Internship Report by Sarthak Pachauri
Internship Report by Sarthak Pachauri
By:
Sarthak Pachauri (171308)
So, I hereby declare that the project report is fully designed/developed by me and
no part of the work is borrowed or purchased from any agency. And I'll produce
a certificate/document of my internship completion with the company to TNP
Cell whenever COVID-19 situation gets normal.
Signature-
Name-Sarthak Pachauri
Roll No-171308
Date-21-05-2021
1
Certificate
Candidate’s Declaration
I hereby declare that the work presented in this report entitled “Internship Report”
in partial fulfilment of the requirements for the award of the degree of Bachelor
of Technology in Computer Science and Engineering submitted in the department
of Computer Science & Engineering and Information Technology, Jaypee
University of Information Technology Waknaghat is an authentic record of my
own work carried out over a period from March 2021 to May 2021 under the
supervision of Mr.Surjeet Singh(JUIT) and Mr. Abhijit Joshi (Trainer at
Cognizant).
The matter embodied in the report has not been submitted for the award of any
other degree or diploma.
This is to verify that the above statement made by the candidate is true to the best
of my knowledge.
2
ACKNOWLEDGEMENT
I wish to express my sincere gratitude to Mr. Abhijit Joshi, Trainer at Cognizant for constantly
monitoring and guiding us to the right path in terms of the various skills we learned during
these weeks. He constantly helped us in our research and the learning wouldn’t be possible
without his constant support. I would like to record my sincere appreciation and gratitude
towards all the officials and employees of cognizant, without whose kind assistance, my
internship program would not have succeeded. The facts and other vital information provided
by them have contributed towards making this report as comprehensive as possible. I am
indeed, thankful to them. I would also like to express my gratitude to my college project
supervisor Mr. Surjeet Singh for his valuable guidance and help in completing this project
report.
3
TABLE OF CONTENT
References
4
LIST OF FIGURES
5
LIST OF TABLES
6
CHAPTER-1: ORGANIZATION
(1.1) Background
Cognizant offers various role in the company like develop, Designer, Tester and
Manager in the company, but, before becoming an associate every person should
complete the internship period and after the intern period there is one year of probation
period in the company.
The internship period varies and depends on the roles, which the intern gets, like
someone who got developer profile, for them internship period will be of around 4-5
months and for the quality insurance, it might vary from 5-6 month. The domain
allocation is random in the cognizant for the interns, but sometime it depends on the
assimilation test also, the person who got higher marks in assimilation test, will have
higher chances to get better profile or domain and it also depends on the first come first
serve basis.
(1.2) Mission
The only objective of Cognizant is to work with customers to strengthen organisations
via technology and process innovation, deep industry experience, and a global
resources.
(1.3) Vision
Cognizant Company's vision statement, which describes the company's long-term
strategy, identifies the many developing demands of the market, different consumer
habits, and current market conditions that will try to push the information economy.
7
(1.4) Values
Company values are as follows:
1. First and foremost, people are important to a company's success. When we
respect everyone, we interact with, we will make and keep strong connections
with our customers, coworkers, referral sources, suppliers, and the community.
2. Goal is to generate long-term customer loyalty by establishing trust,
trustworthiness, and honesty in our work and providing customers with impartial
advice.
3. Holding committed to principles of excellence, honesty, respect, fairness, and
professionalism at all times throughout our organisation.
(1.5) Objectives
8
CHAPTER-2: PROGRAM STRUCTURE
STAGE-1
QEA BASICS
Assessment:
1. We like hands-on activities and quizzes to allow us to demonstrate our knowledge of the
material.
2. Module/Skill Code Challenges are coding problems to test and assess programming
abilities.
3. An Integrated Capability Test (ICT) is a case study of all the concepts learned in a single
module during an integrated learning opportunity.
9
(2.2) Functional Testing
Week-1
(2.2.1) Testing
A test is a method of determining whether or not a system or a component meets the defined
criteria. Verifying is doing a system run to find any deficiencies or mistakes in contradiction
to the specifications. Testing may be characterised as it is performed in multiple formats across
SDLC:
1. Analysis and verifying of criteria also are considered testing during the requirement
collection process.
2. In design review, you look at the design to try to enhance it.
10
Testing should strive to accomplish the following three basic goals: verification and validation.
Function testing is a sort of application testing that is conducted against the company's
business needs. The sort of testing is known as a black box test. It involves the whole
integration system to assess the platform conformity with its set requirements. This
form of testing is laid out in the functional specification document.
11
(2.2.3) Types of Testing
1. Manual Testing- In manual testing, you do manual testing, which means you
use no automated tool or script. This form of test is done by the tester becoming
an end-user and executing the programme to search for any unexpected or
critical behaviour.
2. Automation Testing- Automation testing, often known as test automation, is a
method through which a tester utilises scripts and other tools to perform a
variety of tests on a product.
12
(2.2.4) Testing methods
13
FIG-7: Traditional Vs Agile SDLC
Test Case-A test case would be a collection of variables or situations that an engineer
will use to find out if a product under test is accurate and conforms to specifications.
One must include a wide range of fields in a test case.-
14
FIG-8: Test Case Template
Week-2
15
(2.3.2) JVM
A JVM is a run-time engine that can execute Java programmes. The JVM, the Java
Virtual Machine, initiates the call to the main function inside the Java code. JVM is a
component of the JRE (Java Runtime Environment). In contrast to Perl, Java
applications are known as (WORA-Write Once Run Anywhere). When this is said, it
implies that programmers may build Java source code on one machine and have
confidence that it will operate on any other Java-capable machine without any
modification. Due to the existence of the JVM, this is all feasible.
FIG-9: JVM
Java Runtime Environment (JRE) is another name for Java RTE. The Java Runtime
Environment (JRE) includes the Java Virtual Machine (JVM), core classes, and auxiliary
files, which provide the necessary for running a Java application.
16
(2.3.3) Java Identifiers
int a = 20;
Within the java code shown above, we have five distinct identifiers:
a: variable name.
1. Primitive Data Type: such as Boolean, char, int, short, byte, long, float, and double
2. Non-Primitive Data Type or Object Data type: such as String, Array, etc.
Primitive Data Types
17
Table-1: Primitive Data Types
Non-Primitive Data Type or Reference Data Types- Because the reference data types
wouldn’t keep a variable value immediately in memory, any reference data types will
now have a memory address that refers to the variable value. They are strings, objects,
arrays, etc.
18
(2.3.5) Variables
A variable is indeed a memory region with a name. A storage unit is one of the
fundamental building blocks of a programme. Variables have the ability to modify their
value while a programme is running.
FIG-11: Variable
Assigning a data from one data type to the other may not be possible. To facilitate
automated type conversion, Java can automatically convert the data types for you if
they are equivalent. Otherwise, you must manually convert or cast the values
(2.3.7) Loops
While loop: A while loop would be a control flow expression that repeats code
depending on a Boolean condition that holds true.
19
For Loop: The for loop is an easy method to represent the structure of a loop. On a for
loop, you may have just one initialization, one condition, and one increment or
decrement statement in one line, which is helpful when you are trying to analyse the
structure of your loops.
FIG-15: if-else
20
2.Nested-if: The if expression that would be the subject of someone else if or else is known as
a nested if. If statements may be nested, therefore if statements may be nested as well.
4. Jump- break, continue, and return are all supported by Java's jump statement. Control is
transferred to other parts of the programme in these three phrases.
21
Continue-If forcing an initial execution of a loop may be helpful, do so. In other words,
when you execute the for loop in this instance, you should continue executing the loop,
but not process the rest of the script in the loop body this time around.
Return-With the return statement, you may specify that a method should exit. For
instance, if a method causes a control process to transferring back to the caller, it means
the method will cause the called method to return.
In addition to the static variables described above, there are also static class variables
which are shared by all the objects of either the class and which may be accessed using
the class name.
Class-A class is a blueprint or template for creating things from which users derive
user-defined capabilities. All things of one type have the same attributes or methods.
Class declarations may comprise the following elements in this order::
1. Modifiers
2. Class name
3. Superclass (if any)
4. Interfaces (if any)
5. Body: The class body surrounded by braces, { }.
Objects are fundamental in object-oriented programming because they correspond
to physical things in the actual world. Let's use an example: A shopping system
that utilises the internet may feature such terms as "shopping cart", "customer",
and "product".
22
FIG-18: Class and Objects
Class, function Object() { [native code] }, variable, function, and data member scope
may be restricted using Java's access modifiers. Four different kinds of access
modifiers, with the suffix "Default", "Private", "Protected", and "Public" are available
in Java.
(2.3.13) Packages
Classes, sub packages, and interfaces may be safely and accurately packed within Java
packages.
(2.3.14) Inheritance
The way in which one class may inherit the characteristics (fields and methods) with
another class is found in Java's implementation of a class inheritance.
23
Types of Inheritance in Java:
1. Single Inheritance
2. Multilevel Inheritance
3. Hierarchical Inheritance
4. Multiple Inheritance (Through Interfaces)
5. Hybrid Inheritance (Through Interfaces)
(2.3.15) Constructors
(2.3.16) Interfaces
24
(2.3.17) Abstraction
Data Abstraction is indeed the feature that gives you the ability to present just the
necessary information to the user. Unimportant or unimportant factors are not made
apparent to the user. When looking at cars, people see them as vehicles rather than
separate components.
An abstract class is created having the abstract keyword defined inside it.
(2.3.18) Encapsulation
To encapsulate data is to enclose it inside a single unit. The means through which code
and data are connected is the mechanism. Another benefit of encapsulation is
1. Data hiding.
2. It enhances flexibility.
3. Reuse
4. The testing of code is simple.
At the moment the call happens, Java uses the property of the object being referenced
to to decide which version (superclass/subclasses) of that function is to be performed.
Thus, runtime polymorphism is the process by which a decision is made at runtime
and this occurrence is termed runtime polymorphism.
Overloading in Java
Some methods have almost the same identity, but have various signatures, based on
number of input arguments, whether the input parameters are of a certain type, or both.
Overriding in Java
25
Week-3
(2.3.20) Collections
The collection of a items is made up of any set of independent things that are displayed
as a singular body. The “Collection Framework” is an additional framework in Java
that houses all of the collection classes & their associated interfaces in Java SE 1.2.
(2.3.21) Iterators
In the Collection Framework in Java, iterators are used to obtain items one at a time.
Three iterators are involved.
1. Enumeration-To be able to get the items of older collections (Vector, Hash Table), one
must utilise an enumeration.
2. Iterator- it may be applied to any Collection object; it is universal since it can be used
with iterators. Because we use the Iterator, we can both read and delete data using it.
3. ListIterator-It can only be used on collection types like ArrayList, LinkedList, and the
like that implement List.
(2.3.22) ArrayList
Arrays may be found in the java.util package, which belongs to the collection
framework. It is Java's dynamic array.
(2.3.23) HashMap
(2.3.24) Sets
1. HashSet
2. Enum Set
26
(2.3.25) Exception Handling
Java's java.io package provides you with practically every I/O class you'll need to use
in Java. The source and destination of these many streams represents an input and an
output. In the java.io package, you may use streams to store many kinds of data,
including simple values, objects, localised characters, and more.
A stream is a series of data. As I learned to my regret, there are two sorts of streams:
An Output Stream is needed to output data to a location. The 8-bit bytes that are read
and written using Java bytes streams are utilised for input and output. A stream may
be described as a succession of data that you may read and write. Input Stream: Used
to read from an origin and to read from a destination.
Week-4
(2.3.27) JDBC
It is known as Java Database Connectivity (JDBC) in Java. JDBC is really a Java API that
allows you to establish a connection and run a query on a database. The ability to use
JavaSE is an element of the Java SE platform (Java Standard Edition). The JDBC API
connects to the database via JDBC drivers. The four driver types are
27
FIG-20: JDBC Architecture
We may use JDBC APIs to connect to any relational database and get tabular data
contained in it. The JDBC API enables us to save, retrieve, update, and remove
information from the database. It is similar to the functionality given by Microsoft's
ODBC.
Week-5
(2.4.1) HTML
A standard markup language for online publications, the Hypertext Markup Language,
or HTML, is known as HTML. Cascading Style Sheets (CSS) and programming
languages like as JavaScript may be used to help. HTML documents are served by the
web server or local storage, and the browser renders the Html files creating multimedia
web pages.
29
Table-3: Input and Form Tags
30
FIG-22: Sample of HTML code
(2.4.2) XML
Like HTML, but without specified tags to utilise, XML is a mark - up language that is
quite similar to HTML. You, however, establish your own tags with your unique
requirements in mind.
31
FIG-23: Basic XML Document
Table-5: Entities
(2.4.3) JSON
JSON is a common text-based format used to express structured data whose format is
defined using JavaScript object syntax. It is often used in online applications for
conveying data.
32
FIG-24: JSON Sample
Week-6
(2.4.4) JavaScript
33
Table-6: Data Types
34
Week-7
(2.4.5) CSS
In short, CSS is the programming that is used to style online content. The design of
HTML is not a language of programming, as with CSS. You aren't using HTML either.
Cascading Style Sheets (CSS) is a style sheet language. CSS is what you are using to
style HTML elements based on their specific elements.
FIG-26: CSS
35
Use of CSS is for web pages, and among other things, it incorporates design, layout,
and various display preferences and standards for different screen sizes.
FIG-27:CSS Sample
(2.4.6) Bootstrap
36
FIG-29: Bootstrap Sample
37
Week-8
(2.4.7) SQL
1. Statements and questions are made up of clauses, which are also constituents. This is (in
some circumstances) optional.
2. In addition to expressions, which may return scalar numbers or tables made up of rows
and columns of data, you may use expressions which yield more complex results.
3. Predicates, which define criteria that may be examined in SQL to determine whether the
logic evaluates to 3VL (true/false/unknown) or Boolean truth values, and that are used
to limit the impact of statements and queries, or to steer the course of execution.
4. A query is a tool used to search for data that you want, depending on certain parameters.
In terms of SQL, this is a critical factor.
5. Persistent statements, which might regulate transactions, programme flow, connections,
sessions, or diagnostics, or alter schemata and data.
The restrictions that are applied to the values of particular columns are called column
constraints.
1. Using the PRIMARY KEY constraint allows you to identify a single row.
2. UNIQUE columns include values that are unique to each row.
3. Only columns with a value are required to be of type NOT NULL.
4. The DEFAULT column will have a default value if no value is supplied when it is
created.
A new table is created in a database when you issue the command "CREATE TABLE".
Incorporating this feature enables one to identify and label the table and each column
inside it.
38
FIG-30: Create Table
Inserting new records (rows) into tables is done using the INSERT INTO command.
In other words, it has two distinct states:
To alter all columns of an existing table, use the ALTER TABLE statement. It is often
used in combination with the Create COLUMN clause to introduce a new column.
To remove records (rows) in such a table, use the DELETE command. In this example,
the WHERE clause is used to determine which record(s) should be destroyed. All records
will be erased if the WHERE clause is removed.
39
FIG-33: Delete Statement
(2.4.9) Queries
A SELECT query including the keyword SELECT* retrieves all columns from the table
referenced in the result set. This query will return all of the movies' columns and records
(rows).
Where is used to restrict the number of rows (records) that meet a certain criterion.
Every records in which the pub year is 2017 will be returned by the query.
You may use the BETWEEN operator to restrict your search to a certain range of
values. Text, integers, or date data may be in the range of values. Any movie released
between 1980 and 1990 will be found in the search results.
You may use the ORDER BY clause to sort the result set in alphabetical or numerical
order. Ordered in two ways: It may be ordered in two ways:
1. One may sort the results in decreasing order by using the keyword DESC.
2. ASC is a keyword used to sort the results in the order of increasing value
(default)
40
FIG-37: Order By
You may use the AND operator to evaluate several criteria. A result set may only
comprise records that meet both requirements connected by AND. This query will
return results for any blue vehicle that was manufactured after 2014.
Multiple criteria may be merged using the OR operator. Records containing either the
AND or the OR in their search criteria are recorded in the returned result set.
FIG-39: OR Operator
Grouping entries in a sequence database by similar value over one or even more
columns using the GROUP BY clause. When used with aggregate functions, it is often
it is often used to get data about entries that are comparable.
41
The HAVING clause is being used to offer additional filter groups to the result set
produced by the GROUP BY clause. When using aggregate functions in conjunction
with aggregate functions, you may filter result sets depending on to an aggregate
property.
Aggregate functions calculate a number on a group of values and return one number:
1. COUNT()
2. SUM()
3. MAX()
4. MIN()
5. AVG()
Every record in a SQL database has a unique primary key field, since that field is used
to identify each record. A main key must be populated..
FIG-42: Primary
The foreign key is indeed a reference from one table's records to the table that
contains. Foreign key functionality is crucial to retain numerous records for a given
row.
42
FIG-43: Foreign key
UNION is used to collect data from numerous SELECT queries and eliminate duplicates.
FIG-44: Union
A CROSS-JOIN clause has been used to connect each row through one table to each row from
another, and to do so, these clauses include specific rules that govern the contents of each result
set row
Using an ON clause, results from even more than one tables may be combined to provide results
based on their common column values.
FIG-46: ON Clause
43
Though the join requirement is not satisfied, rows from distinct tables are combined even if the
join expression has been specified. The left join retrieves every row in the left table, but only
if the join condition is fulfilled, which is why NULL values are used to fill in the fields from
the right table
FIG-47: Join
The WITH clause stores the result of a query in a temporary table (temporary movies) using
an alias. Multiple temporary tables can be defined with one instance of the WITH keyword.
44
CHAPTER-3: PERFORMANCE ANALYSIS
JavaScript CC 100/100
45
CHAPTER-4: CONCLUSION
My internship with cognizant will finish on August 16, 2021, however over these eight
weeks, I have increased my expertise in many technologies.
I'd want to thank all the coaches, SMEs, mentors, and trainers that assisted me throughout
my internship at Cognizant. They helped me when I was having problems, and were there
to handle all of my questions. My trainer, in particular, put in additional effort and served
as an intern while working to pass on all of our inquiries to the corporation's higher
authorities, including any queries about scheduling or workload.
My gratitude always go to TNP Officer Mr. Pankaj Kumar and Dr. Nafis U Khan, who went
above and beyond to support and help with the whole placement effort.
46
REFERENCES
[3] www.udemy.com
[4] www.geeks4geeks.com
[5] www.tutorialspoint.com
47
final project report
ORIGINALITY REPORT
17 %
SIMILARITY INDEX
13%
INTERNET SOURCES
2%
PUBLICATIONS
12%
STUDENT PAPERS
PRIMARY SOURCES
1
Submitted to Jaypee University of Information
Technology
2%
Student Paper
2
Submitted to Sogang University
Student Paper 2%
3
www.geeksforgeeks.org
Internet Source 2%
4
www.codecademy.com
Internet Source 2%
5
www.ir.juit.ac.in:8080
Internet Source 1%
6
www.nishorgo.org
Internet Source 1%
7
tutorialspoint.dev
Internet Source 1%
8
www.slideshare.net
Internet Source 1%
9
www.scribd.com
Internet Source 1%
10
en.wikipedia.org
Internet Source <1 %
11
Submitted to University of Wales Swansea
Student Paper <1 %
12
Submitted to Central Queensland University
Student Paper <1 %
13
Submitted to Gusto International College
Student Paper <1 %
14
Submitted to Modi Apollo International
Institute
<1 %
Student Paper
15
Submitted to CTI Education Group
Student Paper <1 %
16
Kishori Sharan. "Beginning Java 9
Fundamentals", Springer Science and
<1 %
Business Media LLC, 2017
Publication
17
novatechsol.com
Internet Source <1 %
18
Submitted to Middlesex University
Student Paper <1 %
19
www.metaglossary.com
Internet Source <1 %
20
navinwbackup.blogspot.com
Internet Source <1 %
<1 %
21
www.answers.com
Internet Source
22
www.onlinetutorial.co.in
Internet Source <1 %
23
data-flair.training
Internet Source <1 %
24
www.educba.com
Internet Source <1 %
25
"Beginning Java® Programming", Wiley, 2012
Publication <1 %
26
codenza.app
Internet Source <1 %
27
github.com
Internet Source <1 %
28
text.123doc.org
Internet Source <1 %
29
tutorials.ducatindia.com
Internet Source <1 %
30
www.coursehero.com
Internet Source <1 %
31
www.svecw.edu.in
Internet Source <1 %
32
www.vsbec.com
Internet Source <1 %
JAYPEE UNIVERSITY OF INFORMATION TECHNOLOGY, WAKNAGHAT
PLAGIARISM VERIFICATION REPORT
Date: 17-06-2021 ✓
Type of Document (Tick): PhD Thesis M.Tech Dissertation/ Report B.Tech Project Report Paper
UNDERTAKING
I undertake that I am aware of the plagiarism related norms/ regulations, if I found guilty of any plagiarism and
copyright violations in the above thesis/report even after award of degree, the University reserves the rights to
withdraw/revoke my degree/report. Kindly allow me to avail Plagiarism verification report for the document
mentioned above.
− Total No. of Pages =51
− Total No. of Preliminary pages =7
− Total No. of pages accommodate bibliography/references =1
(Signature of Student)
FOR DEPARTMENT USE
We have checked the thesis/report as per norms and found Similarity Index at 17 (%). Therefore, we are
forwarding the complete thesis/report for final plagiarism check. The plagiarism verification report may be
handed over to the candidate.
Word Counts
• All Preliminary
Pages
• Bibliography/ Character Counts
Report Generated on
Images/Quotes Submission ID Page counts
• 14 Words String
File Size
Checked by
Name & Signature Librarian
..……………………………………………………………………………………………………………………………………………………………………………
Please send your complete Thesis/Report in (PDF) & DOC (Word File) through your Supervisor/Guide at
[email protected]
ORIGINALITY REPORT
17 %
SIMILARITY INDEX
9%
INTERNET SOURCES
3%
PUBLICATIONS
6%
STUDENT PAPERS
PRIMARY SOURCES
1
Submitted to Asian Institute of Technology
Student Paper 4%
2
towardsdatascience.com
Internet Source 3%
3
Submitted to Jaypee University of Information
Technology
5%
Student Paper
4
github.com
Internet Source 1%
5
Satish Kumar Satti, K. Suganya Devi, Prasenjit
Dhar, P. Srinivasan. "A machine learning
1%
approach for detecting and tracking road
boundary lanes", ICT Express, 2020
Publication
6
www.thushv.com
Internet Source 1%
7
www.coursehero.com
Internet Source 1%
JAYPEE UNIVERSITY OF INFORMATION TECHNOLOGY, WAKNAGHAT
PLAGIARISM VERIFICATION REPORT
Date: 17-06-2021
Type of Document (Tick): PhD Thesis M.Tech Dissertation/ Report B.Tech Project Report Paper
UNDERTAKING
I undertake that I am aware of the plagiarism related norms/ regulations, if I found guilty of any plagiarism and
copyright violations in the above thesis/report even after award of degree, the University reserves the rights to
withdraw/revoke my degree/report. Kindly allow me to avail Plagiarism verification report for the document
mentioned above.
− Total No. of Pages =51
− Total No. of Preliminary pages =7
− Total No. of pages accommodate bibliography/references =1
(Signature of Student)
FOR DEPARTMENT USE
We have checked the thesis/report as per norms and found Similarity Index at 17 (%). Therefore, we are
forwarding the complete thesis/report for final plagiarism check. The plagiarism verification report may be
handed over to the candidate.
Word Counts
• All Preliminary
Pages
• Bibliography/ Character Counts
Report Generated on
Images/Quotes
Submission ID Page counts
• 14 Words String
File Size
Checked by
Name & Signature Librarian
..……………………………………………………………………………………………………………………………………………………………………………
Please send your complete Thesis/Report in (PDF) & DOC (Word File) through your Supervisor/Guide at
[email protected]