Professional Documents
Culture Documents
405 Method Not Allowed
405 Method Not Allowed
com)
Submitted to:
Department of Computer Applications, for the award of the Degree of Master of Computer Applications May, 2013.
Table Of Contents
CHAPTER 1 INTRODUCTION 1.1 INTRODUCTION OF THE PROJECT 1.1.1 Nokari Plus Marriage Data Product Overview 1.2 HOW TO USE NOKARI PLUS MARRIAGE DATA.COM 1.3 Stop Waiting. Start living. Get Married!! 1.4 ADVANTAGES 1.5 DISADVANTAGES CHAPTER 2 SYSTEM ANALYSIS 2.1 System study Existing system 2.2 SOFTWARE AND HARDWARE REQUIREMENTS SPECIFICATION:2.2.1 Hardware Requirements 2.2.2 Software Requirements 2.3 OBJECTIVE 2.4 FEASIBILITY STUDY:2.4.1 Economical Feasibility 2.4.2 Technical Feasibility
2.4.3 Operational Feasibility 2.5 SOFTWARE MATRICS:2.5.1 Estimation 2.5.2 Application Authoring And Design Tool 2.5.3 Calculation CHAPTER 3 TOOLS AND TECHNOLOGY 3.1 INTRODUCTION TO PHP 3.1.1 What Is PHP 3.1.2 Error Reporting 3.1.3 Connecting to Database 3.1.4 Encrypt Storage Model 3.1.5 Hiding PHP 3.2 HTTP AUTHENTICATION WITH PHP 3.2.1 Cookies 3.2.2 Installation 3.2.3 PHP vs. .ASP? 3.2.4 PHP vs. Perl 3.3 ABOUT MYSQL 3.3.1 Introduction 3.3.2 Installing MySQL 3.3.3 Simple Validation 3.4 E-R DIAGRAM (ENTITY RELATIONSHIP DIAGRAM) 3.5 DATA FLOW DIAGRAM 3.6 USE CASE DIAGRAM
3.6.1 Admin Use Case :3.6.2 User Use Case :3.7 SEQUENCE DIAGRAM 3.8 ACTIVITY DIAGRAM 3.9 CLASS DIAGRAM 3.9.1 Admin class diagram:3.9.2 User Class Diagram 3.9.3 Login Class Diagram CHAPTER 4 DESIGN 4.1 SCREEN SHOT 4.1.1 Admin Part 4.1.2 User part 4.2 DATA MODELING 4.2.1 Data Dictionary CHAPTER 5 TESTING 5.1 TESTING PLAN 5.2 STRATEGY PLAN 5.3 TESTING METHOD 5.4 TEST CASES CHAPTER 6 CONCLUSION AND FUTURE PROSPECTUS 6.1 CONCLUSION 6.2 FUTURE EXTENSION CHAPTER 7 BIBLIOGRAPHY
This is to certify that Mr. Satya Prakash Malav, a student of MCA from National Institute Of Technology, Jasmshedpur is doing his 6th Semester Project Training at 3ilogics, Jaipur from feb 2013 to apr 2013. The project work entitled Matrimonial Site embodies the original work done by him during his tenure.
Declaration
I hereby declare that the project work entitled Matrimonial Site in partial fulfillment of the requirement for the award of degree of Master of Computer Applications (M.C.A.) and submitted to the Department Of Computer Applications, NIT Jamshedpur in authentic record of my own work carried out during the period from 1st Feb 2013 to 30th April 2013 course at 3ilogics. The project report has not been submitted by me for any award of any other degree/diploma of this university.
Satya Prakash Malav MCA (6th Sem.) Department Of Computer Applications National Institute Of Technology, Jamshedpur.
Acknowledgement
First of all, an honorable mention goes to my Project Manager, Mr. Nitesh Ranjan for making me familiar with the intricacies of Software Development. Also I would like to thank Mr. Balram for the way he supported me and showed me the way during the training period. Also a special mention of Mr. Pankaj , who were always there for any sort of help. Working with them has added a new dimension in my stock of knowledge. Sincere thanks to all my colleagues at 3ilogics for their support and assistance throughout the project. It is definitely a wonderful experience to have such a good surrounding of people who have helped me on every step where I might have fallen. My heartfelt gratitude also goes to the Prof. Ashok Kumar Mehta , Head Of Department of Department Of Computer Applications , National Institute Of Technology, Jamshedpur for providing me with the opportunity to avail the excellent facilities and infrastructure. The knowledge and values inculcated have proved to be of immense help at the very start of my career. I would, especially like to express my gratitude to my internal guide, Mrs. Susmita Mahato for all her help, support and guidance to this juncture. I also extend my apologies for all errors or omissions, which are solely my responsibility.
Preface
Computer is an inherent part of the life today. Virtually, in every walk of life, a person in expected to be able to use computers. The impact of computer technology in several aspect of accounting profession and practice has been pronounced over the last two decades in India.
Now, we are in hyper technology area. There are several revolutions in any field. We are got more and more machine support in any kind of work in the world. In the medical science we are more efficient equipments available having all more facility, so computerization becomes a powerful factor behind this technology. And we can do any work faster and time consumed all this process become very less than ancient area.
We are doing a project named Matrimonial Site The project has maintained all types of information of the bride and groom and educational information of the job seeker.
Abstract
This project report is submitted in partial fulfillment of the requirement for the award of the degree of Masters of Computer Applications. The project report is prepared for the project pursued during the course of training undertaken at Matrix Computers as a part of the sixth semester M.C.A curriculum prescribed by National Institute Of Technology , Jamshedpur. The project report includes information about project entitled Matrimonial Site at 3ilogics, Jaipur which was assigned during the course of training.
CHAPTER 1 INTRODUCTION
Welcome to Nokari Plus Marriage Data.Com, the best Indian Matrimonial site with profiles of Indian brides and grooms that includes listings of Hindu Matrimonial, Muslim Matrimonial, Sikh
Matrimonial, Tamil Matrimonial, Telugu Matrimonial, Oriya Matrimonial, Kannada Matrimonial and many more from all over the world. We provide the most comprehensive listing of Indian matrimonial profiles for singles seeking love and marriage.
Browse thousands of Indian matrimonial profiles Contact Profiles of your choice Get Married. Be Happy. Matrimonial web sites are gaining popularity among young men, women and their parents. A big attraction for them is cost effectiveness of this idea. Gone are the days when harried parents of the marriageable daughters waited for marriage brokers to come up with proposals from prospective bridegrooms who could match their choice and pockets. The scene was almost the same in the homes of bachelors; with the only difference that their parents were less harassed and less worried about money. Now, things have changed quite a lot. The education of women has brought with it the power of independence. The Indian society has come a long way. There has been a drastic change in the attitude of both Parents and their daughters. Women nowadays exercise their veto more often while choosing their bridegrooms. The situation for the boys too has improved; though even earlier their conditions were better off than the girls. One thing that has become clear and loud with the change is that today the Indian marriage is increasingly becoming a union of two individuals rather being a union of two families. Marriages in India are categorized mainly under two types: love marriage and arranged marriage. Love marriage is getting full-fledged support from our own dear dream weaver, the one and only Bollywood. Things now have come a long way. It is not that the earlier two forms do not exist anymore, but there has been a perceptible change in the outlook of the educated middle and the upper middle class. The classifieds of the renowned English and the vernacular dailies now have taken place of the marriage brokers. But, the ones who are Creating ripples in the business of finding the right match are the matrimonial sites. Shaadi.com, Jeevansaathi.com 123India.com Matrimonial, BharatMatrimony.com, etc. are some of the popular matrimonial web sites. Just a click of the mouse and a whole world of information about men and women of marriageable age unravel in front of the user. These sites provide free registrations for their users and also help them in creating Attractive looking profiles. The sites enable their user to search matches, that meet their respective criteria and can even email or chat with the registered members. The site does not only help the prospective brides and bridegrooms but are helpful for their parents also. The choice is extensive for the netizens, who are hooked on to these sites. The user can avail many search options. The member just has to mention about the desired community or the desired job profile or the choice of the country or city for the match search. There are options for selecting the desired complexion and height in these matrimonial web sites. Some sites are exclusively for the Non-Resident Indians (NRIs). India Canada Marriage is one such web site for Indo-Canadians. India Matches is another matrimonial web site where one can search for a life partner or find a date or meet a friend through the Internet. The matrimonial sites do not restrict themselves to the role of an information provider of the ready-to-be brides and the bridegrooms. They are just ready with all kinds of information associated with marriage starting from the information about designers, renowned shops of trousseau, to even decorators, florists, caterers and wedding halls. Now,
the question that may come to everybody's mind is that whether people are really benefited by it or not. The success stories that have been put up on these sites assert that the people do get benefits. But, there is also another side of the story. Many young men and women log on to these sites just for chatting and dating on the net. In many offices, guys are often seen these sites regularly just to see the pictures of the girls, to take their email addresses, to chat and to meet them later on to be browsing through.
1.4 ADVANTAGES
1. Easy and simple to use. 2. Upload your photo for FREEit is said that a "Photo" is worth a thousand words" Upload your Digital Photo yourself OR send us your photo & we will scan & digitize& Upload it - Absolutely Free . 3. Free Registration--If you have not register yet, and then register now it will only take few minutes and start searching for your soul mate. If you have any suggestions or comments on how to make this website better then please do not hesitate to contact us. To ensure higher ranks in search results login regularly. There are other advantages too: 4. You can check interests you receive and respond to them . 5. Thousands of new members join each week and your special someone may be one of them. 6. New features and enhancements are regularly made to improve your experience here. 7. Photo security. 8. The aficionados of the first type snub arrange marriage as the marriage of convenience. Moreover, the second type really has a long fan following among the fraternity of parents. With even love marriages Breaking apart too often, some of the younger generations are also shifting their allegiance.
1.5 DISADVANTAGES
1. Poor communication between users. 2. Photo size is small.
The prime objective of the system is to develop a application for satisfying all requirements of the client and it should be capable of handling large volume of customers. The overall system must be fast and convenient. The Classical System Development life Cycle (SDLC) method, the Prototype model has been used here. It is the most widely used paradigm for system development. This process demands a systematic, sequential approach to software development. The life cycle involves the following activities
2.1 System study System studies results in finding out details of the existing methodologies that are being followed and that whether any developments is to be made. These studies considered both the existing and the proposed system. System study had been conducted to analyze the current existing system of matrimonial websites. All the current websites have been analyzed.
Existing system
In the existing system the advertisement and marriage is done through newspapers and marriage beauro. So the current system is an old one in this computer world and it has many drawbacks. The main problem is regarding time as well as cost. The cost of advertisement and searching of the partners through newspapers and consultancy are difficult. In the manual system we waist the time. Later it leads to confusion and lack of knowledge of the bride and grooms. As paper advertisement involved in the manual maintenance is high, keeping of unnecessary data, leading piles of waste paper. In this fast changing world, in each and every home there is a computer with net connection. So the present system has become an easy, fast, and cost effective way of through mails.
2.2 SOFTWARE AND HARDWARE REQUIREMENTS SPECIFICATION:2.2.1 Hardware Requirements PROCESSOR CLOCK SPEED SYSTEM BUS RAM : : : : B PENTIUM IV 500 MHZ 32 BIT 512 MB
: : : : :
OPERATING SYSTEM
ENVIRONMENT
DREAMVIEWER
: : : : :
2.3 OBJECTIVE
What is Matrimonial Web Application? The main objective of Matrimonial Web Application is to provide Grooms and Brides with excellent matchmaking experience by exploring the opportunities and resources to meet true potential partner. Keeping our objective in mind, we have created a world renowned
online matchmaking services that will touch the souls of millions of people all over the globe.
What are the purposes of Matrimonial Web Application? The purposes of the Matrimonial Web Application are:
by applying the information in the field. perspective bride or groom and other information regarding them online. life partner at his/her home at his/her convenience. ity which helps those users who have a certain criteria of qualities in mind to make online matrimonial easier. Since internet is a pivot for modern business, our project which is based on Internet paves a path for modernization in trade.
2.4 FEASIBILITY STUDY:Feasibility study is a process to check possibilities of system development. It is a method to check various different requirements and availability of financial & technical resources.
Estimated finance is there or not? The man power to operate the system is there or not?
All the above conditions must be satisfied to start the project. This is why in depth analysis of feasibility is carried out.
2.4.1
Economical Feasibility:-
in economical feasibility, analysis of the cost of the system is carried out. The system should be only developed if it is going to give returned the current manual system user can get the price only by purchasing the newspapers. In addition if he/she wants to see archives of particular equity then he has to refer to all the old newspapers. For research reports he has to buy another magazine. So Instead of buying no of magazines user has to just go online and with a single click he can get whatever information he wants. So our project of online share news passes the test of economical feasibility.
2.4.2
Technical Feasibility:
It is basically used to see existing computer, hardware and software etc, weather it is sufficient or additional equipments are required? Minimum System Requirement is such that it can be affordable by of the user who is having computer. All the user requires is compatible browser and .net framework installed so our system is fully technical feasible.
2.4.3 Operational Feasibility:Once the system is designed there must be trained and expert operator. If there are not trained they should given training according to the needs of the system. From the users perspective our system fully operational feasible as it just requires some knowledge of computer. Operators only need add daily prices of various equities and there are enough validations available so operator does not require any special technical knowledge. So our system also passes the test of operational feasibility.
2.5.1 Estimation:In Web engineering, the metrics have three goals: 1 2 3 To provide the indication of the quality from the technical point of view. To provide the basis for effort estimation. To provide an indication of the success from the business point of view.
Suggested measure
Description
Structuring effort
Time
to
structure
Web
App
and/or
device architecture.
Interlinking effort
Interfacing planning
Interface building
Link-testing effort
Total effort
PAGE AUTHORING
Text effort
Time
MEDIA AUTHORING Media Effort Time taken to author or re-use media files. Media-digitizing effect Total Media Effort PROGRAM AUTHORING Time taken to digitize media. Media Effort + Media-digitizing effort.
Programming effort PHP or language implementations. Re-use effort 2.5.3 Calculation :Structuring effort Interfacing planning Interlinking effort Interface Building Link-testing effort Media-testing effort Total Effort Text Effort Page-linking effort Page structuring effort Total Page Effort Programming Effort Reuse effort
6-PDay 3-PDay 3-PDay 6-PDay 3-PDay 3-PDay (6+3+3+6+3+3)=24-PDay 6-PDay 4-PDay 6-PDay (6+4+6)days=16-PDay 40-PDay 10-PDay
of PHP's features. You can jump in a short time, and start writing simple scripts in a few hours. General Installation considerations Before starting the installation, first you need to know what do you want to use PHP for. There are three main fields you can use PHP Server-side scripting Command line scripting Client-side GUI applications For the first and most common form, you need three things: PHP itself, a web server and a web browser. You probably already have a web browser, and depending on your operating system setup, you may also have a web server (e.g. Apache on Linux and MacOS X;IIS on Windows). You may also rent web space at accompany. This way, you don't set up anything on your own, only write your PHP scripts, upload it to the server you rent, and see the results in your browser. While setting up the server and PHP on your own, you have two choices for the method of connecting PHP to the server. For many servers PHP has a direct module interface (also called SAPI). These servers include Apache, Microsoft Internet Information Server, Netscape and iPlanet servers. Many other servers have support for ISAPI, the Microsoft module interface (Omni HTTP for example). If PHP has no module support for your web server, you can always use it as a CGI or Fast CGI processor. This means you setup your server to use the CGI executable of PHP to process all PHP file requests on the server. If you are also interested to use PHP for command line scripting (e.g. write scripts auto generating some images for you offline, or processing text files depending on some arguments you pass to them), you always need the command line executable. With PHP you can also write to the desktop GUI application using the PHP-GTK extension. This is a completely different approach than writing the pages, as you do not output any HTML, but manage windows and objects within them.
is running code from non-sources with built-in debugging handlers or using common debugging technique. If the attacker can determine what general technique you are using, they may try to brute-force a page, by sending various common debugging strings: Regardless of the method of error handling, the ability to probe a system for error leads to providing attacker with more information. For example, the very style of a generic PHP error indicates system is running PHP. If the attacker was looking at an .html page, and wanted probe for the back-end (To look for known weakness in the system), by feeding it the wrong data they may be able to determine that a system pass built with PHP. A function error can indicate whether a system may be running a specific database engine, or give clues as to how a web page or programmed or designed. This allows for deeper investigation into open database ports, or to look for specific bugs or weakness in a web page. By feeding different pieces or bad data, for example, an attacker can determine the order of authentication in a script, (from the line number errors) as well as probe for exploits that may be exploited in different locations in the scripts. A file system or general PHP error can indicate what permissions the webserver has, as well as the structure and organization of files on the web server. Developer written error code can aggravate this problem, leading to easy exploitation of formerly "hidden" information. There are three major solutions to this issue. The first is to scrutinize all functions, and attempt to compensate for the bulk of the errors. The third is to use PHP's custom error handling functions to create your own error handler. Depending on your security policy, you may find all three to be applicable to your situation. One way of catching this issue ahead of time is to make use of PHP's own error reporting (), to help you secure your code and find variable usage that may be dangerous. By testing your code, prior to deployment, with EALL, yo can quickly find you area where your variables may be open to poisoning or modification in other ways. Once you are ready for deployment, you should either disable error reporting completely by setting error reporting () to 0, or turn off the error display using the php.ini option display_ errors, to insulate your code from probing. If you choose to do the latter, you should also define the path to your log file using the error log in directive, and turn log error on.
Once an attacker gains access to your database directly (bypassing the web server), the stored sensitive may be exposed or misused, unless the information is protected by the database itself. Encrypting the data is a good way to mitigate this threat, but very few databases offer this type of data encryption. The easiest way to work around this problem is to first create your encryption package, and then use it from within your PHP scripts. PHP can assist you in this with several extensions, such as Mcrypt and Mhash covering a wide variety of encryption algorithms. The script encrypts the data before inserting it in to the database, and decrypts it when retrieving. See the reference for further examples of how encryption works. In case of truly hidden data, if its raw representation is not needed (i.e. not be displayed), hashing may also be taken in to consideration. The well-known example for the hashing is storing the MD5 hash of a password in a database, instead of password itself.
3.2.1 Cookies
PHP transparently supports HTTP cookies. Cookies are a mechanism for storing data in the remote browser and thus tracking or identifying return users. You can set cookies using the set cookie or set raw cookie () function. Cookies are part of the HTTP header; so set cookie () must be called before any output is sent to the browser. This is the same limitation that header () has. You can use the output buffering functions to delay the script output until you have decided whether or not to set any cookies or sent any headers. Any cookies sent to
you from the client will automatically be turned in to a PHP variable just like GET and POST method data, depending on the register global and variables order configuration variables .If you wish to assign multiple values to a single cookie, just add [] to the cookie name. In PHP 4.1.0and later, the $_COOKIE auto global array will always be sent with any cookies sent from the client. $HTTP_COOKIE_VARS is also set in earlier versions of PHP when the track vars configuration variable is set 3.2.2 Sessions Session supports in PHP consist of a way to preserve certain data across subsequent accesses. This enables you to build more customized applications and increase the appeal of your web site. The session module cannot guarantee that the information you store in a session .You need to take additional measure to actively protect the integrity of the session, depending on the value associated with it. Assess the importance of the data carried by your sessions and deploy additional protections _this usually comes at a price, reduced convenience for the user. For example, if you want to protect users from simple social engg: tactics, you need to enable session. Use _only _cookies. In that case, cookies must be enabled unconditionally on the user side, or sessions will not work. There are several ways to leak an existing session id to third parties. A leaked session id enables the third party to access all resources, which are associated with a specific id. First URLs caring session ides' you link to an external site, the URL including the session id might be stored in the external sites referrer logs. Second, a more attacker might listen to your network traffic .If it is not encrypted ,session ids will flow in plain text or the network the solution here is to implement SSL on your server and make it mandatory for users . Optionally you can use shared memory allocation (mm) developed by Ralf S.engle hall for session storage you have to download mm and install it. This option is not available to windows platforms .not that the session storage module for mm does not guaranty that concurrent access to the same session is properly locked.
3.2.2 Installation
Session support is enable in PHP by default if you would not like to build your PHP with session support you should specify the disable session options to configure to use shared memory allocation (mm) for session storage configure PHP -with-mm [=DIR]. The windows version of PHP has built in support for this extension you do not need to load any additional extension in order use this functions. BY default all data related to particular session will be stored in file in the directory specified by the session. Save path INI option. File for each session (regardless if any data if associated with that session) will be created. This is due to the fact that session is opened (file is created) but no data is even return to that file not that these behavior is a side effect of limitation of working with the file system and it is possible that accustom session handler (such as one which uses database) does not keep track of session which store no data
ASP is that a it's a proprietary system that is natively used on Microsoft internet information server (IIS). This limit it's availability to win 32-based servers there are a couple of projects in the works that allows ASP to run in other environments and webservers. InstantASP from Halcyon (commercial) chily! Soft ASP from chily! Soft (commercial) ASP is said to be slower and comp some language than script it's Relatively easy to pick up the language you already know how to program in Visual Basic. ASP support is also enabled by default in the IIS server making it easy to get up and running. The components built in ASP are really limited, so if you need to use" advanced" features like interacting with FTP servers you need to buy additional components. PHP is commonly said to be faster and more efficient for complex programming tasks and trying out new ideas. PHP generally referred to as more stable and less resource intensive as well. Cold Fusion has better error handling, database abstraction and date parsing although database abstraction is addressed in PHP 4.Another thing that is listed as one of Cold Fusion's strength is its excellent search engine, but it has been mentioned that a search engine is not something should be included in a web scripting language .PHP runs on almost every platform there is Cold Fusion is only available on Win 32,Solaris, Linux and HP/UX.Cold Fusion has a good IDE and Is generally easier to get started with where as PHP initially requires more programming knowledge. Cold Fusion is designed with nonprogrammers in mind while PHP is focused on programmers.
In addition to being free (My SQL does have some licensing restrictions though), the PHPMySQL combination is also cross-platform, which means you can develop in Windows and serve on a Unix platform. Also, PHP can be run as an external CGI process, a stand-alone script interpreter, or an embedded Apache module.
Imagine for a moment that we've got our database nicely laid out and we're now requesting information from users that will be inserted into the database. Further, let's imagine that you have a field in your database waiting for some numeric input, such as a price. Finally, imagine your application falling over in a screaming heap because some smart aleck put text in that field. MySQL doesn't want to see text in that portion of your SQL statement- and it complains bitterly. Validation simply means that we'll examine a piece of data, usually from an HTML form, and check to make sure that it fits a certain model. This can range from ensuring that an element is not blank to validating that an element meets certain criteria (for example, that a numeric value is stipulated or that an email address contains an @ for an email address). Validation can be done on the server side or on the client side. PHP is used for server-side validation, while JavaScript or another client-based scripting language can provide clientside validation. This article is about PHP, so we're going to concentrate on the server end of things. Let's ignore our database for the moment and concentrate on PHP validation. If you wish, you can add additional fields to our employee database quite simply by using the MySQL ALTER statement that is, if you want to commit to the values that we'll validate. There are several useful PHP functions we can use to validate our data and they range from simple to highly complex. a simple function we could use might be strlen (),which tells us the length of the variable. A more complex function would be ereg (), which uses full regular expression handling for complex queries. I wont delve in to the complexities of regex here, as entire books have been written on the subject, but I will provide some examples on the next page. To select a value from the database we can use the following script inside PHP tags $sql="SELECT * from my table"; $result=db_query ($sql);
Mobileno
u Ed n1 tio ca
Address
Sta te1
or d1
Mother Country Resident occupation Horoscope code city Interest Description Phoneno Exsport
Coun
Area code
ent Resid t sta e ly Fami g i or in
yee lik
Pa ss
p1 hi
plo Em
Do
ma in1 Dr ink
Register
Sp e Ag m o r f
2 ort
ng Ma
3 Sport 4 Sport
Movie1 Movie2
Read1 Read2
Ph y sta sical tus 1
Movie3
e4 M ovi vie Exmo
1 sic Mu 2 sic Mu Mu sic 3
ht Heig m fro
Read3
Weight
Heig Re ht ad4
Ex rea d La ng uag e1
2 3 ge ge ua ua
Sta r
ng La
ic 4
ng La
us
H ob 2 es bi 1 es ob bi H
Ho es3 bbi
Intere st4 Exint erest Resid en status t 1 Mother tongue1 No of brother Ageto
Ho es4 bbi
ho Ex
No of sister
es bbi
Income
Smoke
Eatinghabits
Occupation
Education
Register
1 1 1
Female
Male
Msgto
Story
1 Story
Emsgtable
Id
Msg from
Msg
Has loan
Emailid
Memberid
Msgto
Pmsgtable
Loan
Msg from
Msg
Landlineno1
Landlineno2
3.5.1 Level 0
3.5.2 Level 1
3.5.3 Level 1
Add/Update Records
Sending Mail
Delete Records
Admin
Registration
Searching
USER
Sequence Diagram For Registration::User :Home :Registration personal :Registration physical :Registration socio-occupation :Profile :Database
click on registration
fill-up data
store to database
valid username and password wellcome user now you can edit/update your profile
:User
:Profile
:Registration
:Photoupload
:database
update imformation
store to database
profile updated
click on photoupload
browes photo
[Data Valid]
[Data Invalid]
I/P Validation
No Data in to Database
Display Records
[Data Valid]
Search fails
Search Records
Add Records
Update Record
Chapter 4 DESIGN
Input:
Output: Registration is done for new user Flow: Control is redirected to registration form and after fill up the form and after click on the register button data of new user is stored database and an email is sent to the user into
Input:
Output: Get the screen of verify MemberId and Password. Flow: If MemberId and Password correct then user will get his/her profile. user can do update profile, create album, change photo, hide profiletoure, apply for loan after correct login.
Input: Click on given caste. Output: Control is redirect to the search screen.
Input: Click on view profile button. Output: Get the screen of directory.
Input: Click on link of genius profile. Output: Control is redirect to the screen of genius profile.
Name
Null ?
Type
Description
Id profile_for Userid contact_person email_id Password Name Gender marital_status Mobile Phone Dob Height Country
No No No No No No No No No No No No No No
Int Varchar Varchar Varchar Varchar Varchar Varchar Varchar Varchar varchar Varchar Varchar Varchar Varchar
Primary key Relation with bride and groom User login id Name of the person to whom you can contact User mail id User password Name of the bride or groom Gender of the bride or groom Marital Status Contact no of the bride or groom Contact no of the bride or groomhouse Date of birth Height of the bride and groom Country of the bride and groom
Religion Caste mother_tongue Occupation Children father_name Mother_name gm_name mgm_name father_village mother_village gm_village mgm_village father_gothram mother_gothram gm_gothram mgm_gothram country_residence Address
No No No No No No No No No No No No No No No No No No No
Varchar Varchar Varchar Varchar Int Varchar Varchar Varchar Varchar Varchar Varchar Varchar Varchar Varchar Varchar Varchar varchar Varchar Varchar
Religion of the bride and groom Caste of bride and groom mother_tongue of the bride or groom Occupation of the bride or groom No of the children Fathers name of the bride or groom Mother name of the bride or groom Grand Mother name of the bride or groom Maternal grand mother Fathers village Mothers village Grand mothers name Maternal grand mothers name Fathers gothram Mother s gothram Grand Mother s gothram Maternal Grand Mother s gothram Residential country Address of the user
Citizenship Immigration_Statu s Living_Situation House_Ownership Highest_Education Specific_Degree other_job_details Income Features Complexion Built Special_Cases
No No
Varchar Varchar
No No No No No No No No No No
Varchar Varchar Varchar Varhar Varchar Varchar Varchar Varchar Varchar Varchar
Bride or groom living situation Info about house of the bride or groom Education of the bride or groom Specific degree of the bride and groom Other job detail of the user Monthly income of the bride or groom Features of the bride and groom Complexion (fair , dark etc.) Built (slim , medium ,athletic etc) Special Cases(mentally challenged, physically handicap etc.)
No No No No No No
Blood group of the user Weight of the user in k.g. Smoke habit of the user Other habits of the user Whether user take hard drinks or not About the user
No No No
Pics of the bride or groom Status of the user profile Updated date of profile
Success_Story:
Name
Null?
Type
Description
No No No No No
Caste info.
Name
Null?
Type
Description
Id Caste
No No
Int Varchar
Admin info
Name
Null?
Type
Description
Id admin_name
No No
Int Varchar
password
No
Varchar
Password
Chapter
TESTING
5.1 TESTING PLAN Similar to the project plan, due to confidentiality issues, we cannot provide details test plan to the development team. We will still add the core components that make up our test plan.
1.1.1 Test plan identifier 1.1.2 References 1.1.3 Introduction 1.1.4 Test items (functions) 1.1.5 Application risk issues. 1.1.6 Features to be tested 1.1.7 Features not to be tested 1.1.8 Approach (strategy) 1.1.9 Item pass/fail criteria 1.1.10 Entry & exit criteria 1.1.11 Suspension criteria & resumption requirements 1.1.12 Test deliverables 1.1.13 Remaining test tasks 1.1.14 Environmental needs 1.1.15 Staffing and training needs 1.1.16 Responsibilities
5.2 STRATEGY PLAN Test More and Test Frequent is organizations tagline for testing. A typical screen in asp.net is tested at four levels before it goes for production. Level 1 is generally the work to be tested by other developers or other interns (this is typical first level of testing where focus is not on requirement but end user testing) Ratio: 0% end user: 100% Technical Level 2 is level where a senior programmer comes into the testing cycle of the screen that was unit tested by the developer in this phase the onus is to test software for technical requirements specified. Ratio: 80% Technical: 20% end user Level 3 is where a tester will come into picture. The tester will test the software for both end user as well as technical point of view. The ratio here is: 50% Technical: 50% end user Level 4 is where we make the code at Release-Ready. Here screen is tested to the core and each and every standard must be followed and verified. Ratio here is: 80% User Testing 20% Technical This allows us to text a screen at four levels and at the end of four weeks when the screen goes to production, it is generally bug free because more people have looked at this screen from different viewpoints.
References available while testing Project Plan. System Requirements specifications. High Level design document. Detail design document. Development and Test process standards. Methodology. Low level design.
Also organization has Separate module to store all bugs So each screen is released for testing as a build and all information for that screen (till release) is maintained using this particular build.
CONTENT TESTING:
Errors in Web Application content can be as trivial as minor typographical error as incorrect information, improper organization or validation of intellectual property laws. Content Testing attempt to uncover this and many other problems before the user encounter them.
DATABASE TESTING:
Modern Web Application does much more than present static content objects. In many application domains, Web Application interface with sophisticated database management system and build dynamic content object that are created in real time using the data acquired from a database. Database Testing for Web Application is complicated by a variety of factor. 1) The original client side request for information is rarely presented in the form that can be input to a database management system. 2) The database may be remote to the server that houses the Web application. 3) RAW data acquired from the database must be transmitted to the Web application Server and properly formatted for subsequent transmittal to the client. 4) The dynamic content objects must be transmitted to the client in a form that can be displayed to the end user.
Database
[Layers of interaction]
In figure testing should be ensure that 1. Valid information is passed between the client and server from the interface layer 2. The Web application process script correctly and properly extract or formats user data. 3. Queries are passed to a data management layer that communicates with database access routines. 4. User data are passed correctly to a server side data transformation function that format appropriate queries.
INTERFACE TESTING
Interface design model is reviewed to ensure that generic quality criteria established for all user interfaces have been achieved and that application specific interface design issue has been properly addressed.
reached. The Web engineer builds a list of all associated with interface layout. and then executes each individually. Forms: -
At a microscopic level, tests are performed to ensure that Labels correctly identified fields within the form and that mandatory fields are identified visually for the user. The server receives all information content within the form and their no data are lost in the transmission between client and server Appropriate defaults are used when the user does not select from a pull down menu or set of buttons. Browser function dont corrupt data enter in a form and Scripts that perform error checking on data entered work Properly and provide meaningful error message. Client side scripting:Black box tests are conducted to uncover any error in processing As the script is executed . These tests are coupled with forms testing because script input is often derived from data provided as part of forms processing Dynamic HTML:Each Web page that contain dynamic HTML is executed to ensure that the dynamic display is correct. In addition a compatibility test should be conducted to ensure that the dynamic HTML is work properly in the environmental configuration that support the Web application. Application specific interface mechanisms:Test conforms to a checklist of functionality and features that are defined by the interface mechanism. Boundary test minimum and maximum number of item that can be placed in to shopping chart. Test to determine persistence of shopping chart contents. Test to determine whether the Web Application can be record shopping chart content at some future date.
USABLITY TESTING
Usability test may be designed by Web engineering team. Define a set of usability testing categories and identify goal for each. Design test that will enable each goal to be evaluate Select participants who will conduct test. Instrument participants interaction with Web Application while testing is conducted. Develop a mechanism for assessing the usability of the Web Application.
The following test categories and objective illustrate establish testing Interactivity Are interaction mechanism easy to understand and use? Layout- Are navigation mechanism, content and function place in a manner that allows the user to find them quickly? Readability- Is text well written and under stable? Aesthetics-Do layout color, typeface, and related characteristics lead to ease of use ? Display Characteristics- Does the Web Application make optimal use of screen size and resolution? Time Sensitivity- Can important features, functions and content be used in a manner? Accessibility- Is the Web application accessible to people who have Disabilities? timely
COMPATIBILITY TESTING
Web application must operate within
environment that differs from one another. Different computer, display device, OS, browser and network connection speed can have significant on Web application operation. Different
browser some time produced slightly different results, regardless of the degree of HTML standardization within the Web application. The Web Engineering team derives a series of compatibility, validation tests, derived from existing interface tests, navigation tests, performance tests and security tests.
WHITE-BOX TESTING: White-box testing sometimes called glass-box testing, is a test case design method that users the control structure of the procedural design to drive the test case .Always we are thinking that there is no necessary to execute or checks the loops and conditions. And so large number of errors is uncovered. With using white-box testing methods, we have checked that; All independent paths within a function have been executed at least once. All logical decisions on their true and false side. A11 loops working correctly at their boundary values and within their specified conditions.
In our coding we test that all the loops works truly in each module. The one technique of white-box testing is basis path testing. It contains two parts, one is flow graph notation and the second is cyclometer complexity. In flow graph notation we are checking logical control of flow. By using cyclometer complexity we find complexity of our project structure. BLACK-BOX TESTING: Black-box testing focuses on the functional requirements of the software. That is black-box testing enables the software engineer to drive sets of input conditions that will fully exercise all functional Requirements for the program. Black-box testing is not an alternative to white-box testing techniques. Rather, it is a complementary approach that is likely to uncover a different class of errors than white-box methods. We use in our coding to find errors in the following categories: Incorrect or missing functions Interface errors Errors in database Performance errors
Unlike white-box testing, which is performed earlier in the testing process, black-box testing tends to be applied during later stages of testing. Because black-box testing purposely disregards control structure, attention is focused on the information domain. By applying black-box techniques, we derive a set of test cases that satisfy following criteria Test cases that reduce, by a count that is greater then one, the number of additional test cases must be designed to achieve reasonable testing. Level 1 - Build Acceptance Tests:Other related test cases ensure that adopters received the proper Development Release Document plus other build related information (drop point, etc.). The objective is to determine if further testing is possible. If any Level 1 test case fails, the build is returned to developers un-tested.
Level 2 - Smoke Tests:The objective is to determine if further testing is possible. These test cases should emphasize breadth more than depth. All components should be touched, and every major feature should be tested briefly by the Smoke Test. If any Level 2 test case fails, the build is returned to developers un-tested.
Level 2a - Bug Regression Testing:Every bug that was Open during the previous build, but marked as Fixed, Needs Re-Testing for the current build under test, will need to be regressed, or re-tested. Once the smoke test is completed, all resolved bugs need to be regressed. It should take between 5 minutes to 1 hour to regress most bugs.
Level 3 - Critical Path Tests:Critical Path test cases must pass by the end of every 23 Build Test Cycles. They do not need to be tested every drop, but must be tested at least once per milestone. Thus, the Critical Path test cases must all be executed at least once during the Iteration cycle, and once during the Final Release cycle.
Level 4 - Standard Tests:Test Cases that need to be run at least once during the entire test cycle for this release. These cases are run once, not repeated as are the test cases in previous levels. Functional Testing and Detailed Design Testing (Functional Spec and Design Spec Test Cases, respectively). These can be tested multiple times for each
Milestone Test Cycle (Iteration, Final Release, etc.). Standard test cases usually include Installation, Data, GUI, and other test areas.
Level 5 - Suggested Test:These are Test Cases that would be nice to execute, but may be omitted due to time constraints.
Bug Regression
Bug Regression will be a central tenant throughout all testing phases. When a Severity 1 bug fails regression, adopters Testing team should also put out an immediate email to development. The Test Lead will be responsible for tracking and reporting to development and product management the status of regression testing.
5.4 TEST CASES 5.4.1 Test Cases 1 Checks system behavior when credentials provided by admin are correct. Click on all member link by admin.
Input
Expected output
Result page which contain information about only all member. Pass
Pass/Fail
5.4.2
Test Cases 2 Checks system behavior when credentials provided by admin are correct.
Input
Expected output
Result page which contain information about only paid member. Pass
Pass/Fail
5.4.3
Test Cases 3 Checks system behavior when credentials provided by admin are correct. Click on statistic link by admin.
Input
Expected output
Result page which contain total member, total male member, total female member, free member, paid member.
Pass/Fail
Pass
5.4.4
Test Cases
4 Checks system behavior when credentials provided by the user are correct. In Login page user enter correct credentials in respected text fields. User profile page.
Input
Expected output
Pass/Fail
Pass
Checks system behavior when credentials provided by the user are not correct. In Login page user enters incorrect credentials in respected text fields. Login page with message saying that credentials are incorrect..
Input
Expected output
Pass/Fail
Pass
5.4.6
Test Cases 6 Checks system behavior when credentials provided by user are not correct.
Input
If user enters in-correct credentials in respected text fields of register pages. Same register page with alert message
Expected output
Pass/Fail
Pass
5.4.7
Test Cases 7 Checks system behavior when credentials provided by the are correct. Click on details button for see more information about user . Redirect to the hide profile error message page if membership type of logged user is free type. Pass
Input
Expected output
Pass/Fail
5.4.8
Test Cases
8 Checks system behavior when credentials provided by user are correct. If user click on profile details button in result page of search. Redirect to the page which contain message like prolix has been hidden by profile owner.
Input
Expected output
Pass/Fail
Pass
5.4.9Test Cases
9 Checks system behavior when credentials provided by user are incorrect. User enters incorrect credentials in respected text fields of Email-Id. Register page with message saying that credentials are incorrect. Pass
Input
10 Checks system behavior when credentials provided by the user are correct. In quick search page user enters required information for quick search. Display result according to match with information given by user.
Pass/Fail
Pass
5.4.11 Test Cases Test Case No. Test Case Action 20 Checks system behavior when credentials provided by the user are correct. In wedding directory page user select correct category and city. Display result according to match with information given by user. Pass
Input
Expected output
Pass/Fail
6.1 CONCLUSION
Matrimonial Web Application is to provide Grooms and Brides with excellent matchmaking experience by exploring the opportunities and resources to meet true potential partner. Matrimonial website which will provide platform to a lot of Bride/Groom for finding perfect match. There are different sectors like Registration, Partner Search, etc. So the Bride/Groom can get their interest for find their partner. Bride/Groom can directly search Partner according to their required criteria. The Bride/Groom can use match By Email functionality so he/she can get directly E-mail alert for the match which fulfill their required criteria. It helps the user by providing profiles of perspective Bride or Groom and other information regarding them online. Matrimonial web application provides facility like quick tour. This is a module that contains the flow of the website .Here user can have a idea how he can commit himself in the website. Matrimonial web application provides facility to change preference about partner. This application provide facility like edit profile, update photo and delete photo, hide profile, create album, send express interest, send personal message, apply for loan to the use.
It is possible to create our own mail server. It is possible to create chat server so that user can communicate with each other. It is possible to provide facility like create video album.
BIBLIOGRAPHY
Books
PHP(Ivan bayross). Professional ASP.NET(Wrox Publication). C# Vijaymukhi. ASP.NET Complete Reference. Software engineering Concepts By Roger S.Presman UML IN A NUTSHELL By Alhir Fundamentals of Software Engineering By Rajib Mall SQL Server 2005 (Wrox Publication).
Web Sites