0% found this document useful (0 votes)
14 views

full document

Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

full document

Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 65

1.

INTRODUCTION

The first recorded cyber crime took place in the year 1820! That is not
surprising considering the fact that the abacus, which is thought to be the earliest
form of a computer, has been around since 3500 B.C. in India, Japan and China.
The era of modern computers, however, began with the analytical engine of
Charles Babbage.
In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the
loom. This device allowed the repetition of a series of steps in the weaving of
special fabrics. This resulted in a fear amongst Jacquard's employees that their
traditional employment and livelihood were being threatened. They committed
acts of sabotage to discourage Jacquard from further use of the new technology.
This is the first recorded cyber crime!

Today computers have come a long way, with neural networks and nano-
computing promising to turn every atom in a glass of water into a computer
capable of performing a Billion operations per second.

Cyber crime is an evil having its origin in the growing dependence on computers
in modern life. In a day and age when everything from microwave ovens and
refrigerators to nuclear power plants is being run on computers, cyber crime has
assumed rather sinister implications. Major cyber crimes in the recent past include
the Citibank rip off. US $ 10 million were fraudulently transferred out of the bank
and into a bank account in Switzerland. A Russian hacker group led by Vladimir
Kevin, a renowned hacker, perpetrated the attack. The group compromised the
bank's security systems. Vladimir was allegedly using his office computer at AO
Saturn, a computer firm in St. Petersburg, Russia, to break into Citibank
computers. He was finally arrested on Heathrow airport on his way to
Switzerland. People hesitate and fear to go directly for giving the complaint ,So
rectifying this problem ,we introduced this online cyber crime process, this
process is used for online complaints for people and easily solved their problems.

1.2 PROJECT OVERVIEW

Cyberspace is the software aimed at providing a wide range of access to


the administrator in managing and monitoring the complaints registered by the
customers regarding the problems they face in accessing the connections extended
by the Cyberspace. The administrator can even maintain the record of the
employees working in the organization in allocating the tasks of attending to the
complaints raised by the customers. This intranet-based application provides the
user of the system a centralized view of the things maintained in the software
depending on the privileges assigned by the administrator accordingly. Customers
also see their data and they can send complaints to service provider if they have
any problems regarding internet. In this, there are different types employees are
there to solve problems which have posted by the customers. Administrator has to
assign the work to employees. Whenever employee logging in site he can see the
latest work. Employee has to solve the problem send the answer to customer
directly.
2. SYSTEM ANALYSIS

System Analysis is first stage according to System Development Life Cycle


model. This System Analysis is a process that starts with the analyst. Analysis is a
detailed study of the various operations performed by a system and their
relationships within and outside the system. One aspect of analysis is defining the
boundaries of the system and determining whether or not a candidate should
consider other related systems. During analysis, data is collected from the
available files, decision points, and transactions handled by the present system.
Logical system models and tools are used in analysis. Training, experience, and
common sense are required for collection of the information needed to do the
analysis.

2.1 FEASIBILITY STUDY

Technical Feasibility
CYBERSPACE is the product that is designed mainly on Java. The main reason
behind choosing the Java environment is that, as the users. In order to post the
queries to related Organization always require Input screen which usually
provides services all around the time. Such environment that always gives instant
reply to the users should support input screen. These requirements are satisfied by
Java, as it is multi platform environment supports web Browser where as other
languages lack these features.

In order user to continuously communicate he/she needs a reliable protocol i.e., is


TCP/IP protocol. The Cyberspace protocol frequently transfers messages between
client and user. Communication Standards such as HTTP is used .An HTTP is a
client/server interaction consists of a single request/reply interchange, it user-
friendly environment.

Economic Feasibility
As CYBERSPACE which provides continuous communication to users at the
front end, provides solutions to different queries to various different problems as
get from the use of different product. And the solutions for their queries are sent to
them by messaging to their sites within the expiry time or the time mentioned i.e.,
within 12hrs or 24hrs.

Operational Feasibility
Operations done in the CYBERSPACE are very fast and are able to succeed in
sending the responses very fastly. Updating is done very quickly that the modified
data is stored in the database in no time. Its supports up to five hundred
simultaneously users against the central database at any given time.
2.2 EXISTING SYSTEM:

1. Cyberspace has been automated in 2003 using Html as front end and SQL
Server as backend. This system is well adopted but could cater only stores the
complaints but could not send complaints. It requires lot of attention and risk from
the user’s side. Other departments such as employee had not automated. So this
Intranet solution proves to be extremely good. In the present system the user has
to login and he can send the problems. He also maintains the details of the old
complaints.
2. Administrator cannot maintain old complaints in this system and last
disadvantage is database. In this data base is ms access so that’s why it’s old one.

2.3 PROPOSED SYSTEM:

1.Proposed system are those that are automated, so that it is easy to retrieve
the responses from the system fast and updating the details once the response or
services are provided to the end-users upon their request without any difficulty
and saves time.
2. Cyberspace using jsp as front end and Oracle as backend. This system is
Very good it stores the details of all customers and also employees.
3. In the present system we can maintain the old complaints and also update
the customers and employees information. by using oracle we store the stored
procedures, so that why we are using oracle.
3. SYSTEM CONFIGURATION

3.1 HARDWARE SPECIFICATION:

Processor : Intel P-III based system

Processor Speed : 250 MHz to 833MHz

RAM : 64MB to 256MB

Hard Disk : 2GB to 30GB

3.2 SOFTWARE SPECIFICATION:

Language : JSP

Database : SQL Server

Operating System : Any Operating System.


3.3 ABOUT THE SOFTWARE:

Introduction to html:

The hypertext markup language (HTML) is a simple markup language. Used to


create a hypertext documents that are portable from one platform to another
HTML documents are SGML (Standard generalized mark up language)
documents with generic semantics that are appropriate for representing
information from a wide range of applications. This specification defines HTML
version 3.2. HTML 3.2 aims to capture recommended practice as of early ’96 and
as such a replacement for HTML2.0 (RFC 1866).
A set of instructions embedded in a document is called mark up language. These
instructions describe what the document text means and how it should look like in
a dCyberspacelay. Hyper Text Mark Up language (HTML) is the language used to
encode World Wide Web documents.

WHY TO USE HTML?

Website is a collection of pages, publications, and documents that reside on web


server. While these pages publications and a document as a formatted in a single
format, you should use HTML for home page and all primary pages in the site.
This will enable the millions of web users can easily access and to take advantage
of your website.
HTML is considered first for formatting any new material you plan to
publish on the web. HTML documents are platform independent, meaning that
they don’t confirm to any standard. If they are created properly you can move
home page to any server platform or you can access them with any complaint
www browser.

STRUCTURE OF HTML:

HTML elements perform a defined task. HTML uses two types of elements

. Empty Tags
. Container Tags
These tags differ because of what they represent. Empty tags represent formatting
constricts such as line breaks and horizontal rules. Container tags define a section
of text, formats and dot all of the selected text. A container tag has both a
beginning and an ending.

HTML LAYOUT:

An HTML document consists of text, which comprises the content of the


document and tags, which, defines the structure, and appearance of the document.
The structure of an HTML document is simple, consists of outer.

<HTML>tag enclosing the document header and body


<HTML>
<HEAD>
<TITLE>the title of HTML document</TITLE>
</HEAD>
<BODY>
This is where the actual HTML documents
Text lies, which is dCyberspacelayed in the browser
</BODY>
</HTML>

Each document has a head and body delimited by the <HEAD> and <BODY> tag.
The head is where you give your HTML document a title and where you indicate
other parameters the browser may use when dCyberspacelaying the document.
This includes the text for dCyberspacelaying the text. Tag also references special
and indicates the hot spots that link your document to other documents.

HTML FORMS:

Creating a form usually involves two independent steps: Creating the layout
for the form itself and then writing a script program on the server side to process
the formation you get back from a form.

To create a form, You use the <FORM> tag. Inside the opening and closing
FORM tags are each of the individual form elements plus any other HTML
content to create a layout for that form.

The opening tag of the FORM element usually includes the attributes:
METHOD and ACTION. The METHOD attributes can be either GET or POST
which determines how your form data is sent to the script to process it.
The ACTION attribute is a pointer to the script that processes the form on
the server side. The ACTION can be included by a relative path or by a full URL
to a script on your server or somewhere else. For example, the following
<FORM> tag would call a script called form-name in cgi-bin directory on server
www.myservser.com

<FORM Method= post action=http://www.mytservser.com/cgi-bin/form-name.pl>


……………….
</FORM>

METHOD ATTRIBUTE:

The other required attribute for the <form> tag sets the methods by which the
browser form’s data to the server for processing. There are two ways: the POST
method and GET method. With POST method, the browser sends the data in two
steps: the browser first contacts the form-processing server specified in the action
attributes, and once contact is made, sends the data.

The GET method in the other hand, contacts the form processing server and sends
the form data in a single transaction step: the browser appends the data to the
form’s action URL, separated by the question mark (?) character.

Introduction to JavaScript

JavaScript:
JavaScript is a new scripting language for WebPages. Scripts written with
java script can be embedded into your HTML pages. With java script you have
many possibilities for enhancing your HTML page with interesting elements. For
example you are able to respond to user-initiated events quite easily. Some effects
that are now possible with java script were some time ago only possible with CGI.
So you can create really sophisticated pages with the helps of java script on the
Internet.

Difference between java and Java Script

Although the names are almost the same Java is not the same as Java Script.
These are two different techniques for Internet programming. Java
Cyberspacerogramming language. JavaScript is a scripting language as the name
implies. The difference is that we can create real programs with java. But java
script in not real programming. Java Script is meant to be easy to understand and
easy to use. JavaScript authors should not have to care too much about
programming. We could say that Java Script is rather an extension to HTML than
a separate computer language. Of course this is not the official definition but it
makes it easier to understand the difference between java and java script.

How can Java Script scripts run?

The first browser to support java script was the Netscape Navigator 2.0 of
course the higher versions do have java script as well. You might know that java
does not run on all Netscape Navigators 2.0 (or higher versions) versions. But
this is not true for java script -although there are some problems with the different
versions.
The Mac version for example seems to have many bugs. In the near future
there are going to be some other browsers, which support java script. The
Microsoft Internet explorer 3.0 is going to support java script. JavaScript enabled
browsers are going to spread soon - it is worth learning this new technique now.
You might realize that is really easy to write Java Script scripts. We have to know
is some basic techniques and some work-around for problems you might
encounter. Of course we need a basic. Understanding HTML before reading this
tutorial you can find many really good online resources about HTML. Best you
make an online search about ‘html’ at yahoo if you want to get informed about
HTML. Now I want to show some small scripts so you can learn how they are
implemented into HTML-documents and to show which possibilities you have
with the new scripting language. The following is a very small script, which will
only print a text into an HTML document.

<html>
<head>
My first JavaScript
</head>
<body><br>
This is a normal HTML document
<br>
<script language=”JavaScript”>
Document.write (“this is a java script”)
</script><b r>
Backing HTML again
</body>
</html>

If you are using a java script enabled-browser at the moment then you will have
the possibility to see this script working. If your browser doesn’t support Java
Script then this output might be some kind of strange…
This is a normal HTML document
This is java script!
Back in HTML again.

Functions

Functions are bet declared between the <Head> tag of HTML page. Functions are
called by user-initiated events. Seems reasonable to keep the functions between
the <Head> tags. They are loaded first before a user can do anything that might
call a function. Scripts can be placed between inside comment fields to ensure
that older browser do not dCyberspacelay the script itself.

<html>
<head>
<script language=”JavaScript”>
function pushbutton (){
alert (“Hello!”);
}
</script>
</head>
<body>
<form>
<input type=”button” name=”Button1” value=”push me” onclick=”pushbutton
()”>
</form>
</body>
</html>

If we want to test this one immediately and you are using a Java Script enabled
browser then please go ahead and push the button.
This script will create a button and when you press it a window will pop up saying
“hello!”. In fact we have a lot of possibilities just by adding functions to our
scripts.
The common browsers transmit the form information by either method: here’s the
complete tag including the GET transmission method attribute for the previous
form

Example

<Form method =GET action=http://www.mycompany.com/cgi-bin/upfdate.pl>


………
</form>

Input elements.

Use the <input> tag to define any one of a number of common form elements
including text fields multiple choice lists click able images and submission
buttons. There are many attributers for this tag only that types and name attributes
are required for each element, each type of input element uses only a subset of the
followed attributes. Additional <input> attributes may be required based upon
which type of the form element you specify.

Submit button:

The submit button (<input type=submit> ) does what its name implies, settings in
motion the form’s submission to the server from the browser. We many have
more than submit buttons will be added to the parameter list the browser sends
along to the server.

Example
< Input type =”submit”>
<Input type=”submit” value=”submit” name=”name”>

Reset button:

The reset button if firm <input> button is nearly self- explanatory; it lets the user
reset erase or set to some default value all elements in the form. By default the
browser dCyberspacelays a reset button worth the label “reset”. We can change
that by specifying a value attribute with tour own button label.
INTRODUCTION TO JDBC

JDBC (Java Database connectivity) is a front-end tool for connecting to a server


to ODBC in that respect, however JDBC can connect only java client and it uses
ODBC for the connectivity. JDBC is essentially a low-level API since any data
manipulation, storage and retrieval has to be done by the program itself. Some
tools, which provide a higher-level abstraction, are expected shortly.

The next question that needs to be answered is why we need JDBC, once
we have ODBC on hand. We can use the same ODBC to connect the entire
database and ODBC is a proven technology.
Problem for doing this is ODBC gives a ‘c’ language API, which uses
pointers extensively. Since java does not have any pointes and is object-oriented
sun Microsystems, inventor of java developed to suit its needs.

Requirements to use JDBC:


To use JDBC you need a basic knowledge of databases and SQL.A part from this
you need the jdk1.1 (Java Development Kit1.1 available javasoft’s website) or a
version of Java since jdk1.1 and above come bundled with JDBC software.

After that you need to have a back-end database engine for which a JDBC driver
is available. When JDBC drivers are not available JDBC-ODBC bridge drivers are
used to access the database through ODBC. Back-end is not needed when JDBC
driver is capable of storing and retrieving the data itself, or if JDBC-ODBC
Bridge and the ODBC driver can be used to store and retrieve the information.
OVERVIEW OF SQL SERVER

DATABASE

A database is a set of data, organized for easy access. The database is


an actual data; it is the database that you will be accessing when you need to
retrieve data.

DATA DICTIONARY

The data dictionary is a set of tables SQL uses to maintain information


about the database. The data dictionary contains information about tables, indexes,
clusters and so on.

DBA (DATABASE ADMINISTRATOR)

The DBA is the person responsible for the operation, configuration and
performance of the database. The DBA is charged with keeping the database
operating smoothly, ensuring that backups are done on regular basis (and that
backups work), and installing new software. Other responsibilities might include
planning for future expansion and disk space needs, creating databases and table
spaces, adding users and maintaining security, and monitoring the database and
retuning it as necessary. Large installations might have teams of DBA’s to keep
the system running smoothly; alternatively, the task might be segmented among
the DBA’s.

STRUCTURED QUERY LANGUAGE (SQL)

SQL is an ANSI standard computer programming language used to


query relational databases. The ANSI standard for SQL specifies the core syntax
for language itself.
Create Table Command: This is used to create a table in database specifying the
columns in it.

Syntax: create table table_name (column_name datatype(size));

Insertion of values: This is used to insert values to the specified columns in the
table.

Syntax: insert into table_name values (expressions);

Viewing Data from tables: This is used to view the content’s of the table created.
Syntax: select * from table_name;

Creating a table from existing table: This is used to create a table from existing
table by taking the columns needed.

Syntax: create table table_name[(column_name)] as select column_name from


table_name;

Inserting data into a table from another table: This is used to insert rows from
one table into another table.

Syntax : insert into table_name values select column_name from table_name;

Delete operation: The verb DELETE in SQL is used to remove all rows from
table, or a selected set of rows from a table.
Syntax: delete from table_name; (deletes all rows)

Syntax: delete from table_name where condition; (deletes specified rows based on
condition)

Updating the contents of a table: the update command is used to change or


modify data values in a table. To update all the rows from table OR a select set of
rows from a table.

Syntax: update table_name set column_name = expression; (updates all the rows)

Syntax: update table_name set column_name =expression where condition;


(updates selected rows based on condition)

Modifying existing columns: This is used in situation whenever we need to


change the type and size of the column.

Syntax: Alter table table_name modify (column_name new datatype (new size));

Renaming tables: To change the table name.

Syntax: rename oldtable_name to newtable_name;

Destroying tables: This is used to delete any table from the database.
Syntax: drop table_name;

Finding out the tables created by user: To display all the tables which are there
in our database.

Syntax: select * from tab;

Finding out the columns details of a table created: To check which columns are
present and what is there datatype& size we use this command i.e. desc.

Syntax: desc table_name;


JAVA (JDK1.6)
A high-level programming language developed by Sun Microsystems. Java was
originally called OAK, and was designed for handheld devices and set-top boxes.
Oak was unsuccessful so in 1995 Sun changed the name to Java and modified the
language to take advantage of the burgeoning World Wide Web. Java is an object-
oriented language similar to C++, but simplified to eliminate language features
that cause common programming errors. Java source code files (files with a .java
extension) are compiled into a format called byte code (files with a .class
extension), which can then be executed by a Java interpreter. Compiled Java code
can run on most computers because Java interpreters and runtime environments,
known as Java Virtual Machines (VMs), exist for most operating systems,
including UNIX, the Macintosh OS, and Windows. Byte code can also be
converted directly into machine language instructions by a just-in-time compiler
(JIT). Java is a general purpose programming language with a number of features
that make the language well suited for use on the World Wide Web. Small Java
applications are called Java applets and can be downloaded from a Web server
and run on your computer by a Java-compatible Web browser, such as Netscape
Navigator or Microsoft Internet Explorer.
Java server page (JSP)
Java Server Page (JSP) is a technology for controlling the content or appearance
of Web pages through the use of servlets, small programs that are specified in the
Web page and run on the Web server to modify the Web page before it is sent to
the user who requested it. Sun Microsystems, the developer of Java, also refers to
the JSP technology as the Servlet application program interface (API). JSP is
comparable to Microsoft's Active Server Page (ASP) technology. Whereas a Java
Server Page calls a Java program that is executed by the Web server, an Active
Server Page contains a script that is interpreted by a script interpreter (such as
VBScript or JScript) before the page is sent to the user. An HTML page that
contains a link to a Java servlet is sometimes given the file name suffix of .JSP.
Apache tomcat
Apache Tomcat is a web container, or application server developed at the Apache
Software Foundation (ASF). Tomcat implements the Java Servlet and the
JavaServer Pages (JSP) specifications from Sun Microsystems, providing an
environment for Java code to run in cooperation with a web server. It adds tools
for configuration and management but can also be configured by editing
configuration files that are normally XML-formatted. Tomcat includes its own
internal HTTP server.
4. SYSTEM DESIGN

4.1 NORMALIZATION:

Relations are to be normalized to avoid anomalies. In insert, update


and delete operations. Normalization theory is built around the concept of normal
forms. A relation is said to be in a particular form if it satisfies a certain specified
set if constraints. To decide a suitable logical structure for given database design
the concept of normalization, which are briefly described below.

1.1 st Normal Form (1 N.F):


A relation is said to be in 1 NF is and only if all unaligned domains
contain values only. That is the fields of an n-set should have no group items and
no repeating groups.

2.2 nd Normal Form (2 N.F) :


A relation is said to be in 2 NF is and only if it is in 1 NF and every
non key attribute is fully dependent on primary key. This normal takes care of
functional dependencies on non-key attributes.

3.3 rd Normal Form (3 N.F) :


A relation is said to be in 3 NF is and only if it is in 2 NF and every
non key attribute is non transitively dependent on the primary key. This normal
form avoids the transitive dependencies on the primary key.
4.Boyce code Normal Form (BCNF) : This is a stronger definition than that of
NF. A relation is said to be in BCNF if and only if every determinant is a
Candidate key.

5.4 th Normal Form (4 NF) :


A relation is said to be in 4 NF if and only if whenever there exists a
multi valued dependency in a relation say A->->B then all of the relation are also
functionally dependent on A(i.e. A->X for all attributes x of the relation.).
6.5 th Normal Form (5 NF) OR Projection Join Normal Form (PJNF):
A relation R is in 5 NF .if and only if every join dependency in R is
implied by the candidate key on R . A relation can’t be non-loss split into two
tables but can be split into three tables. This is called Join Dependency.
4.2 TABLE DESIGN

ILogin_MasterAdmin:

User Name Varchar2(20)


Password Varchar2(20)

ILogin_MasterCust:

Cust_id number
Username varchar2(20)
Password varchar2(20)
Cust_type varchar2(20)
Address1 varchar2(30)
Address2 varchar2(30)
Email_id varchar2(20)
Phone number
Faxno number
ConnType number

Employee CYBERSPACE:
Emp_id number
Emp_name varchar2(20)
Password varchar2(20)
emp_type varchar2(20)
Dept varchar2(20)
Contact_no number
Email varchar2(20)
address1 varchar2(20)
address2 varchar2(20)

CustCompliants:
cust_id Number
Complaint_id Number
Complaint_type varchar2(20)
Complaint_desc varchar2(20)
Complaint_date Date

AsignComplaints:
Emp_id Number
Comp_id Number
Cust_id Number
comp_type varchar2(20)
comp_desc varchar2(20)

SolveProb:

Emp_id Number
Comp_id Number
Cust_id Number
comp_type varchar2(20)
comp_desc varchar2(20)
Solution varchar2(20)

4.3 INPUT DESIGN:


The input was classified into various forms, sometimes the user give manual

inputs like text (numeric, string, character, special characters). Sometimes the user

itself became a input like the biometric inputs such as finger print, palm print, iris,

foot print and so on. In our proposed project the user gives input through manual

options such as unique username and password for access the application. The

user gives input through neither keyboard nor any sensors. The user can give any

type of input randomly. he can use any window frames through GUI control. The

forms also entered manually by the user.


4.4 SFD/DFD
ARCHITECTURE DIAGRAM

CYBERSPACE

ADMINISTRATOR CUSTOMERS EMPLOYERS HOME

Login Login Login

My Info My Complaint Info My Info My Task Info

Add new complaint


Solving
problem

Customer Complaints Employers Logout

Add new Update


Add new Update Employer existing
customer existing employer
customer

Latest Pending Completed Assign work to


Complaints Complaints Employers
DATA FLOW DIAGRAMS

Zero Level: Cyberspace

Administrator

Cyber
Customers Space

Database

Employee
Level 1: Admin

Login

Customer User
validatio
New Customer n Database
Update details Admin
process

New Complaints

Pending Add new


complaints employer

Assign work to Updating


employee employee details

Completed
Level 2: Customer

Login

User
validat
My Information
ion Database

Complai
nt
process

My Complaint
information

Add Complaints
Level 3 : Employer

Login

User
validati
on Database
My Information

Employe
e
process

My Task
information

Solving Problem

E-R Diagram:

usernam passwor Comp Comp


e d ID type
Cust Customer Cust Customer Complaints
type ID

Addres E-mail
s ID Comp desc Comp type

Admi
n
Comp_de
s Assign Complaint
empnam passwor
e d
Comp_typ Cus_id
e
Employer Emp
ID
Comp_i Emp_id
d
Emp type Addres E-mail
s ID

5. SYSTEM DESCRIPTION
MODULES:
1. Administrator
2. Employee
3. Customer

1. ADMINISTRATOR:
Administrator can add employees and also customers whenever they join
in to organization. He has to maintain the details of all employees as well as
customers. If any customer post problem he has to assign that problem to related
employee. And also admin can update customer details.

2. EMPLOYEE:
Employee has to login and if admin assign any work to employee, he has
to solve the problem and post solution to that particular customer. So he can see
his details and he cannot change the details.

3. CUSTOMERS:
In this module customers can login by using their own id and password.
Customers can see their details and also if they have problem in internet also post
that problem to provider. You will get solution after employee solved.

6. TETING AND IMPLEMENTATION


TESTING
Software Testing is a critical element of software quality assurance and
represents the ultimate review of specification, design and coding, Testing
presents an interesting anomaly for the software engineer.

Testing Objectives include:

1. Testing is a process of executing a program with the intent of finding an


error
2. A good test case is one that has a probability of finding an as yet
undiscovered error
3. A successful test is one that uncovers an undiscovered error

Testing Principles:

 All tests should be traceable to end user requirements


 Tests should be planned long before testing begins
 Testing should begin on a small scale and progress towards testing in
large
 Exhaustive testing is not possible
 To be most effective testing should be conducted by a independent
third party

TESTING STRATEGIES
A Strategy for software testing integrates software test cases into a series of
well planned steps that result in the successful construction of software. Software
testing is a broader topic for what is referred to as Verification and Validation.
Verification refers to the set of activities that ensure that the software correctly
implements a specific function. Validation refers he set of activities that ensure
that the software that has been built is traceable to customer’s requirements

Unit Testing:

Unit testing focuses verification effort on the smallest unit of software


design that is the module. Using procedural design description as a guide,
important control paths are tested to uncover errors within the boundaries of the
module. The unit test is normally white box testing oriented and the step can be
conducted in parallel for multiple modules.

Integration Testing:

Integration testing is a systematic technique for constructing the program


structure, while conducting test to uncover errors associated with the interface.
The objective is to take unit tested methods and build a program structure that has
been dictated by design.
Top-down Integration:

Top down integrations is an incremental approach for construction of


program structure. Modules are integrated by moving downward through the
control hierarchy, beginning with the main control program. Modules subordinate
to the main program are incorporated in the structure either in the breath-first or
depth-first manner.

Bottom-up Integration:

This method as the name suggests, begins construction and testing with
atomic modules i.e., modules at the lowest level. Because the modules are
integrated in the bottom up manner the processing required for the modules
subordinate to a given level is always available and the need for stubs is
eliminated.

Validation Testing:

At the end of integration testing software is completely assembled as a


package. Validation testing is the next stage, which can be defined as successful
when the software functions in the manner reasonably expected by the customer.
Reasonable expectations are those defined in the software requirements
specifications. Information contained in those sections form a basis for validation
testing approach.

System Testing:
System testing is actually a series of different tests whose primary purpose
is to fully exercise the computer-based system. Although each test has a different
purpose, all work to verify that all system elements have been properly integrated
to perform allocated functions.

Security Testing:

Attempts to verify the protection mechanisms built into the system.

Performance Testing:

This method is designed to test runtime performance of software within the


context of an integrated system.

7. CONCLUSION AND FUTURE SCOPE

CONCLUSION:
The result of the CYBERSPACE is that it supports many solved complaints from
admin and the individual users or the end-users with unique interface, through
which the employee problems are solved within given time and it shows
efficiency in the internal messaging system and results in accurate task scheduling
system and this can be run with the minimal administration.

FUTURE SCOPE:

8. FORMS AND REPORTS


Home Page from administrator, customers and employees can login
using their id. This page can achieve through
http://localhost:8080/cyberspace1/. From this page user can forward to
the administrator page, customers page and employee page.

ADMIN LOGIN:
This page can achieve through
http://localhost:8080/cyberspace1/adminloginpage.jsp . From this page
user can forward to the administrator page, customers page and
employee page. The admin login page is used for authenticate the
administrators to control other users through this application.

ADMIN HOME PAGE:


This page can achieve through
http://localhost:8080/cyberspace1/adminhome.jsp . From this page user
can forward to the customers page, complaints page and employee
page. The admin home page is used for control the clients of this
application.

CUSTOMER DETAILS IN ADMIN PAGE:


This page can achieve through
http://localhost:8080/cyberspace1/admincusthome.jsp . From this page
user can forward to the administrator page, customers page and
employee page. The admin customer page is used for access the
information like customer id customer name customer type and etc., .

ADD NEW CUSTOMER IN ADMIN PAGE:


This page can achieve through
http://localhost:8080/cyberspace1/adminaddnewcust.jsp . From this
page user can forward to the administrator page, customers page and
employee page. The admin new customer add page is used for add the
new customer to access this application as a member. The information
deals with customer id, customer name, password, customer type and
contact details.

EXISTED CUSTOMERS DETAILS CAN UPDATE HERE:


This page can achieve through
http://localhost:8080/cyberspace1/admincustedit.jsp . From this page
user can forward to the administrator page, customers page and
employee page. The admin edit customer page is used for add the new
customer to access this application as a member. The information deals
with customer id, customer name, password, and customer type and
contact details.

EMPLOYEES PAGE IN ADMIN MODULE:


This page can achieve through
http://localhost:8080/cyberspace1/adminemphome.jsp . From this page
user can forward to the complaints page, customers page and employee
page. The admin employee home page is used for access the employee
information. The information deals with employee id, employee name,
department and others.

ADMIN CAN ADD NEW EMPLOYEE:


This page can achieve through
http://localhost:8080/cyberspace1/adminaddnewemp.jsp . From this
page user can forward to the complaints page, customers page and
employee page. The admin new employee add page is used for add the
new employee to access this application as a member. The information
deals with employee id, employee name, password, customer type and
contact details.

ADMIN CAN UPDATE EMPLOYEE DETAILS:


This page can achieve through
http://localhost:8080/cyberspace1/adminempedit.jsp . From this page
user can forward to the complaints page, customers page and employee
page. The admin edit employee add page is used for update the new
employee to access this application as a member. The information deals
with employee id, employee name, password, customer type and
contact details.

COMPLAINTS MODULE IN ADMINISTRATOR:


This page can achieve through
http://localhost:8080/cyberspace1/admincomplainthome.jsp . From this
page user can forward to the complaints page, customers page and
employee page. The admin complaints page is especially used for
admin to view details about latest complaints, pending complaints and
status of the complaints.

LATEST COMPLAINT:
This page can achieve through
http://localhost:8080/cyberspace1/latestcomplaints.jsp . From this page
user can forward to the complaints page, customers page and employee
page. The admin use (view this page).
PENDING COMPLAINTS:
This page can achieve through
http://localhost:8080/cyberspace1/pendingcomp.jsp . From this page
user can forward to the complaints page, customers page and employee
page. The admin use (view this page).

COMPLETED PROBLEMS:
This page can achieve through
http://localhost:8080/cyberspace1/completedproblems.jsp . From this
page user can forward to the complaints page, customers page and
employee page. The admin use (view this page). The status of the
complaint is described here.
ASSIGNING WORK TO EMPLOYEE:
This page can achieve through
http://localhost:8080/cyberspace1/assignwork.jsp . From this page user
can forward to the complaints page, customers page and employee
page. The admin use this page to assign the works to employee.

CUSTOMER MODULE:
This page can achieve through
http://localhost:8080/cyberspace1/custloginpage.jsp . From this page
user can forward to the administrator page, customers page and
employee page. The customer login page is used for authenticate the
customers to access this application.

CUSTOMER HOME PAGE:


This page can achieve through
http://localhost:8080/cyberspace1/custhome.jsp . The customer
forwarded to my info and my complaints info pages.

CUSTOMER INFORMATION:
This page can achieve through
http://localhost:8080/cyberspace1/custinfo.jsp . This page is used forto
enter the customer details.
COMPLAINT INFORMATION:

ADD NEW COMPLAINT:


ADDED COMPLAINT SUCCESSFULLY:
This page can achieve through
http://localhost:8080/cyberspace1/custhomecomp.jsp this page is used
for access the information like customer id, complaint id, complaint
type, complaint description and complaint date.

EMPLOYEE LOGIN:
This page can achieve through
http://localhost:8080/cyberspace1/emploginpage.jsp. from this page we
can forward to administrator page, customers page, employees page and
home page. The employee was authenticated and login through this
page.
EMPLOYEE HOME PAGE:
This page can achieve through
http://localhost:8080/cyberspace1/employeehome.jsp . this page used to
access the link my info and my tasks info.

EMPLOYEE INFORMATION :
This page can achieve through
http://localhost:8080/cyberspace1/employeeinfo.jsp , the information
deals with this page are employee: Id, name, password, type,
department and contact details.

TASK INFORMATION:
This page can achieve through
http://localhost:8080/cyberspace1/taskinfo.jsp . this user view this form
as task report.

EMPLOYEE SOLVING THE PROBLEM:


This page can achieve through
http://localhost:8080/cyberspace1/solvingproblem.jsp , the complaint
process and got over in this page only.

LOGOUT:
After all process got over this page will appear.

9.BIBILIOGRAPHY
BOOKS AND MANUALS :-

1.JAVA-2 Complete-Reference

Author : Patric Norton & Herberlt Schild


Publisher : Tata McGraw Hill

2.System Analysis & Designing

Author : James A. senn


Publisher : Tata McGraw Hill

3.Software Engineering Concepts

Author : Fairley
Publisher : Tata McGraw Hill Publication,3rd
Edition.

4.Software Engineering Principles

Author : Pressman

5.Java Server Pages

Author : James Good Will


Publisher : Techmedia

You might also like