SlideShare a Scribd company logo
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 1
1.INTRODUCTION
1.1 PROJECT OVERVIEW
Online job recruitment is a web application built in php. It provides
the candidates ability to register to this application and search for jobs, manage their
accounts. Each candidate their own account with their own home page.
On the other hand companies that are willing to publish the jobs for
their company to candidates can register to the job portal and get their own account created
and can post jobs to portal’s database .
Registered companies can add or remove jobs and these jobs can be
seen by various candidates and they can contact the company person for the job. Main aim
of this web application is to make a good web application that can make this job search
option easy and accessible to everyone who are interested.
MODULES
 Admin module
 Employer module
 Jobseeker module
Admin module
 Enter new jobs
 Update latest news about job
 Approve the employer
 Approve the jobseeker
 View the details of jobseeker and employees
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 2
Employer module
 View and update profile
 Insert jobs and the details
 Add the details of interview
 Job updation
 Delete existing date of interview
Jobseekermodule
 View the profile
 Search the new jobs
 Apply for a job
 Post the feedback of the site
 Add the qualification
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 3
1.2 ABOUT THE ORGANISATION
Teena computers is a global innovation, technology and services company
focused mainly on communications. Teena is the strategic supplier for the world’s most
innovative applications and develops software for a variety of global needs. Path has been set
for application development for telecom service providers and handset manufactures for state
of the art technological enhancements for mobile devices. Teena’s unique engagement model
blends strategy, design, technology and engineering services, delivering exceptional value
across each phase of the product and service lifecycle.
Through a seamless combination of strategy consulting, design, licensable
technology, software development, integration and support services, Teena helps technology
and communications-oriented companies create highly differentiated products, services and
business models.
Teena family is committed to co-create with the customers to meet the business
objectives and on-time delivery. The messaging gateways developed by Teena attained wider
market demands from the service providers and the service industries because it effectively
reduces the traffic in the network and a good revenue assurance for both the ends.
By creating the best in-class solutions that enable critical business initiatives,
Teena cohort with the clients to create an infrastructure that supports customer specific
unique requirements and facilitating the customers to creatively collaborate in new ways, and
to eliminate boundaries.
Using industry-leading solutions, Teena focuses on helping business to
migrate voice, video, and data over different network. The wide spectrum of services Teena
offer include application software development for various hand-held devices like mobile
phone, PDA etc, data migration over different network, embedded applications for different
processing capabilities etc. and passionate towards the messaging gateways and IM tools...
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 4
2.SYSTEMSTUDY AND ANALYSIS
System study is the major aspect of software development. A
detailed study of the process must be made by various techniques like interviews, Questioners
etc. the data collected by these sources must be scrutinized to arrive to a conclusion. The
conclusion is an understanding of how the system functions. This system is called existing
system. Now the existing system is subjected to close study and problem areas are identified.
The designer now functions as a problem solver and tries to sort outbthe
difficulties that the enterprise faces. The solutions are given as proposals. The proposal is
then weighed with the existing system analytically and the best one is selected. The proposal
is presented to the user for an endorsement by the user. The proposal is reviewed on user
request and suitable changes are made. This is looped at ends as soon as the user is satisfied
the proposal.
Preliminary study is the process of gathering and interpreting fax, using the
information for further studies on the system. Preliminary study is problem solving activity
that requires intensive communication between the system users and system developers. It
does various feasibility studies. In these studies a rough figure of the system activities can be
obtained, from which the decisions about the strategies to be followed for effective system
study and analyses can be taken.
System analysis is a process of gathering and interpreting facts, diagnosing
problems and the information to recommend improvements on the system. It is a problem
solving activity that requires intensive communication between the system users and system
developers. System analyses or study is an important phase of any system development
process. The system is studied to the minutest detail and analyzed. The system analyst plays
the role of the interrogator and dwells deep into the working of the present system. The
system is viewed as a whole and the input to the system are identified. The outputs from the
organization are traced to the various processes. The system analyses is concerned with
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 5
becoming aware of the problem, identifying the relevant and decisional variables, analyzing
synthesizing the various factors and determining and optimal or at leased a satisfactory
solution or program or action.
2.1 EXISTING SYSTEM
The current system is manual. There is no software is created for the recruitment
agency for enter; view the details of applicants and jobs. Now, if a client wants to apply for a
job he will get the complete details of jobs with the details of company.
2.1.1 LIMITATIONS OF EXISTING SYSTEM
 It is highly time consuming
 Greater work load.
 It is very slow.
 Cost is very high.
 Accuracy is missing.
2.2 PROPOSED SYSTEM
The proposed system has a number of advantages over the existing system. First
of all it is very user friendly. So the user can easily understand how to handle the software. It
deals with the jb applications and jobs. The clerk can register the new job seeker a, this
software provide the facility to know the details of his jobs , ranklist etc. This software gives
the complete details about the charge of various jobss. The proposed system has a number of
advantages:
2.2.2 ADVANTAGES OF PROPOSED SYSTEM
 Reduce the manual effort considerably.
 Easily understandable.
 List of available courses, fees details, duration etc. understood.
 Corruption can be minimized.
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 6
 It increases efficiency, speed and accuracy.
 It reduces the cost.
 It reduces a lot of paper wastes thereby saving time and money.
2.3FEASIBILITY STUDY
Feasibility study is the process of determination of whether or not a
project is worth doing. Feasibility studies are undertaken within tight time constraints and
normally culminate in a written and oral feasibility report. The contents and
recommendations of this feasibility study helped us as a sound basis for deciding how to
precede the project. It helped in taking decisions such as which software to use, hardware
combinations, etc.
The following is the process diagram for feasibility analysis. In the diagram,
the feasibility analysis starts with the user set of requirements. With this, the existing system
is also observed. The next step is to check for the deficiencies in the existing system. By
evaluating the above points a fresh idea is conceived to define and quantify the required
goals. Besides that, a set of alternatives and their feasibility is also considered in case of any
failure in the proposed system. Thus, feasibility study is an important part in software
development.
Technical Feasibility : Technical feasibility determines whether the work for the project can
be done with the existing equipment, software technology and available personnel. Technical
feasibility is concerned with specifying equipment and software that will satisfy the user
requirement.This project is feasible on technical remarks also, as the proposed system is more
beneficiary in terms of having a sound proof system with new technical components installed
on the system. The proposed system can run on any machines supporting Windows and
Internet services and works on the best software and hardware that had been used while
designing the system so it would be feasible in all technical terms of feasibility. The
technologies such as JAVA (JSP, Servlet), JavaScript and the compatible H/Ws are so
familiar with the today’s knowledge based industry that anyone can easily be compatible to
the proposed environment.
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 7
Economical Feasibility : Economical feasibility determines whether there are sufficient
benefits in creating to make the cost acceptable, or is the cost of the system too high. As this
signifies cost benefit analysis and savings. On the behalf of the cost-benefit analysis, the
proposed system is feasible and is economical regarding its pre-assumed cost for making a
system. During the economical feasibility test we maintained the balance between the
Operational and Economical feasibilities, as the two were the conflicting.
Behavioral feasibility: People are inherently resistant to change and computers have been
known to facilitate change. There is always some reluctance among the users against the
introduction of new system but they were told that this system would eliminate the
unnecessary overhead of database migration and conversion, which presently had to be
carried out on daily basis to facilitate transactions between the different departments. The
objective this feasibility phase is to take the operational staff into confidence. As the success
of a good system depends upon the willingness of the operating staff, they were taken into
full confidence that the new proposed system would make their jobs easier, relieve them from
the unnecessary overheads and reduce the possibility of errors creeping into the system.
2.4PROCESSING ENVIRoNMENT
2.4.1HARDWARE REQUIREMENTS
Platform : PC
Processor : Pentium IV
Processor Speed : 1.8 GHz and Above
Cache Memory : 512 MB DDRAM or More
Hard disk memory : 160 GB HDD
Keyboard : standard keyboard
2.4.2 SOFTWARE REQUIREMENTS
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 8
Front end : PHP
Back end : MySQL Database Server 5.1.37Web
Server : Tomcat 7.0.14
Application Server : Apache v3.1
Operating System : Windows 7 / Vista / XP sp3 / Linux
Fedora 14
2.6 SOFTWARE DESCRIPTIONS
PHP
PHP is a server-side scripting language designed for web development but also
used as a general purpose programming language. It is an object oriented programming
language.
PHP stands for “Hyper text pre processor” PHP code is interpreted by a web
server with a PHP processor module which generates the resulting web page.PHP is free
software released under the PHP license, which is incompletable with the GNU general
public license( GPL).Restrictions on the usage of the term PHP, PHP can be deployed one
most web servers and also as a standalone shell on almost every operating system and
platform ,free of charge.
Advantages of PHP
 Open Source
 Simple and easy to learn
 Support for both Structural and object oriented programming.
 PHP can used on all major operating systems, including linux,many unix,varients
,Microsoft windows,mac OS X,RISC OS ,and probably others.
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 9
 PHP has also support for most of the webserver today. This include appache
microsoft internet information server, personal web server, netscape and Iplant
servers.
 Powerful built in function
 PHP can plug in with most of the database .It support with MYSQL
,MSSQL,ORACLE,dbaseSQLlite etc.
Language features
HTML
 HTML is a language for describing web pages.
 HTML stands for Hyper Text Markup Language
 HTML is not a programming language, it is a markup language
 A markup language is a set of markup tags
 HTML uses markup tags to describe web pages
 HTML markup tags are usually called HTML tags
 HTML tags are keywords surrounded by angle brackets like <html>
 HTML tags normally come in pairs like <b> and </b>
 The first tag in a pair is the start tag, the second tag is the end tag
 Start and end tags are also called opening tags and closing tags.
HTML Documents
 HTML documents describe web pages
 HTML documents contain HTML tags and plain text
 HTML documents are also called web pages
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 10
CSS
A few words about CSS
 CSS stands for Cascading Style Sheets
 Styles define how to display HTML elements
 Styles are normally stored in Style Sheets
 Styles were added to HTML 4.0 to solve a problem
 External Style Sheets can save you a lot of work
 External Style Sheets are stored in CSS files
 Multiple style definitions will cascade into one
 CSS provides means to customize inbuilt HTML tags
HTML tags were originally designed to define the content of a
document. They were supposed to say "This is a header", "This is a paragraph", "This is a
table", by using tags like <h1>, <p>, <table>, and so on. The layout of the document was
supposed to be taken care of by the browser, without using any formatting tags.
As the two major browsers - Netscape and Internet Explorer - continued to
add new HTML tags and attributes (like the <font> tag and the color attribute) to the original
HTML specification, it became more and more difficult to create Web sites where the content
of HTML documents was clearly separated from the document's presentation layout.
To solve this problem, the World Wide Web Consortium (W3C) - the
non profit, standard setting consortium, responsible for standardizing HTML - created
STYLES in addition to HTML 4.0.
All major browsers support Cascading Style Sheets.Styles sheets define
HOW HTML elements are to be displayed, just like the font tag and the color attribute in
HTML 3.2. Styles are normally saved in external .css files. External style sheets enable you
to change the appearance and layout of all the pages in your Web, just by editing one single
CSS document.
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 11
JavaScript
JavaScript is used in millions of Web pages to improve the design, validate forms, detect
browsers, create cookies, and much more. JavaScript is the most popular scripting language
on the internet, and works in all major browsers, such as Internet Explorer, Firefox, and
Opera.
 A few words about JavaScript
 JavaScript was designed to add interactivity to HTML pages
 JavaScript is a scripting language
 A scripting language is a lightweight programming language
 JavaScript is usually embedded directly into HTML pages
 JavaScript is an interpreted language (means that scripts execute without
preliminary compilation)
 Everyone can use JavaScript without purchasing a license
Purpose of using JavaScript
 JavaScript gives HTML designers a programming tool - HTML authors are
normally not programmers, but JavaScript is a scripting language with a very simple
syntax! Almost anyone can put small "snippets" of code into their HTML pages
 JavaScript can put dynamic text into an HTML page - A JavaScript statement like
this: document.write("<h1>" + name + "</h1>") can write a variable text into an
HTML page
 JavaScript can react to events - A JavaScript can be set to execute when something
happens, like when a page has finished loading or when a user clicks on an HTML
element
 JavaScript can read and write HTML elements - A JavaScript can read and change
the content of an HTML element
 JavaScript can be used to validate data - A JavaScript can be used to validate form
data before it is submitted to a server. This saves the server from extra processing
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 12
 JavaScript can be used to detect the visitor's browser - A JavaScript can be used to
detect the visitor's browser, and - depending on the browser - load another page
specifically designed for that browser
 JavaScript can be used to create cookies - A JavaScript can be used to store and
retrieve information on the visitor's computer
Where to Put the JavaScript
Scripts in the head section: Scripts to be executed when they are called, or when an event is
triggered, go in the head section. When you place a script in the head section, you will ensure
that the script is loaded before anyone uses it.
Scripts in the body section: Scripts to be executed when the page loads go in the body
section. When you place a script in the body section it generates the content of the page.
Using an External JavaScript: When you might want to run the same JavaScript on several
pages, without having to write the same script on every page, then you can write a JavaScript
in an external file. Save the external JavaScript file with a .js file extension. The external
script cannot contain the <script> tag. To use the external script, point to the J1.js file in the
"src" attribute of the <script> tag:
<script type="text/javascript" src="J1.js"></script>
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 13
3. SYSTEM DESIGN
After the analysis phase we have with us the details of the existing
system and the requirements of the user for the new system. This phase diverts focus from the
problem domain to the solution domain. It acts as a bridge between the requirement phase
and its solution. The design phase focuses on the detailed implementation of the system
recommended in the feasibility study.
Systems design is the process or art of defining the architecture,
components, modules, interfaces, and data for a system to satisfy specified requirements.
There is some overlap with the disciplines of systems analysis, systems architecture and
systems engineering.
Object-oriented analysis and design (OOAD) methods are becoming the
most widely used methods for computer system design. The UML has become the standard
language used in Object-oriented analysis and design. It is widely used for modeling software
systems and is increasingly used for high designing non-software systems and organizations.
System design has two phases:
 Logical
 Physical
The logical design reviews the present physical system, prepares the input and output
and also prepares a logical design walk-through. We have to deal with how to take entries
required and whether and how to process the user data. This design also involves the
methodology to store, modify and retrieve data from the data base as per the requirement.
Physical design maps out the details of the physical system, plans the system implementation.
We have to decide how and where to store the input data and how to process it so as to
present it to the user in an easy, informative and attractive manner. A major step in the design
is the preparation of input and output report in a form acceptable to the user. In this a data
entry operator can feed the relevant details asked by the system for particular task as input.
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 14
3.1 OUTPUT DESIGN
One of the most important features of an information system for users is the
output it produces. Output is the information delivered to users through information system.
Computer is the most important source of information to the users.
Output design is a process that involves designing necessary outputs that have to
be used by various users according to requirement. Efficient intelligent output design should
improve the system relationship with the user and help in decision making. Since the reports
are directly required by the management for taking decision and to draw the conclusion must
be simple, descriptive and clear to the user.
The output design is an ongoing activity almost from the beginning of the project,
and follows the principles of form design. The primary consideration in the design of the
output is the requirement of the information of the objectives of the end user. A major form
of output is a hardcopy from the printer, however softcopies are also available.
When analyst design computer output
 Identify the specific output that is needed to meet the information requirements.
 Select methods for presenting information.
 Create documents, report, or other formats that contain information produced by the
system.
 Determine what information to present.
 Decide whether to display, print or speak the information and select the output.
 Arrange the presentation of information in an acceptable format.
 Design how to distribute the output to intend recipient.
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 15
The system output may be
 A report
 A document
 A message
Output contents originate from one or more of these sources:
 Retrieval from a data store.
 Transmission from a process or system activity.
 Directly from an input source.
The output design should efficient intelligible so that system relationship with the end
user is improved and thereby enhancing the process decision making. The contents of the
output are then defined in detail of outputs.
3.2 INPUT DESIGN
Input design is the link between the information system and the users and those
steps that are necessary to put transaction data into a usable form for processing data entry.
The activity of putting data into the computer for processing can be activated by instructing
the computer to read data from a written printed document or it can occur by keying data
directly into the system. The designs of input focusing on controlling the amount of input
required controlling the errors, avoid delay extra steps, and keeping the process simple.
The design decisions for handling input specify how data are accepted for computer
processing. Analyst decides whether the data are enters directly or by using source
documents. The quality of the system describes the manner in which the data enter the system
for processing. It ensures the reliability of the system and produce result for accurate data.
Perspective guide the design of the input focus on
 Effectiveness
 Accuracy
 Ease of use
 Consistency
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 16
 Simplicity
 Attractiveness
The nature of the input design is determined partially during logical system design.
However the nature of the input is made more explicitly during the physical design. The
impact of inputs of the system is also determined.
The proposed system satisfies the following input design objectives.
 A cost effective method of input.
 The highest possible level of accuracy.
 Input is acceptable to and understood by the user.
3.3 DATA BASE DESIGN
Like other software engineering activities, data design (data architecting)
creates a model of data and/or information that is represented in at a higher level of
abstraction (the customer/user’s view of data). James Martin defines database as “A
collection of data designed to be used by different programs”. It can also be defined as a
collection of interrelated data stored together with controlled redundancy to serve one or
more application in an optional fashion. A database is a collection of interrelated data stored
with minimum redundancy to serve users more quickly and efficiently. The general theme
behind a database is to handle information as an integrated whole. The general objective of a
database is to make information access easy, quick, inexpensive, integrated and shared by
different applications users. Applications or users can access data through the Data Base
Management System (DBMS). The data is stored so that they are independent of the
programs that use them. A controlled common approach is used in inserting new data,
modifying and retrieving existing data within the database. The data within software that
allows one or more person to use and/or modify this data is termed as Data Base Management
System (DBMS).
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 17
A good database design does the following:
 Provide minimum search time when locating specific records.
 Stored data in the most efficient manner possible to keep the database from
growing too large.
 Makes data update as easy as possible.
 Is flexible enough to allow inclusion of new functions required of the programs.
3.3.1 Normalization
The process of refining the data model and creating with a database is called
normalization. Database designers can implement several levels of normalization. Each level
builds on previous levels by reducing the amount of redundancy between tables. This
typically increases performance and avoids problems with data consistency.
Advantages of normalization are
 Help in reduction in the complexity of maintaining data integrity by removing the
redundant data.
 It reduces inconsistency of data.
 Eliminate the repeating fields.
1. First normal form
First normal form is the most basic level of the database normalization. The keys
to creating tables in the 1NF:
 Eliminate repeating groups in individual tables.
 Create a separate table for each set of related data.
 Identify each set of related data with a primary key.
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 18
2. Second normal form
The first normal form is not a good database design, but it is a start. The keys to
creating tables in the 2NF
 Create separate tables for sets of values that apply to multiple records.
 Relate these tables with a foregin key.
3. Third normal form
The third normal form is typically the last form that most database designers will
normalize to. After 3NF, the number of relationships between tables becomes very large, and
performance begins to decrease on the database server. The goal of the third normal form is
to remove all data that does not depend on the primary key of a table.
TABLES
1. Application_master
Description: details of the application
Primary key: applicationid
Foreign key:jobid
Colum name Data type Constrain Description
applicationid Int(11) Primary key Application id of
the applicant
Jobseekerid Int(11) Foreign key jobseekid
Jobid Int(11) Foreign key jobid
Status Varchar(30) Not null status
Description Varchar(200) Not null description
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 19
2. Employer_reg
Description: details of employer
Primary key: employer id
Colum name Data type Constrain Description
Employer id Int(11) Primery key Employer id of
the employer
Company name Varchar(20) Not null Name of the
company
Contact person Varchar(20) Not null Contact person
Address Varchar(100) Not null Address of the
employer
City Varchar(20) Not null City of the
employer
Email Varchar(40) Not null Email of the
employer
Mobile number bigint(20) Not null Mobile number
of the employer
Area work Varchar(40) Not null Area work
Status Varchar(10) Not null status
User name Varchar(10) Not null User name of
the employer
Password Varchar(20) Not null Pass word of the
employer
Question Varchar(100) Not null
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 20
3.Feedback
Description: Feedback of the company
Foreign key:Jobseekerid
Colum name Data type Constrain Description
Feedbackid Int(11) Not null Id of the
employer
Jobseekid Int(11) Not null
Feedback Varchar(200) Not null
Feedbackdate date Not null
4.Jobseeker-Education
Description: jobseeker-Education
Primary key: Eduld
Foreign key: Jobseekid
Colum name Data type Constrain Description
Eduld Int(11) Primery key Eduid of the
jobseeker
Jobseekid Int(11) Foreign key Id of the
jobseeker
Degree Varchar(20) Not null Degree of the
jobseeker
University Varchar(100) Not null university
Passing year Mediumint(9) Not null Passing year
Percentage Float Not null percentage
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 21
5.Job_Master
Description: details of the job master
Primary key: Jobid
Colum name Data type Constrain Description
Jobid Int(11) Primery key id
Company name Varchar(20) Not null Company name
Job title Varchar(50) Not null Job title
Vacancy Int(11) Not null vacancy
Minqualification Varchar(50) Not null Minqualification
Description Varchar(200) Not null Description
6.New_Master
Description : news master
Primary key :Newsid
Colum name Data type Constrain Description
Newsid Int(11) Primary key Newsid
News Varchar(200) Not null News
News date date Not null News date
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 22
7.Jobseeker_Reg
Description: Registration of jobseeker
Primary key :Jobseekerid
Colum name Data type Constrain Description
Jobseekerid Int(11) Primary key Id of the
employer
Jobseeker name Varchar(20) Not null Jobseeker name
mobile Bigint(20) Not null Contact person
Address Varchar(100) Not null Address
City Varchar(20) Not null City
Email Varchar(40) Not null Email
Resume Varchar(40) Not null Resume of the
jobseeker
Status Varchar(10) Not null Status
User name Varchar(20) Not null Name of the
user
Password Varchar(20) Not null Password
Question Varchar(100) Not null Question
Answer Varchar(50) Not null Answer
Qualification Varchar(10) Not null Qualification
Gender Varchar(6) Not null Gender
Birthdate Date Not null Birth date of the
jobseeker
8.User_Master
Description: user master
Primary key : Userid
Colum name Data type Constrain Description
Userid Int(11) Primary key Id of the user
Usernames Varchar(20) Not null Name of the user
Password Varchar(20) Not null Password of the
user
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 23
9.Walkin_Master
Description:walkin-master
Primary key : Walkintid
Colum name Data type Constrain Description
Walkintid Int(11) Primary key Walkintid
Company name Varchar(20) Not null Company name
Job title Varchar(50) Not null Job title
Vacancy Int(11) Not null Vacancy
Min
qualification
Varchar(50) Not null Min
qualification
Description Varchar(100) Not null Description
Interview date date Not null Interview date
Interview time time Not null Interview time
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 24
3.4 DATA FLOW DIAGRAM
Analysis model helps us to understand the relationship between different
components in the system design. Analysis model shows the user clearly how a system will
function. This is the first technical representation of a system. The analysis modeling must
achieve three primary objectives:
 To establish a basis for creation of software design.
 To describe what the user requires.
 To define set of requirements that can be validated once the
software is built.
A dataflow diagram is a graphical technique that depicts information and
transforms that are applied as data move from input to output. The DFD is used to represent
increasing information flow and functional details. A level-0 DFD is also called a
fundamental system model represents the entire software elements as a single bible with input
and output indicated by incoming and outgoing arrows respectively.
Additional process and information flow parts are represented in the next level,
i.e., level 1 DFD. Each of the process represented at level 1 are sub functions of overall
system depicted in the context model. Any processes that are complex in level 1 level will be
further represented into sub functions in the next level, i.e., level 2.
Data flow diagrams is a means of representing a system at any level of detail
with a graphic network of symbols showing data flows, data stores, data process and data
stores. The purpose of data flow diagram is to provide a semantic bridge between users and
system developers.
The diagram is graphical, eliminating thousands of words, logical
representations, modeling what system does; hierarchical, showing systems at any level of
details; and jargon less, allowing user understanding and reviewing.The goal of data flow
diagramming is to have a commonly understood model of a system. The diagram is the basis
of the structural analysis. Data flow diagrams are supported by other techniques of structured
system analysis data structured diagram, data dictionaries and procedure representing
techniques such as decision tables, decision tree and structured English.
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 25
Components of Data Flow Diagram
There are only four symbols that are used in the drawing of data flow diagrams.
These are explained below together with the rules that apply to them.
 External Entities
External entities represent the sources of data that enter the system or the
recipients of data that leave the system. They can be duplicated, one or more times on the
diagram to avoid line crossing.
 Process
Processes represent activities in which data is manipulated by being stored or
retrieved or transformed in some way. A circle represents it. The process will show the data
transformation or change. Data coming into a process must be “worked-on” or transformed
in some way. Thus all process my have an input and output.
 Data Stores
Data stores represent stores of data within the system. Data stores may be
long-term files such as sales ledgers, or may be short-term accumulations: For example
batches of documents that are waiting to be processed. Each data store should be given a
reference followed by an arbitrary number.
 Data Flow
A data flow shows the flow of information from its source to its destination. A
line represents a data flow, with arrowheads showing the direction of flow. Information
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 26
always flows to or from a process and may be written, verbal or electronic. Each data flow
may be referenced by the processes or data stores at its head and tail, or by a description of its
contents.
CONTEXT DIAGRAM ( Level 0)
Job
Recruitment
Admin
Employer
Jobseeker
Admin
Employer
Jobseeker
Response
Response
Response
Request
Request
Request
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 27
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 28
Level 1 of Admin
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 29
Level 1 of Employer
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 30
Level 2 of employer : Manage Walking
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 31
Level 1 of JobSeeker
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 32
3.5 SYSTEM FLOW CHART
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 33
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 34
3.6 STRUCTURE CHART
Online Job
Recruitment
Admin
Employer
Job seeker
Employer
Approval
Job seeker
Approval
Update News
Job Approval
View Employer
View jobseeker
View Profile
Insert Job
Update
Interview details
Update Job
Delete interview
dates
View Job seeker’s
Application
View Job seeker’s
profile
pr
View Profile
Post feedback
Search New
Interviews
Search New
Jobs
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 35
4. SYSTEM CODING
The coding is the process that transforms design into a programming
language. It translates a detailed design representation of software into a programming
language realization. The translation process continues when a compiler aspects code as input
and produces machine depended object code as input. Quality of source code can be
improved by the users structure coding techniques: good coding style and readable, consistent
code format. During coding, some coding standards are to be followed. this has two purposes:
reducing the chance of making it easier for sometimes to modify the code later on. Coding
phase affects both testing and maintains profoundly.
Sample code:
<?php
# FileName="Connection_php_mysql.htm"
# Type="MYSQL"
# HTTP="true"
$hostname_job = "localhost";
$database_job = "job";
$username_job = "root";
$password_job = "mysql";
$job=mysql_pconnect($hostname_job,$username_job,$password_job)or
trigger_error(mysql_error(),E_USER_ERROR);
?>
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 36
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Untitled Document</title>
</head>
<body>
<?php
session_start();
$UserName=$_POST['txtUser'];
$Password=$_POST['txtPass'];
$UserType=$_POST['cmbUser'];
if($UserType=="Administrator")
{
$con = mysql_connect("localhost","root","mysql");
mysql_select_db("job", $con);
$sql = "select * from user_master where UserName='".$UserName."' and
Password='".$Password."'";
$result = mysql_query($sql,$con);
$records = mysql_num_rows($result);
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 37
$row = mysql_fetch_array($result);
if ($records==0)
{
echo '<script type="text/javascript">alert("Wrong UserName or
Password");window.location='index.php';</script>';
}
else
{
header("location:Admin/index.php");
}
mysql_close($con);
}
else if($UserType=="JobSeeker")
{
$con = mysql_connect("localhost","root","mysql");
mysql_select_db("job", $con);
$sql = "select * from jobseeker_reg where UserName='".$UserName."' and
Password='".$Password."' and Status='Confirm'";
$result = mysql_query($sql,$con);
$records = mysql_num_rows($result);
$row = mysql_fetch_array($result);
if ($records==0)
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 38
{
echo '<script type="text/javascript">alert("Wrong UserName or
Password");window.location='index.php';</script>';
}
else
{
$_SESSION['ID']=$row['JobSeekId'];
$_SESSION['Name']=$row['JobSeekerName'];
header("location:JobSeeker/index.php");
}
mysql_close($con);
}
else
{
$con = mysql_connect("localhost","root","mysql");
mysql_select_db("job", $con);
$sql = "select * from employer_reg where UserName='".$UserName."' and
Password='".$Password."' and Status='Confirm'";
$result = mysql_query($sql,$con);
$records = mysql_num_rows($result);
$row = mysql_fetch_array($result);
if ($records==0)
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 39
{
echo '<script type="text/javascript">alert("Wrong UserName or
Password");window.location='index.php';</script>';
}
else
{
$_SESSION['ID']=$row['EmployerId'];
$_SESSION['Name']=$row['CompanyName'];
header("location:Employer/index.php");
}
mysql_close($con);
}
?>
</body>
</html>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 40
<title>Untitled Document</title>
</head>
<body>
<?php
$Id = $_GET['EmpId'];
// Establish Connection with MYSQL
$con = mysql_connect("localhost","root","mysql");
// Select Database
mysql_select_db("job", $con);
// Specify the query to Update Record
$sql = "Update Employer_Reg set Status='Confirm' where EmployerId=".$Id."";
// Execute query
mysql_query($sql,$con);
// Close The Connection
mysql_close($con);
echo '<script type="text/javascript">alert("Employer Request
Confirmed");window.location='ManageEmployer.php';</script>';
?>
</body>
</html>
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 41
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Untitled Document</title>
</head>
<body>
<?php
if(!isset($_SESSION))
{
session_start();
}
$Degree=$_POST['cmbQual'];
$Uni=$_POST['txtBoard'];
$Passing=$_POST['cmbYear'];
$Per=$_POST['txtPer'];
$Id=$_SESSION['ID'];
if($Degree=="Other")
{
$Degree=$_POST['txtOther'];
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 42
}
// Establish Connection with MYSQL
$con = mysql_connect ("localhost","root","mysql");
// Select Database
mysql_select_db("job", $con);
// Specify the query to Insert Record
$sql = "insert into
JobSeeker_Education(JobSeekId,Degree,University,PassingYear,Percentage)
values('".$Id."','".$Degree."','".$Uni."','".$Passing."','".$Per."')";
// execute query
mysql_query ($sql,$con);
// Close The Connection
mysql_close ($con);
echo '<script type="text/javascript">alert("Profile Created
Succesfully");window.location='Education.php';</script>';
?>
</body>
</html>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 43
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Untitled Document</title>
</head>
<body>
<?php
$Id=$_GET['JobId'];
// Establish Connection with MYSQL
$con = mysql_connect ("localhost","root","mysql");
// Select Database
mysql_select_db("job", $con);
// Specify the query to Insert Record
$sql = "delete from Job_Master where JobId='".$Id."'";
// execute query
mysql_query ($sql,$con);
// Close The Connection
mysql_close ($con);
echo '<script type="text/javascript">alert("Job Deleted
Succesfully");window.location='ManageJob.php';</script>';
?>
</body>
</html>
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 44
5. SYSTEM TESTING
Testing is the last stage of the software development before we release the
product to the customer. Software testing is a critical element of software quality assurance
and represents the ultimate review of specification, design and coding. Software testing can
be looked upon as one among the many processes. Testing is the process of executing a
program with the explicit intention of finding errors. Testing cannot show the absence of
defects, it can only show that software defects are present.
Software Testing Techniques
The importance of testing and its impact on software cannot be underestimated.
The greater visibility of software systems and the cost associated with the software failure are
motivating factors for planning through testing. It is not uncommon for a software organization
to spent 40% of its effort on testing.
A number of rules that act as Testing Objectives are:
 Testing is a process of executing a program with the aim of finding errors.
 A good test case will have a good chance to find an undiscovered error.
 A successful test case uncovers a new error.
Need For Testing
Testing is essential as
 Existence of program defects of inadequacies is inferred.
 Test the performance of the system.
 Verifies whether the software behaves as intended by its designer.
 Checks conformance with requirement specification/user needs.
 Assesses the operational reliability of the system.
 Reflects the frequency of actual user input.
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 45
Unit Testing
The first level testing is unit testing. Unit testing concentrates on each unit of the
software as implemented in source code. Initially tests focus on each module individually,
ensuring that it functions properly as a unit. The modules must then be assembled or
integrated to form the complete software package.
There are tests that occur as part of unit testing. The module interfaces are tested
to ensure that information properly flows into and out of a program under test. The data
structures are also tested for integrity. Boundary conditions are tested to ensure that the
module operates properly at boundaries established to limit or restrict processing. All
independent paths through the control structures are exercised to ensure that all statements in
a module have been executed at least once. Finally all error handling paths are tested.
In this project, after coding each module have been individually tested to
determine whether they are coded correctly so that they satisfy the requirements in the
specifications and execute effectively as individual units was tested and run individually. All
unnecessary coding were removed and it was ensured that all modules worked, as
programmer would expect. Logical errors found were corrected. So, by working all the
modules independently and verifying the output of each module in the presence of staff
concluded that the program was functioning as expected.
Integration Testing
The next level of the testing is often called as Integration testing in which many
tested modules are combined into sub-system, which are then tested. The output from the
unit testing becomes the input to the integration testing. The goal here is to see if the
modules can be integrated properly, the emphasis being on testing interfaces between
modules. Modules in this software are combined and tested after the unit testing. After
connecting all the sub modules into whole module, the connections between the modules
are correctly established. The back end and front end are working as a whole module and
the data entered in the front end once submitted were successfully entered into the database.
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 46
On request the data was successfully retrieved. After performing the integration testing, the
next steps should be the output testing of the developed system, because no system could be
useful if it does not produce the required output in a specific format.
The output generated by the developed system should be compared with the format
required by the user. The format can be presented by using the screen or in the printed form.
According to this project, using integrated test plans prepared in the design
phase of system developed as a guide, the integration test was carried out. All the errors
found in the system were corrected for the next testing steps. In the project, ‘Home
Anywhere’ individually tested sections are integrated to form a single module and test
whether the output is still maintained after integrating.
Validation Testing
In validation testing the requirements established as part of software
requirement analysis are validated against the software that has been constructed.
Validation testing provides the final assurance that software meets all functional,
behavioral and performance requirements.
After the project was made from all the logical and interface errors, the project
is input with dummy data to ensure that the software developed satisfied all the
requirements of the user.
In this project, validation testing is done with all the forms. All forms were
validated completely. In case of email ids, entered according to the format and chunk size
should contain only numeric values. The validation checking also includes boundary
checking for various fields.
System Testing
System testing is actually a series of different tests whose primary purpose is to
fully exercise the computer- based system. Although each test has different purpose, all work
to verify that system elements have been properly integrated and perform allocated functions.
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 47
User Acceptance Testing
User acceptance testing of a system is a key factor for the success of any
system. The System under consideration is tested for user acceptance by constantly keeping
in touch with the prospective system users at time of developing and making changes
whenever required. Test results emphasize how the actual results differ from the expected
results. This suggests the need for re-testing, and to discover the source of differences. The
test phase of systems development process involves defining the criteria by which the
system will be tested and measuring the criteria against the acceptance failure rate. Errors
detected during the development are corrected and re-tested. Each input, output and process
are tested to verify that it performs as specified in design. The test data included illegal as
well as out of range of data .It is found that the system is able to handle all the possibilities.
The units in the system are re-compiled and errors found are corrected as indicated by the
compiler. The tests are repeated until all known errors are eliminated and the program
matched the design specifications. Separate tests are performed to ensure that program units
are properly interfaced with each other to form a complete system.
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 48
6. SYSTEM IMPLEMENTATION
Implementation is the process in which the working product is installed
at the client site and configured and customized to its operational environment. Implementation
is less creative than software design, but it may tend to be the source of new bugs if procedures
aren’t followed strictly. Utmost patience and very good technical are a must for the Application
Developer. Implementation procedure normally begins with preparing the target machine/s.
The risk of crashes and failures can be reduced to the bare minimum if the correct system
configurations are strictly enforced.
Implementation stages involves following tasks:
 Careful planning.
 Investigation of system and constraints.
 Design of methods to achieve the changeover
 Evaluation of changeover method.
 Training of the staff in changeover phase.
The method of implementation and the time scale to be adopted are found out
initially. Next the system is tested properly and the same time users are trained in new
environment.
Implementation Procedure:
Implementation of software refers to the final installation of the package in
its real environment, to the satisfaction of intended users and operation of the system. In the
initial stage, the doubt about the software but have to ensure that the resistance does not built
up, as one has to make sure that
 Active user must be aware of benefits of using a new system
 Their confidence in software is built-up
 Proper guidance is imparted to the user so that he is comfortable in using
that system
 Periodical changes must be adapted in to the system to make customers
always using the system
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 49
7. SYSTEM MAINTANANCE
Once the software is delivered and deployed, then maintenance
phase starts. Software requires maintenance because there are some residual errors remaining
in the system that must be removed as they discovered. Maintenance involves understanding
the existing software (code and related documents), understanding the effect of change,
making the changes, testing the new changes, and retesting the old parts that were not
changed. The complexity of the maintenance task makes maintenance the most costly activity
in the life of software product.
It is believed that almost all software that is developed has
residual errors, or bugs, in them. These errors need to be removed when discovered that leads
to the software change. This is called Corrective Maintenance. Corrective maintenance means
repairing, processing or performance failures or making alterations because of previously ill-
defined problems.
Software undergoes change frequently even without bugs because
the software must be upgraded and enhanced to include more features and provide more
services. This also requires modification of the software. The changed software changes the
environment, which in turn requires further change. This phenomenon is called the “law of
software evaluation”. Maintenance due to this phenomenon is called adaptive maintenance.
Adaptive maintenance means changing the program function. Perfect maintenance means
enhancing the performance or modifying the programs according to the user’s additional or
changing needs. The keys to reduce the need for maintenance are:
 More accurately defining the user’s requirement during system
development.
 Using Preparation of system documentation in a better way.
 More effective ways for designing processing logic and communicating it
to project team members.
 Making better use of existing tools and techniques
 Managing the system engineering process effectively
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 50
. 8. SYSTEM SECURITY
This software produces some security features. Before
registering admin’s and staff’s details, they have to authenticate by providing the appropriate
username and password. Securities are provided in the software so that the data remains
confidential. Password facility is implemented to avoid unauthorized access. For providing
more security they has to change their password with their wishes
Applications only control the use of resources granted to them, and not
which resources’ are granted to them. they ,in turn, determine the use of these resources by
users of the application through application security.
Security testing techniques scour for vulnerabilities or security holes in
applications. these vulnerabilities leave applications open to exploitation. Ideally, security
testing is implemented throughout the entire software development life cycle(SDLC) so thast
vulnerabilities may be addressed in a timely and thorough manner. Unfortunately, testing is
often conducted as an after thought at end of the development cycle.
“ONLINE JOB RECRUITMENT” is secured by means of providing
password protection for every type of users. It is also less vulnerable to external attacks by
using php for its development non repudications are avoided by logging all activities of users.
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 51
9. UPGRADABLEPOSSIBILITIES
Software must be in such a way that it should adapt to changes easily.
Our system is capable of meeting all future changes without much modification. The program
is coded in more structured manner. So we can include more future enhancements. There is
scope for improvement of this system. Apart from these, there is a scope for generating many
more features. I believe that this application can be extended easily with out affecting the
functioning. Up gradation is made possibly by means of
 Increased reliability and integrity of data
 User-friendly and flexible aspects
 Data entry and updating is quite easy
 Effective table manipulation as facilitated by the rich My SQL.
 Good validation check
 Reduce complexity in data entry.
 Easy maintenance is providing
 More user friendly designing
 Attractive product searching and sorting option
Some future enhancements to the current system are listed below.
 Good product viewing capability
 Very easy sorting of product
 Live bidding options and advisement
 More payment options
 Sending alert to all type of users over SMS gateways
 Very rich set of insights and report generations of admin
 Product market values, as chart info for handcrafters
 Mobhile application for quik access of store
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 52
10.CONCLUSION
The conventional system is time consuming and laborious. The online
jobrecruitment helps the users to select the job and register to it..It also provide a facility for
selecting appropriate field.It provides maximum security. The package is very much user
friendly in nature.
So here in this software we have tried our level best to over the difficulties faced by
the existing manual system. This software reduces the labour work that was required before
automating it.
Developing this application has been a learning experience. We are able to explore
PHP as much as possible. Since the project involved all the important features of PHP and its
application it helped me to a great extent. There was a lot of positive feedback when the final
testing of the project was over. This software is designed with the aim of providing fast,
reliable and secure access to end users.
On the whole it was an excellent experience and we feel satisfied at the
end of the project. Of course, this is not all that is possible. There are several features that
could be added and the application made better but we have really done maximum in the
stipulated time and feel happy at the end of it.
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 53
BIBLIOGRAPHY
o Rajib Mall,Fundamentals of Software Engineerin.Third Edition,PHI Learning
Private Limited 2009
o System Analysis and Design By Elias M Awad
o Elmarsi,Navathe:Fundamentals of Database Systems,ThirdEdition,Pearson
Education,2000
o Ramakrishnan,Gehre:Database Management Systems,Third Edition McGraw-
Hill Higher Education,2003
o Pankaj Jalote An Integrated Approach to Software Enginering Home PVT
LTD 2006
o Lee Purcell, Mary Jane Mara approach to the ABCs of Java Script
o Paul Haine approach to HTML Mastery
o Rasmus Lerdorf,Kevin Tatroe and Peter MacIntyre approaches to
Programming PHP
o Tim Converse and Joyce Park with Clark Morgan approach to PHP5 and My
SQL
WEBSITES
 www.mysql.org
 www.java.com/j2ee/index.html
 www.java.com/jsp/index.html
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 54
Appendix I: FORM LAYOUT
Homepage
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 55
Admin homepage
Control panel
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 56
Jobseeker’sHomepage
JobseakerProcces
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 57
Interview details
Employer’sHomepage
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 58
Employer,s Controlpanel
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 59
Appendix II: MEETING MINUTES
Group Members
Anju S (320-12958007)
Aswathy.S.P (320-12958009)
Athira.U (320-12958012)
Monija.M (320-12958024)
Minutes
Date : 22/02/2014
Time : 10am
Location : Teena Computers, Anchal
We decide to do a project named “ONLINE JOBPORTAL”. And we choose
PHP language for doing the project. Language study and system study and analysis are
done in between 22/02/2014to02/03/2014.
Minutes
Date : 02/03/2014
Time : 10am
Location : Teena Computers Anchal
We start form design and many forms are included in the project. So
completed our form design on 09/03/2014.
Minutes
Date : 09/03/2014
Time : 10am
Location : Teena Computers,Anchal
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 60
Since the form design is over, we decided to do the table creation and
design.PHP language is used for coding and for database design MY SQL is used.
Also we complete data flow diagram neatly.
Minutes
Date : 24/03/2014
Time : 10:.30 aM
Location : Teena Computers,Anchal
About 80% of code design is completed, we started testing process. It can take a
long time to complete the process.
Minutes
Date : 10/05/2014
Time : 10 AM
Location :Teena Computers, Anchal
Since the implementation and testing is completed, we started documentation preparation
work.
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 61
Appendix III
GANTT CHART
TASK START(DD/MM/YY) END(DD/MM/YY)
System study and analysis 22/02/2014 02/03/2014
Form design 03/03/2014 08/03/2014
Database design 09/03/2014 23/03/2014
Coding 24/03/2014 10/052014
Testing 11/05/2014 15/05/2014
Documentation 09/03/2014 22/05/2014
Feb22 to Mar3 Mar3 to Mar 8 Mar9 to Mar23 Mar24 to May10 May11 to May15 May16 to May22
System
Study and
analysis
And
analysis
System design
Coding
Testing
Documentation
Online job Recruitment
B.sc Computer Science UIT ,Yerror 2012-2015
Page 62

More Related Content

What's hot

Project management
Project managementProject management
Project managementDavid Terry
 
Week8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical RequirementsWeek8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical Requirementshapy
 
Instant message
Instant  messageInstant  message
Instant message
kplshrm222
 
ITERATIVE AND INCREMENTAL DEVELOPMENT ANALYSIS STUDY OF VOCATIONAL CAREER INF...
ITERATIVE AND INCREMENTAL DEVELOPMENT ANALYSIS STUDY OF VOCATIONAL CAREER INF...ITERATIVE AND INCREMENTAL DEVELOPMENT ANALYSIS STUDY OF VOCATIONAL CAREER INF...
ITERATIVE AND INCREMENTAL DEVELOPMENT ANALYSIS STUDY OF VOCATIONAL CAREER INF...
ijseajournal
 
Requirement analysis with use case
Requirement analysis with use caseRequirement analysis with use case
Requirement analysis with use case
Rapeepan Thawornwanchai
 
How good is my software a simple approach for software rating based on syst...
How good is my software   a simple approach for software rating based on syst...How good is my software   a simple approach for software rating based on syst...
How good is my software a simple approach for software rating based on syst...
Conference Papers
 
Software Engineering unit 2
Software Engineering unit 2Software Engineering unit 2
Software Engineering unit 2
Abhimanyu Mishra
 
Unit1
Unit1Unit1
Tomi resume
Tomi resumeTomi resume
Good Practices For Developing User Requirements
Good Practices For Developing User RequirementsGood Practices For Developing User Requirements
Good Practices For Developing User Requirementsnkaur
 
Software engineering Unit-2
Software engineering Unit-2Software engineering Unit-2
Software engineering Unit-2
Samura Daniel
 
REQUIREMENT ENGINEERING: HOW TO MAKE IT COMPLETE AND CORRECT
REQUIREMENT ENGINEERING: HOW TO MAKE IT COMPLETE AND CORRECTREQUIREMENT ENGINEERING: HOW TO MAKE IT COMPLETE AND CORRECT
REQUIREMENT ENGINEERING: HOW TO MAKE IT COMPLETE AND CORRECT
AM Publications,India
 
Senior ipt term4_casestudy
Senior ipt term4_casestudySenior ipt term4_casestudy
Senior ipt term4_casestudyhccit
 
Going mobile with enterprise application
Going mobile with enterprise applicationGoing mobile with enterprise application
Going mobile with enterprise application
Muzayun Mukhtar
 
Development of Intelligence Process Tracking System for Job Seekers
Development of Intelligence Process Tracking System for Job SeekersDevelopment of Intelligence Process Tracking System for Job Seekers
Development of Intelligence Process Tracking System for Job Seekers
IJMIT JOURNAL
 
A Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingA Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive Computing
Osama M. Khaled
 
Information systems engineering
Information systems engineeringInformation systems engineering
Information systems engineering
EssaysREasy
 
Cw comp1661 211574_mo233_20131122_234918_1314
Cw comp1661 211574_mo233_20131122_234918_1314Cw comp1661 211574_mo233_20131122_234918_1314
Cw comp1661 211574_mo233_20131122_234918_1314
Owen Muzi
 
Unit 2
Unit 2Unit 2

What's hot (20)

Project management
Project managementProject management
Project management
 
Week8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical RequirementsWeek8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical Requirements
 
Instant message
Instant  messageInstant  message
Instant message
 
ITERATIVE AND INCREMENTAL DEVELOPMENT ANALYSIS STUDY OF VOCATIONAL CAREER INF...
ITERATIVE AND INCREMENTAL DEVELOPMENT ANALYSIS STUDY OF VOCATIONAL CAREER INF...ITERATIVE AND INCREMENTAL DEVELOPMENT ANALYSIS STUDY OF VOCATIONAL CAREER INF...
ITERATIVE AND INCREMENTAL DEVELOPMENT ANALYSIS STUDY OF VOCATIONAL CAREER INF...
 
Requirement analysis with use case
Requirement analysis with use caseRequirement analysis with use case
Requirement analysis with use case
 
How good is my software a simple approach for software rating based on syst...
How good is my software   a simple approach for software rating based on syst...How good is my software   a simple approach for software rating based on syst...
How good is my software a simple approach for software rating based on syst...
 
Software Engineering unit 2
Software Engineering unit 2Software Engineering unit 2
Software Engineering unit 2
 
Unit1
Unit1Unit1
Unit1
 
Tomi resume
Tomi resumeTomi resume
Tomi resume
 
Good Practices For Developing User Requirements
Good Practices For Developing User RequirementsGood Practices For Developing User Requirements
Good Practices For Developing User Requirements
 
Software engineering Unit-2
Software engineering Unit-2Software engineering Unit-2
Software engineering Unit-2
 
REQUIREMENT ENGINEERING: HOW TO MAKE IT COMPLETE AND CORRECT
REQUIREMENT ENGINEERING: HOW TO MAKE IT COMPLETE AND CORRECTREQUIREMENT ENGINEERING: HOW TO MAKE IT COMPLETE AND CORRECT
REQUIREMENT ENGINEERING: HOW TO MAKE IT COMPLETE AND CORRECT
 
SrivatsanRangaswamy_resume
SrivatsanRangaswamy_resumeSrivatsanRangaswamy_resume
SrivatsanRangaswamy_resume
 
Senior ipt term4_casestudy
Senior ipt term4_casestudySenior ipt term4_casestudy
Senior ipt term4_casestudy
 
Going mobile with enterprise application
Going mobile with enterprise applicationGoing mobile with enterprise application
Going mobile with enterprise application
 
Development of Intelligence Process Tracking System for Job Seekers
Development of Intelligence Process Tracking System for Job SeekersDevelopment of Intelligence Process Tracking System for Job Seekers
Development of Intelligence Process Tracking System for Job Seekers
 
A Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingA Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive Computing
 
Information systems engineering
Information systems engineeringInformation systems engineering
Information systems engineering
 
Cw comp1661 211574_mo233_20131122_234918_1314
Cw comp1661 211574_mo233_20131122_234918_1314Cw comp1661 211574_mo233_20131122_234918_1314
Cw comp1661 211574_mo233_20131122_234918_1314
 
Unit 2
Unit 2Unit 2
Unit 2
 

Similar to 235429094 jobportal-documentation

Project Documentation Student Management System format.pptx
Project Documentation Student Management System format.pptxProject Documentation Student Management System format.pptx
Project Documentation Student Management System format.pptx
AjayPatre1
 
Online job placement system project report.pdf
Online job placement system project report.pdfOnline job placement system project report.pdf
Online job placement system project report.pdf
Kamal Acharya
 
44478167 hospital-management-system
44478167 hospital-management-system44478167 hospital-management-system
44478167 hospital-management-system
Akshay Iliger
 
IRJET- Speech and Hearing
IRJET- Speech and HearingIRJET- Speech and Hearing
IRJET- Speech and Hearing
IRJET Journal
 
46393833 e banking
46393833 e banking46393833 e banking
46393833 e bankingdipali2009
 
Project on multiplex ticket bookingn system globsyn2014
Project on multiplex ticket bookingn system globsyn2014Project on multiplex ticket bookingn system globsyn2014
Project on multiplex ticket bookingn system globsyn2014Md Imran
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
online banking system
online banking systemonline banking system
online banking system
kartikeya upadhyay
 
Online dating system management project report.pdf
Online dating system management project report.pdfOnline dating system management project report.pdf
Online dating system management project report.pdf
Kamal Acharya
 
Project documentation on Mango Shop Management System
Project documentation on Mango Shop Management SystemProject documentation on Mango Shop Management System
Project documentation on Mango Shop Management System
Hrushikesh Patil
 
Online auction system srs riport
Online auction system srs  riportOnline auction system srs  riport
Online auction system srs riport
Dilip Prajapati
 
Online auction system srs riport
Online auction system srs  riportOnline auction system srs  riport
Online auction system srs riportDilip Prajapati
 
BUILDING INFORMATION SYSYTEMS.pptx
BUILDING INFORMATION SYSYTEMS.pptxBUILDING INFORMATION SYSYTEMS.pptx
BUILDING INFORMATION SYSYTEMS.pptx
ZEESHANMEHMOOD43
 
System analysis and_design.docx
System analysis and_design.docxSystem analysis and_design.docx
System analysis and_design.docx
AlaJebnoun
 
Synopsis on billing system
Synopsis on billing systemSynopsis on billing system
Synopsis on billing system
Alok Sharma
 
Online movie booking synopsis
Online movie booking  synopsisOnline movie booking  synopsis
Online movie booking synopsis
mca projects
 
12th CBSE Computer Science Project
12th CBSE Computer Science Project12th CBSE Computer Science Project
12th CBSE Computer Science Project
Ashwin Francis
 
OS Password-Manager-Report.docx
OS Password-Manager-Report.docxOS Password-Manager-Report.docx
OS Password-Manager-Report.docx
rinim85726
 

Similar to 235429094 jobportal-documentation (20)

Project Documentation Student Management System format.pptx
Project Documentation Student Management System format.pptxProject Documentation Student Management System format.pptx
Project Documentation Student Management System format.pptx
 
Online job placement system project report.pdf
Online job placement system project report.pdfOnline job placement system project report.pdf
Online job placement system project report.pdf
 
44478167 hospital-management-system
44478167 hospital-management-system44478167 hospital-management-system
44478167 hospital-management-system
 
IRJET- Speech and Hearing
IRJET- Speech and HearingIRJET- Speech and Hearing
IRJET- Speech and Hearing
 
46393833 e banking
46393833 e banking46393833 e banking
46393833 e banking
 
Project on multiplex ticket bookingn system globsyn2014
Project on multiplex ticket bookingn system globsyn2014Project on multiplex ticket bookingn system globsyn2014
Project on multiplex ticket bookingn system globsyn2014
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Sdpl1
Sdpl1Sdpl1
Sdpl1
 
online banking system
online banking systemonline banking system
online banking system
 
Online dating system management project report.pdf
Online dating system management project report.pdfOnline dating system management project report.pdf
Online dating system management project report.pdf
 
Project documentation on Mango Shop Management System
Project documentation on Mango Shop Management SystemProject documentation on Mango Shop Management System
Project documentation on Mango Shop Management System
 
Online auction system srs riport
Online auction system srs  riportOnline auction system srs  riport
Online auction system srs riport
 
Online auction system srs riport
Online auction system srs  riportOnline auction system srs  riport
Online auction system srs riport
 
BUILDING INFORMATION SYSYTEMS.pptx
BUILDING INFORMATION SYSYTEMS.pptxBUILDING INFORMATION SYSYTEMS.pptx
BUILDING INFORMATION SYSYTEMS.pptx
 
System analysis and_design.docx
System analysis and_design.docxSystem analysis and_design.docx
System analysis and_design.docx
 
Synopsis on billing system
Synopsis on billing systemSynopsis on billing system
Synopsis on billing system
 
Online movie booking synopsis
Online movie booking  synopsisOnline movie booking  synopsis
Online movie booking synopsis
 
12th CBSE Computer Science Project
12th CBSE Computer Science Project12th CBSE Computer Science Project
12th CBSE Computer Science Project
 
OS Password-Manager-Report.docx
OS Password-Manager-Report.docxOS Password-Manager-Report.docx
OS Password-Manager-Report.docx
 
Sadchap3
Sadchap3Sadchap3
Sadchap3
 

Recently uploaded

The Impact of Artificial Intelligence on Modern Society.pdf
The Impact of Artificial Intelligence on Modern Society.pdfThe Impact of Artificial Intelligence on Modern Society.pdf
The Impact of Artificial Intelligence on Modern Society.pdf
ssuser3e63fc
 
New Explore Careers and College Majors 2024.pdf
New Explore Careers and College Majors 2024.pdfNew Explore Careers and College Majors 2024.pdf
New Explore Careers and College Majors 2024.pdf
Dr. Mary Askew
 
Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.
alexthomas971
 
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
foismail170
 
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaaInteractive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
23211a7274
 
How to Master LinkedIn for Career and Business
How to Master LinkedIn for Career and BusinessHow to Master LinkedIn for Career and Business
How to Master LinkedIn for Career and Business
ideatoipo
 
Brand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio IBrand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio I
thomasaolson2000
 
133. Reviewer Certificate in Advances in Research
133. Reviewer Certificate in Advances in Research133. Reviewer Certificate in Advances in Research
133. Reviewer Certificate in Advances in Research
Manu Mitra
 
My Story of Getting into Tech By Gertrude Chilufya Westrin
My Story of Getting into Tech By Gertrude Chilufya WestrinMy Story of Getting into Tech By Gertrude Chilufya Westrin
My Story of Getting into Tech By Gertrude Chilufya Westrin
AlinaseFaith
 
Operating system. short answes and Interview questions .pdf
Operating system. short answes and Interview questions .pdfOperating system. short answes and Interview questions .pdf
Operating system. short answes and Interview questions .pdf
harikrishnahari6276
 
Widal Agglutination Test: A rapid serological diagnosis of typhoid fever
Widal Agglutination Test: A rapid serological diagnosis of typhoid feverWidal Agglutination Test: A rapid serological diagnosis of typhoid fever
Widal Agglutination Test: A rapid serological diagnosis of typhoid fever
taexnic
 
salivary gland disorders.pdf nothing more
salivary gland disorders.pdf nothing moresalivary gland disorders.pdf nothing more
salivary gland disorders.pdf nothing more
GokulnathMbbs
 
135. Reviewer Certificate in Journal of Engineering
135. Reviewer Certificate in Journal of Engineering135. Reviewer Certificate in Journal of Engineering
135. Reviewer Certificate in Journal of Engineering
Manu Mitra
 
Midterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptxMidterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptx
Sheldon Byron
 
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
larisashrestha558
 
Full Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptxFull Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptx
mmorales2173
 
How to create an effective K-POC tutorial
How to create an effective K-POC tutorialHow to create an effective K-POC tutorial
How to create an effective K-POC tutorial
vencislavkaaa
 
134. Reviewer Certificate in Computer Science
134. Reviewer Certificate in Computer Science134. Reviewer Certificate in Computer Science
134. Reviewer Certificate in Computer Science
Manu Mitra
 
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
foismail170
 
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】
foismail170
 

Recently uploaded (20)

The Impact of Artificial Intelligence on Modern Society.pdf
The Impact of Artificial Intelligence on Modern Society.pdfThe Impact of Artificial Intelligence on Modern Society.pdf
The Impact of Artificial Intelligence on Modern Society.pdf
 
New Explore Careers and College Majors 2024.pdf
New Explore Careers and College Majors 2024.pdfNew Explore Careers and College Majors 2024.pdf
New Explore Careers and College Majors 2024.pdf
 
Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.
 
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
 
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaaInteractive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
 
How to Master LinkedIn for Career and Business
How to Master LinkedIn for Career and BusinessHow to Master LinkedIn for Career and Business
How to Master LinkedIn for Career and Business
 
Brand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio IBrand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio I
 
133. Reviewer Certificate in Advances in Research
133. Reviewer Certificate in Advances in Research133. Reviewer Certificate in Advances in Research
133. Reviewer Certificate in Advances in Research
 
My Story of Getting into Tech By Gertrude Chilufya Westrin
My Story of Getting into Tech By Gertrude Chilufya WestrinMy Story of Getting into Tech By Gertrude Chilufya Westrin
My Story of Getting into Tech By Gertrude Chilufya Westrin
 
Operating system. short answes and Interview questions .pdf
Operating system. short answes and Interview questions .pdfOperating system. short answes and Interview questions .pdf
Operating system. short answes and Interview questions .pdf
 
Widal Agglutination Test: A rapid serological diagnosis of typhoid fever
Widal Agglutination Test: A rapid serological diagnosis of typhoid feverWidal Agglutination Test: A rapid serological diagnosis of typhoid fever
Widal Agglutination Test: A rapid serological diagnosis of typhoid fever
 
salivary gland disorders.pdf nothing more
salivary gland disorders.pdf nothing moresalivary gland disorders.pdf nothing more
salivary gland disorders.pdf nothing more
 
135. Reviewer Certificate in Journal of Engineering
135. Reviewer Certificate in Journal of Engineering135. Reviewer Certificate in Journal of Engineering
135. Reviewer Certificate in Journal of Engineering
 
Midterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptxMidterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptx
 
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
 
Full Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptxFull Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptx
 
How to create an effective K-POC tutorial
How to create an effective K-POC tutorialHow to create an effective K-POC tutorial
How to create an effective K-POC tutorial
 
134. Reviewer Certificate in Computer Science
134. Reviewer Certificate in Computer Science134. Reviewer Certificate in Computer Science
134. Reviewer Certificate in Computer Science
 
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
 
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】
 

235429094 jobportal-documentation

  • 1. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 1 1.INTRODUCTION 1.1 PROJECT OVERVIEW Online job recruitment is a web application built in php. It provides the candidates ability to register to this application and search for jobs, manage their accounts. Each candidate their own account with their own home page. On the other hand companies that are willing to publish the jobs for their company to candidates can register to the job portal and get their own account created and can post jobs to portal’s database . Registered companies can add or remove jobs and these jobs can be seen by various candidates and they can contact the company person for the job. Main aim of this web application is to make a good web application that can make this job search option easy and accessible to everyone who are interested. MODULES  Admin module  Employer module  Jobseeker module Admin module  Enter new jobs  Update latest news about job  Approve the employer  Approve the jobseeker  View the details of jobseeker and employees
  • 2. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 2 Employer module  View and update profile  Insert jobs and the details  Add the details of interview  Job updation  Delete existing date of interview Jobseekermodule  View the profile  Search the new jobs  Apply for a job  Post the feedback of the site  Add the qualification
  • 3. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 3 1.2 ABOUT THE ORGANISATION Teena computers is a global innovation, technology and services company focused mainly on communications. Teena is the strategic supplier for the world’s most innovative applications and develops software for a variety of global needs. Path has been set for application development for telecom service providers and handset manufactures for state of the art technological enhancements for mobile devices. Teena’s unique engagement model blends strategy, design, technology and engineering services, delivering exceptional value across each phase of the product and service lifecycle. Through a seamless combination of strategy consulting, design, licensable technology, software development, integration and support services, Teena helps technology and communications-oriented companies create highly differentiated products, services and business models. Teena family is committed to co-create with the customers to meet the business objectives and on-time delivery. The messaging gateways developed by Teena attained wider market demands from the service providers and the service industries because it effectively reduces the traffic in the network and a good revenue assurance for both the ends. By creating the best in-class solutions that enable critical business initiatives, Teena cohort with the clients to create an infrastructure that supports customer specific unique requirements and facilitating the customers to creatively collaborate in new ways, and to eliminate boundaries. Using industry-leading solutions, Teena focuses on helping business to migrate voice, video, and data over different network. The wide spectrum of services Teena offer include application software development for various hand-held devices like mobile phone, PDA etc, data migration over different network, embedded applications for different processing capabilities etc. and passionate towards the messaging gateways and IM tools...
  • 4. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 4 2.SYSTEMSTUDY AND ANALYSIS System study is the major aspect of software development. A detailed study of the process must be made by various techniques like interviews, Questioners etc. the data collected by these sources must be scrutinized to arrive to a conclusion. The conclusion is an understanding of how the system functions. This system is called existing system. Now the existing system is subjected to close study and problem areas are identified. The designer now functions as a problem solver and tries to sort outbthe difficulties that the enterprise faces. The solutions are given as proposals. The proposal is then weighed with the existing system analytically and the best one is selected. The proposal is presented to the user for an endorsement by the user. The proposal is reviewed on user request and suitable changes are made. This is looped at ends as soon as the user is satisfied the proposal. Preliminary study is the process of gathering and interpreting fax, using the information for further studies on the system. Preliminary study is problem solving activity that requires intensive communication between the system users and system developers. It does various feasibility studies. In these studies a rough figure of the system activities can be obtained, from which the decisions about the strategies to be followed for effective system study and analyses can be taken. System analysis is a process of gathering and interpreting facts, diagnosing problems and the information to recommend improvements on the system. It is a problem solving activity that requires intensive communication between the system users and system developers. System analyses or study is an important phase of any system development process. The system is studied to the minutest detail and analyzed. The system analyst plays the role of the interrogator and dwells deep into the working of the present system. The system is viewed as a whole and the input to the system are identified. The outputs from the organization are traced to the various processes. The system analyses is concerned with
  • 5. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 5 becoming aware of the problem, identifying the relevant and decisional variables, analyzing synthesizing the various factors and determining and optimal or at leased a satisfactory solution or program or action. 2.1 EXISTING SYSTEM The current system is manual. There is no software is created for the recruitment agency for enter; view the details of applicants and jobs. Now, if a client wants to apply for a job he will get the complete details of jobs with the details of company. 2.1.1 LIMITATIONS OF EXISTING SYSTEM  It is highly time consuming  Greater work load.  It is very slow.  Cost is very high.  Accuracy is missing. 2.2 PROPOSED SYSTEM The proposed system has a number of advantages over the existing system. First of all it is very user friendly. So the user can easily understand how to handle the software. It deals with the jb applications and jobs. The clerk can register the new job seeker a, this software provide the facility to know the details of his jobs , ranklist etc. This software gives the complete details about the charge of various jobss. The proposed system has a number of advantages: 2.2.2 ADVANTAGES OF PROPOSED SYSTEM  Reduce the manual effort considerably.  Easily understandable.  List of available courses, fees details, duration etc. understood.  Corruption can be minimized.
  • 6. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 6  It increases efficiency, speed and accuracy.  It reduces the cost.  It reduces a lot of paper wastes thereby saving time and money. 2.3FEASIBILITY STUDY Feasibility study is the process of determination of whether or not a project is worth doing. Feasibility studies are undertaken within tight time constraints and normally culminate in a written and oral feasibility report. The contents and recommendations of this feasibility study helped us as a sound basis for deciding how to precede the project. It helped in taking decisions such as which software to use, hardware combinations, etc. The following is the process diagram for feasibility analysis. In the diagram, the feasibility analysis starts with the user set of requirements. With this, the existing system is also observed. The next step is to check for the deficiencies in the existing system. By evaluating the above points a fresh idea is conceived to define and quantify the required goals. Besides that, a set of alternatives and their feasibility is also considered in case of any failure in the proposed system. Thus, feasibility study is an important part in software development. Technical Feasibility : Technical feasibility determines whether the work for the project can be done with the existing equipment, software technology and available personnel. Technical feasibility is concerned with specifying equipment and software that will satisfy the user requirement.This project is feasible on technical remarks also, as the proposed system is more beneficiary in terms of having a sound proof system with new technical components installed on the system. The proposed system can run on any machines supporting Windows and Internet services and works on the best software and hardware that had been used while designing the system so it would be feasible in all technical terms of feasibility. The technologies such as JAVA (JSP, Servlet), JavaScript and the compatible H/Ws are so familiar with the today’s knowledge based industry that anyone can easily be compatible to the proposed environment.
  • 7. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 7 Economical Feasibility : Economical feasibility determines whether there are sufficient benefits in creating to make the cost acceptable, or is the cost of the system too high. As this signifies cost benefit analysis and savings. On the behalf of the cost-benefit analysis, the proposed system is feasible and is economical regarding its pre-assumed cost for making a system. During the economical feasibility test we maintained the balance between the Operational and Economical feasibilities, as the two were the conflicting. Behavioral feasibility: People are inherently resistant to change and computers have been known to facilitate change. There is always some reluctance among the users against the introduction of new system but they were told that this system would eliminate the unnecessary overhead of database migration and conversion, which presently had to be carried out on daily basis to facilitate transactions between the different departments. The objective this feasibility phase is to take the operational staff into confidence. As the success of a good system depends upon the willingness of the operating staff, they were taken into full confidence that the new proposed system would make their jobs easier, relieve them from the unnecessary overheads and reduce the possibility of errors creeping into the system. 2.4PROCESSING ENVIRoNMENT 2.4.1HARDWARE REQUIREMENTS Platform : PC Processor : Pentium IV Processor Speed : 1.8 GHz and Above Cache Memory : 512 MB DDRAM or More Hard disk memory : 160 GB HDD Keyboard : standard keyboard 2.4.2 SOFTWARE REQUIREMENTS
  • 8. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 8 Front end : PHP Back end : MySQL Database Server 5.1.37Web Server : Tomcat 7.0.14 Application Server : Apache v3.1 Operating System : Windows 7 / Vista / XP sp3 / Linux Fedora 14 2.6 SOFTWARE DESCRIPTIONS PHP PHP is a server-side scripting language designed for web development but also used as a general purpose programming language. It is an object oriented programming language. PHP stands for “Hyper text pre processor” PHP code is interpreted by a web server with a PHP processor module which generates the resulting web page.PHP is free software released under the PHP license, which is incompletable with the GNU general public license( GPL).Restrictions on the usage of the term PHP, PHP can be deployed one most web servers and also as a standalone shell on almost every operating system and platform ,free of charge. Advantages of PHP  Open Source  Simple and easy to learn  Support for both Structural and object oriented programming.  PHP can used on all major operating systems, including linux,many unix,varients ,Microsoft windows,mac OS X,RISC OS ,and probably others.
  • 9. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 9  PHP has also support for most of the webserver today. This include appache microsoft internet information server, personal web server, netscape and Iplant servers.  Powerful built in function  PHP can plug in with most of the database .It support with MYSQL ,MSSQL,ORACLE,dbaseSQLlite etc. Language features HTML  HTML is a language for describing web pages.  HTML stands for Hyper Text Markup Language  HTML is not a programming language, it is a markup language  A markup language is a set of markup tags  HTML uses markup tags to describe web pages  HTML markup tags are usually called HTML tags  HTML tags are keywords surrounded by angle brackets like <html>  HTML tags normally come in pairs like <b> and </b>  The first tag in a pair is the start tag, the second tag is the end tag  Start and end tags are also called opening tags and closing tags. HTML Documents  HTML documents describe web pages  HTML documents contain HTML tags and plain text  HTML documents are also called web pages
  • 10. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 10 CSS A few words about CSS  CSS stands for Cascading Style Sheets  Styles define how to display HTML elements  Styles are normally stored in Style Sheets  Styles were added to HTML 4.0 to solve a problem  External Style Sheets can save you a lot of work  External Style Sheets are stored in CSS files  Multiple style definitions will cascade into one  CSS provides means to customize inbuilt HTML tags HTML tags were originally designed to define the content of a document. They were supposed to say "This is a header", "This is a paragraph", "This is a table", by using tags like <h1>, <p>, <table>, and so on. The layout of the document was supposed to be taken care of by the browser, without using any formatting tags. As the two major browsers - Netscape and Internet Explorer - continued to add new HTML tags and attributes (like the <font> tag and the color attribute) to the original HTML specification, it became more and more difficult to create Web sites where the content of HTML documents was clearly separated from the document's presentation layout. To solve this problem, the World Wide Web Consortium (W3C) - the non profit, standard setting consortium, responsible for standardizing HTML - created STYLES in addition to HTML 4.0. All major browsers support Cascading Style Sheets.Styles sheets define HOW HTML elements are to be displayed, just like the font tag and the color attribute in HTML 3.2. Styles are normally saved in external .css files. External style sheets enable you to change the appearance and layout of all the pages in your Web, just by editing one single CSS document.
  • 11. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 11 JavaScript JavaScript is used in millions of Web pages to improve the design, validate forms, detect browsers, create cookies, and much more. JavaScript is the most popular scripting language on the internet, and works in all major browsers, such as Internet Explorer, Firefox, and Opera.  A few words about JavaScript  JavaScript was designed to add interactivity to HTML pages  JavaScript is a scripting language  A scripting language is a lightweight programming language  JavaScript is usually embedded directly into HTML pages  JavaScript is an interpreted language (means that scripts execute without preliminary compilation)  Everyone can use JavaScript without purchasing a license Purpose of using JavaScript  JavaScript gives HTML designers a programming tool - HTML authors are normally not programmers, but JavaScript is a scripting language with a very simple syntax! Almost anyone can put small "snippets" of code into their HTML pages  JavaScript can put dynamic text into an HTML page - A JavaScript statement like this: document.write("<h1>" + name + "</h1>") can write a variable text into an HTML page  JavaScript can react to events - A JavaScript can be set to execute when something happens, like when a page has finished loading or when a user clicks on an HTML element  JavaScript can read and write HTML elements - A JavaScript can read and change the content of an HTML element  JavaScript can be used to validate data - A JavaScript can be used to validate form data before it is submitted to a server. This saves the server from extra processing
  • 12. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 12  JavaScript can be used to detect the visitor's browser - A JavaScript can be used to detect the visitor's browser, and - depending on the browser - load another page specifically designed for that browser  JavaScript can be used to create cookies - A JavaScript can be used to store and retrieve information on the visitor's computer Where to Put the JavaScript Scripts in the head section: Scripts to be executed when they are called, or when an event is triggered, go in the head section. When you place a script in the head section, you will ensure that the script is loaded before anyone uses it. Scripts in the body section: Scripts to be executed when the page loads go in the body section. When you place a script in the body section it generates the content of the page. Using an External JavaScript: When you might want to run the same JavaScript on several pages, without having to write the same script on every page, then you can write a JavaScript in an external file. Save the external JavaScript file with a .js file extension. The external script cannot contain the <script> tag. To use the external script, point to the J1.js file in the "src" attribute of the <script> tag: <script type="text/javascript" src="J1.js"></script>
  • 13. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 13 3. SYSTEM DESIGN After the analysis phase we have with us the details of the existing system and the requirements of the user for the new system. This phase diverts focus from the problem domain to the solution domain. It acts as a bridge between the requirement phase and its solution. The design phase focuses on the detailed implementation of the system recommended in the feasibility study. Systems design is the process or art of defining the architecture, components, modules, interfaces, and data for a system to satisfy specified requirements. There is some overlap with the disciplines of systems analysis, systems architecture and systems engineering. Object-oriented analysis and design (OOAD) methods are becoming the most widely used methods for computer system design. The UML has become the standard language used in Object-oriented analysis and design. It is widely used for modeling software systems and is increasingly used for high designing non-software systems and organizations. System design has two phases:  Logical  Physical The logical design reviews the present physical system, prepares the input and output and also prepares a logical design walk-through. We have to deal with how to take entries required and whether and how to process the user data. This design also involves the methodology to store, modify and retrieve data from the data base as per the requirement. Physical design maps out the details of the physical system, plans the system implementation. We have to decide how and where to store the input data and how to process it so as to present it to the user in an easy, informative and attractive manner. A major step in the design is the preparation of input and output report in a form acceptable to the user. In this a data entry operator can feed the relevant details asked by the system for particular task as input.
  • 14. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 14 3.1 OUTPUT DESIGN One of the most important features of an information system for users is the output it produces. Output is the information delivered to users through information system. Computer is the most important source of information to the users. Output design is a process that involves designing necessary outputs that have to be used by various users according to requirement. Efficient intelligent output design should improve the system relationship with the user and help in decision making. Since the reports are directly required by the management for taking decision and to draw the conclusion must be simple, descriptive and clear to the user. The output design is an ongoing activity almost from the beginning of the project, and follows the principles of form design. The primary consideration in the design of the output is the requirement of the information of the objectives of the end user. A major form of output is a hardcopy from the printer, however softcopies are also available. When analyst design computer output  Identify the specific output that is needed to meet the information requirements.  Select methods for presenting information.  Create documents, report, or other formats that contain information produced by the system.  Determine what information to present.  Decide whether to display, print or speak the information and select the output.  Arrange the presentation of information in an acceptable format.  Design how to distribute the output to intend recipient.
  • 15. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 15 The system output may be  A report  A document  A message Output contents originate from one or more of these sources:  Retrieval from a data store.  Transmission from a process or system activity.  Directly from an input source. The output design should efficient intelligible so that system relationship with the end user is improved and thereby enhancing the process decision making. The contents of the output are then defined in detail of outputs. 3.2 INPUT DESIGN Input design is the link between the information system and the users and those steps that are necessary to put transaction data into a usable form for processing data entry. The activity of putting data into the computer for processing can be activated by instructing the computer to read data from a written printed document or it can occur by keying data directly into the system. The designs of input focusing on controlling the amount of input required controlling the errors, avoid delay extra steps, and keeping the process simple. The design decisions for handling input specify how data are accepted for computer processing. Analyst decides whether the data are enters directly or by using source documents. The quality of the system describes the manner in which the data enter the system for processing. It ensures the reliability of the system and produce result for accurate data. Perspective guide the design of the input focus on  Effectiveness  Accuracy  Ease of use  Consistency
  • 16. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 16  Simplicity  Attractiveness The nature of the input design is determined partially during logical system design. However the nature of the input is made more explicitly during the physical design. The impact of inputs of the system is also determined. The proposed system satisfies the following input design objectives.  A cost effective method of input.  The highest possible level of accuracy.  Input is acceptable to and understood by the user. 3.3 DATA BASE DESIGN Like other software engineering activities, data design (data architecting) creates a model of data and/or information that is represented in at a higher level of abstraction (the customer/user’s view of data). James Martin defines database as “A collection of data designed to be used by different programs”. It can also be defined as a collection of interrelated data stored together with controlled redundancy to serve one or more application in an optional fashion. A database is a collection of interrelated data stored with minimum redundancy to serve users more quickly and efficiently. The general theme behind a database is to handle information as an integrated whole. The general objective of a database is to make information access easy, quick, inexpensive, integrated and shared by different applications users. Applications or users can access data through the Data Base Management System (DBMS). The data is stored so that they are independent of the programs that use them. A controlled common approach is used in inserting new data, modifying and retrieving existing data within the database. The data within software that allows one or more person to use and/or modify this data is termed as Data Base Management System (DBMS).
  • 17. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 17 A good database design does the following:  Provide minimum search time when locating specific records.  Stored data in the most efficient manner possible to keep the database from growing too large.  Makes data update as easy as possible.  Is flexible enough to allow inclusion of new functions required of the programs. 3.3.1 Normalization The process of refining the data model and creating with a database is called normalization. Database designers can implement several levels of normalization. Each level builds on previous levels by reducing the amount of redundancy between tables. This typically increases performance and avoids problems with data consistency. Advantages of normalization are  Help in reduction in the complexity of maintaining data integrity by removing the redundant data.  It reduces inconsistency of data.  Eliminate the repeating fields. 1. First normal form First normal form is the most basic level of the database normalization. The keys to creating tables in the 1NF:  Eliminate repeating groups in individual tables.  Create a separate table for each set of related data.  Identify each set of related data with a primary key.
  • 18. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 18 2. Second normal form The first normal form is not a good database design, but it is a start. The keys to creating tables in the 2NF  Create separate tables for sets of values that apply to multiple records.  Relate these tables with a foregin key. 3. Third normal form The third normal form is typically the last form that most database designers will normalize to. After 3NF, the number of relationships between tables becomes very large, and performance begins to decrease on the database server. The goal of the third normal form is to remove all data that does not depend on the primary key of a table. TABLES 1. Application_master Description: details of the application Primary key: applicationid Foreign key:jobid Colum name Data type Constrain Description applicationid Int(11) Primary key Application id of the applicant Jobseekerid Int(11) Foreign key jobseekid Jobid Int(11) Foreign key jobid Status Varchar(30) Not null status Description Varchar(200) Not null description
  • 19. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 19 2. Employer_reg Description: details of employer Primary key: employer id Colum name Data type Constrain Description Employer id Int(11) Primery key Employer id of the employer Company name Varchar(20) Not null Name of the company Contact person Varchar(20) Not null Contact person Address Varchar(100) Not null Address of the employer City Varchar(20) Not null City of the employer Email Varchar(40) Not null Email of the employer Mobile number bigint(20) Not null Mobile number of the employer Area work Varchar(40) Not null Area work Status Varchar(10) Not null status User name Varchar(10) Not null User name of the employer Password Varchar(20) Not null Pass word of the employer Question Varchar(100) Not null
  • 20. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 20 3.Feedback Description: Feedback of the company Foreign key:Jobseekerid Colum name Data type Constrain Description Feedbackid Int(11) Not null Id of the employer Jobseekid Int(11) Not null Feedback Varchar(200) Not null Feedbackdate date Not null 4.Jobseeker-Education Description: jobseeker-Education Primary key: Eduld Foreign key: Jobseekid Colum name Data type Constrain Description Eduld Int(11) Primery key Eduid of the jobseeker Jobseekid Int(11) Foreign key Id of the jobseeker Degree Varchar(20) Not null Degree of the jobseeker University Varchar(100) Not null university Passing year Mediumint(9) Not null Passing year Percentage Float Not null percentage
  • 21. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 21 5.Job_Master Description: details of the job master Primary key: Jobid Colum name Data type Constrain Description Jobid Int(11) Primery key id Company name Varchar(20) Not null Company name Job title Varchar(50) Not null Job title Vacancy Int(11) Not null vacancy Minqualification Varchar(50) Not null Minqualification Description Varchar(200) Not null Description 6.New_Master Description : news master Primary key :Newsid Colum name Data type Constrain Description Newsid Int(11) Primary key Newsid News Varchar(200) Not null News News date date Not null News date
  • 22. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 22 7.Jobseeker_Reg Description: Registration of jobseeker Primary key :Jobseekerid Colum name Data type Constrain Description Jobseekerid Int(11) Primary key Id of the employer Jobseeker name Varchar(20) Not null Jobseeker name mobile Bigint(20) Not null Contact person Address Varchar(100) Not null Address City Varchar(20) Not null City Email Varchar(40) Not null Email Resume Varchar(40) Not null Resume of the jobseeker Status Varchar(10) Not null Status User name Varchar(20) Not null Name of the user Password Varchar(20) Not null Password Question Varchar(100) Not null Question Answer Varchar(50) Not null Answer Qualification Varchar(10) Not null Qualification Gender Varchar(6) Not null Gender Birthdate Date Not null Birth date of the jobseeker 8.User_Master Description: user master Primary key : Userid Colum name Data type Constrain Description Userid Int(11) Primary key Id of the user Usernames Varchar(20) Not null Name of the user Password Varchar(20) Not null Password of the user
  • 23. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 23 9.Walkin_Master Description:walkin-master Primary key : Walkintid Colum name Data type Constrain Description Walkintid Int(11) Primary key Walkintid Company name Varchar(20) Not null Company name Job title Varchar(50) Not null Job title Vacancy Int(11) Not null Vacancy Min qualification Varchar(50) Not null Min qualification Description Varchar(100) Not null Description Interview date date Not null Interview date Interview time time Not null Interview time
  • 24. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 24 3.4 DATA FLOW DIAGRAM Analysis model helps us to understand the relationship between different components in the system design. Analysis model shows the user clearly how a system will function. This is the first technical representation of a system. The analysis modeling must achieve three primary objectives:  To establish a basis for creation of software design.  To describe what the user requires.  To define set of requirements that can be validated once the software is built. A dataflow diagram is a graphical technique that depicts information and transforms that are applied as data move from input to output. The DFD is used to represent increasing information flow and functional details. A level-0 DFD is also called a fundamental system model represents the entire software elements as a single bible with input and output indicated by incoming and outgoing arrows respectively. Additional process and information flow parts are represented in the next level, i.e., level 1 DFD. Each of the process represented at level 1 are sub functions of overall system depicted in the context model. Any processes that are complex in level 1 level will be further represented into sub functions in the next level, i.e., level 2. Data flow diagrams is a means of representing a system at any level of detail with a graphic network of symbols showing data flows, data stores, data process and data stores. The purpose of data flow diagram is to provide a semantic bridge between users and system developers. The diagram is graphical, eliminating thousands of words, logical representations, modeling what system does; hierarchical, showing systems at any level of details; and jargon less, allowing user understanding and reviewing.The goal of data flow diagramming is to have a commonly understood model of a system. The diagram is the basis of the structural analysis. Data flow diagrams are supported by other techniques of structured system analysis data structured diagram, data dictionaries and procedure representing techniques such as decision tables, decision tree and structured English.
  • 25. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 25 Components of Data Flow Diagram There are only four symbols that are used in the drawing of data flow diagrams. These are explained below together with the rules that apply to them.  External Entities External entities represent the sources of data that enter the system or the recipients of data that leave the system. They can be duplicated, one or more times on the diagram to avoid line crossing.  Process Processes represent activities in which data is manipulated by being stored or retrieved or transformed in some way. A circle represents it. The process will show the data transformation or change. Data coming into a process must be “worked-on” or transformed in some way. Thus all process my have an input and output.  Data Stores Data stores represent stores of data within the system. Data stores may be long-term files such as sales ledgers, or may be short-term accumulations: For example batches of documents that are waiting to be processed. Each data store should be given a reference followed by an arbitrary number.  Data Flow A data flow shows the flow of information from its source to its destination. A line represents a data flow, with arrowheads showing the direction of flow. Information
  • 26. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 26 always flows to or from a process and may be written, verbal or electronic. Each data flow may be referenced by the processes or data stores at its head and tail, or by a description of its contents. CONTEXT DIAGRAM ( Level 0) Job Recruitment Admin Employer Jobseeker Admin Employer Jobseeker Response Response Response Request Request Request
  • 27. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 27
  • 28. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 28 Level 1 of Admin
  • 29. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 29 Level 1 of Employer
  • 30. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 30 Level 2 of employer : Manage Walking
  • 31. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 31 Level 1 of JobSeeker
  • 32. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 32 3.5 SYSTEM FLOW CHART
  • 33. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 33
  • 34. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 34 3.6 STRUCTURE CHART Online Job Recruitment Admin Employer Job seeker Employer Approval Job seeker Approval Update News Job Approval View Employer View jobseeker View Profile Insert Job Update Interview details Update Job Delete interview dates View Job seeker’s Application View Job seeker’s profile pr View Profile Post feedback Search New Interviews Search New Jobs
  • 35. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 35 4. SYSTEM CODING The coding is the process that transforms design into a programming language. It translates a detailed design representation of software into a programming language realization. The translation process continues when a compiler aspects code as input and produces machine depended object code as input. Quality of source code can be improved by the users structure coding techniques: good coding style and readable, consistent code format. During coding, some coding standards are to be followed. this has two purposes: reducing the chance of making it easier for sometimes to modify the code later on. Coding phase affects both testing and maintains profoundly. Sample code: <?php # FileName="Connection_php_mysql.htm" # Type="MYSQL" # HTTP="true" $hostname_job = "localhost"; $database_job = "job"; $username_job = "root"; $password_job = "mysql"; $job=mysql_pconnect($hostname_job,$username_job,$password_job)or trigger_error(mysql_error(),E_USER_ERROR); ?>
  • 36. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 36 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <title>Untitled Document</title> </head> <body> <?php session_start(); $UserName=$_POST['txtUser']; $Password=$_POST['txtPass']; $UserType=$_POST['cmbUser']; if($UserType=="Administrator") { $con = mysql_connect("localhost","root","mysql"); mysql_select_db("job", $con); $sql = "select * from user_master where UserName='".$UserName."' and Password='".$Password."'"; $result = mysql_query($sql,$con); $records = mysql_num_rows($result);
  • 37. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 37 $row = mysql_fetch_array($result); if ($records==0) { echo '<script type="text/javascript">alert("Wrong UserName or Password");window.location='index.php';</script>'; } else { header("location:Admin/index.php"); } mysql_close($con); } else if($UserType=="JobSeeker") { $con = mysql_connect("localhost","root","mysql"); mysql_select_db("job", $con); $sql = "select * from jobseeker_reg where UserName='".$UserName."' and Password='".$Password."' and Status='Confirm'"; $result = mysql_query($sql,$con); $records = mysql_num_rows($result); $row = mysql_fetch_array($result); if ($records==0)
  • 38. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 38 { echo '<script type="text/javascript">alert("Wrong UserName or Password");window.location='index.php';</script>'; } else { $_SESSION['ID']=$row['JobSeekId']; $_SESSION['Name']=$row['JobSeekerName']; header("location:JobSeeker/index.php"); } mysql_close($con); } else { $con = mysql_connect("localhost","root","mysql"); mysql_select_db("job", $con); $sql = "select * from employer_reg where UserName='".$UserName."' and Password='".$Password."' and Status='Confirm'"; $result = mysql_query($sql,$con); $records = mysql_num_rows($result); $row = mysql_fetch_array($result); if ($records==0)
  • 39. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 39 { echo '<script type="text/javascript">alert("Wrong UserName or Password");window.location='index.php';</script>'; } else { $_SESSION['ID']=$row['EmployerId']; $_SESSION['Name']=$row['CompanyName']; header("location:Employer/index.php"); } mysql_close($con); } ?> </body> </html> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
  • 40. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 40 <title>Untitled Document</title> </head> <body> <?php $Id = $_GET['EmpId']; // Establish Connection with MYSQL $con = mysql_connect("localhost","root","mysql"); // Select Database mysql_select_db("job", $con); // Specify the query to Update Record $sql = "Update Employer_Reg set Status='Confirm' where EmployerId=".$Id.""; // Execute query mysql_query($sql,$con); // Close The Connection mysql_close($con); echo '<script type="text/javascript">alert("Employer Request Confirmed");window.location='ManageEmployer.php';</script>'; ?> </body> </html>
  • 41. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 41 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <title>Untitled Document</title> </head> <body> <?php if(!isset($_SESSION)) { session_start(); } $Degree=$_POST['cmbQual']; $Uni=$_POST['txtBoard']; $Passing=$_POST['cmbYear']; $Per=$_POST['txtPer']; $Id=$_SESSION['ID']; if($Degree=="Other") { $Degree=$_POST['txtOther'];
  • 42. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 42 } // Establish Connection with MYSQL $con = mysql_connect ("localhost","root","mysql"); // Select Database mysql_select_db("job", $con); // Specify the query to Insert Record $sql = "insert into JobSeeker_Education(JobSeekId,Degree,University,PassingYear,Percentage) values('".$Id."','".$Degree."','".$Uni."','".$Passing."','".$Per."')"; // execute query mysql_query ($sql,$con); // Close The Connection mysql_close ($con); echo '<script type="text/javascript">alert("Profile Created Succesfully");window.location='Education.php';</script>'; ?> </body> </html> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
  • 43. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 43 <head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <title>Untitled Document</title> </head> <body> <?php $Id=$_GET['JobId']; // Establish Connection with MYSQL $con = mysql_connect ("localhost","root","mysql"); // Select Database mysql_select_db("job", $con); // Specify the query to Insert Record $sql = "delete from Job_Master where JobId='".$Id."'"; // execute query mysql_query ($sql,$con); // Close The Connection mysql_close ($con); echo '<script type="text/javascript">alert("Job Deleted Succesfully");window.location='ManageJob.php';</script>'; ?> </body> </html>
  • 44. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 44 5. SYSTEM TESTING Testing is the last stage of the software development before we release the product to the customer. Software testing is a critical element of software quality assurance and represents the ultimate review of specification, design and coding. Software testing can be looked upon as one among the many processes. Testing is the process of executing a program with the explicit intention of finding errors. Testing cannot show the absence of defects, it can only show that software defects are present. Software Testing Techniques The importance of testing and its impact on software cannot be underestimated. The greater visibility of software systems and the cost associated with the software failure are motivating factors for planning through testing. It is not uncommon for a software organization to spent 40% of its effort on testing. A number of rules that act as Testing Objectives are:  Testing is a process of executing a program with the aim of finding errors.  A good test case will have a good chance to find an undiscovered error.  A successful test case uncovers a new error. Need For Testing Testing is essential as  Existence of program defects of inadequacies is inferred.  Test the performance of the system.  Verifies whether the software behaves as intended by its designer.  Checks conformance with requirement specification/user needs.  Assesses the operational reliability of the system.  Reflects the frequency of actual user input.
  • 45. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 45 Unit Testing The first level testing is unit testing. Unit testing concentrates on each unit of the software as implemented in source code. Initially tests focus on each module individually, ensuring that it functions properly as a unit. The modules must then be assembled or integrated to form the complete software package. There are tests that occur as part of unit testing. The module interfaces are tested to ensure that information properly flows into and out of a program under test. The data structures are also tested for integrity. Boundary conditions are tested to ensure that the module operates properly at boundaries established to limit or restrict processing. All independent paths through the control structures are exercised to ensure that all statements in a module have been executed at least once. Finally all error handling paths are tested. In this project, after coding each module have been individually tested to determine whether they are coded correctly so that they satisfy the requirements in the specifications and execute effectively as individual units was tested and run individually. All unnecessary coding were removed and it was ensured that all modules worked, as programmer would expect. Logical errors found were corrected. So, by working all the modules independently and verifying the output of each module in the presence of staff concluded that the program was functioning as expected. Integration Testing The next level of the testing is often called as Integration testing in which many tested modules are combined into sub-system, which are then tested. The output from the unit testing becomes the input to the integration testing. The goal here is to see if the modules can be integrated properly, the emphasis being on testing interfaces between modules. Modules in this software are combined and tested after the unit testing. After connecting all the sub modules into whole module, the connections between the modules are correctly established. The back end and front end are working as a whole module and the data entered in the front end once submitted were successfully entered into the database.
  • 46. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 46 On request the data was successfully retrieved. After performing the integration testing, the next steps should be the output testing of the developed system, because no system could be useful if it does not produce the required output in a specific format. The output generated by the developed system should be compared with the format required by the user. The format can be presented by using the screen or in the printed form. According to this project, using integrated test plans prepared in the design phase of system developed as a guide, the integration test was carried out. All the errors found in the system were corrected for the next testing steps. In the project, ‘Home Anywhere’ individually tested sections are integrated to form a single module and test whether the output is still maintained after integrating. Validation Testing In validation testing the requirements established as part of software requirement analysis are validated against the software that has been constructed. Validation testing provides the final assurance that software meets all functional, behavioral and performance requirements. After the project was made from all the logical and interface errors, the project is input with dummy data to ensure that the software developed satisfied all the requirements of the user. In this project, validation testing is done with all the forms. All forms were validated completely. In case of email ids, entered according to the format and chunk size should contain only numeric values. The validation checking also includes boundary checking for various fields. System Testing System testing is actually a series of different tests whose primary purpose is to fully exercise the computer- based system. Although each test has different purpose, all work to verify that system elements have been properly integrated and perform allocated functions.
  • 47. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 47 User Acceptance Testing User acceptance testing of a system is a key factor for the success of any system. The System under consideration is tested for user acceptance by constantly keeping in touch with the prospective system users at time of developing and making changes whenever required. Test results emphasize how the actual results differ from the expected results. This suggests the need for re-testing, and to discover the source of differences. The test phase of systems development process involves defining the criteria by which the system will be tested and measuring the criteria against the acceptance failure rate. Errors detected during the development are corrected and re-tested. Each input, output and process are tested to verify that it performs as specified in design. The test data included illegal as well as out of range of data .It is found that the system is able to handle all the possibilities. The units in the system are re-compiled and errors found are corrected as indicated by the compiler. The tests are repeated until all known errors are eliminated and the program matched the design specifications. Separate tests are performed to ensure that program units are properly interfaced with each other to form a complete system.
  • 48. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 48 6. SYSTEM IMPLEMENTATION Implementation is the process in which the working product is installed at the client site and configured and customized to its operational environment. Implementation is less creative than software design, but it may tend to be the source of new bugs if procedures aren’t followed strictly. Utmost patience and very good technical are a must for the Application Developer. Implementation procedure normally begins with preparing the target machine/s. The risk of crashes and failures can be reduced to the bare minimum if the correct system configurations are strictly enforced. Implementation stages involves following tasks:  Careful planning.  Investigation of system and constraints.  Design of methods to achieve the changeover  Evaluation of changeover method.  Training of the staff in changeover phase. The method of implementation and the time scale to be adopted are found out initially. Next the system is tested properly and the same time users are trained in new environment. Implementation Procedure: Implementation of software refers to the final installation of the package in its real environment, to the satisfaction of intended users and operation of the system. In the initial stage, the doubt about the software but have to ensure that the resistance does not built up, as one has to make sure that  Active user must be aware of benefits of using a new system  Their confidence in software is built-up  Proper guidance is imparted to the user so that he is comfortable in using that system  Periodical changes must be adapted in to the system to make customers always using the system
  • 49. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 49 7. SYSTEM MAINTANANCE Once the software is delivered and deployed, then maintenance phase starts. Software requires maintenance because there are some residual errors remaining in the system that must be removed as they discovered. Maintenance involves understanding the existing software (code and related documents), understanding the effect of change, making the changes, testing the new changes, and retesting the old parts that were not changed. The complexity of the maintenance task makes maintenance the most costly activity in the life of software product. It is believed that almost all software that is developed has residual errors, or bugs, in them. These errors need to be removed when discovered that leads to the software change. This is called Corrective Maintenance. Corrective maintenance means repairing, processing or performance failures or making alterations because of previously ill- defined problems. Software undergoes change frequently even without bugs because the software must be upgraded and enhanced to include more features and provide more services. This also requires modification of the software. The changed software changes the environment, which in turn requires further change. This phenomenon is called the “law of software evaluation”. Maintenance due to this phenomenon is called adaptive maintenance. Adaptive maintenance means changing the program function. Perfect maintenance means enhancing the performance or modifying the programs according to the user’s additional or changing needs. The keys to reduce the need for maintenance are:  More accurately defining the user’s requirement during system development.  Using Preparation of system documentation in a better way.  More effective ways for designing processing logic and communicating it to project team members.  Making better use of existing tools and techniques  Managing the system engineering process effectively
  • 50. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 50 . 8. SYSTEM SECURITY This software produces some security features. Before registering admin’s and staff’s details, they have to authenticate by providing the appropriate username and password. Securities are provided in the software so that the data remains confidential. Password facility is implemented to avoid unauthorized access. For providing more security they has to change their password with their wishes Applications only control the use of resources granted to them, and not which resources’ are granted to them. they ,in turn, determine the use of these resources by users of the application through application security. Security testing techniques scour for vulnerabilities or security holes in applications. these vulnerabilities leave applications open to exploitation. Ideally, security testing is implemented throughout the entire software development life cycle(SDLC) so thast vulnerabilities may be addressed in a timely and thorough manner. Unfortunately, testing is often conducted as an after thought at end of the development cycle. “ONLINE JOB RECRUITMENT” is secured by means of providing password protection for every type of users. It is also less vulnerable to external attacks by using php for its development non repudications are avoided by logging all activities of users.
  • 51. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 51 9. UPGRADABLEPOSSIBILITIES Software must be in such a way that it should adapt to changes easily. Our system is capable of meeting all future changes without much modification. The program is coded in more structured manner. So we can include more future enhancements. There is scope for improvement of this system. Apart from these, there is a scope for generating many more features. I believe that this application can be extended easily with out affecting the functioning. Up gradation is made possibly by means of  Increased reliability and integrity of data  User-friendly and flexible aspects  Data entry and updating is quite easy  Effective table manipulation as facilitated by the rich My SQL.  Good validation check  Reduce complexity in data entry.  Easy maintenance is providing  More user friendly designing  Attractive product searching and sorting option Some future enhancements to the current system are listed below.  Good product viewing capability  Very easy sorting of product  Live bidding options and advisement  More payment options  Sending alert to all type of users over SMS gateways  Very rich set of insights and report generations of admin  Product market values, as chart info for handcrafters  Mobhile application for quik access of store
  • 52. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 52 10.CONCLUSION The conventional system is time consuming and laborious. The online jobrecruitment helps the users to select the job and register to it..It also provide a facility for selecting appropriate field.It provides maximum security. The package is very much user friendly in nature. So here in this software we have tried our level best to over the difficulties faced by the existing manual system. This software reduces the labour work that was required before automating it. Developing this application has been a learning experience. We are able to explore PHP as much as possible. Since the project involved all the important features of PHP and its application it helped me to a great extent. There was a lot of positive feedback when the final testing of the project was over. This software is designed with the aim of providing fast, reliable and secure access to end users. On the whole it was an excellent experience and we feel satisfied at the end of the project. Of course, this is not all that is possible. There are several features that could be added and the application made better but we have really done maximum in the stipulated time and feel happy at the end of it.
  • 53. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 53 BIBLIOGRAPHY o Rajib Mall,Fundamentals of Software Engineerin.Third Edition,PHI Learning Private Limited 2009 o System Analysis and Design By Elias M Awad o Elmarsi,Navathe:Fundamentals of Database Systems,ThirdEdition,Pearson Education,2000 o Ramakrishnan,Gehre:Database Management Systems,Third Edition McGraw- Hill Higher Education,2003 o Pankaj Jalote An Integrated Approach to Software Enginering Home PVT LTD 2006 o Lee Purcell, Mary Jane Mara approach to the ABCs of Java Script o Paul Haine approach to HTML Mastery o Rasmus Lerdorf,Kevin Tatroe and Peter MacIntyre approaches to Programming PHP o Tim Converse and Joyce Park with Clark Morgan approach to PHP5 and My SQL WEBSITES  www.mysql.org  www.java.com/j2ee/index.html  www.java.com/jsp/index.html
  • 54. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 54 Appendix I: FORM LAYOUT Homepage
  • 55. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 55 Admin homepage Control panel
  • 56. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 56 Jobseeker’sHomepage JobseakerProcces
  • 57. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 57 Interview details Employer’sHomepage
  • 58. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 58 Employer,s Controlpanel
  • 59. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 59 Appendix II: MEETING MINUTES Group Members Anju S (320-12958007) Aswathy.S.P (320-12958009) Athira.U (320-12958012) Monija.M (320-12958024) Minutes Date : 22/02/2014 Time : 10am Location : Teena Computers, Anchal We decide to do a project named “ONLINE JOBPORTAL”. And we choose PHP language for doing the project. Language study and system study and analysis are done in between 22/02/2014to02/03/2014. Minutes Date : 02/03/2014 Time : 10am Location : Teena Computers Anchal We start form design and many forms are included in the project. So completed our form design on 09/03/2014. Minutes Date : 09/03/2014 Time : 10am Location : Teena Computers,Anchal
  • 60. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 60 Since the form design is over, we decided to do the table creation and design.PHP language is used for coding and for database design MY SQL is used. Also we complete data flow diagram neatly. Minutes Date : 24/03/2014 Time : 10:.30 aM Location : Teena Computers,Anchal About 80% of code design is completed, we started testing process. It can take a long time to complete the process. Minutes Date : 10/05/2014 Time : 10 AM Location :Teena Computers, Anchal Since the implementation and testing is completed, we started documentation preparation work.
  • 61. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 61 Appendix III GANTT CHART TASK START(DD/MM/YY) END(DD/MM/YY) System study and analysis 22/02/2014 02/03/2014 Form design 03/03/2014 08/03/2014 Database design 09/03/2014 23/03/2014 Coding 24/03/2014 10/052014 Testing 11/05/2014 15/05/2014 Documentation 09/03/2014 22/05/2014 Feb22 to Mar3 Mar3 to Mar 8 Mar9 to Mar23 Mar24 to May10 May11 to May15 May16 to May22 System Study and analysis And analysis System design Coding Testing Documentation
  • 62. Online job Recruitment B.sc Computer Science UIT ,Yerror 2012-2015 Page 62