Report PDF
Report PDF
1.INTRODUCTION
1.1. Overview:
Jobenlist Webapp is developed for creating an interactive job vacancy for candidates.
An employment website is a web site that deals specifically with employment or careers. Many
employment websites are designed to allow employers to post job requirements for a position to
be filled and are commonly known as job boards. Other employment sites offer employer
reviews, career and job-search advice, and describe different job descriptions or employers.
Through a job website a prospective employee can locate and fill out a job application or submit
resumes over the Internet for the advertised position.
1. Job Seeker.
2. Job Provider.
3. Administrator.
4. Job Search.
1
1.1.1. Job Seeker:
This module contains details about Job Seeker, i.e. employee or un-employee details. Like
employee name, email, experience. Here employee can do update, modify and delete. He can
update experience and skills details also.
This module having information about job provider and requirement details, which client
recruiting the employees, and what based them recruiting the employees. Here client releasing
the primary skills, experience, no. of vacancies, opening date, closing and closing date.
1.1.3. Administrator:
The administrator module having all privileges about this entire project, he can update,
delete, and modify the details about job seeker, job provider, client and Job Search details.
Administrator maintain the client and job seeker database, where ever client is releasing their
requirements( vacancies) with particular primary skills and experience, on that time
administrator search for job seekers, who are having that primary skills and experience.
Administrator sends the message for selected candidates.
This module having all current vacant jobs, experience and which client offering that
vacant.
2
CHAPTER-2
2. PROBLEM DEFINITION AND SYSTEM ANALYSIS
To create or develop a new system first we have to study the prior system, Analysis difficult
problems faced by the operator of that system. System Analysis therefore understands such
problems and proposes a new system in which the above problems are rectified.
Before creating this website, all jobseekers to send their resumes or information through
postal mails or they use person to person contacts with each other. It will take long time to send
their requirements through this type of communications.
Here there May error occurs in the process. The administration faces the problems to collect all
the information from clients and consultants to analyze the requirement in the corresponding
Clients. Administration has to send requirements information to different consultants and
jobseekers.
Here all job seekers send their resumes Or information through our site.It does not consume
much of time.It is very easier to modify if any error occurs in the process.It is also very easier to
administrator to collect information from clients and consultants.
The users of this system are administrator, clients, job provider and jobseekers. This system
is designed such a way that the users can easily interact with the system with minimum
knowledge to browser the net and company rules.
3
2.5. Module Description:
1. Job Seeker.
2. Job Provider.
3. Administrator.
4. Job Search.
This module contains details about Job Seeker, i.e. employee or un-employee details.
Like employee name, email, experience.……. Here employee can do update, modify and delete.
He can update experience and skills details also.
This module having information about job provider and requirement details, which client
recruiting the employees, and what based them recruiting the employees. Here client releasing
the primary skills, experience, no. of vacancies, opening date, closing and closing date.
2.5.3. Administrator:
The administrator module having all privileges about this entire project, he can update,
delete, and modify the details about job seeker, job provider, client and Job Search details.
Administrator maintain the client and job seeker database, where ever client is releasing their
requirements( vacancies) with particular primary skills and experience, on that time
administrator search for job seekers, who are having that primary skills and experience.
Administrator sends the message for selected candidates.
4
This module having all current vacant jobs, experience and which client offering that
vacant.
2.6.Module connectivity:
In the administrator module the administrator will be responsible for the registering the
consultants and clients at the site. This module is also responsible for search for skilled
applicants, shortlist the applicants and send the call letters to the applicants. In the jobseekers
module the new user can registration their information, or existing jobseeker can update their
information, search for job based on skills or experience.
The client module, different clients are fetching new job lists, and no. of vacates, opening
date and closing date.
5
CHAPTER-3
3.FEASIBILITY STUDY
It is necessary and prudent to evaluate the feasibility of a project at the earliest possible
time. There may be different ways of checking whether a system is feasible or not. The following
feasibility studies were performed to gauge the feasibility of the system.
In this test, the operational scope of the system is checked. The system under consideration
should have enough operational reach. It is observed that the proposed system is very user
friendly and since the system is built with enough help, even persons with little knowledge of
windows can find the system very easy.
This test includes a study of function, performance and constraints that may affect the
ability to achieve an acceptable system. This test begins with an assessment of the technical
viability of the proposed system. One of the main fusers to be accessed is the need of various
kinds of resources for the successful implementation for the proposed system.
An evaluation of development cost weighed against the ultimate income or benefit derived
from the development of the proposed system is made. Care must be taken that incurred in the
development of the proposed of the system should not exceed from the system. The income can be
in terms of money or goodwill, since the software brings in both, the system is highly viable.
6
CHAPTER-4
4. SYSTEM REQUIREMENT
8
browser search as hot java. Applets can be downloaded from remote machine via internet and
run it on local machine .
9
4.2.8 PARADIGM OF JAVA
Dynamic down loading applets(small application programs);
Elimination of flatware phenomenon that is providing those features of a product
that user needs at a time. The remaining features of a product can remain in the
server.
Changing economic model of the software
Up-to-date software availability
Supports network entire computing
10
<CENTER>...</CENTER> Creates text
<DD>…</DD> Definition of a term
<DL>...</DL> Creates definition list
<FONT>…</FONT> Formats text with a particular font
<FORM>...</FORM> Encloses a fill-out form
<FRAME>...</FRAME> Defines a particular frame in a set of frames
<H#>…</H#> Creates headings of different levels
<HEAD>...</HEAD> Contains tags that specify information about a document
<HR>...</HR> Creates a horizontal rule
<HTML>…</HTML> Contains all other HTML tags
<META>...</META> Provides meta-information about a document
<SCRIPT>…</SCRIPT> Contains client-side or server-side script
<TABLE>…</TABLE> Creates a table
<TD>…</TD> Indicates table data in a table
<TR>…</TR> Designates a table row
<TH>…</TH> Creates a heading in a table
4.3.2.ADVANTAGES:
A HTML document is small and hence easy to send over the net. It is small because it does
not include formatted information.
HTML is platform independent.
HTML tags are not case-sensitive.
11
Note that the availability to generate and interpret programs at runtime implies the
presence of a compiler at runtime.
Java script is a high level scripting language that does not depend on or expose particular
machine representations or operating system services. It provides automatic storage
management, typically using a garbage collector.
12
4.5. Introduction to SERVLETS:
The servlet is a Java programming language class used to extend the capabilities of a
server. Although servlets can respond to any types of requests, they are commonly used to
extend the applications hosted by web servers, so they can be thought of as Java applets that run
on servers instead of in web browsers.
Servlets are to servers what applets are to browsers. Unlike applets, however, servlets
have no graphical user interface.
Servlets can be embedded in many different servers because the servlet API, which you
use to write servlets, assumes nothing about the server's environment or protocol. Servlets have
become most widely used within HTTP servers; many web servers support the Servlet API.
Servlets are most often used to Process or store data that was submitted from an HTML
form, provide dynamic content such as the results of a database query manage state information
that does not exist in the stateless HTTP protocol, such as filling the articles into the shopping
13
cart of the appropriate customer. Technically speaking, a "servlet" is a Java class in Java EE that
conforms to the Java Servlet API, a standard for implementing Java classes which respond to
requests. Servlets could in principle communicate over any client–server protocol, but they are
most often used with the HTTP protocol. Thus "servlet" is often used as shorthand for "HTTP
servlet".Thus, a software developer may use a servlet to add dynamic content to a web server
using the Java platform. The generated content is commonly HTML, but may be other data such
as XML. Servlets can maintain state in session variables across many server transactions by
using HTTP cookies, or URL rewriting.
To deploy and run a servlet, a web container must be used. A web container (also known
as a servlet container) is essentially the component of a web server that interacts with the
servlets. The web container is responsible for managing the lifecycle of servlets, mapping a URL
to a particular servlet and ensuring that the URL requester has the correct access rights.
The Servlet API, contained in the Java package hierarchy javax.servlet, defines the
expected interactions of the web container and a servlet.
A Servlet is an object that receives a request and generates a response based on that
request. The basic Servlet package defines Java objects to represent servlet requests and
responses, as well as objects to reflect the servlet's configuration parameters and execution
environment. The package javax.servlet.http defines HTTP-specific subclasses of the generic
servlet elements, including session management objects that track multiple requests and
responses between the web server and a client. Servlets may be packaged in a WAR file as a web
application.
Servlets can be generated automatically from Java Server Pages (JSP) by the JavaServer
Pages compiler. The difference between servlets and JSP is that servlets typically embed HTML
inside Java code, while JSPs embed Java code in HTML. While the direct usage of servlets to
generate HTML (as shown in the example below) has become rare, the higher level MVC web
framework in Java EE (JSF) still explicitly uses the servlet technology for the low level
request/response handling via the FacesServlet. A somewhat older usage is to use servlets in
conjunction with JSPs in a pattern called "Model 2", which is a flavor of the model–view–
controller pattern.
14
The advantages of using servlets are their fast performance and ease of use combined
with more power over traditional CGI (Common Gateway Interface). Traditional CGI scripts
written in Java have a number of disadvantages when it comes to performance:
When an HTTP request is made, a new process is created for each call of the CGI script.
This overhead of process creation can be very system-intensive, especially when the script does
relatively fast operations. Thus, process creation will take more time for CGI script execution. In
contrast, for servlets, each request is handled by a separate Java thread within the web server
process, omitting separate process forking by the HTTP daemon.
Simultaneous CGI request causes the CGI script to be copied and loaded into memory as
many times as there are requests. With servlets, there is only one copy that persists across
requests and is shared between threads.
Only a single instance answers all requests concurrently. This reduces memory usage and
makes the management of persistent data easy.
15
Fig-4.2. Life Cycle of Servlet
Forwarding requests. Servlets can forward requests to other servers and servlets. Thus
servlets can be used to balance load among several servers that mirror the same content,
and to partition a single logical service over several servers, according to task type .
16
The javax.servlet package provides interfaces and classes for writing servlets.
The architecture of the package is described below.
The central abstraction in the Servlet API is the Servlet interface. All servlets implement
this interface, either directly or, more commonly, by extending a class that implements it such as
HTTPSERVLET.
The Servlet interface declares, but does not implement, methods that manage the servlet and its
communications with clients. Servlet writers provide some or all of these methods when
developing a servlet.
When the servlet class is loaded, the servlet container creates an instance of the servlet.
Typically, only a single isntance of the servlet is created, and concurrent requests to the
servlet are executed on the same servlet instance. This is really up to the servlet container to
decide, though. But typically, there is just one instance.
When a servlet instance is created, its init() method is invoked. The init() method allows a
servlet to initialize itself before the first request is processed.
17
You can specify init parameters to the servlet in the web.xml file. See web.xml Servlet
Configuration for more details.
For every request received to the servlet, the servlets service() method is called. For
HttpServlet subclasses, one of the doGet(), doPost() etc. methods are typically called.
As long as the servlet is active in the servlet container, the service() method can be called.
Thus, this step in the life cycle can be executed multiple times.
When a servlet is unloaded by the servlet container, its destroy() method is called. This step
is only executed once, since a servlet is only unloaded once.
A servlet is unloaded by the container if the container shuts down, or if the container
reloads the whole web application at runtime.
Three methods are central to the life cycle of a servlet. These are init(), service(), and
destroy(). They are implemented by every servlet and are invoked at specific times by the server.
During initialization stage of the servlet life cycle, the web container initializes the servlet
instance by calling the init() method, passing an object implementing the
javax.servlet.ServletConfig interface. This configuration object allows the servlet to access
name-value initialization parameters from the web application.
After initialization, the servlet instance can service client requests. Each request is
serviced in its own separate thread. The web container calls the service() method of the servlet
for every request. The service() method determines the kind of request being made and
dispatches it to an appropriate method to handle the request. The developer of the servlet must
provide an implementation for these methods. If a request is made for a method that is not
implemented by the servlet, the method of the parent class is called, typically resulting in an
error being returned to the requester.
Finally, the web container calls the destroy() method that takes the servlet out of service.
The destroy() method, like init(), is called only once in the lifecycle of a servlet.
18
The SERVLETREQUEST interface allows the servlet access to:
Information such as the names of the parameters passed in by the client, the protocol
(scheme) being used by the client, and the names of the remote host that made the
request and the server that received it.
The input stream, SERVLETINPUTSTREAM. SERVLETS use the input stream to get
data from clients that use application protocols such as the HTTP POST and PUT
methods.
The classes and interfaces described above make up a basic Servlet. HTTP servlets have
some additional objects that provide session-tracking capabilities. The servlet writer can use
these APIs to maintain state between the servlet and the client that persists across multiple
connections during some time period. HTTP servlets also have objects that provide cookies. The
servlet writer uses the cookie API to save data with the client and to retrieve this data. The
classes mentioned in the Architecture of the Servlet Package section are shown in the example in
bold:
19
Fig-4.4. Servlet Client Server Interaction
Even though most servlets are run in multi-threaded servers, servlets have no
concurrency issues during servlet initialization. The server calls the init method once, when the
server loads the servlet, and will not call the init method again unless the server is reloading the
servlet.
The server can not reload a servlet until after the server has destroyed the SERVLET
by calling the destroy method.
20
When the destroy method runs, another thread might be running a service request. The
Handling Service Threads at Servlet Termination section shows you how to provide a clean
shutdown when there could be long-running threads still running servicerequests.
The destroy method provided by the httpservlet class destroys the servlet and logs the
destruction. To destroy any resources specific to your servlet, override the destroy method. The
destroy method should undo any initialization work and synchronize persistent state with the
current in-memory state.
The following example shows the destroy method that accompanies the init method
shown previously:
A server calls the destroy method after all service calls have been completed, or a server-
specific number of seconds have passed, whichever comes first. If your servlet handles any long-
running operations, service methods might still be running when the server calls the destroy
method. You are responsible for making sure those threads complete. The next section shows
you how.
1.Open browser and type the URL ofServlet(http://localhost:65535/first/hs), then the request is
passed tothe client system socket.
2.Then the client system socket further forward the request to theServer System ServerSocket by
using IP-address used in the URL.
3.Then the Server System transports the request to the Web-Serverwith the help of port no. used in
the URL.
4.Then the Web-Server handover the request to the paticular webcontainerfor which the request is
meant for.
21
5.Then the web-container identify the web-application using webapplicationname mentioned in the
URL, then further it read that webapplication'sweb.xml file and prepared the below objects.
v >Servlet:- Servlet Object is created by using default constructor bymapping the url-pattern
mentioned in the URL.
6.Then web-container(Servlet-container) create a new thread andpasses the Servlet object and then
invokes life -cycle methods as:
a) init() : By passing ServletConfig object.This method is executedonly once when client first time
gives request to the Servlet.
c) destroy() : This method is invoked when the Server is Shut-down/undeployment of the Servlet.
7. Once after the request is processed by Servlet's service() method ,then the response is generated
and handover to the Servlet-container.
An HTTP Servlet handles client requests through its service method. The service method
supports standard HTTP client requests by dispatching each request to a method designed to
handle that request. For example, the service method calls the do Get method shown earlier in
the simple example servlet.
Methods in the HTTPSERVLET class that handle client requests take two arguments:
22
1. An HTTPSERVLETREQUEST object, which encapsulates the data from the client.
For HTTP GET requests, the GETQUERYSTRING method returns a String of raw data
from the client. You must parse this data yourself to obtain the parameters and values.
23
Use the GETWRITER method to return text data to the user, and the GETOUTPUTSTREAM
method for binary data. Closing the Writer or SERVLETOUTPUTSTREAM after you send the
response allows the server to know when the response is complete.
The methods to which the service method delegates HTTP requests include,
By default, these methods return a BAD_REQUEST (400) error. Your servlet should
override the method or methods designed to handle the HTTP interactions that it supports. This
section shows you how to implement methods that handle the most common HTTP requests:
GET and POST.
The HTTPSERVLET'S service method also calls the DOOPTIONS method when the
servlet receives an OPTIONS request, and DOTRACE when the servlet receives a TRACE
request. The default implementation of do Options automatically determines what HTTP options
are supported and returns that information. The default implementation of DOTRACE causes a
response with a message containing all of the headers sent in the trace request. These methods
are not typically overridden.
A session is a series of requests from the same user that occur during a time period. This
transaction model for sessions has many benefits over the single-hit model. It can maintain state
and user identity across multiple page requests. It can also construct a complex overview of user
behavior that goes beyond reporting of user hits.
25
This method is called when this JSP is destroyed. With this call the servlet serves its purpose and
submits itself to heaven (garbage collection). This is the end of jsp life cycle.
26
The Oracle Database (commonly referred to as Oracle RDBMS or simply as Oracle) is an
object-relational database management system produced and marketed by Oracle Corporation.
Larry Ellison and his friends, former co-workers Bob Miner and Ed Oates, started the
consultancy Software Development Laboratories (SDL) in 1977. SDL developed the original
version of the Oracle software. The name Oracle comes from the code-name of a CIA-funded
project Ellison had worked on while previously employed by Ampex.
ORACLE IS PORTABLE:
The Oracle RDBMS is available on wide range of platforms ranging from PCs to super
computers and as a multi user loadable module for Novel NetWare, if you develop
application on system you can run the same application on other systems without any
modifications.
ORACLE IS COMPATIBLE:
Oracle commands can be used for communicating with IBM DB2 mainframe RDBMS that is
different from Oracle, that is Oracle compatible with DB2. Oracle RDBMS is a high
performance fault tolerant DBMS, which is specially designed for online transaction
processing and for handling large database applications.
A relational database management system must manage its stored data using
relational capabilities. The system must qualify as relational, as a database, and as a
management system. For a system to qualify as a relational database management system
(RDBMS), that system must use its relational facilities (exclusively) to manage the database.
27
All information in a relational database (including table and column names) is represented in
only one way, namely as a value in a table.
All data must be accessible. This rule is essentially a restatement of the fundamental
requirement for primary keys. It says that every individual scalar value in the database must
be logically addressable by specifying the name of the containing table, the name of the
containing column and the primary key value of the containing row.
Rule 3: Systematic treatment of null values:(Oracle does not support this rule):
The DBMS must allow each field to remain null (or empty). Specifically, it must support a
representation of "missing information and inapplicable information" that is systematic,
distinct from all regular values (for example, "distinct from zero or any other number", in the
case of numeric values), and independent of data type. It is also implied that such
representations must be manipulated by the DBMS in a systematic way.
The system must support an online, inline, relational catalog that is accessible to authorized
users by means of their regular query language. That is, users must be able to access the
database's structure (catalog) using the same query language that they use to access the
database's data.
The system must support at least one relational language that has a linear syntaxCan be used
both interactively and within application programs,Supports data definition operations
(including view definitions), data manipulation operations (update as well as retrieval),
security and integrity constraints, and transaction management operations (begin, commit,
and rollback).
All views that are theoretically updatable must be updatable by the system.
The system must support set-at-a-time insert, update, and delete operators. This means that
data can be retrieved from a relational database in sets constructed of data from multiple
rows and/or multiple tables. This rule states that insert, update, and delete operations should
be supported for any retrievable set rather than just for a single row in a single table.
28
Rule 8: Physical data independence:
Changes to the physical level (how the data is stored, whether in arrays or linked lists etc.)
must not require a change to an application based on the structure.
Changes to the logical level (tables, columns, rows, and so on) must not require a change to
an application based on the structure. Logical data independence is more difficult to achieve
than physical data independence.
Integrity constraints must be specified separately from application programs and stored in the
catalog. It must be possible to change such constraints as and when appropriate without
unnecessarily affecting existing applications.
The distribution of portions of the database to various locations should be invisible to users
of the database. Existing applications should continue to operate successfully:
If the system provides a low-level (record-at-a-time) interface, then that interface cannot be
used to subvert the system, for example, bypassing a relational security or integrity
constraint.
CHAPTER-5
5.SYSTEM DESIGN
30
SL.NO FIELD NAME DATA TYPE
DESCRIPTION
31
SL.NO FIELD NAME DATA TYPE DESCRIPTION
This is unique identifier given to a User to
1 JPPID Number identify him uniquely. This is the Primary Key
of the table
2 JOBID Varchar2(30) This is the code of job.
3 JOBTYPE Varchar2(30) This is the type of job.
4 JOBREQ Varchar2(50) This is the requirements of job.
5 JOBQUALI Varchar2(50) This is the qualification of job.
6 JOBQUALI2 Varchar2(50) This is the skill set required for the job.
7 JCITY Varchar2(20) This is the city where job is available.
8 JDEMAND Varchar2(50) Demand Skills for job
9 JVALID Varchar2(20) Validity of job.
10 JEMAIL Varchar2(50) Email for job requirement
11 JDESC Varchar2(400) Description of Job
12 EXPER Varchar2(20) Experience needed for job
13 CNAME1 Varchar2(50) This is the company name who posted job
33
SL.NO FIELD NAME DATA TYPE DESCRIPTION
1 JSID Varchar2(20) This is about the jobseeker ID.
2 USERN Varchar2(30) User name of the Jobseeker.
3 PASSW Varchar2(30) This is the password of the jobseeker.
<<extends>>
apply resume
<<extends>>
validation
job seeker
<<extends>> update details
search vacancies
5.3.2. ADMINISTRATOR:
34
<<extends>>
job seeker
<<extends>>
job provider
35
5.3.4 JOB PROVIDER:
<<extends>>
administrator
36
5.4.1 JOB SEEKER:
verify
login denied
applying resume
checking mail
37
validation recruitment submitting
: job provider
details details
verify
login denied
placement details
5.4.3 CLIENT:
validation recruitment
: client details
verify
login denied
placement info
Fig:-5.7. CLIENT
38
5.4.4 ADMINISTRATOR:
verify
login denied
5.5.1.ER-Diagram:
S_emai id
l passwd
id Job_seeker
S_qual
Admin
passwd t
S_cell
no S_d.o.
sec b Site_log
S_hob in
by
skills
Manag
es
Job_de
Emp g
Job_nam
Vacancy e
Comp_name
Job_lo
c
P_nam paswd
e
Com_na
Job_provider
Manag me
es
P_id
Emp.
P_name
Job_lo
5.9.ER-Diagram of Job Portal c.
Process
Data Store
Source or Sink
Description:
Process : Describes how input data is converted to output Data
Data Store : Describes the repositories of data in a system
Data Flow : Describes the data flowing between process, Data stores and
external entities.
Sources : An external entity causing the origin of data.
Sink : An external entity, which consumes the data.
41
5.6.1 Context level:
0 level:
Administrator Administrator
Job Seeker
Job Seeker
JOB
Job Provider PORTAL
0 Job Provider
Job Search
Client
42
Level 1 Diagrams:
ADMINISTRATOR:
Guest
0.1
Job
Job provider
Administrator
portal
0.1
Jobseeker
Job search
Short listed
students
43
JOB SEEKER:
Update
Job 0.2
Job seeker portal
0.1
delete
JOB PROVIDER:
update
Job
Job Provider portal
0.1
delete
Add
new
Add new /update Jobs
Jobprovider
details
44
CHAPTER-6
6. TESTING AND IMPLEMENTATION
6.1.Need of Testing:
Testing plays a critical role for quality assurance and for ensuring the reliability of the
software. Its basic function is to detect the errors. After the coding phase, testing is done to test
the proper working of the new system. Testing is the process of executing a program with the
intention of finding errors. It is a complete verification to determine whether the objectives are
met and the user requirements are satisfied. The testing phase involves testing of a system using
various test data. Preparation of the test data plays a vital role in the system testing. After
preparing the test data, the system under study is testing using those test data. Errors were found
and corrected by using the following testing steps and corrections are recorded for future
references. Thus, a series of testing is performed on the system before it is ready for coding.
Since code is the only product that can be executed frequently whose actual behavior can be
observed, this phase is so important for the successful implementation of the software product.
Thus, the goal of testing is to uncover the requirements, design and coding errors in the program.
45
6.1.2 Integration Testing
The second step in the testing process is the Integration testing. Integration testing is the
systematic technique for constructing the program structure while conducting tests to uncover
errors associated with interfacing. All the modules when unit testing will work properly but after
interfacing the data can be lost across an interface, one module can have an inadvertent, adverse
effect on other, sub functions when combined may not produce the desired major function,
global data structures can cause problems, etc.
Integration testing was performed by integrating all the individual modules and the activities
of the user such as loading layers, retrieving information from any functions applying themes
based on the records present in the database etc. and is found that it works good to the
examination of the end users. Hence, the objective of integration testing is to take unit tested
modules and build a final program structure.
All the modules developed are independent. Even the whole process of approval for all. Each
module is integrated well with other modules. And all the interfaces are tested successfully.
46
3. Reporting and corrections
4. Data Access Protections
5. System Output
6.2 Implementation:
Implementation includes all those activities that take place to convert the old system to the
new system .The new system will replace he existing system. The aspects of implementation are
as follows.
Conversion, Post Implementation Review.
6.2.1.Conversion:
Conversion means changing from one system to another. The objective is to put the tested
system into operation. It involves proper installation of the software package developed and
training the operating staff.
The software has been installed and found to be functioning properly. The users how to be
trained to handle the system effectively. Sample data provide to the operating stuff and were
asked to operate on the system. The operating stuffs now have a clear out look of the software
and are ready for practical implementation of the package.
6.2.2. Post Implementation Review
A post implantation review is an evaluation of system in terms of the extent to which the
system accomplishes the started objectives. This starts after the system is implemented and
conversation is complete.
47
SCREEN SHOTS
1.Home Page:
48
3.Job seeker registration page success:
49
5.Job seeker module homepage:
6.Upload File:
50
7.Uploaded Filename:
51
9.Select Resume to Download:
10.Download Option:
52
11.Changing password jobseeker:
53
13.Jobseeker job apply :
54
15.Job seeker personal edit page:
55
17.Registration provider page success:
18.Employer Login:
56
19.Employer module home page:
57
21.View or deleting the job profile:
58
23.Deleting the job profile:
59
25.Administrator Login:
60
27.View jobs:
61
29.Jobseeker details Admin:
30.Jobprovider Details:
62
CONCLUSION AND ENHANCEMENTS
This system has been developed successfully incorporate all the requirements. Appropriate
care has taken during database design maintain database integrity and to avoid redundancy of
data. This site was developed in such a way that any further modifications needed can be easily
done. User feels freely while using this site. In this all technical complexities are hidden. This
site is a more user friendly.
The quality like correctness, efficiency, usability, maintainability, portability, accuracy,
errors, tolerance, expandability and communicatively all are successfully done.
Foreseeable enhancements
There is always a room for improvement in any software package, however good and
efficient it may be. The important thing is that the website should be flexible enough for further
modifications. Considering this important factor, the web site is designed in such a way that the
provisions are given for further enhancements. At present this website provides all the
information using static pages and reservation forms.
In future we can enhance our project by providing options like. Include many sites
information.
63
REFERENCES
[1]. Ken Arnold and James Gosling, The Java Programming Language, second ed., Addison-
Wesley, 1998.
[2] . Java Servlet Programming, Jason Hunter, William Crawford. 1998. ISBN 1-56592-391-1,
510 pp, $36.95. Describes in detail how to use Java Servlets with HTML to make dynamic web
sites
[3]. J. Hou and Y. Zhang, “Effectively Finding Relevant Web Pages from Linkage
Information,” IEEE Trans. Knowledge and Data Eng., vol. 15, no. 4, pp. 940-951, July/Aug.
2003.
[4]. [Deitel 2011] Paul J. Deitel, Harvey M. Deitel, Abbey Deitel, and Michael Morgano,
Android for Programmers: An App-Driven Approach, Prentice Hall, 2011.
[5]. James Gosling and Bill Joy and Guy Steele, The Java Language Specification, Addison-
Wesley, 1996. https://en.wikibooks.org/wiki/Java_Programming
[6]. The Oracle Designer/2000 Handbook, by Carrie Anderson and David Wendelken, Addison-
Wesley, 1997, https://developer.mozilla.org/en-US/docs/Web/Guide/CSS/Getting_started
[7]. Oracle Designer/2000 Handbook , by Dr. Paul Dorsey and Peter Koletzke, Osborne
McGraw-Hill,1997, ISBN 0-07-882229-7 available at: www. oracle.org/article/search-ranking-
factors (accessed on 5 August 2010).
64