SlideShare a Scribd company logo
Wasif & Saima

JoinPakForces
Final Project Presentation

JoinPakForces
Developed by

Wasif Altaf
Saima Altaf
University Institute of Information Technology,
PMAS Arid Agriculture University, Rawalpindi.
2009

Wasif & Saima

JoinPakForces
Presentation Agenda
•
•
•
•
•
•
•
•

Wasif & Saima

System Introduction
Problem Definition
Proposed Solution
System Architecture
Application UI
Interaction Analysis
Tools & Technologies
Questions & Answers

JoinPakForces
Introduction

Why “JoinPakForces” ?

Wasif & Saima

JoinPakForces
Problem Definition

• Manual
• Decentralized approach
– Frequency checking
– Record handling

Wasif & Saima

JoinPakForces
Proposed Solution

• “JoinPakForces” multipurpose
dynamic Website
• Centralized Approach

Wasif & Saima

JoinPakForces
System Architecture

System Design Modeling :
•
•
•
•
•
•
Wasif & Saima

Data Flow Diagram
E-R Diagram
Template Design
Three main Screen shots
Three test Cases
One Bug Report
JoinPakForces
Data Flow Diagram

Wasif & Saima

JoinPakForces
Data Flow Diagram

Wasif & Saima

JoinPakForces
Data Flow Diagram

Wasif & Saima

JoinPakForces
Data Flow Diagram

Wasif & Saima

JoinPakForces
Data Flow Diagram

Wasif & Saima

JoinPakForces
Data Flow Diagram

Wasif & Saima

JoinPakForces
Data Flow Diagram

Wasif & Saima

JoinPakForces
Entity Relationship Diagram

Wasif & Saima

JoinPakForces
Template Design

Wasif & Saima

JoinPakForces
Index Screen Shot

Wasif & Saima

JoinPakForces
Ad Notices Screen Shot

Wasif & Saima

JoinPakForces
Gallery Screen Shot

Wasif & Saima

JoinPakForces
Three Test Cases
Action
Performed

Action’s
Output

Valid Input

Invalid Input

Input

Required
Output

Output

Administrat
or’s Login

If the entered
login Id and
password are
valid, the user
proceeds
to
the next page

Valid login Id
and password,
according
to
length
constraints and
verification from
“admin” table

Invalid or empty
value for login Id
or password or
for both

Login Id or
password
left empty

Alert is shown,
to fill the text
boxes properly

Alert is shown,
to fill the text
boxes properly

No
differenc
e

User’s
Login

If the entered
NIC No. is
valid, the user
proceeds
to
next page

Valid NIC No.,
according
to
length
constraints and
verification from
“cand” table

Invalid or empty
value for NIC
No.

Alert is shown,
to fill the text
boxes properly

Alert is shown,
to fill the text
boxes properly

No
differenc
e

Validity of the
inputted data
is
checked
and
registration
process
moves ahead

Each of fields
should follow the
related
constraints

Any of the fields
may
not
be
following
the
related
constraints

Invalid
length NIC
No.
entered,
34203466489797
999779-5
Father’s
CNIC
No.
left empty

Candidate
should
be
alerted that he
has left father’s
NIC
related
text box empty,
and
field
should
be
focused

Candidate
is
alerted that he
has left father’s
NIC
related
text box empty,
and field is
focused also.

No
differenc
e

Submit
Step
Button
Pressed

1

Wasif & Saima

Analysis
Result

JoinPakForces
Bug Report
PROBLEM REPORT: BUG01
PROGRAM:
REPORT TYPE:
1.Coding issue
2.Design issue
3.Suggestion

Login Security Problem
2. Design Issue
4. Documentation
5. Hardware
6. Query

RELEASE: 1st
SEVERITY: Serious
1. Fatal
2.Serious
3. Minor

VER: 1.0
ATTACHMENTS: NO
If yes. Describe:
_________
_________

PROBLEM SUMMARY:
If user fills a login form and login’s successfully, and then presses
BACK button provided by Web Browser, his/her NIC number still remains there on the form ,viewable,
which is a serious security threat.
CAN YOU REPRODUCE THE PROBLEM? (Y/N)
PROBLEM AND HOW TO REPRODUCE IT:

Yes

When a user fills a login form and login’s successfully, and then
presses BACK button provided by Web Browser, his/her NIC number still remains there on the form
,viewable, which is a serious security threat. Any other person may be able to see the NIC No. of
candidate, which he/she should not.
SUGGESTED FIX:
PHP session may be used to uproot this problem. Complete fix deferred to
Teacher.
REPORTED BY:

Wasif & Saima

Wasif Altaf

DATE:

14/01/2009

JoinPakForces
Future Enhancements

• Security Upraising
• Communication Base
• Increase Interactivity

Wasif & Saima

JoinPakForces
Tools & Technologies

Client Side
HTML

Server Side
PHP

CSS
JavaScript
Other tools:

Adobe Dreamweaver CS4
Adobe Photoshop CS2
WAMP Server 2.0

Development Platform : Microsoft Windows XP
Wasif & Saima

JoinPakForces
Questions
&
Answers
Wasif & Saima

JoinPakForces
Thanks

Wasif & Saima

JoinPakForces

More Related Content

Viewers also liked

C++ Preprocessor Directives
C++ Preprocessor DirectivesC++ Preprocessor Directives
C++ Preprocessor Directives
Wasif Altaf
 
Implementation of c string functions
Implementation of c string functionsImplementation of c string functions
Implementation of c string functions
mohamed sikander
 
C string
C stringC string
C programming - String
C programming - StringC programming - String
C programming - String
Achyut Devkota
 
String in c
String in cString in c
String in c
Suneel Dogra
 
Strings Functions in C Programming
Strings Functions in C ProgrammingStrings Functions in C Programming
Strings Functions in C Programming
DevoAjit Gupta
 

Viewers also liked (8)

C++ Preprocessor Directives
C++ Preprocessor DirectivesC++ Preprocessor Directives
C++ Preprocessor Directives
 
Implementation of c string functions
Implementation of c string functionsImplementation of c string functions
Implementation of c string functions
 
Preprocessor
PreprocessorPreprocessor
Preprocessor
 
pre processor directives in C
pre processor directives in Cpre processor directives in C
pre processor directives in C
 
C string
C stringC string
C string
 
C programming - String
C programming - StringC programming - String
C programming - String
 
String in c
String in cString in c
String in c
 
Strings Functions in C Programming
Strings Functions in C ProgrammingStrings Functions in C Programming
Strings Functions in C Programming
 

Similar to Web Project Presentation - JoinPakForces

Is your SAP system vulnerable to cyber attacks?
Is your SAP system vulnerable to cyber attacks?Is your SAP system vulnerable to cyber attacks?
Is your SAP system vulnerable to cyber attacks?
Virtual Forge
 
Why Johnny Still Can’t Pentest: A Comparative Analysis of Open-source Black-b...
Why Johnny Still Can’t Pentest: A Comparative Analysis of Open-source Black-b...Why Johnny Still Can’t Pentest: A Comparative Analysis of Open-source Black-b...
Why Johnny Still Can’t Pentest: A Comparative Analysis of Open-source Black-b...
Rana Khalil
 
Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...
Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...
Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...
CA Technologies
 
DataOps, DevOps and the Developer: Treating Database Code Just Like App Code
DataOps, DevOps and the Developer: Treating Database Code Just Like App CodeDataOps, DevOps and the Developer: Treating Database Code Just Like App Code
DataOps, DevOps and the Developer: Treating Database Code Just Like App Code
DevOps.com
 
From web interface to the database:Monitor all that matters
From web interface to the database:Monitor all that mattersFrom web interface to the database:Monitor all that matters
From web interface to the database:Monitor all that matters
ManageEngine, Zoho Corporation
 
The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring
Savvius, Inc
 
Why Johnny Still Can’t Pentest: A Comparative Analysis of Open-source Black-b...
Why Johnny Still Can’t Pentest: A Comparative Analysis of Open-source Black-b...Why Johnny Still Can’t Pentest: A Comparative Analysis of Open-source Black-b...
Why Johnny Still Can’t Pentest: A Comparative Analysis of Open-source Black-b...
Rana Khalil
 
2015 02 24 lmtv baselining
2015 02 24 lmtv baselining2015 02 24 lmtv baselining
2015 02 24 lmtv baselining
Tony Fortunato
 
14.project online eamination system
14.project online eamination system14.project online eamination system
14.project online eamination systemVivek Mehta
 
Presentation 2315006 done
Presentation 2315006 donePresentation 2315006 done
Presentation 2315006 done
deepaktile
 
Webinar on Functional Safety Analysis using Model-based System Analysis
Webinar on Functional Safety Analysis using Model-based System AnalysisWebinar on Functional Safety Analysis using Model-based System Analysis
Webinar on Functional Safety Analysis using Model-based System Analysis
Deepak Shankar
 
Jenniffer
JennifferJenniffer
Jenniffer
Ben Laarhoven
 
EAS-SEC Project
EAS-SEC ProjectEAS-SEC Project
EAS-SEC ProjectERPScan
 
EAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applicationsEAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applications
ERPScan
 
QUES#19 Automation and Quality 2022.pdf
QUES#19 Automation and Quality 2022.pdfQUES#19 Automation and Quality 2022.pdf
QUES#19 Automation and Quality 2022.pdf
sonalsingh547884
 
DevOps: Find Solutions, Not More Defects
DevOps: Find Solutions, Not More DefectsDevOps: Find Solutions, Not More Defects
DevOps: Find Solutions, Not More Defects
TechWell
 
Root cause Analysis of Defects
Root cause Analysis of DefectsRoot cause Analysis of Defects
Root cause Analysis of Defects
David Gevorgyan
 
Continuous Performance Testing and Monitoring in Agile Development
Continuous Performance Testing and Monitoring in Agile DevelopmentContinuous Performance Testing and Monitoring in Agile Development
Continuous Performance Testing and Monitoring in Agile Development
Dynatrace
 
Issue tracking system
Issue tracking systemIssue tracking system
Issue tracking system
Akshay Surve
 

Similar to Web Project Presentation - JoinPakForces (20)

Is your SAP system vulnerable to cyber attacks?
Is your SAP system vulnerable to cyber attacks?Is your SAP system vulnerable to cyber attacks?
Is your SAP system vulnerable to cyber attacks?
 
Why Johnny Still Can’t Pentest: A Comparative Analysis of Open-source Black-b...
Why Johnny Still Can’t Pentest: A Comparative Analysis of Open-source Black-b...Why Johnny Still Can’t Pentest: A Comparative Analysis of Open-source Black-b...
Why Johnny Still Can’t Pentest: A Comparative Analysis of Open-source Black-b...
 
Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...
Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...
Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...
 
DataOps, DevOps and the Developer: Treating Database Code Just Like App Code
DataOps, DevOps and the Developer: Treating Database Code Just Like App CodeDataOps, DevOps and the Developer: Treating Database Code Just Like App Code
DataOps, DevOps and the Developer: Treating Database Code Just Like App Code
 
From web interface to the database:Monitor all that matters
From web interface to the database:Monitor all that mattersFrom web interface to the database:Monitor all that matters
From web interface to the database:Monitor all that matters
 
The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring
 
Why Johnny Still Can’t Pentest: A Comparative Analysis of Open-source Black-b...
Why Johnny Still Can’t Pentest: A Comparative Analysis of Open-source Black-b...Why Johnny Still Can’t Pentest: A Comparative Analysis of Open-source Black-b...
Why Johnny Still Can’t Pentest: A Comparative Analysis of Open-source Black-b...
 
2015 02 24 lmtv baselining
2015 02 24 lmtv baselining2015 02 24 lmtv baselining
2015 02 24 lmtv baselining
 
14.project online eamination system
14.project online eamination system14.project online eamination system
14.project online eamination system
 
Presentation 2315006 done
Presentation 2315006 donePresentation 2315006 done
Presentation 2315006 done
 
Webinar on Functional Safety Analysis using Model-based System Analysis
Webinar on Functional Safety Analysis using Model-based System AnalysisWebinar on Functional Safety Analysis using Model-based System Analysis
Webinar on Functional Safety Analysis using Model-based System Analysis
 
Jenniffer
JennifferJenniffer
Jenniffer
 
EAS-SEC Project
EAS-SEC ProjectEAS-SEC Project
EAS-SEC Project
 
EAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applicationsEAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applications
 
QUES#19 Automation and Quality 2022.pdf
QUES#19 Automation and Quality 2022.pdfQUES#19 Automation and Quality 2022.pdf
QUES#19 Automation and Quality 2022.pdf
 
DevOps: Find Solutions, Not More Defects
DevOps: Find Solutions, Not More DefectsDevOps: Find Solutions, Not More Defects
DevOps: Find Solutions, Not More Defects
 
Root cause Analysis of Defects
Root cause Analysis of DefectsRoot cause Analysis of Defects
Root cause Analysis of Defects
 
Continuous Performance Testing and Monitoring in Agile Development
Continuous Performance Testing and Monitoring in Agile DevelopmentContinuous Performance Testing and Monitoring in Agile Development
Continuous Performance Testing and Monitoring in Agile Development
 
Issue tracking system
Issue tracking systemIssue tracking system
Issue tracking system
 
IV&V Cox Overview
IV&V Cox OverviewIV&V Cox Overview
IV&V Cox Overview
 

More from Wasif Altaf

Security Issues in HTML 5
Security Issues in HTML 5Security Issues in HTML 5
Security Issues in HTML 5
Wasif Altaf
 
Java Web Services - Parts of Speech Tagger Web Service
Java Web Services - Parts of Speech Tagger Web ServiceJava Web Services - Parts of Speech Tagger Web Service
Java Web Services - Parts of Speech Tagger Web Service
Wasif Altaf
 
An Introduction to Image Processing and Artificial Intelligence
An Introduction to Image Processing and Artificial IntelligenceAn Introduction to Image Processing and Artificial Intelligence
An Introduction to Image Processing and Artificial Intelligence
Wasif Altaf
 
Software User Interface Design Ergonomics
Software User Interface Design ErgonomicsSoftware User Interface Design Ergonomics
Software User Interface Design Ergonomics
Wasif Altaf
 
A Review of Microsoft Windows Vista
A Review of Microsoft Windows VistaA Review of Microsoft Windows Vista
A Review of Microsoft Windows Vista
Wasif Altaf
 
Are Java Primitive Variables Objects?
Are Java Primitive Variables Objects?Are Java Primitive Variables Objects?
Are Java Primitive Variables Objects?
Wasif Altaf
 
Modern Logic - Introduction to Logic
Modern Logic - Introduction to LogicModern Logic - Introduction to Logic
Modern Logic - Introduction to Logic
Wasif Altaf
 
Introduction to Logic
Introduction to LogicIntroduction to Logic
Introduction to Logic
Wasif Altaf
 

More from Wasif Altaf (8)

Security Issues in HTML 5
Security Issues in HTML 5Security Issues in HTML 5
Security Issues in HTML 5
 
Java Web Services - Parts of Speech Tagger Web Service
Java Web Services - Parts of Speech Tagger Web ServiceJava Web Services - Parts of Speech Tagger Web Service
Java Web Services - Parts of Speech Tagger Web Service
 
An Introduction to Image Processing and Artificial Intelligence
An Introduction to Image Processing and Artificial IntelligenceAn Introduction to Image Processing and Artificial Intelligence
An Introduction to Image Processing and Artificial Intelligence
 
Software User Interface Design Ergonomics
Software User Interface Design ErgonomicsSoftware User Interface Design Ergonomics
Software User Interface Design Ergonomics
 
A Review of Microsoft Windows Vista
A Review of Microsoft Windows VistaA Review of Microsoft Windows Vista
A Review of Microsoft Windows Vista
 
Are Java Primitive Variables Objects?
Are Java Primitive Variables Objects?Are Java Primitive Variables Objects?
Are Java Primitive Variables Objects?
 
Modern Logic - Introduction to Logic
Modern Logic - Introduction to LogicModern Logic - Introduction to Logic
Modern Logic - Introduction to Logic
 
Introduction to Logic
Introduction to LogicIntroduction to Logic
Introduction to Logic
 

Recently uploaded

Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 

Recently uploaded (20)

Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 

Web Project Presentation - JoinPakForces

  • 2. Final Project Presentation JoinPakForces Developed by Wasif Altaf Saima Altaf University Institute of Information Technology, PMAS Arid Agriculture University, Rawalpindi. 2009 Wasif & Saima JoinPakForces
  • 3. Presentation Agenda • • • • • • • • Wasif & Saima System Introduction Problem Definition Proposed Solution System Architecture Application UI Interaction Analysis Tools & Technologies Questions & Answers JoinPakForces
  • 5. Problem Definition • Manual • Decentralized approach – Frequency checking – Record handling Wasif & Saima JoinPakForces
  • 6. Proposed Solution • “JoinPakForces” multipurpose dynamic Website • Centralized Approach Wasif & Saima JoinPakForces
  • 7. System Architecture System Design Modeling : • • • • • • Wasif & Saima Data Flow Diagram E-R Diagram Template Design Three main Screen shots Three test Cases One Bug Report JoinPakForces
  • 8. Data Flow Diagram Wasif & Saima JoinPakForces
  • 9. Data Flow Diagram Wasif & Saima JoinPakForces
  • 10. Data Flow Diagram Wasif & Saima JoinPakForces
  • 11. Data Flow Diagram Wasif & Saima JoinPakForces
  • 12. Data Flow Diagram Wasif & Saima JoinPakForces
  • 13. Data Flow Diagram Wasif & Saima JoinPakForces
  • 14. Data Flow Diagram Wasif & Saima JoinPakForces
  • 15. Entity Relationship Diagram Wasif & Saima JoinPakForces
  • 16. Template Design Wasif & Saima JoinPakForces
  • 17. Index Screen Shot Wasif & Saima JoinPakForces
  • 18. Ad Notices Screen Shot Wasif & Saima JoinPakForces
  • 19. Gallery Screen Shot Wasif & Saima JoinPakForces
  • 20. Three Test Cases Action Performed Action’s Output Valid Input Invalid Input Input Required Output Output Administrat or’s Login If the entered login Id and password are valid, the user proceeds to the next page Valid login Id and password, according to length constraints and verification from “admin” table Invalid or empty value for login Id or password or for both Login Id or password left empty Alert is shown, to fill the text boxes properly Alert is shown, to fill the text boxes properly No differenc e User’s Login If the entered NIC No. is valid, the user proceeds to next page Valid NIC No., according to length constraints and verification from “cand” table Invalid or empty value for NIC No. Alert is shown, to fill the text boxes properly Alert is shown, to fill the text boxes properly No differenc e Validity of the inputted data is checked and registration process moves ahead Each of fields should follow the related constraints Any of the fields may not be following the related constraints Invalid length NIC No. entered, 34203466489797 999779-5 Father’s CNIC No. left empty Candidate should be alerted that he has left father’s NIC related text box empty, and field should be focused Candidate is alerted that he has left father’s NIC related text box empty, and field is focused also. No differenc e Submit Step Button Pressed 1 Wasif & Saima Analysis Result JoinPakForces
  • 21. Bug Report PROBLEM REPORT: BUG01 PROGRAM: REPORT TYPE: 1.Coding issue 2.Design issue 3.Suggestion Login Security Problem 2. Design Issue 4. Documentation 5. Hardware 6. Query RELEASE: 1st SEVERITY: Serious 1. Fatal 2.Serious 3. Minor VER: 1.0 ATTACHMENTS: NO If yes. Describe: _________ _________ PROBLEM SUMMARY: If user fills a login form and login’s successfully, and then presses BACK button provided by Web Browser, his/her NIC number still remains there on the form ,viewable, which is a serious security threat. CAN YOU REPRODUCE THE PROBLEM? (Y/N) PROBLEM AND HOW TO REPRODUCE IT: Yes When a user fills a login form and login’s successfully, and then presses BACK button provided by Web Browser, his/her NIC number still remains there on the form ,viewable, which is a serious security threat. Any other person may be able to see the NIC No. of candidate, which he/she should not. SUGGESTED FIX: PHP session may be used to uproot this problem. Complete fix deferred to Teacher. REPORTED BY: Wasif & Saima Wasif Altaf DATE: 14/01/2009 JoinPakForces
  • 22. Future Enhancements • Security Upraising • Communication Base • Increase Interactivity Wasif & Saima JoinPakForces
  • 23. Tools & Technologies Client Side HTML Server Side PHP CSS JavaScript Other tools: Adobe Dreamweaver CS4 Adobe Photoshop CS2 WAMP Server 2.0 Development Platform : Microsoft Windows XP Wasif & Saima JoinPakForces