0% found this document useful (0 votes)
43 views

A Project Report: A Web Application On Job Portal

Uploaded by

Yash Sonar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views

A Project Report: A Web Application On Job Portal

Uploaded by

Yash Sonar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 44

A

PROJECT REPORT

ON

A Web Application on Job Portal

Submitted by

Sneha shivanad jadhav (roll no 18)

Tejaswini vijay mali (roll no 21)

Poonam harish sonar (roll no 48)

Under the guidance of

Prof.y.p.nemade

Department of computer

Shree gulabrao devkar collage of engineering, jalgaon

North Maharashtra University

2018-2019
STUDENT’S DECLARATION

I here by declare that the work presented in this project entitled “A Web
Application on Job Portal” submitted towards completion of project in Sixth Semester of
engineering , is an authentic record of our original work carried out under the guidance of
Prof.S.R.Borse

Students:-

Sneha shivanand jadhav 18

Tejaswini vijay mali 21

Poonam harish sonar 48

Semester: 6th

Place: jalgaon
Shree gulabrao devkar collage of engineering, jalgaon

Department of computer

Certificate

This is to certify the following group of students of third year has successfully completed

Their project on ”online job portal ” for the partial fulfillment of the third year In

computer engineering awarded by north Maharashtra university ,jalgaon during academic

year 2018-2019

Mr./Mrs. Guide Mr. H. . Agnihotri

Guide Head Of Department

Mr. Internal Examiner

Principle
ABSTRACT:

 Employee Sign-up: This section would be seen first whenever the candidate opens the
website. If a candidate has not been signed up, he would have to create account. Later
on, she/he can sign-in to his/her profile. In form, all personal details, educational
background, qualification, resumes, experience, expectation.

 Search job: In this section, the candidate search for jobs. There are 4 ways in which the
candidate can search.

First is “Jobs for you”. In it, the candidate can view all the jobs according to their profile. Those
jobs are showed here which fits and suites their education and qualities. Company names, details,
occupation all are shown. Link is also provided for further details.

Second is “Advance search”. In this, candidate requirement is given priority. So, the candidate
enters his needed salary, working hours, occupation, city, category and for other facilities. Then
candidate press the ‘see’ button to view all suitable jobs with details. At every particular job,
there is ‘save’ button provided by which, s/he can save her/his job in his ‘saved jobs’ section.
This helps employees who want to work in particular fixed city or hoping salary or occupation
appropriately.

Third is “search by company”. In this section, 2 textboxes are provided for entering company
name and location. Also a-z alphabets are located to find a company of an alphabet starting with.
Then ‘search’ button is provided. At that time, all the available jobs are shown in that company
which matches their profile. All company details are shown including the contact person. The
salary and other company facilities are also mentioned. There is also an option to find vacancies
in some government companies,

Forth is “search by category”. In it, different optional categories are shown i.e. Banking,
Accounting, Production, IT, Medical, Engineering, IPO/BPO sector, Networking etc. The
candidate would have to select the category and all the available jobs would be shown with
respect to their profile and expected category.
Acknowledgement

It is our great pleasure to acknowledge the contribution and assistance of a few


individuals to this effort. We acknowledge here our debt to those who have contributed
significantly to this project.

We are also indebted to our faculty member and internal guide Mrs S.R.Borse for motivating
us and fostering a feeling of belongingness towards our alma mater. Their helpful solutions and
comments enriched by their experience for the betterment of the project. We sincerely
acknowledge that without his support this project would not have been feasible.

Our thanks goes to all the faculty member of computer department and special thanks
goes to Mr. H.O.Agnihotri sir to allow this project to be done by us and provide useful guidance
of Mrs.S.R.Borse time to time.

Finally we would like to thank everyone who directly or indirectly helped us in the
project.

With thanks to all.


INDEX
1. INTRODUCTION
1.1 Project definition
1.2 Project overview/specification
1.3 Hardware specification
1.4 Software specification
1.4.1
1.4.2
2. LITERATURE SURVEY
2.1 Existing System
2.2 Proposed System
2.3 Feasibility Study
3. SESTEM ANALYSIS &DESIGN
3.1 Requirement Specification
3.2 flowchart / DFDs / EREs
3.3 Design and test Steps
3.4 Algorithm and Pseudo Code

4. TESTING PROCESS
5. RESULTS/OUTPUTS
6. CONCLUSIONS
7. REFEREANCES
Introduction
Project Summary:

Title : JOB-PORTAL SYSTEM

Definition : To manage the jobseeker and recruiter [employer]

Team Size : 3

Team Members : sneha shivanand jadhav

: tejaswini vijay mali

: poonam harish sonar

Software Requirements : Microsoft Visual Studio 2005, SQL Server.NET Framework 2.0

Development Platform : Microsoft Visual Studio 2008

Front-end-tool : ASP.NET

Back-end-tool : SQL Server

Office Automation Tools : Ms-word

Project Guide : Mrs.Y.P.Nemade


Defination
 We have developed the job-portal. This portal can handle data of Recruits (Several
Companies) who are looking for suitable candidates for their vacancies.

 This portal will be most useful for Consultants for searching of matching job with
jobseekers etc.

 The classic Functionality of this Application focuses on data storage. However, the
means to retrieve and analyze data, to extract, transform and load data, and to
manage the data dictionary.

 An administrator is provided through which can enter Recruiter’s record /type of


jobs/jobseeker’s description. A registration form is provided through which user can
enter details of company like location of company/type of job/status of
job/Qualification of jobseekers. This data once entered can be edited/deleted as
required when there will be vast entries of data user can scroll the data.

 There are sections provided for Recruiter Requirement/Resource.


Project overview /specification

 Recruiter:
In Recruiter sections, user can enter the details of companies through the help of
portal. The portal has a form that’s will ask details like company
id/name/location/address/city/country/contact person/contact number/email_id.
Once after entering the details the data will be saved by clicking save button and the
details will be stored in the Recruiter database.

 Requirement:
In Requirement sections, various vacancies of various companies are stored. All the
details like job_id , job title , job location , functional skills , technical skills ,
company_id , contact_id , contact person , contact number , email_id are stored in
database.

 Resource:
In Resource sections, details of various Jobseekers are stored. All the Personal
details and Technical and Educational background, work experience.

 Search:
In search section, user will search for matching requirement and jobseeker as per
their requirement from of the portal and fill the form as it given above.

SCOPE:

 There is no any online Payment gateway provided in this portal. So, any company which
would register would not be able to pay online. Payment would be done by check/case.

 There are no banners for advertisement on the site.


 This system can run only on Windows platform.

 Supported only in My SQL database.

 No security of data.

 No N-level category.

 Supportive language is only English.


query and execute server side applications to fulfill http requests. Use
windows NT Performance monitor top detect bottlenecks and other server
latency issues. Although the performance of your server can be enhanced by
adding more RAM , if CPU usage is high, you will have to upgrade your server
to a multiprocessor server.

 SCOPE OF NETWORK:

Taking to account, the scope of your network when setting up your web server.
Confidential information that should remain only within your organization should
not be published from a server that accessible via internet.

 Platform Compatibility:-
The internet’s consist of a wide variety of hardware platforms and operating
systems. When publishing information, platform compatibility should be taken into
a account to ensure that information published at your web site is accessible to a
wide variety of users. When users need to use a special helper application to view a
file at your website, provide URLs for downloading helper application that run on
several platforms. At minimum, windows and Macintosh users should be able to
view information publish at your website as should those who use widely used
flavors of UNIX.

 Security:-
While an internet web site is accessible primarily to select individuals, an internet web
site is accessible to millions of users all over the world. Never use clear text passwords
to protect sensitive information distributed to and from an internet websites. When
distributing sensitive information via the internet, configure your website to encrypt the
data. See chapter 20 , “Security” , of volume

2 of this kit(Windows NT internet and intranet administration) for more


information about internet security encryption.

 Scope of audience:-

The internet consists of a very diverse group of users. When developing an


internet website, consider the scope of your audience. For example, if the targeted
audience of your website is not very technically inclined, do not assume your users
use the latest version of internet explorer or Netscape navigator, and do not assume
that they have helper application installed on their systems.
Software specification

In developing the Job portal website, we have used ASP.NET 2008. In which C# is used for
server side coding. SQL Server is used for as the database. In which .Net framework 3.5 is
included. Here are the some features of Asp.Net 3.5 and C# 2.0.

Front-End:
Asp.Net 3.5 and C# 2.0

ASP.NET is a unified Web development model that includes the services


necessary for you to build enterprise-class Web applications with a minimum of coding.
ASP.NET is part of the .NET Framework, and when coding ASP.NET applications you
have access to classes in the .NET Framework. You can code your applications in any
language compatible with the common language runtime (CLR), including Microsoft
Visual Basic, C#, JScript .NET, and J#. These languages enable you to develop
ASP.NET applications that benefit from the common language runtime, type safety,
inheritance, and so on.

ASP.NET includes:
 A page and controls framework
 The ASP.NET compiler
 Security infrastructure
 State-management facilities
 Application configuration
 Health monitoring and performance features
 Debugging support
 An XML Web services framework
 Extensible hosting environment and application life cycle management
 An extensible designer environment

ASP.NET

ASP.NET provides a unified Web development model that includes the services
necessary for you to build enterprise-class Web applications. ASP.NET is part of the .NET
Framework and enables you to take full advantage of the features of the common language
runtime, such as type safety, inheritance, language interoperability, and versioning.

The topics in this section provide you with conceptual information about how
ASP.NET works and procedural topics that show you how to write code that takes
advantage of the power of ASP.NET to create dynamic Web applications.

 Why is ASP.Net 3.5 proffered?

The Microsoft .NET Framework version 3.5 includes significant enhancements to


ASP.NET in virtually all areas. ASP.NET has been improved to provide out-of-the-box
support for the most common Web application situations. You will find that you can get
Web sites and pages up and running more easily and with less code than ever before. At the
same time, you can add custom features to ASP.NET to accommodate your own
requirements.

Specific areas in which ASP.NET has been improved are:


 Productivity: You can easily and quickly create ASP.NET Web pages and applications
using new ASP.NET server controls and existing controls with new features. New areas
such as membership, personalization, and themes provide system-level functionality that
would normally require extensive developer coding. Core development scenarios,
particularly data, have been addressed by new data controls, no-code binding, and smart
data-display controls.

 Flexibility and extensibility: Many ASP.NET features are extensible so that you can
easily incorporate custom features into applications. The ASP.NET provider model, for
example, provides pluggable support for different data sources.

 Performance: Features such as recompilations, configurable caching, and SQL cache


invalidation allow you to optimize the performance of your Web applications.

 Security: It is now easier than ever to add authentication and authorization to your Web
applications.

 Hosting: ASP.NET includes new features that make it easier to manage a hosting
environment and create more opportunities for hosters to add value.
 Completeness: New and existing features work in concert to allow you to create end-to-
end scenarios that address real-world Web development challenges.
The following sections describe changes made in different areas of
ASP.NET:

 Web Site Management


 Page Design
 Controls
 Data
 Security

Microsoft’s C#.Net

An ASP.NET page is restricted to code written in a single programming language.


Currently, ASP.NET supports Visual Basic, C#, and J#. The default language is Visual
Basic, but any other language can be declared as the default language for the page by placing
a directive at the top of the page, such as the following:

<%@Language="C#"%>

The language can also be declared in a <script language = …> block, as in the
example provided in Code Blocks in ASP.NET. If different languages are declared in
separate script blocks on the same page, an error will be thrown.

Although only one language can be used on a single page, any user controls that you
use on a page can be written in different languages, including Visual C++. This allows
applications to take advantage of function libraries in different languages.

Visual Basic Scripting Edition (VBScript) is not supported, but VBScript syntax is
very similar to Visual Basic 2008 syntax, so any required changes to existing code should be
minor.
These topics summarize common programming concepts with side-by-side code
examples or tables. This information is designed for those who want to learn a new language
or refresh their memory of how to work with a particular language.

Back-End:-

 Microsoft SQL Server 2005

Microsoft® SQL Server™ 2005is a set of components that work together to meet the
data storage and analysis needs of the largest Web sites and enterprise data processing
systems. The topics in SQL Server Architecture describe how the various components work
together to manage data effectively.

Microsoft® SQL Server™ 2005data is stored in databases. The data in a database is


organized into the logical components visible to users. A database is also physically
implemented as two or more files on disk.

Each instance of SQL Server has four system databases (master, model, tempdb, and
msdb) and one or more user databases(hmd_db, Address_Book, payroll, sales,
employees). Some organizations have only one user database, containing all the data for
their organization. Some organizations have different databases for each group in their
organization, and sometimes a database used by a single application. For example, an
organization could have one database for sales, one for payroll, one for a document
management application, and so on. Sometimes an application uses only one database; other
applications may access several databases.

It is not necessary to run multiple copies of the SQL Server database engine to allow
multiple users to access the databases on a server. An instance of the SQL Server Standard or
Enterprise Edition is capable of handling thousands of users working in multiple databases at
the same time. Each instance of SQL Server makes all databases in the instance available to
all users that connect to the instance, subject to the defined security permissions.
When connecting to an instance of SQL Server, your connection is associated with a
particular database on the server. This database is called the current database

 Database Architecture

Microsoft® SQL Server™ 2005data is stored in databases. The data in a


database is organized into the logical components visible to users. A database is
also physically implemented as two or more files on disk.

When using a database, you work primarily with the logical components such as
tables, views, procedures, and users. The physical implementation of files is largely
transparent. Typically, only the database administrator needs to work with the
physical implementations
 What's New in Microsoft SQL Server 2005

Microsoft® SQL Server™ 2005 extends the performance, reliability, quality, and ease-
of-use of Microsoft SQL Server version 7.0. Microsoft SQL Server 2005 includes several
new features that make it an excellent database platform for large-scale online transactional
processing (OLTP), data warehousing, and e-commerce applications.

The OLAP Services feature available in SQL Server version 7.0 is now called SQL
Server 2005 analysis Services. The term OLAP Services has been replaced with the term
Analysis Services. Analysis Services also includes a new data mining component.

The Repository component available in SQL Server version 7.0 is now called
Microsoft SQL Server 2005 beta Data Services. References to the component now use the
term Meta Data Services. The term repository is used only in reference to the repository
engine within Meta Data Services.
Literature survey

Feasibility Study

The main purpose of feasibility analysis is to check the economic viability of the proposed
system. The result of the feasibility study will indicate whether to proceed with the proposed
system or not. If the results of the feasibility study are positive, then we can proceed to develop a
system otherwise project should not be pursued.

Technical Feasibility
This system will be developed using Asp.net. As we require some time to learn all these
technologies, All these technologies are easy to learn and can develop system very rapidly. After
developing and deploying the system, any user can view this site on the Internet.

Economical Feasibility

Proposed System requires development tools and software such as visual studio 2008 which are
free of cost and available on internet. For developing proposed system, we need various
resources such as computers systems, internet connection for e-help, recommended disk space,
and memory speed as mention in technical requirement. By looking at all these expenses and
comparing with proposed system, we have many benefits from proposed system such are

 As existing system is manual, where data may not accurate, up to date, and
available on time. But proposed system will be computerized, so we can
overcome all limitations of existing system. Also with this new system insertion,
deletion, and modification of various data will be easier to handle.

 This system will reduce the paperwork. And quality of data will be improved.

So keeping all above mentioned benefits and comparing with various expenditures
of resources, we conclude that proposed system is economical feasible

Operational feasibility

Users of the system will the registered user of the website.

To put an orders user should have only basic knowledge of computer and Internet which is not a
big issue.

Basic training is required for other users to handle and manage the information.
System analysis & design
Requirement Validation

 Username and Password validation that is compulsory to enter within system (Not
for visitor).
 The user must have the email id in Gmail, yahoo or any website.
 Phone No must be Numeric and length is of maximum 11 Digit.
 Name must be character not in digit.
 Pin code No. is of 6 digits.
 For every new entry of enter all data manually, made entry by adjustment form.
So it reduces mismatch in data.
 The field denoted by (*) are compulsory.
Most of the data are enter from the master table so it also reduces the chances of mismatch data.

Functions of System

Use Case for System Details


System

«uses» «uses»
View C-Profile «uses»

Block company Response boost


«uses»

«uses»
«uses»
«uses»

Job Apply
Block user
«uses»
Candidate
«uses»

Search job
«uses»
Block category
«uses»

«uses»
Save job
«uses»
Administrator
Set pacage
«uses»
«uses»
Registrtion
«uses»

«uses»

Add category Company


Login «uses»

Resume dev. Post job

 Functional and Behavioral modeling

DFD
Administrator DFD
Administrato Authenticati Login
r on

2 DFD “LEVEL 0”

Login Authenticati Regi 1


on

Component Diagram

The component diagram contains components and dependencies. Components

represent the physical packaging of a module of code. The dependencies between the

components show how changes made to one component may affect the other

components in the system.


Dependencies in a component diagram are represented by a dashed line between two

or more components. Component diagrams can also show the interfaces used by the

components to communicate to each other.

Figure of Component Diagram

Deployment Diagram

Deployment and component diagram combines the features of both diagrams into one diagram.
The deployment diagram contains nodes and connections. A node usually represents a piece of
hardware in the system. A connection depicts the communication path used by the hardware to
communicate and usually indicates a method such as TCP/IP.

MS SQL
Server 2005
DB

UI

Web Server

Web pages

Figure of Deployment Diagram


 SYSTEM DESIGN
DATABASE DESIGN/DATA STRUCTURE DESIGN:
Tables and Relationships:
Database Tables’ Names and Description

Table Name Table Description

Login Login Details

Candidate Basic information about Candidates

Candidate_education Educational details about the candidate

Cadidate_Professonal Professional details about the candidate.

Candidate_addrs Address about Candidate

Company Company details

Company_Branch_add Branch details of company

Package Package decided by admin

Company_package Packages held by companies

Job_Applied Applied jobs by candidates

Job_post Posted jobs

Post Post (designation)

Category Categories.

Area Areas

Sate States

Country Countries

Questions Security questions

City cities
Resume Resumes of candidates

Relationships:

After logged in as an administrator, one can see the all details of jobseeker & recruiter
placed by user and all registered user the administrator can also edit the items and the
categories.

Logical Description of Data:

Whenever any user puts their information, the data provided by him/her goes to the
_master table.

SYSTEM PROCEDURAL DESIGN

Methods for Pseudo Code

Pseudo-code

 intuitive/informal notational system


 Good starting point for representing algorithms in any high-level programming
language.

Pseudo code is a kind of structured English for describing algorithms. It allows the designer to
focus on the logic of the algorithm without being distracted by details of language syntax. At the
same time, the pseudo code needs to be complete. It describes the entire logic of the algorithm
so that implementation becomes a rote mechanical task of translating line by line into source
code.
In general the vocabulary used in the pseudo code should be the vocabulary of the problem
domain, not of the implementation domain. The pseudo code is a narrative for someone who
knows the requirements (problem domain) and is trying to learn how the solution is organized.

The "structured" part of pseudo code is a notation for representing six specific structured

programming constructs: SEQUENCE, WHILE, IF-THEN-ELSE, REPEAT-UNTIL, FOR, and

CASE. Each of these constructs can be embedded inside any other construct. These

construct represent the logic, or flow of control in an algorithm.

It has been proven that three basic constructs for flow of control are sufficient to

implement any "proper" algorithm.

SEQUENCE is a linear progression where one task is performed sequentially after another.

WHILE is a loop (repetition) with a simple conditional test at its beginning.

IF-THEN-ELSE is a decision (selection) in which a choice is made between two alternative


courses of action.

Although these constructs are sufficient, it is often useful to include three more constructs:
REPEAT-UNTIL is a loop with a simple conditional test at the bottom.

CASE is a multiway branch (decision) based on the value of an expression. CASE is a


generalization of IF-THEN-ELSE.

FOR is a "counting" loop.

Test steps

Test Object Inputs Desired Outputs Actual Outputs

File upload page of Zip file including Upload Upload


web application. Shape Files and its Successfully. Successfully.
supporting database
files.

Reading data from Text File containing Read and Placed Read and Placed
Text File and comma separated Successfully. Successfully.
placing on the map values.
at proper places.

Viewing Description Text File containing Viewed Viewed


of particular hotspot. comma separated Successfully. Successfully.
values.
Testing process

Testing
Generally, it has been specified thought for testing that:

“Testing is the critical element of any software quality assurance and represents the ultimate
review of specification, design and code generation.”

Software testing has a dual function; it is used to establish the presence of defects in program and
it is used to help judge whether or not the program is usable in practice. Thus software testing is
used for validation and verification, which ensure that software conforms to its specification and
meets the need of the software customer.

Developer resorted Alpha testing, which usually comes in after the basic design of the program
has been completed. The project scientist will look over the program and give suggestions and
ideas to improve or to correct the design. They also report and give after a program has been
created.

Testability:-

Software Testability is simply how easily a computer program can be tasted. The check list that
follows provides a set of characteristics that lead to testable software.

 Operability
 Observables
 Controllability
 Decomposability
 Simplicity
 Stability
 Understandability
Following are the attributes of the Good Test

 A good test has a high probability of finding an error.


 A good test is not redundant.
 A good test should be “Best of Breed”.
 A good test would be neither too simple nor too complex.

Interdependency:-

Interdependencies of each compartmentalized activity were then found out. Some tasks must
occur in sequence while there are many tasks, which can occur in parallel.

Software Inspection:-

Analyze and check system representations such as the requirements document, design, diagrams
and the program source code. They may be applied at all the stages of process.
Figure of Testing Process

Test Plan:-

THE TESTING PROCESS

Developer tests the software process activity such as design, implementation and the requirement
engineering. Because, design errors are very costly to repair when the system has been started to
operate. Therefore, it is quite obvious to repair them at early stage of the system. So, analysis is
the most important process of any project.

REQUIREMENTS TRACTABILITY
As most interested portion is whether the system is meeting its requirements or not, for that
testing should be planned so that all requirements are individually tested. Developer checked the
output of certain combinations of input, which gives desirable results, or not. Strictly stick to our
requirements specifications, give you the path to get desirable results from the system.

TESTED ITEMS

Our tested items are like:

 Data fetching from the database


 Data insertion, updating and deleting in the database
 Form access to particular login
BLACK-BOX TESTING

In black box testing or functional testing, the developer is concerned about the output of the
module and software, i.e. whether the software gives proper output as per the requirements or
not. In another words, these testing aims to test a program behavior against specification without
making any reference to the internal structure of the program or the algorithms used. Therefore,
the source code is not needed, and so even purchased modules can be tested. The program just
gets a certain input and its functionality is examined by observing the output.

This can be done in the following way:

 Input Interface

 Processing
 Output Interface
The tested program gets certain inputs. Then the program does its job and generates a certain
output, which is collected by a second interface. This result is then compared to the excepted
output, which has been determined before the test.
WHITEBOX TESTING:

It is also called ‘GLASS BOX’ or ‘STRUCTURAL’ testing. Tester has access to the
system design.

 Simple Loops
 Nested Loops
 Concatenated Loops
 Unstructured Loops
 Continuous Loops
They can:

 Examine the design document


 View source code
 Individual path examine
 Logical path examine one time
 Logical decision on their true and false

The intention in white-box testing is to ensure that all possible feasible flow of control path
through a sub-program is traversed while the software is under tested. This is not the same as
saying that all statements in the sub-program will be executed as it is possible for all statements
to be executed but for not all of the possible paths to be traversed. However, the conversed is
true; whether all the possible paths through a sub-program are traversed then all statements in
sub-programs will necessarily be executed.

When considering the number of possible paths through a sub-program two other factors need to
be remembered. The first is that some of the possible paths through a sub-program turnout upon
investigation to be non- feasible paths. The second consideration is that the number of possible
paths to a sub-program indicated by a flow-graph analysis will indicate the minimum number of
paths to ensure complete coverage. This may be less than the total number of paths which are
possible when combinations of paths are allowed.
Advantages of White box testing:-

 As the knowledge of internal coding structure is prerequisite, it becomes very


easy to find out which type of input / data can help in testing the application
effectively.
 The other advantage of white box testing is that it helps in optimizing the code.
 It helps in removing the extra lines of code, which can bring in hidden defects.
Algorithm for Operations
 FOR USERS
 Step1 Start.
 Step2 First of all users will login.
 IF username & password = true THEN
 Login
 ELSE
 Display (Error page, sorry login not valid!!!)
 ENDIF
 Step 3 Login successfully done.
 Step 4 The users will go to home page.
 Step 5 if the user want to Search Jobs
 CASE Search Jobs to be open
 Condition: Fill Search Details.
 ENDCASE
 Step 6 If Search details submitted then continue
 Progress of case
 Condition 1: view the progress of your case.
 Condition 2: Case id
 Step 7 End

Methods for Pseudo Code

Pseudo-code
 intuitive/informal notational system
 Good starting point for representing algorithms in any high-level programming
language.

Pseudo code is a kind of structured English for describing algorithms. It allows the designer to
focus on the logic of the algorithm without being distracted by details of language syntax. At the
same time, the pseudo code needs to be complete. It describes the entire logic of the algorithm
so that implementation becomes a rote mechanical task of translating line by line into source
code.

In general the vocabulary used in the pseudo code should be the vocabulary of the problem
domain, not of the implementation domain. The pseudo code is a narrative for someone who
knows the requirements (problem domain) and is trying to learn how the solution is organized.

The "structured" part of pseudo code is a notation for representing six specific structured

programming constructs: SEQUENCE, WHILE, IF-THEN-ELSE, REPEAT-UNTIL, FOR, and

CASE. Each of these constructs can be embedded inside any other construct. These

construct represent the logic, or flow of control in an algorithm.

It has been proven that three basic constructs for flow of control are sufficient to

implement any "proper" algorithm.


SEQUENCE is a linear progression where one task is performed sequentially after another.

WHILE is a loop (repetition) with a simple conditional test at its beginning.

IF-THEN-ELSE is a decision (selection) in which a choice is made between two alternative


courses of action.

Although these constructs are sufficient, it is often useful to include three more constructs:

REPEAT-UNTIL is a loop with a simple conditional test at the bottom.

CASE is a multiway branch (decision) based on the value of an expression. CASE is a


generalization of IF-THEN-ELSE.

FOR is a "counting" loop.


Result /output
CONCLUSION:

In making of this application, we have learnt that handling files and maps is becoming easy.

Using this application, a user gets a different information and a cost effective solution by visiting
unknown place efficiently with all the necessary information regarding to various hotspots the
user visits.

Also this application satisfies collaboration objective i.e. “I make it and you use it; u make it and
I use it” which is the actual motive of this application.

This application is made for all the users so that user can see the required information at the
website also in his/her own hand. So, the main goal of portability and mobility gets achieved by
this application.

Further, this application is made using Asp.net and c# which is leading Microsoft application
programming technology. Hence, this application is also economic solution for the user.

Now, this is a user friendly website so, any user can use this website to buy and sell different
products. Therefore, this application provides collaborative interface to the users.
Reference
References Books

 C# 2.0 Complete Reference


 ProfessionalASP.NET 2.0
 ASP.NET in 21 days
 ASP.NET Complete Reference
 MSDN 2005
 System Analysis And Design

You might also like