0% found this document useful (0 votes)
43 views

Internship Report by Sarthak Pachauri

Uploaded by

docpain605501
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views

Internship Report by Sarthak Pachauri

Uploaded by

docpain605501
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 54

INTERNSHIP REPORT

Internship report submitted in partial fulfilment of the requirement for the


degree of Bachelor of Technology
In

COMPUTER SCIENCE ENGINEERING

By:
Sarthak Pachauri (171308)

Under the supervision


Of
Mr. Surjeet Singh
Assistant Professor (Grade-II)
To

Department of Computer Science & Engineering and Information Technology


Jaypee University of Information Technology Waknaghat,
Solan-173234, Himachal Pradesh
PROJECT REPORT UNDERTAKING

I Sarthak Pachauri Roll No-171308 Branch-Computer Science and


Engineering (CSE) doing my internship with Cognizant Technology
Solutions (CTS) from 6 March 2021 to 16 August 2021

As per procedure I have to submit my project report to the university related to


my work that I have done during this internship.

I have compiled my project report but due to COVID-19 situation


my project mentor in the company is not able to sign my project report.

So, I hereby declare that the project report is fully designed/developed by me and
no part of the work is borrowed or purchased from any agency. And I'll produce
a certificate/document of my internship completion with the company to TNP
Cell whenever COVID-19 situation gets normal.

Signature-
Name-Sarthak Pachauri
Roll No-171308
Date-21-05-2021

1
Certificate

Candidate’s Declaration

I hereby declare that the work presented in this report entitled “Internship Report”
in partial fulfilment of the requirements for the award of the degree of Bachelor
of Technology in Computer Science and Engineering submitted in the department
of Computer Science & Engineering and Information Technology, Jaypee
University of Information Technology Waknaghat is an authentic record of my
own work carried out over a period from March 2021 to May 2021 under the
supervision of Mr.Surjeet Singh(JUIT) and Mr. Abhijit Joshi (Trainer at
Cognizant).
The matter embodied in the report has not been submitted for the award of any
other degree or diploma.

Sarthak Pachauri, 171308

This is to verify that the above statement made by the candidate is true to the best
of my knowledge.

Mr. Surjeet Singh Mr. Abhijit Joshi


Assistant Professor (Grade-II) Trainer at Cognizant

2
ACKNOWLEDGEMENT

I wish to express my sincere gratitude to Mr. Abhijit Joshi, Trainer at Cognizant for constantly
monitoring and guiding us to the right path in terms of the various skills we learned during
these weeks. He constantly helped us in our research and the learning wouldn’t be possible
without his constant support. I would like to record my sincere appreciation and gratitude
towards all the officials and employees of cognizant, without whose kind assistance, my
internship program would not have succeeded. The facts and other vital information provided
by them have contributed towards making this report as comprehensive as possible. I am
indeed, thankful to them. I would also like to express my gratitude to my college project
supervisor Mr. Surjeet Singh for his valuable guidance and help in completing this project
report.

3
TABLE OF CONTENT

1. CHAPTER-1: ORGANIZATION .......................................................................... (7)


Background .................................................................................................. (7)
Mission .......................................................................................................... (7)
Vision and Values......................................................................................... (8)
Objective ....................................................................................................... (8)

2. CHAPTER-2: PROGRAM STRUCTURE............................................................ (9)


Program Structure…………………………………… ................................. (9)
Functional Testing ....................................................................................... (10)
Java Programming and Fundamentals ...................................................... (15)
Web UI and Datasource .............................................................................. (28)

3. CHAPTER-3: PERFORMANCE ANALYSIS.................................................... (45)

4. CHAPTER-4: CONCLUSION ............................................................................ (46)


Conclusion .................................................................................................. (46)

References

4
LIST OF FIGURES

Figure No. Description Page No.


FIG-1 Program Structure 9
FIG-2 SDLC Model 11
FIG-3 Verification and Validation 11
FIG-4 Functional Testing 12
FIG-5 Automation Testing 13
FIG-6 Traditional and Agile SDLC 13
FIG-7 Test Case Template 14
FIG-8 JVM 14
FIG-9 Non-Primitive Data Types 15
FIG-10 Variable 15
FIG-11 Class and Object 20
FIG-12 Abstract class and Interface 22
FIG-13 JDBC Architecture 26
FIG-14 HTML Page Structure 28
FIG-15 Sample HTML Code 30
FIG-16 XML Encoding 30
FIG-17 JSON Sample 30
FIG-18 JavaScript Sample 32
FIG-19 CSS 33
FIG-20 CSS Sample 34
FIG-21 Grid System 35
FIG-22 Bootstrap Sample 35

5
LIST OF TABLES

Table No. Description Page No.


Table-1 Primitive Data Types 15
Table-2 Basic HTML Tags 17
Table-3 Input and Form Tags 17
Table-4 Table Tags 19
Table-5 Entities 20
Table-6 Different Types of Selector 40

6
CHAPTER-1: ORGANIZATION

(1.1) Background

Cognizant is a top IT company in India, and major IT company in US. Cognizant


employees are around 3 lakhs and recruits around 20 thousand fresh people every year
from India. Cognizant also hires from different country across the globe.

Cognizant offers various role in the company like develop, Designer, Tester and
Manager in the company, but, before becoming an associate every person should
complete the internship period and after the intern period there is one year of probation
period in the company.

The internship period varies and depends on the roles, which the intern gets, like
someone who got developer profile, for them internship period will be of around 4-5
months and for the quality insurance, it might vary from 5-6 month. The domain
allocation is random in the cognizant for the interns, but sometime it depends on the
assimilation test also, the person who got higher marks in assimilation test, will have
higher chances to get better profile or domain and it also depends on the first come first
serve basis.

(1.2) Mission
The only objective of Cognizant is to work with customers to strengthen organisations
via technology and process innovation, deep industry experience, and a global
resources.
(1.3) Vision
Cognizant Company's vision statement, which describes the company's long-term
strategy, identifies the many developing demands of the market, different consumer
habits, and current market conditions that will try to push the information economy.

7
(1.4) Values
Company values are as follows:
1. First and foremost, people are important to a company's success. When we
respect everyone, we interact with, we will make and keep strong connections
with our customers, coworkers, referral sources, suppliers, and the community.
2. Goal is to generate long-term customer loyalty by establishing trust,
trustworthiness, and honesty in our work and providing customers with impartial
advice.
3. Holding committed to principles of excellence, honesty, respect, fairness, and
professionalism at all times throughout our organisation.

(1.5) Objectives

The objectives of Cognizant are:

1. Start with a point of view.


2. Seek data, build knowledge.
3. Always strive, never settle.
4. Work as one.
5. Create conditions for everyone to thrive.
6. Do the right thing, the right way

8
CHAPTER-2: PROGRAM STRUCTURE

(2.1) Program Structure

STAGE-1
QEA BASICS

FUNCTIONAL JAVA WEB UI


PROGRAMMING
TESTING FUNDAMENTAL AND DATASOURCE

FIG-1: Program Structure

Assessment:

1. We like hands-on activities and quizzes to allow us to demonstrate our knowledge of the
material.
2. Module/Skill Code Challenges are coding problems to test and assess programming
abilities.
3. An Integrated Capability Test (ICT) is a case study of all the concepts learned in a single
module during an integrated learning opportunity.

9
(2.2) Functional Testing

Week-1

(2.2.1) Testing

A test is a method of determining whether or not a system or a component meets the defined
criteria. Verifying is doing a system run to find any deficiencies or mistakes in contradiction
to the specifications. Testing may be characterised as it is performed in multiple formats across
SDLC:

1. Analysis and verifying of criteria also are considered testing during the requirement
collection process.
2. In design review, you look at the design to try to enhance it.

3. On finishing of the code, testing conducted by a developer is also known as testing.

FIG-2: SDLC Model

10
Testing should strive to accomplish the following three basic goals: verification and validation.

FIG-3: Verification and Validation

(2.2.2) Functional Testing

Function testing is a sort of application testing that is conducted against the company's
business needs. The sort of testing is known as a black box test. It involves the whole
integration system to assess the platform conformity with its set requirements. This
form of testing is laid out in the functional specification document.

FIG-4: Functional Testing

11
(2.2.3) Types of Testing

1. Manual Testing- In manual testing, you do manual testing, which means you
use no automated tool or script. This form of test is done by the tester becoming
an end-user and executing the programme to search for any unexpected or
critical behaviour.
2. Automation Testing- Automation testing, often known as test automation, is a
method through which a tester utilises scripts and other tools to perform a
variety of tests on a product.

FIG-5: Automation Testing

12
(2.2.4) Testing methods

FIG-6: Types of Testing.

(2.2.6) Agile Testing

At order to promote the introduction of testers at the conclusion of the development


process, the notion of including them in the beginning emerged, which paved the way
for the introduction of agile testing. The start of the project represents the start of the
agile testing era.

13
FIG-7: Traditional Vs Agile SDLC

(2.2.7) Test Case Writing

Test Case-A test case would be a collection of variables or situations that an engineer
will use to find out if a product under test is accurate and conforms to specifications.
One must include a wide range of fields in a test case.-

1. Test Case ID.


2. Module to be tested.
3. Assumptions-If any
4. Test Data
5. Test Steps
6. Expected results.
7. Result-Pass or Fail
8. Comments

14
FIG-8: Test Case Template

(2.3) Java Programming Fundamentals

Week-2

(2.3.1) Java Overview

Java is really a strong, class-based, object-oriented programming language with the


objective of minimizing implementation dependencies. Because compiled Java code can
execute on any systems that accept Java, the requirement for recompilation is eliminated.
Principles

1. Object-oriented, straightforward, and familiar must be in the final build.


2. To be secure and durable, it must be sturdy.
3. Architecture-neutral and portable is a requirement.
4. It must run quickly.
5. The creation of a dynamic, interpreted, and interwoven meaning must be understood.

15
(2.3.2) JVM

A JVM is a run-time engine that can execute Java programmes. The JVM, the Java
Virtual Machine, initiates the call to the main function inside the Java code. JVM is a
component of the JRE (Java Runtime Environment). In contrast to Perl, Java
applications are known as (WORA-Write Once Run Anywhere). When this is said, it
implies that programmers may build Java source code on one machine and have
confidence that it will operate on any other Java-capable machine without any
modification. Due to the existence of the JVM, this is all feasible.

FIG-9: JVM

JAVA DEVELOPMENT KIT

The Java Development Kit (JDK) is a Programming language software development


environment. The Java Development Kit (JDK) is composed of the Java Runtime
Environment (JRE), an interpreter/loader (Java), a compiler (javac), an archiver (jar), a
documentation generator (Javadoc), and other tools required in Java development.

JAVA RUNTIME ENVIRONMENT

Java Runtime Environment (JRE) is another name for Java RTE. The Java Runtime
Environment (JRE) includes the Java Virtual Machine (JVM), core classes, and auxiliary
files, which provide the necessary for running a Java application.
16
(2.3.3) Java Identifiers

The aim of identifiers in programming languages is to allow for identification. An


identifier in Java may be any of the following: a class name, a method name, a variable
name, or a label. For instance:

public class Test

public static void main (String [] args)

int a = 20;

Within the java code shown above, we have five distinct identifiers:

Test: class name.

main: method name.

String: predefined class name.

args: variable name.

a: variable name.

(2.3.4) Data Types

Since every kind of data is declared explicitly element of a programming language in


Java, it is a statically typed language, as well as a strongly typed language. When it
comes to data, Java has two distinct categories:

1. Primitive Data Type: such as Boolean, char, int, short, byte, long, float, and double
2. Non-Primitive Data Type or Object Data type: such as String, Array, etc.
Primitive Data Types

17
Table-1: Primitive Data Types

Non-Primitive Data Type or Reference Data Types- Because the reference data types
wouldn’t keep a variable value immediately in memory, any reference data types will
now have a memory address that refers to the variable value. They are strings, objects,
arrays, etc.

FIG-10: Non-Primitive Data Types

18
(2.3.5) Variables

A variable is indeed a memory region with a name. A storage unit is one of the
fundamental building blocks of a programme. Variables have the ability to modify their
value while a programme is running.

FIG-11: Variable

(2.3.6) Type Conversion

Assigning a data from one data type to the other may not be possible. To facilitate
automated type conversion, Java can automatically convert the data types for you if
they are equivalent. Otherwise, you must manually convert or cast the values

(2.3.7) Loops

If a certain condition is met, the instructions/functions are repeated.

While loop: A while loop would be a control flow expression that repeats code
depending on a Boolean condition that holds true.

FIG-12: While loop

19
For Loop: The for loop is an easy method to represent the structure of a loop. On a for
loop, you may have just one initialization, one condition, and one increment or
decrement statement in one line, which is helpful when you are trying to analyse the
structure of your loops.

FIG-13: For loop

do while: An example of Exit Control is the do while loop.

FIG-14: do while loop

(2.3.8) Decision Making.

1. if-else: An if statement on its own would perform a sequence of statements whenever a


condition evaluates to true, and otherwise will not.

FIG-15: if-else

20
2.Nested-if: The if expression that would be the subject of someone else if or else is known as
a nested if. If statements may be nested, therefore if statements may be nested as well.

FIG-16: Nested if-else

3. Switch-Case -A multiway branching statement is known as a switch statement. By


providing a straightforward mechanism to assign execution to various sections of script
up to the value of an expression, it eliminates the confusion caused by switch statements.

FIG-17: Switch Case

4. Jump- break, continue, and return are all supported by Java's jump statement. Control is
transferred to other parts of the programme in these three phrases.

Break-A frequent usage of break is to quit a loop or to go to a different section of code


inside a loop.

21
Continue-If forcing an initial execution of a loop may be helpful, do so. In other words,
when you execute the for loop in this instance, you should continue executing the loop,
but not process the rest of the script in the loop body this time around.

Return-With the return statement, you may specify that a method should exit. For
instance, if a method causes a control process to transferring back to the caller, it means
the method will cause the called method to return.

(2.3.9) Static Variable

In addition to the static variables described above, there are also static class variables
which are shared by all the objects of either the class and which may be accessed using
the class name.

(2.3.10) Non-Static Variable

A non-static variable is sometimes termed an instance variable, since every instance


of a class is a separate variable from the static members of the class.

(2.3.11) Classes and Objects

Class-A class is a blueprint or template for creating things from which users derive
user-defined capabilities. All things of one type have the same attributes or methods.
Class declarations may comprise the following elements in this order::

1. Modifiers
2. Class name
3. Superclass (if any)
4. Interfaces (if any)
5. Body: The class body surrounded by braces, { }.
Objects are fundamental in object-oriented programming because they correspond
to physical things in the actual world. Let's use an example: A shopping system
that utilises the internet may feature such terms as "shopping cart", "customer",
and "product".

22
FIG-18: Class and Objects

(2.3.12) Access Modifiers

Class, function Object() { [native code] }, variable, function, and data member scope
may be restricted using Java's access modifiers. Four different kinds of access
modifiers, with the suffix "Default", "Private", "Protected", and "Public" are available
in Java.

(2.3.13) Packages

Classes, sub packages, and interfaces may be safely and accurately packed within Java
packages.

1. Name clashes are prevented through packages.


2. makes class, interface, enumeration, and annotation search and use simpler.
3. Making regulated access available
4. Packages encapsulate data (or data-hiding)

.Built-in Packages-java.lang,,java.io,java.util,java.applet,java.awt and java.net:.

(2.3.14) Inheritance

The way in which one class may inherit the characteristics (fields and methods) with
another class is found in Java's implementation of a class inheritance.

23
Types of Inheritance in Java:

1. Single Inheritance
2. Multilevel Inheritance
3. Hierarchical Inheritance
4. Multiple Inheritance (Through Interfaces)
5. Hybrid Inheritance (Through Interfaces)

(2.3.15) Constructors

The state of an object is initialised using constructors. A function Object () { [native


code] }, like other methods, also includes statements that are performed when the
object is first created.

The different kinds of constructors include:

1. A function Object() { [native code] } with no parameter is called a "no-argument


function Object() { [native code] }."
2. Parameterized function Object() { [native code] } is also known as a function Object()
{ [native code] } with parameters.

(2.3.16) Interfaces

Methods and variables in an interface must be specified as abstract by default


(with method signature, no body). An interface just states how that class must do; it
does not dictate how it does it. it is the class's blue print.

FIG-19: Abstract class and Interface.

24
(2.3.17) Abstraction

Data Abstraction is indeed the feature that gives you the ability to present just the
necessary information to the user. Unimportant or unimportant factors are not made
apparent to the user. When looking at cars, people see them as vehicles rather than
separate components.

Abstract classes and methods

An abstract class is created having the abstract keyword defined inside it.

An abstract method is a method which is explicitly marked as such, yet has no


implementation.

(2.3.18) Encapsulation

To encapsulate data is to enclose it inside a single unit. The means through which code
and data are connected is the mechanism. Another benefit of encapsulation is

1. Data hiding.
2. It enhances flexibility.
3. Reuse
4. The testing of code is simple.

(2.3.19) Runtime Polymorphism

At the moment the call happens, Java uses the property of the object being referenced
to to decide which version (superclass/subclasses) of that function is to be performed.
Thus, runtime polymorphism is the process by which a decision is made at runtime
and this occurrence is termed runtime polymorphism.

Overloading in Java

Some methods have almost the same identity, but have various signatures, based on
number of input arguments, whether the input parameters are of a certain type, or both.

Overriding in Java

Subclassing and overriding are two key concepts in object-oriented programming.

25
Week-3

(2.3.20) Collections

The collection of a items is made up of any set of independent things that are displayed
as a singular body. The “Collection Framework” is an additional framework in Java
that houses all of the collection classes & their associated interfaces in Java SE 1.2.

(2.3.21) Iterators

In the Collection Framework in Java, iterators are used to obtain items one at a time.
Three iterators are involved.

1. Enumeration-To be able to get the items of older collections (Vector, Hash Table), one
must utilise an enumeration.
2. Iterator- it may be applied to any Collection object; it is universal since it can be used
with iterators. Because we use the Iterator, we can both read and delete data using it.
3. ListIterator-It can only be used on collection types like ArrayList, LinkedList, and the
like that implement List.

(2.3.22) ArrayList
Arrays may be found in the java.util package, which belongs to the collection
framework. It is Java's dynamic array.

(2.3.23) HashMap

Since Java 1.2, HashMap<K, V> is a component of Java's collection. It implements


this same Map interface of Java's Map interface. The keys (or values) are organised
into pairs (known as key-value pairs), and the keys may be accessed by an index that
is of a different kind (e.g., an Integer).

(2.3.24) Sets

The java.util.Set interface extends the java.collections.Collection interface, offering an


unsorted collection of objects that do not permit duplicate values. designated Sets in
Java Collections.

1. HashSet
2. Enum Set
26
(2.3.25) Exception Handling

Exception was an unexpected or unwelcome occurrence that happens during the


running of a programme. For example, a faulty router is an exception that may happen
in a computer network. Exception handling is a method to manage runtime failures,
such as the ClassNotFoundException, IOException, or SQLException. Exception
handling's fundamental benefit is to preserve the usual operation of the application..

(2.3.26) File Handling

Java's java.io package provides you with practically every I/O class you'll need to use
in Java. The source and destination of these many streams represents an input and an
output. In the java.io package, you may use streams to store many kinds of data,
including simple values, objects, localised characters, and more.

A stream is a series of data. As I learned to my regret, there are two sorts of streams:

Source − The source to which you will be reading data.

An Output Stream is needed to output data to a location. The 8-bit bytes that are read
and written using Java bytes streams are utilised for input and output. A stream may
be described as a succession of data that you may read and write. Input Stream: Used
to read from an origin and to read from a destination.

Week-4

(2.3.27) JDBC

It is known as Java Database Connectivity (JDBC) in Java. JDBC is really a Java API that
allows you to establish a connection and run a query on a database. The ability to use
JavaSE is an element of the Java SE platform (Java Standard Edition). The JDBC API
connects to the database via JDBC drivers. The four driver types are

1. JDBC-ODBC Bridge Driver,


2. Native Driver,
3. Network Protocol Driver, and
4. Thin Driver

27
FIG-20: JDBC Architecture

We may use JDBC APIs to connect to any relational database and get tabular data
contained in it. The JDBC API enables us to save, retrieve, update, and remove
information from the database. It is similar to the functionality given by Microsoft's
ODBC.

(2.4) Web UI And Datasource

Week-5

(2.4.1) HTML

A standard markup language for online publications, the Hypertext Markup Language,
or HTML, is known as HTML. Cascading Style Sheets (CSS) and programming
languages like as JavaScript may be used to help. HTML documents are served by the
web server or local storage, and the browser renders the Html files creating multimedia
web pages.

1. HTML is an abbreviation for the term Hyper Text Markup Language.


2. The HTML markup language is the standard means of constructing Web pages.
28
3. The framework of such a Web page is described by HTML.
4. HTML is made up of many components.
5. HTML components guide the browser in displaying the material

FIG-21:HTML Page Structure

Table-2: Basic HTML Tags

29
Table-3: Input and Form Tags

Table-4: Table Tags

30
FIG-22: Sample of HTML code

(2.4.2) XML

Like HTML, but without specified tags to utilise, XML is a mark - up language that is
quite similar to HTML. You, however, establish your own tags with your unique
requirements in mind.

31
FIG-23: Basic XML Document

Table-5: Entities

(2.4.3) JSON

JSON is a common text-based format used to express structured data whose format is
defined using JavaScript object syntax. It is often used in online applications for
conveying data.

32
FIG-24: JSON Sample

Week-6

(2.4.4) JavaScript

JavaScript is a language in which both interpreted and just-in-time compilation are


possible. Because of its widespread usage on the Web, but also in a variety of other
non-browser settings, such as Node.js, Apache CouchDB, and Adobe Acrobat,
JavaScript is sometimes referred to as a scripting language.

33
Table-6: Data Types

the four main data structures that JavaScript supports are:


1.Arrays of sequential integers, such as ["one","two","three"]
2. {firstName:"Tom", lastName:"Smith"} are JS records, which are similar to JavaScript
objects, such as {firstName:"Tom", lastName:"Smith"}
3.For instance, you may see something like the following when loading in a map:
{"one":1, "two":2, "three":3}
4.To the entity tables, entity records are special maps that have an ID (or primary key)
slot for each.

FIG-25: JavaScript Sample

34
Week-7

(2.4.5) CSS

In short, CSS is the programming that is used to style online content. The design of
HTML is not a language of programming, as with CSS. You aren't using HTML either.
Cascading Style Sheets (CSS) is a style sheet language. CSS is what you are using to
style HTML elements based on their specific elements.

FIG-26: CSS

Table-7: Different Types of Selector

35
Use of CSS is for web pages, and among other things, it incorporates design, layout,
and various display preferences and standards for different screen sizes.

FIG-27:CSS Sample

(2.4.6) Bootstrap

Responsive, mobile-first web development is supported by the free and open-source


Bootstrap framework. Design patterns including typography, forms, buttons,
navigation, and other interface components may be found in this tool.

FIG-28: Grid System

36
FIG-29: Bootstrap Sample

37
Week-8

(2.4.7) SQL

Microsoft SQL Server is a relational database management system created by


Microsoft. The main role of a database server is to store and retrieve data for other
software programmes as needed. Some of the SQL components include:

1. Statements and questions are made up of clauses, which are also constituents. This is (in
some circumstances) optional.
2. In addition to expressions, which may return scalar numbers or tables made up of rows
and columns of data, you may use expressions which yield more complex results.
3. Predicates, which define criteria that may be examined in SQL to determine whether the
logic evaluates to 3VL (true/false/unknown) or Boolean truth values, and that are used
to limit the impact of statements and queries, or to steer the course of execution.
4. A query is a tool used to search for data that you want, depending on certain parameters.
In terms of SQL, this is a critical factor.
5. Persistent statements, which might regulate transactions, programme flow, connections,
sessions, or diagnostics, or alter schemata and data.

(2.4.8) SQL Manipulation

The restrictions that are applied to the values of particular columns are called column
constraints.

1. Using the PRIMARY KEY constraint allows you to identify a single row.
2. UNIQUE columns include values that are unique to each row.
3. Only columns with a value are required to be of type NOT NULL.
4. The DEFAULT column will have a default value if no value is supplied when it is
created.
A new table is created in a database when you issue the command "CREATE TABLE".
Incorporating this feature enables one to identify and label the table and each column
inside it.

38
FIG-30: Create Table

Inserting new records (rows) into tables is done using the INSERT INTO command.
In other words, it has two distinct states:

1. Insert the content into the columns in the correct sequence.


2. Use "Name" columns instead.

FIG-31: Bootstrap Sample

To alter all columns of an existing table, use the ALTER TABLE statement. It is often
used in combination with the Create COLUMN clause to introduce a new column.

FIG-32: Alter Table

To remove records (rows) in such a table, use the DELETE command. In this example,
the WHERE clause is used to determine which record(s) should be destroyed. All records
will be erased if the WHERE clause is removed.

39
FIG-33: Delete Statement

(2.4.9) Queries

A SELECT query including the keyword SELECT* retrieves all columns from the table
referenced in the result set. This query will return all of the movies' columns and records
(rows).

FIG-34: Select Statement

Where is used to restrict the number of rows (records) that meet a certain criterion.
Every records in which the pub year is 2017 will be returned by the query.

FIG-35: Where Clause

You may use the BETWEEN operator to restrict your search to a certain range of
values. Text, integers, or date data may be in the range of values. Any movie released
between 1980 and 1990 will be found in the search results.

FIG-36: Between operator

You may use the ORDER BY clause to sort the result set in alphabetical or numerical
order. Ordered in two ways: It may be ordered in two ways:

1. One may sort the results in decreasing order by using the keyword DESC.
2. ASC is a keyword used to sort the results in the order of increasing value
(default)

40
FIG-37: Order By

You may use the AND operator to evaluate several criteria. A result set may only
comprise records that meet both requirements connected by AND. This query will
return results for any blue vehicle that was manufactured after 2014.

FIG-38: AND Operator

Multiple criteria may be merged using the OR operator. Records containing either the
AND or the OR in their search criteria are recorded in the returned result set.

FIG-39: OR Operator

(2.4.10) Aggregate Functions

Grouping entries in a sequence database by similar value over one or even more
columns using the GROUP BY clause. When used with aggregate functions, it is often
it is often used to get data about entries that are comparable.

FIG-40: Group By Clause

41
The HAVING clause is being used to offer additional filter groups to the result set
produced by the GROUP BY clause. When using aggregate functions in conjunction
with aggregate functions, you may filter result sets depending on to an aggregate
property.

FIG-41: Having Clause

Aggregate functions calculate a number on a group of values and return one number:

1. COUNT()
2. SUM()
3. MAX()
4. MIN()
5. AVG()

(2.4.11) Multiple Tables

Every record in a SQL database has a unique primary key field, since that field is used
to identify each record. A main key must be populated..

FIG-42: Primary

The foreign key is indeed a reference from one table's records to the table that
contains. Foreign key functionality is crucial to retain numerous records for a given
row.

42
FIG-43: Foreign key

UNION is used to collect data from numerous SELECT queries and eliminate duplicates.

FIG-44: Union

A CROSS-JOIN clause has been used to connect each row through one table to each row from
another, and to do so, these clauses include specific rules that govern the contents of each result
set row

FIG-45: Cross Join Clause

Using an ON clause, results from even more than one tables may be combined to provide results
based on their common column values.

FIG-46: ON Clause
43
Though the join requirement is not satisfied, rows from distinct tables are combined even if the
join expression has been specified. The left join retrieves every row in the left table, but only
if the join condition is fulfilled, which is why NULL values are used to fill in the fields from
the right table

FIG-47: Join

The WITH clause stores the result of a query in a temporary table (temporary movies) using
an alias. Multiple temporary tables can be defined with one instance of the WITH keyword.

FIG-48: With Clause

44
CHAPTER-3: PERFORMANCE ANALYSIS

Performance of Code Challenges -

Java CC-1 75/100

Java CC-2 82/100

JavaScript CC 100/100

XML & JSON CC 100/100

Performance of Integrated Capability Test (ICT) –

Functional Testing 82/100

Java Programming Fundamentals 100/100

45
CHAPTER-4: CONCLUSION

My internship with cognizant will finish on August 16, 2021, however over these eight
weeks, I have increased my expertise in many technologies.

I'd want to thank all the coaches, SMEs, mentors, and trainers that assisted me throughout
my internship at Cognizant. They helped me when I was having problems, and were there
to handle all of my questions. My trainer, in particular, put in additional effort and served
as an intern while working to pass on all of our inquiries to the corporation's higher
authorities, including any queries about scheduling or workload.

My gratitude always go to TNP Officer Mr. Pankaj Kumar and Dr. Nafis U Khan, who went
above and beyond to support and help with the whole placement effort.

46
REFERENCES

[1] Organization Handbook

[2] Organization Curriculum

[3] www.udemy.com

[4] www.geeks4geeks.com

[5] www.tutorialspoint.com

47
final project report
ORIGINALITY REPORT

17 %
SIMILARITY INDEX
13%
INTERNET SOURCES
2%
PUBLICATIONS
12%
STUDENT PAPERS

PRIMARY SOURCES

1
Submitted to Jaypee University of Information
Technology
2%
Student Paper

2
Submitted to Sogang University
Student Paper 2%
3
www.geeksforgeeks.org
Internet Source 2%
4
www.codecademy.com
Internet Source 2%
5
www.ir.juit.ac.in:8080
Internet Source 1%
6
www.nishorgo.org
Internet Source 1%
7
tutorialspoint.dev
Internet Source 1%
8
www.slideshare.net
Internet Source 1%
9
www.scribd.com
Internet Source 1%
10
en.wikipedia.org
Internet Source <1 %
11
Submitted to University of Wales Swansea
Student Paper <1 %
12
Submitted to Central Queensland University
Student Paper <1 %
13
Submitted to Gusto International College
Student Paper <1 %
14
Submitted to Modi Apollo International
Institute
<1 %
Student Paper

15
Submitted to CTI Education Group
Student Paper <1 %
16
Kishori Sharan. "Beginning Java 9
Fundamentals", Springer Science and
<1 %
Business Media LLC, 2017
Publication

17
novatechsol.com
Internet Source <1 %
18
Submitted to Middlesex University
Student Paper <1 %
19
www.metaglossary.com
Internet Source <1 %
20
navinwbackup.blogspot.com
Internet Source <1 %
<1 %
21
www.answers.com
Internet Source

22
www.onlinetutorial.co.in
Internet Source <1 %
23
data-flair.training
Internet Source <1 %
24
www.educba.com
Internet Source <1 %
25
"Beginning Java® Programming", Wiley, 2012
Publication <1 %
26
codenza.app
Internet Source <1 %
27
github.com
Internet Source <1 %
28
text.123doc.org
Internet Source <1 %
29
tutorials.ducatindia.com
Internet Source <1 %
30
www.coursehero.com
Internet Source <1 %
31
www.svecw.edu.in
Internet Source <1 %
32
www.vsbec.com
Internet Source <1 %
JAYPEE UNIVERSITY OF INFORMATION TECHNOLOGY, WAKNAGHAT
PLAGIARISM VERIFICATION REPORT
Date: 17-06-2021 ✓
Type of Document (Tick): PhD Thesis M.Tech Dissertation/ Report B.Tech Project Report Paper

Name: Sarthak Pachauri Department: CSE Enrolment No 171308


Contact No:7807049958 E-mail: [email protected]
Name of the Supervisor: Mr. Surjeet Singh
Title of the Thesis/Dissertation/Project Report/Paper (In Capital letters): INTERNSHIP REPORT

UNDERTAKING
I undertake that I am aware of the plagiarism related norms/ regulations, if I found guilty of any plagiarism and
copyright violations in the above thesis/report even after award of degree, the University reserves the rights to
withdraw/revoke my degree/report. Kindly allow me to avail Plagiarism verification report for the document
mentioned above.
− Total No. of Pages =51
− Total No. of Preliminary pages =7
− Total No. of pages accommodate bibliography/references =1

(Signature of Student)
FOR DEPARTMENT USE
We have checked the thesis/report as per norms and found Similarity Index at 17 (%). Therefore, we are
forwarding the complete thesis/report for final plagiarism check. The plagiarism verification report may be
handed over to the candidate.

(Signature of Guide/Supervisor) Signature of HOD

FOR LRC USE


The above document was scanned for plagiarism check. The outcome of the same is reported below:
Copy Received on Excluded Similarity Index Abstract & Chapters Details
(%)

Word Counts
• All Preliminary
Pages
• Bibliography/ Character Counts
Report Generated on
Images/Quotes Submission ID Page counts
• 14 Words String
File Size

Checked by
Name & Signature Librarian
..……………………………………………………………………………………………………………………………………………………………………………

Please send your complete Thesis/Report in (PDF) & DOC (Word File) through your Supervisor/Guide at
[email protected]
ORIGINALITY REPORT

17 %
SIMILARITY INDEX
9%
INTERNET SOURCES
3%
PUBLICATIONS
6%
STUDENT PAPERS

PRIMARY SOURCES

1
Submitted to Asian Institute of Technology
Student Paper 4%
2
towardsdatascience.com
Internet Source 3%
3
Submitted to Jaypee University of Information
Technology
5%
Student Paper

4
github.com
Internet Source 1%
5
Satish Kumar Satti, K. Suganya Devi, Prasenjit
Dhar, P. Srinivasan. "A machine learning
1%
approach for detecting and tracking road
boundary lanes", ICT Express, 2020
Publication

6
www.thushv.com
Internet Source 1%
7
www.coursehero.com
Internet Source 1%
JAYPEE UNIVERSITY OF INFORMATION TECHNOLOGY, WAKNAGHAT
PLAGIARISM VERIFICATION REPORT
Date: 17-06-2021 
Type of Document (Tick): PhD Thesis M.Tech Dissertation/ Report B.Tech Project Report Paper

Name: Sarthak Pachauri Department: CSE Enrolment No 171308


Contact No:7807049958 E-mail: [email protected]
Name of the Supervisor: Mr. Surjeet Singh
Title of the Thesis/Dissertation/Project Report/Paper (In Capital letters): INTERNSHIP REPORT

UNDERTAKING
I undertake that I am aware of the plagiarism related norms/ regulations, if I found guilty of any plagiarism and
copyright violations in the above thesis/report even after award of degree, the University reserves the rights to
withdraw/revoke my degree/report. Kindly allow me to avail Plagiarism verification report for the document
mentioned above.
− Total No. of Pages =51
− Total No. of Preliminary pages =7
− Total No. of pages accommodate bibliography/references =1

(Signature of Student)
FOR DEPARTMENT USE
We have checked the thesis/report as per norms and found Similarity Index at 17 (%). Therefore, we are
forwarding the complete thesis/report for final plagiarism check. The plagiarism verification report may be
handed over to the candidate.

(Signature of Guide/Supervisor) Signature of HOD

FOR LRC USE


The above document was scanned for plagiarism check. The outcome of the same is reported below:
Copy Received on Excluded Similarity Index Abstract & Chapters Details
(%)

Word Counts
• All Preliminary
Pages
• Bibliography/ Character Counts
Report Generated on
Images/Quotes
Submission ID Page counts
• 14 Words String
File Size
Checked by
Name & Signature Librarian
..……………………………………………………………………………………………………………………………………………………………………………

Please send your complete Thesis/Report in (PDF) & DOC (Word File) through your Supervisor/Guide at
[email protected]

You might also like