahmadabad. Virtual is a enable services company providing most efficient and cost effective solution. Virtual Softech and InfoTech. Brings together world-class resources and expertise to help create valuable relationships between clients, their users and their employees. It located in Ahmadabad One of the fastest growing industrial cities in Western India with a population base of 4.4 million. Virtual Softech And InfoTech. will carry on business of developing, analyzing, testing, improving, importing, modifying, customizing, exporting, buying, selling, distributing, transferring, altering and converting all kinds of scalable internet architectures and performance measurements and each and every kind of information management activities.  To work with leading edge technologies.  Providing internet marketing, online branding, data entry etc.  To use our expertise to the benefit of our clients and partners through an open, collaborative approach.
  • 6. E-Tender System J.G.College of Computer Application Page 6 PROJECT PROFILE Project Title : E-Tender System. Develop at/for : Virtual Softech & InfoTech. Team members : Patel smit. Front-End : Asp.Net 2005. Back-End : SQL Server, JAVA script.
  • 7. E-Tender System J.G.College of Computer Application Page 7 A Salient Feature The purpose of the E –Tender System is to provide the interface between the Tender buyers and the sellers on the internet. It is the online website to make an advertise about.  Commercial Tender  Government Tender  Global Tender So this system is going to be used for making the advertise about Tender You want to sale and if You want to purchase any Tender then this website is the best resource to get the Tender alerts and To find the Tender as per the requirements. New System: The new of the E – Tender system is to provide the interface between the Tender buyers and the sellers on the internet. It is the website to make an advertise about Tender and this system will be more help full to get the better scope for Tender advertisement. So because of the Drawbacks of the current manual system the company has decided to automate the current system into the computer application as the Website.
  • 8. E-Tender System J.G.College of Computer Application Page 8 Saving the time: Here as we know there is not the manual system. And so it becomes more faster than the manual system and so there is less amount of paper work. Because when a customer Request for the Tender then there will be the online system in which a user have to first of all go through the registration process. And as soon as the user becomes the registered then he will be able to advertise and buy the Tenders. So paper work doesn’t require. And so process for Registration and the searching the property becomes easy and fast. So the system helps to save the time at the both Side. As well as for company and for customer also. Human resources can be managed properly: Here the system is Computer generated so the work Becomes fast and most of the paper Work becomes half. As an example there is no need of an employee for creating the reports. And as the paper work requires more no. of the Employees to handle the database and the information. And there is easy to maintain database by computer system. And accuracy also can be achieved by the automated System.
  • 9. E-Tender System J.G.College of Computer Application Page 9 Easy to manage the database: Because of the automated system the employees are not responsible for managing the data base manually and so followings are the benefits of it. Here data management accuracy can be maintained... Data consistency can be maintained... Data reports can be prepared properly... Data updating can be managed properly... Easy for accessing data: Here also the data can be easily accessed. Because we know that here the system is responsible to manage the data. Management becomes easy. And the data can be fetched and accessed as soon as the user request for particular information. Because data are stored in the proper format. And also if employee want to search for any record. Then the employee would not have to go through each and every record sequentially. So it is easy to manage and get the data easily. Fast service: And so because of not being Time consuming and being Easy in managing the data and being easy in accessing the data the service becomes very fast and comfortable. And because of fast service it becomes to give the service to the large no. of the customers. And results of the fast service become beneficial for the organization as well as the Customer also. These are the benefits of having the computer System.
  • 10. E-Tender System J.G.College of Computer Application Page 10 TOOLS & PLATFORM  Front End Tools Front End tools support the development of graphical method of system and process  Asp.net – Microsoft Visual Studio 2005  Adobe Photoshop 8.0 1 Introduction To ASP.NET : ASP.net is more than the next version of Active server pages (ASP); it is unified web development platform that provide the services necessary for developers to build enterprise-class based web Application. While Asp.net is largely syntax compatible with ASP, it also provides the new programming model and instruction for more secure, scalable and stable application. You can feel free to augment your existing ASP applications by incrementally adding ASP.NET functionality to them. ASP.NET is compiled, NET-based environment; you can author application in any NET Compatible language, including Visual Basic.Net, C# and Jscript NET. Additionally, the entire NET Framework is available to any ASP.NET application. Developers can easily access the benefits of these technologies, Which include the managed common language runtime environment, type safety, inheritance, and so on.
  • 11. E-Tender System J.G.College of Computer Application Page 11 ASP.NET has been designed to work seamlessly with HTML editors and other programming tools, including Microsoft Visual studio NET. Not only does this make web development easier, but it also provides all the benefits that these tools have to offer, including the GUI that developers can use to drop server controls onto a web page and fully integrated debugging support. Developers can use web forms or XML web services when creating an ASP.NET application, or combine these in any way they see fit. Each supported by the same infrastructure that allow you to use authentication schemes, cache frequently use data, or customize your application configuration to name only a few possibilities Web forms allow you to build powerful forms-based Web pages. When building these pages, you can use ASP.NET server control to create common UI elements, and program them for common tasks. These controls allow you to rapidly build a Web form out of reusable build-in or custom components, simplifying the code of a page. An XML Web services provides the means to access server functionality remotely. Using XML Web services, businesses can expose programmatic interface to their data or business logic, which in turn can be obtained and manipulated by client and server application XML Web services enable the exchange of data in client-server or server-server scenarios, using standards like
  • 12. E-Tender System J.G.College of Computer Application Page 12 HTTP and XML Messaging to move data across firewalls. XML Web services are not tied to a particular component technology or object-calling convention. As a result, programs written in any language using any component model, and running on any operating system can access XML Web services. Each of these models can take full advantage of all ASP.NET features, as well as the power of the NET Framework and NET Framework common language runtime. These features and how you can use them are outlined as follow if you have ASP development skills, the new ASP.NET programming model will seem very familiar to you. However, the ASP.NET object model has changed significantly from unfortunately, this means that ASP.NET ids not fully backward compatible; almost all exciting ASP pages will have to be modified to some extend in order to run under ASP.NET Accessing database from ASP.NET application is often use technique for displaying data to Web site visitors. ASP.Net makes it easier than ever to access database for this purpose it also allows to manage the database from your code. ASP.NET provides a simple model that enables Web developers to write logic that runs at the application level. Developers can write this code in the global Ajax text or in a compiled class deployed as an assembly. ASP.NET provides easy-to-use application and session- state facilities that are familiar to ASP developers and are readily compatible with all other.NET Framework APIs.
  • 13. E-Tender System J.G.College of Computer Application Page 13 The NET Framework and ASP.NET provide default Authorization and authentication schemes for Web application. You can easily remove, add to, or replace these schemes, depending upon the needs of your application. ASP.net configuration setting are stored in XML-based which are human readable and writable. Each of your application can have a distinct configuration file and you can extend the configuration scheme to suit your requirements. Application are said to be running side by side when they are installed on the same computer but use different versions of the NET Framework. IIS 6.0 uses a new process model called worker process isolation mode, which a different from the process model used in previous versions of 11S ASPNET uses this process model by default when running on windows server 2003.
  • 14. E-Tender System J.G.College of Computer Application Page 14  ELEMENTS OF ASP.NET WEB APPLICATION Creating ASP.NET Web application involves working with many of the same elements you use in any desktop of client- server application. These include:  Project Management features When creating an ASP.NET Web application, you need to keep track of the files you need, which ones need to be compiled, and which need to be deployed.  User Interface Your application typically presents information to users, in an ASP.NET Web application the user interface is presented in Web forms pages, which send output to a browser. Optically, you can create output tailored for mobile devices or other Web application.  Components Many applications include reusable elements container code to perform specific tasks. In Web applications, you c,' create these components as XML Web services, which make them callable across the Web from a web application, another XML Web services, or a Window Form, for Example.
  • 15. E-Tender System J.G.College of Computer Application Page 15  Data Most applications require some form of data access. ASP.NET Web application you can use ADO.NET, the data services that are part of the NET Framework. Security, performance, and other in structure feature. As in any application, you must implement security prevent unauthorized use, test and debug the application, tune its performance, and perform other tasks not directly related to the application function. The following diagram provides an overview of how the pieces of ASP.NET Web applications fit together and fit into the broader context of the NET Framework of ASP.NET.
  • 16. E-Tender System J.G.College of Computer Application Page 16 2. Adobe Photoshop 8.0 Photoshop, or simply Photoshop, is a graphics editor developed and published by Adobe Systems. It is the current market leader for commercial bitmap and image manipulation, and is the flagship product of Adobe Systems. Photoshop can utilize the color models RGB, lab, CMYK, grayscale, binary and bitmap. Photoshop has the ability to read and write raster and vector image formats such as: .EPS, .PNG, .GIF, .JPEG, Fireworks, etc.
  • 17. E-Tender System J.G.College of Computer Application Page 17  Back End Tools : Back End tools support the development of Database of system  Microsoft Sql Server 2005  C# 1. Microsoft Sql Server 2005:  Advantages of SQL Server 2005 Because It Is built on the new SQL Server 2005 relational database engine, SQL Server 2005 Express provides some important advantages over MSDE, which is based on the older SQL Server 2000 technology. In addition to the core database engine enhancements that SQL Server 2005 Express inherits from the SQL Server 2005 family, SQL Server 2005 Express has been redesigned; some core database capabilities and characteristics have changed.  Increased maximum database size One of the most important advantages that SQL Server 2005 Express has over MSDE Is the increased database size. MSDE is limited to a maximum database size of 2 GB. SQL Server 2005 Express effectively doubles this by bumping up the maximum database size to 4 GB. It's Important to note that the
  • 18. E-Tender System J.G.College of Computer Application Page 18 4-GB limitation Is per database not per instance. For example, you can have multiple 4-GB databases on one SQL Server 2005 Express instance, all of which can be online simultaneously.  No workload governor Another Important advantage that SQL Server 2005 Express has over MSDE is that it does not have the MSDE workload governor. The MSDE query governor is a widely misunderstood MSDE feature that was intended to limit the type of workloads that MSDE could be used for. The MSDE query governor throttles performance by stalling a user connection for a few milliseconds each time the connection requests a read or write operation on a database when there are more than eight concurrent connections.  SQL Server 2005 Management Studio Express Edition The graphical user Interface tools for SQL Server 2005 Express makes it easy for even novices to use the database functionality in SQL Server 2005 Express. The new SQL Server 2005 Management Studio Express (SSMSE) Is available as a separate Web download. It is also included In SQL Server 2005 Express Edition with Advanced Services and the SQL Server 2005 Express Edition Toolkit. SSMSE allows easy database management and query analysis capabilities, and is redistributable with SQL Server 2005 Express.
  • 19. E-Tender System J.G.College of Computer Application Page 19 However, that doesn't mean that you should replace all of your Transact-SQL stored procedures with new CLR-based objects. Transact-SQL Is stills the best choice for data-centric stored procedures and functions. By default, CLR support In SQL Server 2005 Express Is turned off because not all applications require CLR support. To enable CLR support in SQL Server 2005, you can use the SQL Server 2005 Surface Area Configuration tool.  New data types Another important advantage over MSDE that SQL Server 2005 Express inherits from SQL Server 2005 is support for the new SQL Server 2005 data types. SQL Server 2005 has a new XML data type as well as a new varbinary (max) data type. The new XML data type provides support for typed and untyped XML documents. In both cases, the SQL Server relational database engine ensures that the data inserted into the XML data type is well-formed XML. In the case of typed XML documents, SQL Server will only store the XML data if it complies with the associated XSD (Extensible Schema Definition). Like the earlier image data type that is supported by SQL Server 2000 and MSDE, the new varbinary (max) data type can store up to 2 GB of data and is primarily intended to store large binary objects like bitmaps, jpegs, and other large binary objects.
  • 20. E-Tender System J.G.College of Computer Application Page 20 However, unlike the older image data type where the application needed to use an entirely different data access mechanism to read and write the binary data, the new varbinary (max) data type enables applications to access the data stored in the same way as the other SQL Server data types.  User Instance support Another Important advantage that SQL Server 2005 Express has over MSDE is support for user instances. MSDE supports only server Instances-it does not provide support for user Instances. User Instances simplify the ability to deploy database applications that are built on the NET Framework. A user instance is similar to a normal server instance. However, user Instances are created on demand unlike standard SQL Server instances, which are created only during setup. The user does not need to be an administrator to dynamically attach to the database. A user instance is created when the User Instance keyword is used as a part of the Native SQL Client connection string. In addition, the Attach DB Filename keyword is used to specify the name and path of the SQL Server mdf database file that is enabling the application to connect to the target database. The following connection string illustrates using the user Instance support in SQL Server 2005 Express. "Data source=.SQLExpress; integrated security=true; Attachdbfilename=|DataDirectory|mydb.mdf; user instance=true;" The application connects to a user instance of SQL Server 2005 Express that is running as the user who opened the connection. This is a feature only available in SQL Server 2005 Express.
  • 21. E-Tender System J.G.College of Computer Application Page 21  Reporting Services Like MSDE, SQL Server 2005 Express does not possess business intelligence (BI) features such as Analysis Services, Integration Services, or data mining. However, SQL Server 2005 Express does provide support for Reporting Services. While the Initial version of SQL Server 2005 Express did not include support for Reporting Services, It is now available via separate downloads. SQL Server 2005 Express Edition with Advanced Services provides the Report Server. The SQL Server 2005 Express Toolkit provides the Business Intelligence Development Studio. SQL Server 2005 Express can act as a data source for relational data that is on your local server for Reporting Services. Plus, Reporting Services in SQL Server 2005 Express can render reports in Excel, PDF, Image, Print, and DHTML formats. The Report Manager utility In SQL Server 2005 Express manages reports. Reporting Services reports used in SQL Server 2005 Express are completely compatible with the Reporting Services In the other SQL Server 2005 editions.  SQL Service Broker A new SQL Server 2005 development feature that is supported by SQL Server 2005 Express and has no counterpart in MSDE is support for the new SQL Server Service Broker. The SQL Server 2005 Service Broker Is an application development framework that supports the creation of asynchronous Messaging applications.
  • 22. E-Tender System J.G.College of Computer Application Page 22 SQL Server 2005 Express can act as a Client to SQL Server Service Broker applications running on the other editions of SQL Server 2005. This is useful In scale-out scenarios where multiple applications running on a distributed set of SQL Server 2005 Express systems all connect Into a central SQL Server 2005 system running one of the other editions of SQL Server 2005. It should be noted that SQL Server 2005 Express also supports Intra-instance SQL Server Service Broker messaging, which can be used to replace some of the job scheduling functionality that SQL Agent provides for MSDE and the other editions of SQL Server 2005. You can find more information on using SQL Server Service Broker to manage tasks at http://wwwmicrosoft.com/technet/technetmag/issues/2005/05 /ServiceBroker/default.aspx on Microsoft TechNet.  Full-text search Support for full-text search is another feature that wasn't present in the initial release of SQL Server 2005 Express. However, it is available in the SQL Server 2005 Express Edition with Advanced Services download. As in the other editions of SQL Server 2005, the full-text search feature of SQL Server 2005 Express allows fast and flexible indexing for keyword-based queries of text data stored in a SQL Server database. Unlike the LIKE predicate, which only works on character patterns, full text search operates on words and phrases based on the rules of a particular language. Full-text search indexes can be built on
  • 23. E-Tender System J.G.College of Computer Application Page 23 Columns using the char, varchar, marcher, varbinary (max) and Image data types. However, one limitation of full-text search with SQL Server 2005 Express is that it doesn't work in user instances.  Enhanced security Another important advantage that SQL Server 2005 Express has over MSDE is the enhanced security that Is built into the product. SQL Server 2005 Express is installed securely by default. Network connections are disabled. Likewise, support for the CLR is turned off. You need to explicitly enable these features in order to use them. In addition, like the other members of the SQL Server 2005 product line, SQL Server 2005 Express has the ability to encrypt database data, thereby ensuring that sensitive data can be accessed only by users who have the appropriate permissions. SQL Server 2005 Express supports both symmetric and asymmetric data encryption.
  • 24. E-Tender System J.G.College of Computer Application Page 24 2. C# C# is an object-oriented programming language developed by Microsoft as part of the .NET initiative and later approved as a standard by ECMA (ECMA-334) and ISO (ISO/IEC 23270). C# is the programming language that most directly reflects the underlying Common Language Infrastructure (CLI). Most of C#'s intrinsic types correspond to value-types implemented by the CLI framework. C# language specification does not state the code generation requirements of the compiler: that is, it does not state that a C# compiler must target a Common Language Runtime (CLR), or generate Common Intermediate Language (CIL), or generate any other specific format.
  • 25. E-Tender System J.G.College of Computer Application Page 25 HARDWARE AND SOFTWARE ENVIRONMENT 1. SOFTWARE REQUIREMENTS OF THE SYSTEM Along with the hardware, used in the system it requires software to make a system as well as to run a system with the computer hardware. Collection of different types of hardware into a specific type can form a computer but it can not execute different process on its own. For efficient and proper working of any system software must be installed. This software’s may be in the form of operating system or application software. To make the system one also needs to use software. The software’s used in the proposed system are the latest versions of them and can give up-to-date and perfect result of every process in the system. This software comprises operating system and application software used in the system. Visual Studio 2005 Microsoft SQL Server2005
  • 26. E-Tender System J.G.College of Computer Application Page 26 2. HARDWARE REQUIREMENTS OF THE SYSTEM This phase of the software development process deals with a brief study of different hardware used in the computerized system. There is a list of hardware materials used during the making and also during the use of the proposed system. As the new system to be made into a computerized functional system, requirement of a computer is must. All the hardware needed here are generally the basic configuration of a typical office computer. A list of the hardware requirement used in the system given below: 1. 2.80 GHz Pentium(R) D2processor or other compatible. 2. Intel 81x Chipset Motherboard. 3. 512 GB SD-RAM. 4. 160 GB-Hard-Disk. 5. 52x Compact Disc drive or faster. 6. Color Monitor. [1024 * 768 Display] 7. Keyboard. 8. Mouse.
  • 27. E-Tender System J.G.College of Computer Application Page 27 Part 2 SYSTEM ANALYSIS & DESIGN 5 Analysis 5.1 Requirement Analysis 5.2 E-R Diagram 5.3 Data Flow Diagram (DFD) 6 Design 6.1 Data Dictionary 6.2 User Interface Design
  • 28. E-Tender System J.G.College of Computer Application Page 28 ANALYSIS
  • 29. E-Tender System J.G.College of Computer Application Page 29 Requirement Analysis Analysis of system is the process of gathering facts, solution of problem and to decide over all constitution of desired system. In system analysis, we have to analyze all the process related features, required functions, available sources and the time which should be specified for the analysis stage. System analysis's broad outline decides how the problems in outside the world can be related to a computer. It is the examination of the problem. It is concerned with identifying all the constraints and influences. System analysis deals with data collection and a detailed evaluation of present system. It portrays logical modal of the system through Data Flow Diagram and Data Dictionaries.
  • 30. E-Tender System J.G.College of Computer Application Page 30 ENTITY-RELATIONSHIP DIAGRAM  About E –R Diagram The Entity Relationship Model Is a collation of basic Objects, called entitles and relationship among these objects. An Entity is a "thing" or "object" in the real world that is distinguishable from other objects Entities are described in database by a set of attributes. Relationship is association among several entities. The overall logical structure of a database can be expressed graphically by Entities Relationship Diagram.
  • 31. E-Tender System J.G.College of Computer Application Page 31  Symbol for E – R Diagram For Entities For attributes For Relation For Direction For ISA Relation
  • 32. E-Tender System J.G.College of Computer Application Page 32 User IsA Register User UPLoginID UPName UPID Visitor Free Register User Can Subscrib e Can Approve orRejected Or Quary Gives Can Search Can Search Feedback FBIDUPID Can Replay DA B C FTID Can Search & Download 11 1 1 1 M M M M 1 1
  • 33. E-Tender System J.G.College of Computer Application Page 33 TenderMast A B C D Can upload Addmin ALoginIdAID Data eatery Operator DName DLoginId DID TenderID TenderNo OrgName M M M M 1 1
  • 34. E-Tender System J.G.College of Computer Application Page 34 DATA FLOW DIAGRAM ☼ General rules for drawing data flow diagram:  All data flows that appeared on the previous diagram explaining the process are included in the lower level diagram  New data flows and data stores are added if they are used internally in the process to link processes introduced for the first time in the explosion at this level.  Data flows and data stored that originate within the process must be shown.  No entries should contradict the descriptions of the higher level data flow diagram( and if they do one or the other is either incorrect or incomplete and a change must be introduced)  In general we should go as far as necessary to understand the details of the system and the way it functions, taking care to verify all aspects with knowledgeable users.
  • 35. E-Tender System J.G.College of Computer Application Page 35 ☼ Guidelines for drawing DFD:  Explode Processes for more details : In large systems a single process can be exploded many times until an adequate amount of detail is described for analysts to understand the process.  Maintain consistency between processes : The inputs and outputs of the processes should match at last. No one should be missing for consistency.  Allow Meaningful Leveling conventions : Leveling refers to the handling of local files (Those that are used within a process).The details that Pertain only to a single process on a particular level should be held within the process. Data stores and data flows that are relevant only to the inside of a process are concealed until that process is exploded into greater detail.  Add Control on lower level diagrams only : The logical data flow diagram developed to this Point does not include control information. No mention has been made of how to handle errors or exceptions, such as processing incoming invoices that are incomplete. The earlier stages did not include such exceptions as unsigned invoices or invoices without authorized
  • 36. E-Tender System J.G.College of Computer Application Page 36 purchase orders. Yet these conditions are important in correct invoice processing.  Assign meaningful Labels : The descriptions assigned to data flows and processes should tell the reader what is going on.  Data flow naming : The names assigned to data flows should reflect the data of interest to the analysts.  Process naming : Use the proper action verb and an object to receive the action is most appropriate. E.g.: Instead of ‘Inventory control’ use ‘Adjust Quantity on hand’. Also avoid the vague process names such as PROCESS, REVIEW, ASSEMBLE, HANDLE, And ORGANIZE.
  • 37. E-Tender System J.G.College of Computer Application Page 37 Symbol for Dataflow Diagram: Direction of data flow Processes Source or destination Data Stores
  • 38. E-Tender System J.G.College of Computer Application Page 38 CONTEXT LEVEL DIAGRAM FOR TENDER SYSTEM E – Tender System Visitor Data Entry Operator Register User Administer Request Accept / Rejected Request for Free Trial Or Registration Search Tender Notice in Detail Get Tender Notice As per Required / Search Gets Alerts As per plan Get feedback Manage Query Manage Accounts Upload Tender Give Error To The Duplication Of Data Search Tender View Tender Notice Free Register User View Free Tender Notice & Get Free Alerts Search Tender Notice In Detail Replay for Feedback Gives Feedback Download Tender
  • 39. E-Tender System J.G.College of Computer Application Page 39 FIRST LEVEL DATA FLOW DIAGRAM FOR TENDER SYSTEM 1.0 2.0 Log-in 3.0 Utility 4.0 Data Entry 5.0 Management 6.0 Feedback 7.0 Registration Search Visitor Register User Free Register User Data Eatery Operator Administrator Search Criteria Search Result Search Criteria Search Result Search Criteria Search Result Tender Master Gives Tender List Login Id and Password Give Message Login Id and Password Give Message Give Message Login Id and Password Dataentry Operator Admin Master User Personal Gives Data Entry Operator Info User Id / Password Give Admin Info Gives Message Input Visitor detail Free Trial User Personal Register User Details Free Register User Details Gives Feedback Feedback Feedback Details Gives Feedback Tender Master Tender info Upload Tender Update Manage Query Give Account Detail User Personal Payment master Plan master Manage feedback Query Master Query Detail Register user Feedback Update profile View Profile / Payment detail Give Profile Detail Give Plan Detail update plan Update Profile Gives Payment Detail Gives Detail Gives Detail Give Query Info Give wrong Entry Or Error Message Gives Detail Gives Detail Tender Detail
  • 40. E-Tender System J.G.College of Computer Application Page 40 SECOND LEVEL DATA FLOW DIAGRAM FOR SEARCH Quick Search 1.1 Registor User Or Visitor Search Tender Using Date, Price etc By Advance Search Search Tender Using Keyword TenderMaster Advance Search 1.2 Tender List 1.3 TenderMaster Generate Tender List
  • 41. E-Tender System J.G.College of Computer Application Page 41 SECOND LEVEL DIAGRAM FOR TENDER SYSTEM 4.1 Register User Request view or update utility view utility My Profile My Feedback My Query My Payment 4.64.54.44.3 Update profile Show profile Gives Feedback Submit Query Show Query Show feedback Show payment info Query master Payment Master User Personal changeProfile ViewProfile ViewQuery SubmitQuery GivesPayment Detail Feedback Viewprevious feedback Storefeedback Utility Process
  • 42. E-Tender System J.G.College of Computer Application Page 42 SECOND LEVEL DIAGRAM FOR TENDER SYSTEM Management 6.1 Administer Manage account, query View query, account Detail ACCOUNT 6.3 6.2 Give Message QueryMaster Free trial GiveInfo FreeTrialuser Detail Manage Query QueryInfo QureyDetail User personal UserAccount Detail Give account Detail Request For Manage account Query GiveInfo
  • 43. E-Tender System J.G.College of Computer Application Page 43 DESIGN
  • 44. E-Tender System J.G.College of Computer Application Page 44 DATA DICTIONARY The data dictionary of any system is an integral component of structure analysis, since data flow diagrams by themselves do not fully describe the subject under investigation about the system. A data dictionary is a catalog – a repository – of the elements in the system. These elements center on data and the way they are structured to meet user requirements and organization needs. This step of creating a data dictionary is simultaneous with the process of making data flow diagram(s). Here all the data fields in their respective tables are allotted so as to access these data in the system. The data tables are created in a back-end tool like Microsoft Access, Oracle, FoxPro, etc…. Here in the Billing system for Book stall we using tables created in Access as it are the back-end tool used in the system. The data dictionary consists of different major elements like Data Elements, Data Store [Tables Used], Data Flow, Processes and other External entities used in the system. The data dictionary stores details and description of these elements. It is developed during data flow analysis and assists the analysts involved in determining the system requirements. Analysts use data dictionary for the following important reasons:  To manage the details in large system.  To communicate a common meaning for all system elements.  To document the features of the system.
  • 45. E-Tender System J.G.College of Computer Application Page 45 To facilitate analysis of the details in order to evaluate the characteristics and determine where system changes should be made. To locate errors and omissions in the system. The data dictionary contains different types of descriptions for the data flowing through the system. Data Elements is the most fundamental level which is also considered as the building block for all other data in the system. It refers to all the different data used like fields, data item, etc. to make the system fully functional irrespective to the table used in the system. Here all the different type of fields used to make table are written sequentially without referring to the tables. This process helps in the process of Normalization of tables. Next to Data Elements comes the Data Storage which provides the information of where and how each data element is stored in which table and it also give information of any constraints if there. This step also gives knowledge of different data types used for different field and their size. All the normalized tables are showed in data storage. Data Flow stage shows the flow of data in the system. This step is can be already seen in the data flow diagrams above in this document. This step refers to all the data flow paths were transactions are done in the computerized system. The data flow step also includes different processes used in the system and it is followed by External Entities used in the system.
  • 46. E-Tender System J.G.College of Computer Application Page 46 TABLE: - UserPersonal DISCRIPTION: This table shows Register User detail Field Data type CONSTRAINS Allow Null Description UPID Int Primary Key No Auto Increment UPName Varchar(100) No Name ofRegister user UPLoginID Varchar(50) Unique No Login ID. Password Varchar(50) No Hash Email Varchar(100) No Emailed of user Alter _email Varchar(100) Yes AlterNet Emailed of user Address Varchar(250) No Address of user Phone Varchar(30) Yes Phone No. Fax Varchar(30) Yes Fax No. Mobile Varchar(20) Yes Mobile No. City Varchar(50) Forgin Key of City Detail No City Name State Varchar(50) Forgin Key of City Detail No State Name Country Varchar(50) Forgin Key of City Detail No Country Name PlanID Int Forgin Key of plan Masters No Plan id of user. Amount Numeric(7,2) No Amount of pay. BankName Varchar(50) Yes Bank Name Payment Mode Varchar(50) No Pay mode cash or cheque. dd_ck_no Varchar(50) No Dd or cheque no. Registration Date Date Time No Date of Registration Activate Varchar(50) No User active or not
  • 47. E-Tender System J.G.College of Computer Application Page 47 Activation Date Date Time No User active date Expiry Date Date Time No Expire Date question Varchar(50) No Security Question Answer Varchar(50) No Answer PaymtId int Forging Key of Payment Master No Payment Id TABLE: OrganizationMaster DISCRIPTION: This table shows all organization detail. TABLE: City Detail DISCRIPTION: This table shows all city and id detail Filed name Data Type Constrains Allow Null Description OrgId Int Primary Key NO Organization id OrgName Varchar(250) No Organization name CatgoryName Varchar(50) NO Category Name Filed Data type CONSTRAINS Allow Null Description Id int PrimaryKey No Auto Increment City Varchar(100) No Name of City State Varchar(100) No Name of State Country Varchar(100) No Name of Country Region Varchar(100) No Name of Region
  • 48. E-Tender System J.G.College of Computer Application Page 48 TABLE: QueryMaster DISCRIPTION: This table shows all Query detail. TABLE: PlanMaster DISCRIPTION: This table shows all Plan detail Filed name Data Type Constrains Allow Null Description PlanID Int Primary Key NO Plan id PlanName Varchar(50) NO Plan Name Price Numeric(7,2) NO Plan amount TABLE: LoginMaster DISCRIPTION: This table giving information about user login and logout Filed name Data Type Constrains Allow Null Description Id Int Primary Key NO AutoIncrement Filed name Data Type Constrains Allow Null Description QueID Int PrimaryKey No Auto Increment UPID Int Forgin Key of UserPersonal No User Personal Id QueDetail Varchar(100) No Query Detail QueDate DateTime No Query Date Status varchar(50) No Query Status
  • 49. E-Tender System J.G.College of Computer Application Page 49 UPID Int Forgin Key of UserPersonal NO Id of user personal Password Varchar2(50) NO Password TABLE: CategoryMaster DISCRIPTION: This table giving information about and category TABLE: TenderMaster DISCRIPTION:This table giving Tender information Filed name Data Type Constrains Allow Null Description TenderId Int PrimaryKey NO Auto Increment TenderNo Varchar(100) NO TenderNo OrgName Varchar(250) NO Organize Name Address Varchar(500) NO Address of company NoticeType Varchar(50) NO Auction,Tender City Varchar(50) NO Name of City State Varchar(50) NO Name of State Country Varchar(50) NO Name of Country Region Varchar(50) NO Name of Region CatName Varchar(50) NO Category Name TenderBrief Varchar(5000) NO Brief Detail of Tender TenderDetail Varchar(500) NO Short Detail of Tender TenderValue Float NO Price of Tender DocFees Float Yes Document Fees Filed name Data Type Constrains Allow Null Description CategoryID Int PrimaryKey NO Auto Increment CategoryName Varchar(50) No Road,water etc.
  • 50. E-Tender System J.G.College of Computer Application Page 50 EMD Float Yes Early Money Deposite OpeningDate DateTime NO Openig date ClosingDate DateTime NO Closing date InfoSource Varchar(50) NO Information source Name TABLE: Free Trial DISCRIPTION: This table giving free trial user information Filed name Data Type Constrains Allow Null Description FTID Int PrimaryKey No Auto Increment Name Varchar(100) No Name Of User Address Varchar(100) No Address Detail City Varchar(100) No Name of city State Varchar(100) No Name of State Country Varchar(500) No Name of Country Phone nchar(15) Yes Phone No. FaxNumber nchar(15) Yes Fax No. Mobile Varchar(50) Yes Mobile No. Email varchar(100) No EmailId of user KeyWord Varchar(100) No Keyword ,which get a alert. ActivationDate datetime No Activation Date ExpiryDate datetime No Expiry Date Activate Varchar(50) No User active or not. TABLE: FeedBack DISCRIPTION: this table giving user Feedback information
  • 51. E-Tender System J.G.College of Computer Application Page 51 TABLE: PaymentMaster DISCRIPTION: This table giving user Pymt information Filed name Data Type Constrains Allow Null Description PaymtID Int PrimaryKey No Auto Increment UPID Int Forgin Key UserPersonal No Id of user Amount Numeric(7,2) No Amount of user Pay DDno Varchar(20) Yes Demand Draft NO BankName Varchar(50) Yes Name of Bank Filed name Data Type Constrains Allow Null Description FBID Int PrimaryKey No Auto Increment UPID Int Forgin Key of UserPersonal No Id of user FeedBackDetail Varchar(500) No Detail of feedback FeedBackDate DateTime No Feed Back Date
  • 52. E-Tender System J.G.College of Computer Application Page 52 TABLE: Admin DISCRIPTION:This table giving Admin information TABLE: DataentryOperator DISCRIPTION: This table shows data entry operator detail Filed name Data Type Constrains Allow Null Description AID Int Primary Key No Auto Increment ALoginID Varchar(50) No Admin Login id Password Varchar(50) No Password AName Varchar(50) No Admin Name Address Varchar(100) No Address Phone Varchar(50) Yes Phone No. Email Varchar(50) No Email Id of admin Filed name Data Type Constrains Allow Null Description DID Int PrimaryKey No Auto Increment id DLoginID Varchar(50) No Operator Login Id Password Varchar(50) No Operator Password DName Varchar(50) No Operator Name Address Varchar(100) No Operator Address Phone Varchar(50) Yes Phone No.
  • 53. E-Tender System J.G.College of Computer Application Page 53 TABLE:InfoSourceMaster DISCRIPTION: This table shows InformationSource detail Email Varchar(50) No Email Id of Data Entry Operator Filed name Data Type Constrains Allow Null Description InfosourceId Int PrimaryKey No Auto Increment Infosource Varchar(50) Contain Info source where tender Detail get.
  • 54. E-Tender System J.G.College of Computer Application Page 54 USER INTERFACE DESIGN
  • 55. E-Tender System J.G.College of Computer Application Page 55 Home Page In Home Page, display a simple detail of the tender.
  • 56. E-Tender System J.G.College of Computer Application Page 56 User click different link to go other page of website. User can also search tender using tender search. Login Form In Login Page, you must enter the user name & password.
  • 57. E-Tender System J.G.College of Computer Application Page 57 If user is not register, Click subscribe now link and fill Detail. Advance Search Form Advance search page, user can search more different Tender
  • 58. E-Tender System J.G.College of Computer Application Page 58 using Category, Date, city, Value etc… Forgot Password Form
  • 59. E-Tender System J.G.College of Computer Application Page 59 If user forgot his password, to get his password using forgot password form. Free Alert Form
  • 60. E-Tender System J.G.College of Computer Application Page 60 User get a free alert for15 Day of tender after register free alert form. Subscribe Now Form
  • 61. E-Tender System J.G.College of Computer Application Page 61 User can member of the website after his register with subscribe now form. About Us Form About us form contains basic information of the website.
  • 62. E-Tender System J.G.College of Computer Application Page 62 Information Source Form Information source page contain formation of news paper were tender notices is give
  • 63. E-Tender System J.G.College of Computer Application Page 63 Privacy Policy Form rivacy Policy page contain formation of policy notice of website.
  • 64. E-Tender System J.G.College of Computer Application Page 64 Services Form Services page contain payment detail of different plan.
  • 65. E-Tender System J.G.College of Computer Application Page 65 Support Form Support page contain customer care support detail.
  • 66. E-Tender System J.G.College of Computer Application Page 66 Term of Usage Form Term of usage page contain term and condition of use website.
  • 67. E-Tender System J.G.College of Computer Application Page 67 Add With Us Form Add with us page contain Detail of advertisement.
  • 68. E-Tender System J.G.College of Computer Application Page 68 Contact Us Form Contacts us page contain contact detail of company.
  • 69. E-Tender System J.G.College of Computer Application Page 69 Register User Home Form Register user home page contain full detail of tender.
  • 70. E-Tender System J.G.College of Computer Application Page 70 Register User Change Password Form Using change password page user can change his password.
  • 71. E-Tender System J.G.College of Computer Application Page 71 Register User Profile Form My profile page contains register user detail. User also modifies his profile.
  • 72. E-Tender System J.G.College of Computer Application Page 72 Register User Query Form My query page, user sends his query to customer care. User can also see his previous query.
  • 73. E-Tender System J.G.College of Computer Application Page 73 Register User Plan Form My Payment page, user see his payment. User can also see his current plan.
  • 74. E-Tender System J.G.College of Computer Application Page 74 Register User Feedback Form My Feedback form, user can send feedback. User can also see his previous feedback.
  • 75. E-Tender System J.G.College of Computer Application Page 75 Admin Login Form Using Login Page, Addmin can Login.
  • 76. E-Tender System J.G.College of Computer Application Page 76 Admin Query Management Form Query management page display query which send by user or it is approve or not.
  • 77. E-Tender System J.G.College of Computer Application Page 77 Admin account Management Form Account management page display Number of user which is activate or not and also admin can activate the user.
  • 78. E-Tender System J.G.College of Computer Application Page 78 Data-Entry Login Form In Data Entry Login Page, Data entry must enter the user name & password. If user is not register, Click subscribe now link and fill Detail.
  • 79. E-Tender System J.G.College of Computer Application Page 79 Data-Entry Form Data Entry page, Data-Entry operator add, update and delete tender detail.
  • 80. E-Tender System J.G.College of Computer Application Page 80 Data-Entry Category Form In category page, Data-Entry operators add, update and delete category of the tender.
  • 81. E-Tender System J.G.College of Computer Application Page 81 Data-Entry Add City Form In New city page, Data-Entry operators add, update and delete city detail.
  • 82. E-Tender System J.G.College of Computer Application Page 82 Data-Entry Information Source Form In Information Source page, Data-Entry operators add, update and delete information-source of the tender.
  • 83. E-Tender System J.G.College of Computer Application Page 83 Data-Entry Organization Form In Organization page, Data-Entry operators add, update and delete Organization.
  • 84. E-Tender System J.G.College of Computer Application Page 84 Part 3 Testing & Quality Assurance 7 Unit Testing 8 Integrity Testing
  • 85. E-Tender System J.G.College of Computer Application Page 85 IMPORTANCE OF TESTING In today’s competitive business environment, companies are intensely concerned with the quality of their products and services. A successful organization constantly must improve quality in every area, including its information systems. Top management must provide the leadership, encouragement, and support needed for high quality IT resources. No matter how carefully a system is designed and implemented, some problem can occur, especially in a complex system. Rigorous testing catches errors in the final stages, but it is much less expensive to correct mistakes earlier in the development process. The main objective of quality assurance is t avoid problems, or to detect them as soon as possible. Poor quality can result from inaccurate requirements, design problems, coding errors, faulty documentation, and ineffective testing. In an effort to achieve high standards of quality, software systems developers should consider software engineering concepts and internationally recognized quality standards. Testing the application After coding, a programmer must test the program to make sure that it functions correctly. Later, programs are tested in groups, and finally the programmer must test the entire system. The first step is to compile the program using a CASE tool or a language compiler. This process detects syntax errors, which are
  • 86. E-Tender System J.G.College of Computer Application Page 86 language programmer errors. The programmer corrects the errors until the program executes properly. Next, the programmer desk checks the program. Desk checking is the process of reviewing the program code to spot logic errors, which produce incorrect results. This process can be performed by the person who wrote the program or by other programmers. Many organizations require a more formal type of desk checking called a structured walkthroughs, or code review. Typically, a group of three to five IT staff members participate in code review. The group usually consists of project team members and might include other programmers and analysts who did not work on the project. The objective is to have a peer group identify errors, apply quality standards, and verify that the program meets the requirements of the system design specification. Errors found during a structured walkthroughs are easier to fix while coding is still in the developmental stages. In addition to analyzing logic and program code, the project team usually holds a session with users called a design walkthrough, to review the interface with a cross-section of people who will work with the new system. This is a continuation of the modeling and prototyping effort that began early in the systems development process. The next step in application development is to initiate a sequence of unit testing, integration testing, and system testing.
  • 87. E-Tender System J.G.College of Computer Application Page 87 UNIT TESTING The testing of an individual program or module is called unit testing. The objective is to identify and eliminate execution errors that could cause program to terminate abnormally, and logic errors that could have been missed during desk checking. Test data should contain both correct data and erroneous data and should test all possible situations that could occur. For example, for a field that allows a range of numeric values, the test data should contain minimum values, maximum values, values outside the acceptable range, and alphanumeric characters. During testing, programmers can use software tools to determine the location and potential causes of program errors. During unit testing, programmers must test programs that interact with other programs and files individually, before they are integrated system. This requires a technique called stub testing. In stub testing, the programmer simulates each programs outcome or result and displays a message to indicate whether or not the program executed successfully. Each stub represents and entry or exit point that will be linked later to another program or data file.
  • 88. E-Tender System J.G.College of Computer Application Page 88 To obtain an independent analysis, someone other than the programmer who wrote the program usually creates the test data and reviews the results. Systems analysis frequently create details products that specify how and when the testing will ne performed, who will participate, and what test data will be used. A comprehensive test plan should include scenarios for every possible situation the program could encounter. Regardless of who creates the test plan, the project manager or a designated analyst also reviews the final test results. Some organizations also require users to approve final unit test results.
  • 89. E-Tender System J.G.College of Computer Application Page 89 INTEGRITY TESTING Testing one or more programs that depend on each other is called integration testing, or link testing. For example, consider an information system with a program that checks and validates customer credit status, and a separate program that updates data in the customer master file. The output from the validation program becomes input to the master file update program. Testing the programs independently does not guarantee that the data passed between them is correct. Only by performing integration testing for this pair of programs can you make sure that the programs work together properly. Notice that a program can have membership in two or more groups. Systems analysts usually develop the data they use in integration testing. As is the case with all forms of testing, integration test data must consider both normal and unusual situations. For example, integration testing might include passing typical records between two programs, followed by blank records, to simulate an unusual event or an operational problem. You should use test data that simulates actual conditions because you are testing the interface that links the programs. A testing sequence should not move to the integration test stage unless it has performed properly in all unit tests.
  • 90. E-Tender System J.G.College of Computer Application Page 90 Part 4 Conclusion 9 Future Enhancement 10 Bibliography
  • 91. E-Tender System J.G.College of Computer Application Page 91 FUTURE ENHANCEMENT Even though the project was completed to the original requirements, there are a few features that we could add or improve on, if time allowed. The file system implementation should be revised. We could look at other DBMS file systems to get a better idea on how to design a more efficient and space conserving system. Security is the most important feature of the system. In this some security measures are taken to avoid the mishandling of the database. So, we can add more powerful security to system. These are the some of the addition that We are fill that can be added to the system.  Login Time Limitation.  Different Type of Reports is can be added.  Modules like Register User and Admin can be expanded further.
  • 92. E-Tender System J.G.College of Computer Application Page 92 BIBLIOGRAPHY Bibliography means that we have refer while doing project like, which sites we gone through and which books we have referred or which magazines we have seen to implements this project. We are referring many books and websites that can help us proper guild line to implements our system in the right direction. Reference Book Unleashed ASP.NET 2.0 Addison-Wesley - C # Developer's Guide to ASP.NET Wrox.Professional ASP.NET Reference Website www.google.com www.cuil.com www.codeguru.com www.codeplex.com www.asp.net

×