1. E-Tender System
J.G.College of Computer Application Page 1
A
System Development Project
On
E-Tender System
A
DISSERTATION SUBMITTED FOR
THE PARTIAL FULFILLMENT TOWARDS
Submitted By:
Patel Smit
2. E-Tender System
J.G.College of Computer Application Page 2
Part I Introduction
1. Preface
2. About organization
3. Project Profile
4. Tools & Platform
Part II System Analysis and Design
5 Analysis
5.1 Requirement Analysis
5.2 E-R Diagram
5.3 Data Flow Diagram (DFD)
6 Design
6.1 Data Dictionary
6.2 User Interface Design
Part III Testing & Quality Assurance
7 Unit Testing
8 Integrity Testing
Part IV Conclusion
9 Future Enhancement
10 Bibliography
Index
3. E-Tender System
J.G.College of Computer Application Page 3
Part 1
IInnttrroodduuccttiioonn
1. Preface
2. About organization
3. Project Profile
4. Tools & Platform
4. E-Tender System
J.G.College of Computer Application Page 4
PREFACE
It gives us great pleasure in placing in the hands of ower
esteemed Faculties this individual report which, We believe, will
go through the documentation of the project work done by us.
The objective of this report is to provide both a conceptual
understanding of the system as well as working guide.
Surely no other technology the Information Technology is
proven as the driving force of the Nation. I.T. not only decides
the present but also the future. The need for software
development today is a competence in a G.U.I based front-end
tool as far as the database programming is concerned.
In highly competitive world of today all the business have
to be alert and advance in order to survive in the market and for
this, company has to be on constant look out for changing
trends and technology in the market.
A typical scenario today involves an application consisting
of a visual front end for presenting data and reporting options to
the enterprise users, and a connection to a database for piping
data to controls such as text boxes, tables, and list boxes.
Moreover We have found DBMS/RDBMS to be the most
exciting environment to work with, especially when the G.U.I
Tool like Visual Basic .NET.
5. E-Tender System
J.G.College of Computer Application Page 5
About organization
Virtual Softech And InfoTech. Is established in
Ahmadabad. Virtual is a enable services company providing
most efficient and cost effective solution. Virtual Softech and
InfoTech. Brings together world-class resources and expertise to
help create valuable relationships between clients, their users
and their employees. It located in Ahmadabad One of the fastest
growing industrial cities in Western India with a population base
of 4.4 million.
Virtual Softech And InfoTech. will carry on business of
developing, analyzing, testing, improving, importing, modifying,
customizing, exporting, buying, selling, distributing,
transferring, altering and converting all kinds of scalable internet
architectures and performance measurements and each and
every kind of information management activities.
To work with leading edge technologies.
Providing internet marketing, online branding, data
entry etc.
To use our expertise to the benefit of our clients and
partners through an open, collaborative approach.
6. E-Tender System
J.G.College of Computer Application Page 6
PROJECT PROFILE
Project Title : E-Tender System.
Develop at/for : Virtual Softech & InfoTech.
Team members : Patel smit.
Front-End : Asp.Net 2005.
Back-End : SQL Server, JAVA script.
7. E-Tender System
J.G.College of Computer Application Page 7
A Salient Feature
The purpose of the E –Tender System is to provide the
interface between the Tender buyers and the sellers on the
internet. It is the online website to make an advertise about.
Commercial Tender
Government Tender
Global Tender
So this system is going to be used for making the advertise
about Tender You want to sale and if You want to purchase any
Tender then this website is the best resource to get the Tender
alerts and To find the Tender as per the requirements.
New System:
The new of the E – Tender system is to provide the
interface between the Tender buyers and the sellers on the
internet. It is the website to make an advertise about Tender and
this system will be more help full to get the better scope for
Tender advertisement.
So because of the Drawbacks of the current manual
system the company has decided to automate the current system
into the computer application as the Website.
8. E-Tender System
J.G.College of Computer Application Page 8
Saving the time:
Here as we know there is not the manual system. And so it
becomes more faster than the manual system and so there is
less amount of paper work. Because when a customer Request
for the Tender then there will be the online system in which a
user have to first of all go through the registration process. And
as soon as the user becomes the registered then he will be able
to advertise and buy the Tenders. So paper work doesn’t require.
And so process for Registration and the searching the property
becomes easy and fast. So the system helps to save the time at
the both Side. As well as for company and for customer also.
Human resources can be managed properly:
Here the system is Computer generated so the work
Becomes fast and most of the paper Work becomes half. As an
example there is no need of an employee for creating the reports.
And as the paper work requires more no. of the Employees to
handle the database and the information. And there is easy to
maintain database by computer system. And accuracy also can
be achieved by the automated System.
9. E-Tender System
J.G.College of Computer Application Page 9
Easy to manage the database:
Because of the automated system the employees are not
responsible for managing the data base manually and so
followings are the benefits of it.
Here data management accuracy can be maintained...
Data consistency can be maintained...
Data reports can be prepared properly...
Data updating can be managed properly...
Easy for accessing data:
Here also the data can be easily accessed. Because we
know that here the system is responsible to manage the data.
Management becomes easy. And the data can be fetched and
accessed as soon as the user request for particular information.
Because data are stored in the proper format. And also if
employee want to search for any record. Then the employee
would not have to go through each and every record
sequentially. So it is easy to manage and get the data easily.
Fast service:
And so because of not being Time consuming and being
Easy in managing the data and being easy in accessing the data
the service becomes very fast and comfortable. And because of
fast service it becomes to give the service to the large no. of the
customers. And results of the fast service become beneficial for
the organization as well as the Customer also. These are the
benefits of having the computer System.
10. E-Tender System
J.G.College of Computer Application Page 10
TOOLS & PLATFORM
Front End Tools
Front End tools support the development of graphical
method of system and process
Asp.net – Microsoft Visual Studio 2005
Adobe Photoshop 8.0
1 Introduction To ASP.NET :
ASP.net is more than the next version of Active server
pages (ASP); it is unified web development platform that provide
the services necessary for developers to build enterprise-class
based web Application. While Asp.net is largely syntax
compatible with ASP, it also provides the new programming
model and instruction for more secure, scalable and stable
application. You can feel free to augment your existing ASP
applications by incrementally adding ASP.NET functionality to
them.
ASP.NET is compiled, NET-based environment; you can
author application in any NET Compatible language, including
Visual Basic.Net, C# and Jscript NET. Additionally, the entire
NET Framework is available to any ASP.NET application.
Developers can easily access the benefits of these technologies,
Which include the managed common language runtime
environment, type safety, inheritance, and so on.
11. E-Tender System
J.G.College of Computer Application Page 11
ASP.NET has been designed to work seamlessly with HTML
editors and other programming tools, including Microsoft Visual
studio NET. Not only does this make web development easier,
but it also provides all the benefits that these tools have to offer,
including the GUI that developers can use to drop server
controls onto a web page and fully integrated debugging support.
Developers can use web forms or XML web services when
creating an ASP.NET application, or combine these in any way
they see fit. Each supported by the same infrastructure that
allow you to use authentication schemes, cache frequently use
data, or customize your application configuration to name only a
few possibilities
Web forms allow you to build powerful forms-based Web
pages. When building these pages, you can use ASP.NET server
control to create common UI elements, and program them for
common tasks. These controls allow you to rapidly build a Web
form out of reusable build-in or custom components, simplifying
the code of a page.
An XML Web services provides the means to access server
functionality remotely. Using XML Web services, businesses can
expose programmatic interface to their data or business logic,
which in turn can be obtained and manipulated by client and
server application XML Web services enable the exchange of data
in client-server or server-server scenarios, using standards like
12. E-Tender System
J.G.College of Computer Application Page 12
HTTP and XML Messaging to move data across firewalls. XML
Web services are not tied to a particular component technology
or object-calling convention. As a result, programs written in any
language using any component model, and running on any
operating system can access XML Web services.
Each of these models can take full advantage of all
ASP.NET features, as well as the power of the NET Framework
and NET Framework common language runtime. These features
and how you can use them are outlined as follow if you have ASP
development skills, the new ASP.NET programming model will
seem very familiar to you. However, the ASP.NET object model
has changed significantly from unfortunately, this means that
ASP.NET ids not fully backward compatible; almost all exciting
ASP pages will have to be modified to some extend in order to
run under ASP.NET
Accessing database from ASP.NET application is often use
technique for displaying data to Web site visitors. ASP.Net makes
it easier than ever to access database for this purpose it also
allows to manage the database from your code.
ASP.NET provides a simple model that enables Web developers
to write logic that runs at the application level. Developers can
write this code in the global Ajax text or in a compiled class
deployed as an assembly.
ASP.NET provides easy-to-use application and session-
state facilities that are familiar to ASP developers and are readily
compatible with all other.NET Framework APIs.
13. E-Tender System
J.G.College of Computer Application Page 13
The NET Framework and ASP.NET provide default
Authorization and authentication schemes for Web application.
You can easily remove, add to, or replace these schemes,
depending upon the needs of your application.
ASP.net configuration setting are stored in XML-based
which are human readable and writable. Each of your
application can have a distinct configuration file and you can
extend the configuration scheme to suit your requirements.
Application are said to be running side by side when they
are installed on the same computer but use different versions of
the NET Framework.
IIS 6.0 uses a new process model called worker process
isolation mode, which a different from the process model used in
previous versions of 11S ASPNET uses this process model by
default when running on windows server 2003.
14. E-Tender System
J.G.College of Computer Application Page 14
ELEMENTS OF ASP.NET WEB APPLICATION
Creating ASP.NET Web application involves working with
many of the same elements you use in any desktop of client-
server application. These include:
Project Management features
When creating an ASP.NET Web application, you need to
keep track of the files you need, which ones need to be compiled,
and which need to be deployed.
User Interface
Your application typically presents information to users, in
an ASP.NET Web application the user interface is presented in
Web forms pages, which send output to a browser. Optically, you
can create output tailored for mobile devices or other Web
application.
Components
Many applications include reusable elements container
code to perform specific tasks. In Web applications, you c,' create
these components as XML Web services, which make them
callable across the Web from a web application, another XML
Web services, or a Window Form, for Example.
15. E-Tender System
J.G.College of Computer Application Page 15
Data
Most applications require some form of data access.
ASP.NET Web application you can use ADO.NET, the data
services that are part of the NET Framework. Security,
performance, and other in structure feature.
As in any application, you must implement security
prevent unauthorized use, test and debug the application, tune
its performance, and perform other tasks not directly related to
the application function.
The following diagram provides an overview of how the
pieces of ASP.NET Web applications fit together and fit into the
broader context of the NET Framework of ASP.NET.
16. E-Tender System
J.G.College of Computer Application Page 16
2. Adobe Photoshop 8.0
Photoshop, or simply Photoshop, is a graphics editor
developed and published by Adobe Systems. It is the current
market leader for commercial bitmap and image manipulation,
and is the flagship product of Adobe Systems.
Photoshop can utilize the color models RGB, lab, CMYK,
grayscale, binary and bitmap. Photoshop has the ability to read
and write raster and vector image formats such as: .EPS, .PNG,
.GIF, .JPEG, Fireworks, etc.
17. E-Tender System
J.G.College of Computer Application Page 17
Back End Tools :
Back End tools support the development of Database of system
Microsoft Sql Server 2005
C#
1. Microsoft Sql Server 2005:
Advantages of SQL Server 2005
Because It Is built on the new SQL Server 2005 relational
database engine, SQL Server 2005 Express provides some
important advantages over MSDE, which is based on the older
SQL Server 2000 technology. In addition to the core database
engine enhancements that SQL Server 2005 Express inherits
from the SQL Server 2005 family, SQL Server 2005 Express has
been redesigned; some core database capabilities and
characteristics have changed.
Increased maximum database size
One of the most important advantages that SQL Server
2005 Express has over MSDE Is the increased database size.
MSDE is limited to a maximum database size of 2 GB. SQL
Server 2005 Express effectively doubles this by bumping up the
maximum database size to 4 GB. It's Important to note that the
18. E-Tender System
J.G.College of Computer Application Page 18
4-GB limitation Is per database not per instance. For example,
you can have multiple 4-GB databases on one SQL Server 2005
Express instance, all of which can be online simultaneously.
No workload governor
Another Important advantage that SQL Server 2005
Express has over MSDE is that it does not have the MSDE
workload governor. The MSDE query governor is a widely
misunderstood MSDE feature that was intended to limit the type
of workloads that MSDE could be used for. The MSDE query
governor throttles performance by stalling a user connection for
a few milliseconds each time the connection requests a read or
write operation on a database when there are more than eight
concurrent connections.
SQL Server 2005 Management Studio Express Edition
The graphical user Interface tools for SQL Server 2005
Express makes it easy for even novices to use the database
functionality in SQL Server 2005 Express. The new SQL Server
2005 Management Studio Express (SSMSE) Is available as a
separate Web download. It is also included In SQL Server 2005
Express Edition with Advanced Services and the SQL Server
2005 Express Edition Toolkit. SSMSE allows easy database
management and query analysis capabilities, and is
redistributable with SQL Server 2005 Express.
19. E-Tender System
J.G.College of Computer Application Page 19
However, that doesn't mean that you should replace all of
your Transact-SQL stored procedures with new CLR-based objects.
Transact-SQL Is stills the best choice for data-centric stored
procedures and functions.
By default, CLR support In SQL Server 2005 Express Is
turned off because not all applications require CLR support. To
enable CLR support in SQL Server 2005, you can use the SQL
Server 2005 Surface Area Configuration tool.
New data types
Another important advantage over MSDE that SQL Server
2005 Express inherits from SQL Server 2005 is support for the new
SQL Server 2005 data types. SQL Server 2005 has a new XML data
type as well as a new varbinary (max) data type. The new XML data
type provides support for typed and untyped XML documents. In
both cases, the SQL Server relational database engine ensures that
the data inserted into the XML data type is well-formed XML. In the
case of typed XML documents, SQL Server will only store the XML
data if it complies with the associated XSD (Extensible Schema
Definition).
Like the earlier image data type that is supported by SQL
Server 2000 and MSDE, the new varbinary (max) data type can
store up to 2 GB of data and is primarily intended to store large
binary objects like bitmaps, jpegs, and other large binary objects.
20. E-Tender System
J.G.College of Computer Application Page 20
However, unlike the older image data type where the application
needed to use an entirely different data access mechanism to read
and write the binary data, the new varbinary (max) data type
enables applications to access the data stored in the same way as
the other SQL Server data types.
User Instance support
Another Important advantage that SQL Server 2005 Express
has over MSDE is support for user instances. MSDE supports only
server Instances-it does not provide support for user Instances.
User Instances simplify the ability to deploy database applications
that are built on the NET Framework. A user instance is similar to a
normal server instance. However, user Instances are created on
demand unlike standard SQL Server instances, which are created
only during setup. The user does not need to be an administrator to
dynamically attach to the database. A user instance is created when
the User Instance keyword is used as a part of the Native SQL
Client connection string. In addition, the Attach DB Filename
keyword is used to specify the name and path of the SQL Server
mdf database file that is enabling the application to connect to the
target database. The following connection string illustrates using
the user Instance support in SQL Server 2005 Express. "Data
source=.SQLExpress; integrated security=true;
Attachdbfilename=|DataDirectory|mydb.mdf; user instance=true;"
The application connects to a user instance of SQL Server 2005
Express that is running as the user who opened the connection.
This is a feature only available in SQL Server 2005 Express.
21. E-Tender System
J.G.College of Computer Application Page 21
Reporting Services
Like MSDE, SQL Server 2005 Express does not possess
business intelligence (BI) features such as Analysis Services,
Integration Services, or data mining. However, SQL Server 2005
Express does provide support for Reporting Services. While the
Initial version of SQL Server 2005 Express did not include
support for Reporting Services, It is now available via separate
downloads. SQL Server 2005 Express Edition with Advanced
Services provides the Report Server. The SQL Server 2005
Express Toolkit provides the Business Intelligence Development
Studio.
SQL Server 2005 Express can act as a data source for
relational data that is on your local server for Reporting Services.
Plus, Reporting Services in SQL Server 2005 Express can render
reports in Excel, PDF, Image, Print, and DHTML formats. The
Report Manager utility In SQL Server 2005 Express manages
reports. Reporting Services reports used in SQL Server 2005
Express are completely compatible with the Reporting Services
In the other SQL Server 2005 editions.
SQL Service Broker
A new SQL Server 2005 development feature that is
supported by SQL Server 2005 Express and has no counterpart
in MSDE is support for the new SQL Server Service Broker. The
SQL Server 2005 Service Broker Is an application development
framework that supports the creation of asynchronous
Messaging applications.
22. E-Tender System
J.G.College of Computer Application Page 22
SQL Server 2005 Express can act as a Client to SQL Server
Service Broker applications running on the other editions of SQL
Server 2005. This is useful In scale-out scenarios where multiple
applications running on a distributed set of SQL Server 2005
Express systems all connect Into a central SQL Server 2005
system running one of the other editions of SQL Server 2005. It
should be noted that SQL Server 2005 Express also supports
Intra-instance SQL Server Service Broker messaging, which can
be used to replace some of the job scheduling functionality that
SQL Agent provides for MSDE and the other editions of SQL
Server 2005. You can find more information on using SQL Server
Service Broker to manage tasks at
http://wwwmicrosoft.com/technet/technetmag/issues/2005/05
/ServiceBroker/default.aspx on Microsoft TechNet.
Full-text search
Support for full-text search is another feature that wasn't
present in the initial release of SQL Server 2005 Express.
However, it is available in the SQL Server 2005 Express Edition
with Advanced Services download. As in the other editions of
SQL Server 2005, the full-text search feature of SQL Server 2005
Express allows fast and flexible indexing for keyword-based
queries of text data stored in a SQL Server database. Unlike the
LIKE predicate, which only works on character patterns, full text
search operates on words and phrases based on the rules of a
particular language. Full-text search indexes can be built on
23. E-Tender System
J.G.College of Computer Application Page 23
Columns using the char, varchar, marcher, varbinary (max) and
Image data types. However, one limitation of full-text search with
SQL Server 2005 Express is that it doesn't work in user
instances.
Enhanced security
Another important advantage that SQL Server 2005
Express has over MSDE is the enhanced security that Is built
into the product. SQL Server 2005 Express is installed securely
by default. Network connections are disabled. Likewise, support
for the CLR is turned off. You need to explicitly enable these
features in order to use them. In addition, like the other
members of the SQL Server 2005 product line, SQL Server 2005
Express has the ability to encrypt database data, thereby
ensuring that sensitive data can be accessed only by users who
have the appropriate permissions. SQL Server 2005 Express
supports both symmetric and asymmetric data encryption.
24. E-Tender System
J.G.College of Computer Application Page 24
2. C#
C# is an object-oriented programming language
developed by Microsoft as part of the .NET initiative and later
approved as a standard by ECMA (ECMA-334) and ISO (ISO/IEC
23270).
C# is the programming language that most directly
reflects the underlying Common Language Infrastructure (CLI).
Most of C#'s intrinsic types correspond to value-types
implemented by the CLI framework.
C# language specification does not state the code
generation requirements of the compiler: that is, it does not state
that a C# compiler must target a Common Language Runtime
(CLR), or generate Common Intermediate Language (CIL), or
generate any other specific format.
25. E-Tender System
J.G.College of Computer Application Page 25
HARDWARE AND SOFTWARE ENVIRONMENT
1. SOFTWARE REQUIREMENTS OF THE SYSTEM
Along with the hardware, used in the system it
requires software to make a system as well as to run a system
with the computer hardware. Collection of different types of
hardware into a specific type can form a computer but it can not
execute different process on its own. For efficient and proper
working of any system software must be installed. This
software’s may be in the form of operating system or application
software. To make the system one also needs to use software.
The software’s used in the proposed system are the latest
versions of them and can give up-to-date and perfect result of
every process in the system. This software comprises operating
system and application software used in the system.
Visual Studio 2005
Microsoft SQL Server2005
26. E-Tender System
J.G.College of Computer Application Page 26
2. HARDWARE REQUIREMENTS OF THE SYSTEM
This phase of the software development process deals
with a brief study of different hardware used in the computerized
system. There is a list of hardware materials used during the
making and also during the use of the proposed system. As the
new system to be made into a computerized functional system,
requirement of a computer is must. All the hardware needed
here are generally the basic configuration of a typical office
computer. A list of the hardware requirement used in the system
given below:
1. 2.80 GHz Pentium(R) D2processor or other compatible.
2. Intel 81x Chipset Motherboard.
3. 512 GB SD-RAM.
4. 160 GB-Hard-Disk.
5. 52x Compact Disc drive or faster.
6. Color Monitor. [1024 * 768 Display]
7. Keyboard.
8. Mouse.
27. E-Tender System
J.G.College of Computer Application Page 27
Part 2
SYSTEM ANALYSIS & DESIGN
5 Analysis
5.1 Requirement Analysis
5.2 E-R Diagram
5.3 Data Flow Diagram (DFD)
6 Design
6.1 Data Dictionary
6.2 User Interface Design
29. E-Tender System
J.G.College of Computer Application Page 29
Requirement Analysis
Analysis of system is the process of gathering facts, solution of
problem and to decide over all constitution of desired system. In
system analysis, we have to analyze all the process related
features, required functions, available sources and the time
which should be specified for the analysis stage.
System analysis's broad outline decides how the problems in
outside the world can be related to a computer. It is the
examination of the problem. It is concerned with identifying all
the constraints and influences. System analysis deals with data
collection and a detailed evaluation of present system. It portrays
logical modal of the system through Data Flow Diagram and
Data Dictionaries.
30. E-Tender System
J.G.College of Computer Application Page 30
ENTITY-RELATIONSHIP DIAGRAM
About E –R Diagram
The Entity Relationship Model Is a collation of basic
Objects, called entitles and relationship among these objects. An
Entity is a "thing" or "object" in the real world that is
distinguishable from other objects Entities are described in
database by a set of attributes. Relationship is association
among several entities. The overall logical structure of a
database can be expressed graphically by Entities Relationship
Diagram.
31. E-Tender System
J.G.College of Computer Application Page 31
Symbol for E – R Diagram
For Entities
For attributes
For Relation
For Direction
For ISA Relation
32. E-Tender System
J.G.College of Computer Application Page 32
User
IsA
Register
User
UPLoginID
UPName
UPID
Visitor
Free Register
User
Can
Subscrib
e
Can
Approve
orRejected
Or Quary
Gives
Can
Search
Can
Search
Feedback
FBIDUPID
Can
Replay
DA B C
FTID
Can
Search & Download
11
1
1
1
M
M
M
M
1
1
33. E-Tender System
J.G.College of Computer Application Page 33
TenderMast
A B C D
Can
upload
Addmin
ALoginIdAID
Data eatery
Operator
DName
DLoginId
DID
TenderID
TenderNo
OrgName
M
M
M
M
1
1
34. E-Tender System
J.G.College of Computer Application Page 34
DATA FLOW DIAGRAM
☼ General rules for drawing data flow diagram:
All data flows that appeared on the previous diagram
explaining the process are included in the lower level
diagram
New data flows and data stores are added if they are used
internally in the process to link processes introduced for
the first time in the explosion at this level.
Data flows and data stored that originate within the
process must be shown.
No entries should contradict the descriptions of the higher
level data flow diagram( and if they do one or the other is
either incorrect or incomplete and a change must be
introduced)
In general we should go as far as necessary to understand
the details of the system and the way it functions, taking
care to verify all aspects with knowledgeable users.
35. E-Tender System
J.G.College of Computer Application Page 35
☼ Guidelines for drawing DFD:
Explode Processes for more details :
In large systems a single process can be exploded many
times until an adequate amount of detail is described
for analysts to understand the process.
Maintain consistency between processes :
The inputs and outputs of the processes should match
at last. No one should be missing for consistency.
Allow Meaningful Leveling conventions :
Leveling refers to the handling of local files (Those that
are used within a process).The details that Pertain
only to a single process on a particular level should be
held within the process. Data stores and data flows
that are relevant only to the inside of a process are
concealed until that process is exploded into greater
detail.
Add Control on lower level diagrams only :
The logical data flow diagram developed to this Point
does not include control information. No mention has
been made of how to handle errors or exceptions, such
as processing incoming invoices that are incomplete.
The earlier stages did not include such exceptions as
unsigned invoices or invoices without authorized
36. E-Tender System
J.G.College of Computer Application Page 36
purchase orders. Yet these conditions are important in
correct invoice processing.
Assign meaningful Labels :
The descriptions assigned to data flows and processes
should tell the reader what is going on.
Data flow naming :
The names assigned to data flows should reflect the
data of interest to the analysts.
Process naming :
Use the proper action verb and an object to receive the
action is most appropriate. E.g.: Instead of ‘Inventory
control’ use ‘Adjust Quantity on hand’. Also avoid the
vague process names such as PROCESS, REVIEW,
ASSEMBLE, HANDLE, And ORGANIZE.
37. E-Tender System
J.G.College of Computer Application Page 37
Symbol for Dataflow Diagram:
Direction of data flow
Processes
Source or destination
Data Stores
38. E-Tender System
J.G.College of Computer Application Page 38
CONTEXT LEVEL DIAGRAM FOR TENDER SYSTEM
E – Tender
System
Visitor Data
Entry
Operator
Register
User
Administer
Request Accept / Rejected
Request for Free Trial
Or Registration
Search Tender
Notice in Detail
Get Tender Notice As
per Required / Search
Gets Alerts As per plan
Get feedback
Manage Query
Manage Accounts
Upload Tender
Give Error To The
Duplication Of Data
Search Tender
View Tender Notice
Free Register
User
View Free
Tender Notice &
Get Free Alerts
Search
Tender
Notice
In Detail
Replay for Feedback
Gives Feedback
Download Tender
39. E-Tender System
J.G.College of Computer Application Page 39
FIRST LEVEL DATA FLOW DIAGRAM FOR TENDER SYSTEM
1.0
2.0
Log-in
3.0
Utility
4.0
Data Entry
5.0
Management
6.0
Feedback
7.0
Registration
Search
Visitor
Register
User
Free
Register
User
Data Eatery
Operator
Administrator
Search Criteria
Search Result
Search Criteria
Search Result
Search Criteria
Search Result
Tender
Master
Gives Tender List
Login Id and Password
Give Message
Login Id and Password
Give Message
Give Message
Login Id and Password
Dataentry
Operator
Admin
Master User
Personal
Gives Data Entry
Operator
Info
User Id / Password
Give Admin Info
Gives Message
Input
Visitor detail
Free
Trial
User
Personal
Register
User Details
Free Register
User Details
Gives Feedback
Feedback
Feedback Details
Gives Feedback
Tender
Master
Tender
info
Upload
Tender
Update
Manage
Query
Give Account
Detail
User
Personal
Payment
master
Plan master
Manage feedback
Query
Master
Query Detail
Register user
Feedback
Update
profile
View
Profile /
Payment detail
Give Profile
Detail
Give Plan
Detail
update plan
Update
Profile
Gives
Payment Detail
Gives Detail Gives Detail
Give Query
Info
Give wrong
Entry Or Error
Message
Gives Detail
Gives Detail
Tender
Detail
40. E-Tender System
J.G.College of Computer Application Page 40
SECOND LEVEL DATA FLOW DIAGRAM FOR SEARCH
Quick Search
1.1
Registor User Or
Visitor
Search Tender Using
Date, Price etc By
Advance Search
Search Tender Using
Keyword
TenderMaster
Advance
Search
1.2
Tender List
1.3
TenderMaster
Generate Tender List
41. E-Tender System
J.G.College of Computer Application Page 41
SECOND LEVEL DIAGRAM FOR TENDER SYSTEM
4.1
Register User
Request view or
update utility
view utility
My
Profile
My
Feedback
My
Query
My
Payment
4.64.54.44.3
Update profile
Show profile
Gives Feedback Submit
Query
Show
Query
Show feedback
Show payment info
Query master Payment Master
User
Personal
changeProfile
ViewProfile
ViewQuery
SubmitQuery
GivesPayment
Detail
Feedback
Viewprevious
feedback
Storefeedback
Utility
Process
42. E-Tender System
J.G.College of Computer Application Page 42
SECOND LEVEL DIAGRAM FOR TENDER SYSTEM
Management
6.1
Administer
Manage account,
query
View query,
account Detail
ACCOUNT
6.3
6.2
Give Message
QueryMaster
Free trial
GiveInfo
FreeTrialuser
Detail
Manage Query
QueryInfo
QureyDetail
User
personal
UserAccount
Detail
Give account Detail
Request For Manage account
Query
GiveInfo
44. E-Tender System
J.G.College of Computer Application Page 44
DATA DICTIONARY
The data dictionary of any system is an integral component
of structure analysis, since data flow diagrams by themselves do
not fully describe the subject under investigation about the
system.
A data dictionary is a catalog – a repository – of the
elements in the system. These elements center on data and the
way they are structured to meet user requirements and
organization needs. This step of creating a data dictionary is
simultaneous with the process of making data flow diagram(s).
Here all the data fields in their respective tables are allotted so
as to access these data in the system. The data tables are
created in a back-end tool like Microsoft Access, Oracle, FoxPro,
etc…. Here in the Billing system for Book stall we using tables
created in Access as it are the back-end tool used in the system.
The data dictionary consists of different major elements like Data
Elements, Data Store [Tables Used], Data Flow, Processes and
other External entities used in the system. The data dictionary
stores details and description of these elements.
It is developed during data flow analysis and assists the
analysts involved in determining the system requirements.
Analysts use data dictionary for the following important reasons:
To manage the details in large system.
To communicate a common meaning for all system elements.
To document the features of the system.
45. E-Tender System
J.G.College of Computer Application Page 45
To facilitate analysis of the details in order to evaluate the
characteristics and determine where system changes should be
made. To locate errors and omissions in the system. The data
dictionary contains different types of descriptions for the data
flowing through the system.
Data Elements is the most fundamental level which is also
considered as the building block for all other data in the system.
It refers to all the different data used like fields, data item, etc. to
make the system fully functional irrespective to the table used in
the system. Here all the different type of fields used to make
table are written sequentially without referring to the tables. This
process helps in the process of Normalization of tables.
Next to Data Elements comes the Data Storage which
provides the information of where and how each data element is
stored in which table and it also give information of any
constraints if there. This step also gives knowledge of different
data types used for different field and their size. All the
normalized tables are showed in data storage.
Data Flow stage shows the flow of data in the system. This
step is can be already seen in the data flow diagrams above in
this document. This step refers to all the data flow paths were
transactions are done in the computerized system.
The data flow step also includes different processes used in
the system and it is followed by External Entities used in the
system.
46. E-Tender System
J.G.College of Computer Application Page 46
TABLE: - UserPersonal
DISCRIPTION: This table shows Register User detail
Field Data type CONSTRAINS Allow
Null
Description
UPID Int Primary Key No Auto Increment
UPName Varchar(100) No Name ofRegister
user
UPLoginID Varchar(50) Unique No Login ID.
Password Varchar(50) No Hash
Email Varchar(100) No Emailed of user
Alter _email Varchar(100) Yes AlterNet Emailed
of user
Address Varchar(250) No Address of user
Phone Varchar(30) Yes Phone No.
Fax Varchar(30) Yes Fax No.
Mobile Varchar(20) Yes Mobile No.
City Varchar(50) Forgin Key of
City Detail
No City Name
State Varchar(50) Forgin Key of
City Detail
No State Name
Country Varchar(50) Forgin Key of
City Detail
No Country Name
PlanID Int Forgin Key of
plan Masters
No Plan id of user.
Amount Numeric(7,2) No Amount of pay.
BankName Varchar(50) Yes Bank Name
Payment Mode Varchar(50) No Pay mode cash or
cheque.
dd_ck_no Varchar(50) No Dd or cheque no.
Registration
Date
Date Time No Date of
Registration
Activate Varchar(50) No User active or not
47. E-Tender System
J.G.College of Computer Application Page 47
Activation Date Date Time No User active date
Expiry Date Date Time No Expire Date
question Varchar(50) No Security Question
Answer Varchar(50) No Answer
PaymtId int Forging Key of
Payment Master
No Payment Id
TABLE: OrganizationMaster
DISCRIPTION: This table shows all organization detail.
TABLE: City Detail
DISCRIPTION: This table shows all city and id detail
Filed name Data Type Constrains Allow
Null
Description
OrgId Int Primary Key NO Organization id
OrgName Varchar(250) No Organization
name
CatgoryName Varchar(50) NO Category Name
Filed Data type CONSTRAINS Allow
Null
Description
Id int PrimaryKey No Auto Increment
City Varchar(100) No Name of City
State Varchar(100) No Name of State
Country Varchar(100) No Name of Country
Region Varchar(100) No Name of Region
48. E-Tender System
J.G.College of Computer Application Page 48
TABLE: QueryMaster
DISCRIPTION: This table shows all Query detail.
TABLE: PlanMaster
DISCRIPTION: This table shows all Plan detail
Filed name Data Type Constrains Allow Null Description
PlanID Int Primary Key NO Plan id
PlanName Varchar(50) NO Plan Name
Price Numeric(7,2) NO Plan amount
TABLE: LoginMaster
DISCRIPTION: This table giving information about user login and logout
Filed name Data Type Constrains Allow
Null
Description
Id Int Primary Key NO AutoIncrement
Filed name Data Type Constrains Allow
Null
Description
QueID Int PrimaryKey No Auto Increment
UPID Int Forgin Key of
UserPersonal
No User Personal Id
QueDetail Varchar(100) No Query Detail
QueDate DateTime No Query Date
Status varchar(50) No Query Status
49. E-Tender System
J.G.College of Computer Application Page 49
UPID Int Forgin Key of
UserPersonal
NO Id of user
personal
Password Varchar2(50) NO Password
TABLE: CategoryMaster
DISCRIPTION: This table giving information about and category
TABLE: TenderMaster
DISCRIPTION:This table giving Tender information
Filed name Data Type Constrains Allow
Null
Description
TenderId Int PrimaryKey NO Auto Increment
TenderNo Varchar(100) NO TenderNo
OrgName Varchar(250) NO Organize Name
Address Varchar(500) NO Address of
company
NoticeType Varchar(50) NO Auction,Tender
City Varchar(50) NO Name of City
State Varchar(50) NO Name of State
Country Varchar(50) NO Name of Country
Region Varchar(50) NO Name of Region
CatName Varchar(50) NO Category Name
TenderBrief Varchar(5000) NO Brief Detail of
Tender
TenderDetail Varchar(500) NO Short Detail of
Tender
TenderValue Float NO Price of Tender
DocFees Float Yes Document Fees
Filed name Data Type Constrains Allow Null Description
CategoryID Int PrimaryKey NO Auto Increment
CategoryName Varchar(50) No Road,water etc.
50. E-Tender System
J.G.College of Computer Application Page 50
EMD Float Yes Early Money
Deposite
OpeningDate DateTime NO Openig date
ClosingDate DateTime NO Closing date
InfoSource Varchar(50) NO Information source
Name
TABLE: Free Trial
DISCRIPTION: This table giving free trial user information
Filed name Data Type Constrains Allow Null Description
FTID Int PrimaryKey No Auto Increment
Name Varchar(100) No Name Of User
Address Varchar(100) No Address Detail
City Varchar(100) No Name of city
State Varchar(100) No Name of State
Country Varchar(500) No Name of Country
Phone nchar(15) Yes Phone No.
FaxNumber nchar(15) Yes Fax No.
Mobile Varchar(50) Yes Mobile No.
Email varchar(100) No EmailId of user
KeyWord Varchar(100) No Keyword ,which
get a alert.
ActivationDate datetime No Activation Date
ExpiryDate datetime No Expiry Date
Activate Varchar(50) No User active or
not.
TABLE: FeedBack
DISCRIPTION: this table giving user Feedback information
51. E-Tender System
J.G.College of Computer Application Page 51
TABLE: PaymentMaster
DISCRIPTION: This table giving user Pymt information
Filed name Data Type Constrains Allow
Null
Description
PaymtID Int PrimaryKey No Auto Increment
UPID Int Forgin Key
UserPersonal
No Id of user
Amount Numeric(7,2) No Amount of user Pay
DDno Varchar(20) Yes Demand Draft NO
BankName Varchar(50) Yes Name of Bank
Filed name Data Type Constrains Allow
Null
Description
FBID Int PrimaryKey No Auto Increment
UPID Int Forgin Key of
UserPersonal
No Id of user
FeedBackDetail Varchar(500) No Detail of feedback
FeedBackDate DateTime No Feed Back Date
52. E-Tender System
J.G.College of Computer Application Page 52
TABLE: Admin
DISCRIPTION:This table giving Admin information
TABLE: DataentryOperator
DISCRIPTION: This table shows data entry operator detail
Filed name Data Type Constrains Allow
Null
Description
AID Int Primary Key No Auto Increment
ALoginID Varchar(50) No Admin Login id
Password Varchar(50) No Password
AName Varchar(50) No Admin Name
Address Varchar(100) No Address
Phone Varchar(50) Yes Phone No.
Email Varchar(50) No Email Id of admin
Filed
name
Data Type Constrains Allow Null Description
DID Int PrimaryKey No Auto Increment id
DLoginID Varchar(50) No Operator Login Id
Password Varchar(50) No Operator Password
DName Varchar(50) No Operator Name
Address Varchar(100) No Operator Address
Phone Varchar(50) Yes Phone No.
53. E-Tender System
J.G.College of Computer Application Page 53
TABLE:InfoSourceMaster
DISCRIPTION: This table shows InformationSource detail
Email Varchar(50) No Email Id of Data
Entry Operator
Filed name Data Type Constrains Allow
Null
Description
InfosourceId Int PrimaryKey No Auto
Increment
Infosource Varchar(50) Contain Info
source where
tender Detail
get.
55. E-Tender System
J.G.College of Computer Application Page 55
Home Page
In Home Page, display a simple detail of the tender.
56. E-Tender System
J.G.College of Computer Application Page 56
User click different link to go other page of website.
User can also search tender using tender search.
Login Form
In Login Page, you must enter the user name & password.
57. E-Tender System
J.G.College of Computer Application Page 57
If user is not register, Click subscribe now link and fill Detail.
Advance Search Form
Advance search page, user can search more different Tender
59. E-Tender System
J.G.College of Computer Application Page 59
If user forgot his password, to get his password using forgot
password form.
Free Alert Form
60. E-Tender System
J.G.College of Computer Application Page 60
User get a free alert for15 Day of tender after register free alert
form.
Subscribe Now Form
61. E-Tender System
J.G.College of Computer Application Page 61
User can member of the website after his register with
subscribe now form.
About Us Form
About us form contains basic information of the website.
62. E-Tender System
J.G.College of Computer Application Page 62
Information Source Form
Information source page contain formation of news paper
were tender notices is give
63. E-Tender System
J.G.College of Computer Application Page 63
Privacy Policy Form
rivacy Policy page contain formation of policy notice of
website.
64. E-Tender System
J.G.College of Computer Application Page 64
Services Form
Services page contain payment detail of different plan.
65. E-Tender System
J.G.College of Computer Application Page 65
Support Form
Support page contain customer care support detail.
66. E-Tender System
J.G.College of Computer Application Page 66
Term of Usage Form
Term of usage page contain term and condition of use
website.
67. E-Tender System
J.G.College of Computer Application Page 67
Add With Us Form
Add with us page contain Detail of advertisement.
68. E-Tender System
J.G.College of Computer Application Page 68
Contact Us Form
Contacts us page contain contact detail of company.
69. E-Tender System
J.G.College of Computer Application Page 69
Register User Home Form
Register user home page contain full detail of tender.
70. E-Tender System
J.G.College of Computer Application Page 70
Register User Change Password Form
Using change password page user can change his password.
71. E-Tender System
J.G.College of Computer Application Page 71
Register User Profile Form
My profile page contains register user detail.
User also modifies his profile.
72. E-Tender System
J.G.College of Computer Application Page 72
Register User Query Form
My query page, user sends his query to customer care.
User can also see his previous query.
73. E-Tender System
J.G.College of Computer Application Page 73
Register User Plan Form
My Payment page, user see his payment.
User can also see his current plan.
74. E-Tender System
J.G.College of Computer Application Page 74
Register User Feedback Form
My Feedback form, user can send feedback.
User can also see his previous feedback.
76. E-Tender System
J.G.College of Computer Application Page 76
Admin Query Management Form
Query management page display query which send by user or
it is approve or not.
77. E-Tender System
J.G.College of Computer Application Page 77
Admin account Management Form
Account management page display Number of user which is
activate or not and also admin can activate the user.
78. E-Tender System
J.G.College of Computer Application Page 78
Data-Entry Login Form
In Data Entry Login Page, Data entry must enter the user
name & password.
If user is not register, Click subscribe now link and fill Detail.
79. E-Tender System
J.G.College of Computer Application Page 79
Data-Entry Form
Data Entry page, Data-Entry operator add, update and delete
tender detail.
80. E-Tender System
J.G.College of Computer Application Page 80
Data-Entry Category Form
In category page, Data-Entry operators add, update and
delete category of the tender.
81. E-Tender System
J.G.College of Computer Application Page 81
Data-Entry Add City Form
In New city page, Data-Entry operators add, update and
delete city detail.
82. E-Tender System
J.G.College of Computer Application Page 82
Data-Entry Information Source Form
In Information Source page, Data-Entry operators add,
update and delete information-source of the tender.
83. E-Tender System
J.G.College of Computer Application Page 83
Data-Entry Organization Form
In Organization page, Data-Entry operators add, update and
delete Organization.
84. E-Tender System
J.G.College of Computer Application Page 84
Part 3
Testing & Quality Assurance
7 Unit Testing
8 Integrity Testing
85. E-Tender System
J.G.College of Computer Application Page 85
IMPORTANCE OF TESTING
In today’s competitive business environment, companies
are intensely concerned with the quality of their products and
services. A successful organization constantly must improve
quality in every area, including its information systems. Top
management must provide the leadership, encouragement, and
support needed for high quality IT resources.
No matter how carefully a system is designed and
implemented, some problem can occur, especially in a complex
system. Rigorous testing catches errors in the final stages, but it
is much less expensive to correct mistakes earlier in the
development process. The main objective of quality assurance is
t avoid problems, or to detect them as soon as possible. Poor
quality can result from inaccurate requirements, design
problems, coding errors, faulty documentation, and ineffective
testing.
In an effort to achieve high standards of quality, software
systems developers should consider software engineering
concepts and internationally recognized quality standards.
Testing the application
After coding, a programmer must test the program to make
sure that it functions correctly. Later, programs are tested in
groups, and finally the programmer must test the entire system.
The first step is to compile the program using a CASE tool or a
language compiler. This process detects syntax errors, which are
86. E-Tender System
J.G.College of Computer Application Page 86
language programmer errors. The programmer corrects the
errors until the program executes properly.
Next, the programmer desk checks the program. Desk
checking is the process of reviewing the program code to spot
logic errors, which produce incorrect results. This process can be
performed by the person who wrote the program or by other
programmers. Many organizations require a more formal type of
desk checking called a structured walkthroughs, or code review.
Typically, a group of three to five IT staff members
participate in code review. The group usually consists of project
team members and might include other programmers and
analysts who did not work on the project. The objective is to
have a peer group identify errors, apply quality standards, and
verify that the program meets the requirements of the system
design specification. Errors found during a structured
walkthroughs are easier to fix while coding is still in the
developmental stages.
In addition to analyzing logic and program code, the project
team usually holds a session with users called a design
walkthrough, to review the interface with a cross-section of
people who will work with the new system. This is a continuation
of the modeling and prototyping effort that began early in the
systems development process.
The next step in application development is to initiate a
sequence of unit testing, integration testing, and system testing.
87. E-Tender System
J.G.College of Computer Application Page 87
UNIT TESTING
The testing of an individual program or module is called
unit testing. The objective is to identify and eliminate execution
errors that could cause program to terminate abnormally, and
logic errors that could have been missed during desk checking.
Test data should contain both correct data and erroneous
data and should test all possible situations that could occur.
For example, for a field that allows a range of numeric values,
the test data should contain minimum values, maximum values,
values outside the acceptable range, and alphanumeric
characters. During testing, programmers can use software tools
to determine the location and potential causes of program errors.
During unit testing, programmers must test programs that
interact with other programs and files individually, before they
are integrated system. This requires a technique called stub
testing. In stub testing, the programmer simulates each
programs outcome or result and displays a message to indicate
whether or not the program executed successfully. Each stub
represents and entry or exit point that will be linked later to
another program or data file.
88. E-Tender System
J.G.College of Computer Application Page 88
To obtain an independent analysis, someone other than the
programmer who wrote the program usually creates the test data
and reviews the results. Systems analysis frequently create
details products that specify how and when the testing will ne
performed, who will participate, and what test data will be used.
A comprehensive test plan should include scenarios for every
possible situation the program could encounter.
Regardless of who creates the test plan, the project
manager or a designated analyst also reviews the final test
results. Some organizations also require users to approve final
unit test results.
89. E-Tender System
J.G.College of Computer Application Page 89
INTEGRITY TESTING
Testing one or more programs that depend on each other is
called integration testing, or link testing.
For example, consider an information system with a
program that checks and validates customer credit status, and a
separate program that updates data in the customer master file.
The output from the validation program becomes input to the
master file update program. Testing the programs independently
does not guarantee that the data passed between them is
correct. Only by performing integration testing for this pair of
programs can you make sure that the programs work together
properly. Notice that a program can have membership in two or
more groups.
Systems analysts usually develop the data they use in
integration testing. As is the case with all forms of testing,
integration test data must consider both normal and unusual
situations.
For example, integration testing might include passing
typical records between two programs, followed by blank records,
to simulate an unusual event or an operational problem. You
should use test data that simulates actual conditions because
you are testing the interface that links the programs. A testing
sequence should not move to the integration test stage unless it
has performed properly in all unit tests.
91. E-Tender System
J.G.College of Computer Application Page 91
FUTURE ENHANCEMENT
Even though the project was completed to the original
requirements, there are a few features that we could add or
improve on, if time allowed. The file system implementation
should be revised. We could look at other DBMS file systems to
get a better idea on how to design a more efficient and space
conserving system.
Security is the most important feature of the system. In
this some security measures are taken to avoid the mishandling
of the database. So, we can add more powerful security to
system.
These are the some of the addition that We are fill that can
be added to the system.
Login Time Limitation.
Different Type of Reports is can be added.
Modules like Register User and Admin can be expanded
further.
92. E-Tender System
J.G.College of Computer Application Page 92
BIBLIOGRAPHY
Bibliography means that we have refer while doing project
like, which sites we gone through and which books we have
referred or which magazines we have seen to implements this
project. We are referring many books and websites that can help
us proper guild line to implements our system in the right
direction.
Reference Book
Unleashed ASP.NET 2.0
Addison-Wesley - C # Developer's Guide to ASP.NET
Wrox.Professional ASP.NET
Reference Website
www.google.com
www.cuil.com
www.codeguru.com
www.codeplex.com
www.asp.net