documentation) unaltered
TRANSCRIPT
-
8/4/2019 Documentation) Unaltered
1/93
ONSCREEN KEYBOARD
PROJECT REPORT
Submitted in partial fulfillment of the requirements
For the award of the degree of
MASTER OF SCIENCE
(SOFTWARE SCIENCE)
Submitted By
N.GOWRI
REG.No:07BEE1029
Under the Guidance of
Mr.R.RAMANKUMARAMANGALAM, B.E., M.Sc.,
DEPARTMENT OF COMPUTER SCIENCE
VIVEKANANDHA COLLEGE FOR WOMEN
(Affiliated to Periyar University, Salem)
TIRUCHENGODE-637205
APRIL2010
-
8/4/2019 Documentation) Unaltered
2/93
VIVEKANANDHA COLLEGE FOR WOMEN
(Affiliated to Periyar University, Salem)
ELAYAMPALAYAM, TIRUCHENGODE-637205
This is to certify that the project entitled BUG TRACKING is a bonafide record done
by N.GOWRI (REG.No:07BEE1029), during the academic year 2009-2010 in partial
fulfillment for the award of the degree ofMaster of Science(Software Science)
Internal Guide Head of the Department
Submitted for the VivaVoce Examination held on -------------------
Internal Examiner External Examiner
-
8/4/2019 Documentation) Unaltered
3/93
DECLARATION
I hereby declare that the project work entitled BUG TRACKING,
submitted to Periyar University in partial fulfillment of the requirements
for the award of the degree of MASTER OF SOFTWARE SCIENCE, is a
report of original work done by me under the supervision
of Mr.R.Ramankumaramangalam, BE., M.Sc., Head of the Department of
Computer Science, Vivekananda College for Women, during the period of study
2009-2010.
Place: Signature of the candidate
Date: (N.GOWRI)
Reg.No: 07BEE1029
-
8/4/2019 Documentation) Unaltered
4/93
ACKNOWLEDGEMENT
First and foremost I thank the almighty god for showing his grace and blessing on me to
finish this project in a nice manner.
I express my gratitude and sincere thanks to Chairman, Mr.M.Karunanidhi B.Pharm.,
M.S., Ph.D., D.litt., of Vivekanandha Educational Institutions, Elayampalayam, Tiruchengode
for having granted me the permission to undertake the project work.
I extend my heartfelt thanks to our Principal, Mr.N.Rajendran, M.C.A., M.Phil., of
Vivekanandha College for Women for his immense support in all manners.
I extend my gratitude and respect to our Head of the Department,
Mr.R.Ramankumaramangalam, BE.,M.Sc., Department of Computer Science, Vivekananda
College for Women, for his encouragement and support in doing this project work.
I express my profound thanks and gratitude to my internal guide,
Mr.R.Ramankumaramangalam, BE.,M.Sc., for giving me concrete ideas and full support for
the overall design of the system. His timely help and invaluable support
I also thank my company guide, Mr.S.Savariraj, M.C.A, TREC-STEP and all the staff
members of the organization.
Last but not the least I thank my beloved family members and friends for the moral
support and inspiration given to me during my project work.
-
8/4/2019 Documentation) Unaltered
5/93
-
8/4/2019 Documentation) Unaltered
6/93
SYNOPSIS
BUG TRACKING system acts as an interface between the Project Manager, the
Developer and the Tester in a software company.
Using this system the project manager assigns projects to the developers. The developer
develops the project as per customer requirements. The project manger itself assigns the
developed applications to the Testers for testing.
When the tester encounters n no bugs during testing, he generates a unique id number
for each individual bug. The bug information along with its id is mailed to the project manger
and the developer. This is called Bug Report. After viewing the bug report the developer
resolves the bugs. This makes that no error will go unfixed in the projects. These are stored in the
database for future reference.
-
8/4/2019 Documentation) Unaltered
7/93
-
8/4/2019 Documentation) Unaltered
8/93
CONTENTS
SNO DESCRIPTION PAGE NO
1 INTRODUCTION
1.1PROJECT DESCRIPTION1.2ORGANISATION PROFILE
2 SYSTEM CONFIGURATION
2.1 HARDWARE CONFIGURATION
2.2 SOFTWARE CONFIGURATION
2.3 SOFTWARE DESCRIPTION
3 SYSTEM STUDY
3.1 EXISTING SYSTEM
3.1.1 DRAWBACKS
3.2 PROPOSED SYSTEM
3.2.1 AIM
3.2.2 OBJECTIVES
4 SYSTEM DESIGN AND DEVELOPMENT
4.1 FILE DESIGN
4.2 INPUT DESIGN
4.3 OUTPUT DESIGN
4.4.CODE DESIGN
4.5 DATA DESIGN
-
8/4/2019 Documentation) Unaltered
9/93
SNO DESCRIPTION PAGE NO
5 SYSTEM TESTING AND IMPLEMENTATION
6 CONCLUSION
7 BIBLIOGRAPHY
8 APPENDICES
8.1 DATA FLOW DIAGRAM
8.2 TABLE STRUCTURE
8.3 SAMPLE CODINGS
8.4 SAMPLE INPUT/OUTPUT
-
8/4/2019 Documentation) Unaltered
10/93
-
8/4/2019 Documentation) Unaltered
11/93
1.1PROJECT DESCRIPTIONWhen a customer puts request or orders for a product to be developed. The project
manager is responsible for adding users to Bus Tracking System and assigning projects to the
users.
The project manager assigns projects to the developers. The developer develops the
projects as per customer requirements. The project manager itself assigns the developed
applications to the Testers for testing. The tester tests the application and identifies the bugs in
the application.
When the tester encounters n no. of bugs, he generates a unique id number for each
individual bug. The bug information along with its id is mailed to the project manager and
developer. This is Bug Report. These are stored in the database. This is useful for further
reference.
Bug information includes the bug id, bug name, bug priority, project name, bug location,
bug type.
This whole process continues until all the bugs are got fixed in the application.
The bug report is mailed to the project manager and the developer as soon as the bug is
identified. This makes that no error will go unfixed because of poor communication. It makes
ensure that anyone who needs to know about a bug can learn of it soon after it is reported.
Bug Tracking System plays a vital role in the testing phase. But it supports assigning
projects for the developer, tester by the project manager. The Bug Tracking System maintains
the different users separately i.e., it provides separate environments for project manager,
developer and tester.
-
8/4/2019 Documentation) Unaltered
12/93
The project has the following modules:
Project Manager Developer Tester
Module 1: Project Manager
The project manager has the options to access user information, project information,
assign information, report, self details.
1) User Information:
The project manager will access the user information. In this the, the project manager can
Add user details into the database. Delete user from the database. Modifying the existing user.
2) Project Information:
The project manager will access the project information. In this, the project manager can
Add the project into the database by gathering the information like project name,status, project id, description.
Delete project from the database by specifying the project name. Modify the project details by specifying the project name
-
8/4/2019 Documentation) Unaltered
13/93
3) Assign Information:
This can be accessed by the project manager to assign the projects to the other users like
developer, tester. Assign information has the following options like view, assign and project.
The project manager can
View all the projects. Assign the projects to the developer and tester by gathering the information like
user name, project id, assigned date, date of completion.
Search a particular project details by specifying corresponding project id.4) Report:
This is used to view the bug report after specifying the project id.
5) Self:
This option is used to view the self details. It has option to change password. This
gathers the information like old password, new password. This makes to store the changed
password to the database.
Module 2: Developer
The developer has the options to view projects, bug details and self details.
1) View Projects:
This option will make the developer to view all his assigned projects. It displays the
project name, project id, assigned date, expected date of completion.
-
8/4/2019 Documentation) Unaltered
14/93
2) Bug Details:
This option will make the developer to view all the bug details sent by the tester
3) Self:
This option is used to view the self details. It has option to change password. This
gathers the information like old password, new password. This makes to store the changed
password to the database.
Module 3: Tester
The tester has the options to his projects, post bugs and self details.
1) View Projects:
This option will make the tester to view all his assigned projects. It displays the project
name, project id, assigned date, expected date of completion.
2) Post Bugs:
This option will make the tester to
Add the bug information along with bug id, project id, bug type, location etc., tothe database for future reference
Mail the bug id and some other details regarding the bug to the project managerand developer.
3) Self:
This option is used to view the self details. It has option to change password. This
gathers the information like old password, new password.
-
8/4/2019 Documentation) Unaltered
15/93
-
8/4/2019 Documentation) Unaltered
16/93
2.SYSTEM CONFIGURATION
2.1HARDWARE CONFIGURATION:
Processor : Intel Pentium IV
Hard disk : 80 GB
Ram : 512 MB
Speed : 2.66 GHz
Monitor : SAMSUNG
Mother Board : Intel
Mouse model : ps/2
Keyboard : SAMSUNG, 108 Keys
2.2SOFTWARE CONFIGURATION:
Operating System : Windows XP Professional with SP2
IDE : Microsoft Visual Studio .Net 2005
Database : MS-SQLSERVER 2005
Web Technology : Asp.Net
Code Behind : VB
Framework : Version 3.5
-
8/4/2019 Documentation) Unaltered
17/93
2.3 SOFTWARE DESCRIPTION
FRONT-END: ASP.NET
ASP.NET is a new way to program dynamic and interactive Web applications. ASP.NET
is a compiled environment that makes extensive use of the Microsoft.NET framework, and the
entire .NET platform is available to any ASP.NET application.
About ASP:
Microsoft Active Server Pages (ASP) is a server-side scripting technology .Any scripting
or programming language that is compliant with the Component Object Model (COM) can be
used to create Web server application.
Take a pure HTML file and add scripting code to it, so that one file contains both HTML
and, for example, Microsoft Visual Basic Scripting Edition (VBScript).That file has the file
extension .asp (instead of .html) and is accessed via HTTP request.
In the browser, a user enters the URL for the file. When the server receives the request, it
recognizes the extension; Microsoft Internet Information Services (IIS) treats the .asp file
differently from an .html file. Normally, a standard HTML document will be generated and sent
to the browser as a response; but other data, such as images or binary data, can be returned.
Fortunately we are not limited to dynamically generating and presenting date and time
information in the client browser or performing computations. We can also access COM
components to extend the functionality of our Web site.
With ASP we can use client-side scripts as well as server-side scripts. May be we want to
validate user input or access a database.ASP provides solution for transaction processing and
managing session state.
-
8/4/2019 Documentation) Unaltered
18/93
While ASP should not be used for implementing business logic, we can easily and
quickly create simple Web applications.
About ASP.Net
ASP.NET is a new way to program dynamic and interactive Web applications. There is
more in it than just a few new features. It is much more than ASP 4.0. ASP. NET is a new
programming framework for Web application. It is a compiled .NET-based environment that
makes extensive use of the .NET Framework.
Because it has evolved from ASP, ASP.NET looks very similar to its predecessor-but
only at first sight. Some items look very familiar, and they remind us of ASP. But concept like
Web Forms, Web Services, or Server Controls gives ASP.NET the power to build real Web
applications.
The .NET Framework Architecture
To really understand what makes ASP.NET more than just ASP 4.0we need to have a
look at the underlying .NET Framework architecture.
The .Net Framework is a managed, type-safe environment for developing and executing
applications. The .NET Framework manages all aspects of program execution like allocation of
memory for the storage of data and instructions, granting and denying permissions to the
application, managing execution of the application and reallocation of memory for resources that
are not needed. The .NET Framework is designed for cross-language compatibility.
The .NET Framework consists of two main components:
Common Language Runtime (CLR) Class Libraries
-
8/4/2019 Documentation) Unaltered
19/93
Common Language Runtime (CLR):
The CLR is described as the Execution Engine of .NET. It provides the environment
within which the programs run. Its this CLR that manages the execution of programs and
provides core services, such as code compilation, memory allocation, thread management and
garbage collection. Through the Common Type System (CTS), it enforces strict type safety and
it also ensures that the code is executed in a safe environment by enforcing code access security.
The software version .Net is actually the CLR version.
Working of the CLR
When the .NET program is compiled, the output of the compiler is not an executable file
but a file that contains a special type of code called the Microsoft Intermediate Language
(MSIL), which is a low level set of portable instructions that are independent of any specific
CPU. Its the job of the CLR to translate this Intermediate code into a executable code when the
program is executed making the program to run in any environment for which the CLR is
implemented. And thats how the .NET Framework achieves portability. This MSIL is turned
into executable code using JIT (Just in Time) compiler. When .NET programs are executed, the
CLR activates the JIT compiler. The JIT compiler converts MSIL into native code even though it
is compiled to native code but achieves the portability benefits of MSIL.
Class Libraries
Class library is the second major entity of the .NET Framework which is designed to
integrate with the CLR. This library gives the program access to runtime environment. The class
library consists of lots prewritten code that all the applications created in ASP.NET and Visual
Studio.Net will use. The code for all elements like forms, controls and the rest in ASP.NET
applications actually come from the class library.
-
8/4/2019 Documentation) Unaltered
20/93
BACK-END: Microsoft SQL Server
Microsoft SQL Server 2005 is a full-featured relational database management system
(RDBMS) that offers a variety of administrative tools to ease the burdens of database
development, maintenance and administration. The more frequently used tools are
Enterprise Manager Query Analyzer SQL Profiler Service Manager Data Transformation Services
Enterprise Manager is the main administrative console for SQL Server installations. It provides
you with a graphical "birds-eye" view of all of the SQL Server installations on your network.
You can perform high-level administrative functions that affect one or more servers, schedule
common maintenance tasks or create and modify the structure of individual databases.
Query Analyzer offers a quick and dirty method for performing queries against any of your
SQL Server databases. It's a great way to quickly pull information out of a database in response
to a user request, test queries before implementing them in other applications, create/modify
stored procedures and execute administrative tasks.
SQL Profiler provides a window into the inner workings of your database. You can monitor
many different event types and observe database performance in real time. SQL Profiler allows
you to capture and replay system "traces" that log various activities. It's a great tool for
optimizing databases with performance issues or troubleshooting particular problems.
-
8/4/2019 Documentation) Unaltered
21/93
Service Manager is used to control the MSSQLServer (the main SQL Server process), MSDTC
(Microsoft Distributed Transaction Coordinator) and SQLServerAgent processes. An icon for
this service normally resides in the system tray of machines running SQL Server. You can use
Service Manager to start, stop or pause any one of these services.
Data Transformation Services (DTS) provide an extremely flexible method for importing and
exporting data between a Microsoft SQL Server installation and a large variety of other formats.
The most commonly used DTS application is the "Import and Export Data" wizard found in the
SQL Server program group.
SQL Server Architecture
In Microsoft SQL Server, data is stored in databases. The data in a database is
organized into the logical components visible to users. A database is also physically
implemented as two or more files on disk.
When using a database, you work primarily with the logical components such as tables,
views, procedures, and users. The physical implementation of files is largely transparent.
Typically, only the database administrator needs to work with the physical implementation.
Each instance of SQL Server has four system databases (master, model, tempdb, and
msdb) and one or more user databases. Some organizations have only one user database,
containing all the data for their organization. Some organizations have different databases for
each group in their organization, and sometimes a database used by a single application. For
example, an organization could have one database for sales, one for payroll, one for a document
management application, and so on. Sometimes an application uses only one database; other
applications may access several databases.
-
8/4/2019 Documentation) Unaltered
22/93
It is not necessary to run multiple copies of the SQL Server database engine to allow
multiple users to access the databases on a server. An instance of the SQL Server is capable of
handling thousands of users working in multiple databases at the same time. Each instance of
SQL Server makes all databases in the instance available to all users that connect to the instance,
subject to the defined security permissions.
When connecting to an instance of SQL Server, your connection is associated with a
particular database on the server. This database is called the current database. You are usually
connected to a database defined as your default database by the system administrator.
SQL Server allows you to detach databases from an instance of SQL Server, then
reattach them to another instance, or even attach the database back to the same instance. If you
have a SQL Server database file, you can tell SQL Server when you connect to attach that
database file with a specific database name.
-
8/4/2019 Documentation) Unaltered
23/93
-
8/4/2019 Documentation) Unaltered
24/93
3.SYSTEM STUDY3.1EXISTING SYSTEM:
In the existing system, the project manager assigns the projects to the developers. The
developers develop the projects as per customer requirements. The project manager itself assigns
the developed applications to the tester for testing. In the testing phase, when the tester
encounters no. of bugs then he reports to the project manager and developer about the bug
information.
3.1.1DRAWBACKS:
The tester report which is called Bug Report is in the form of physical document. If thedocument is damaged then the total information about the bug will be lost.
The bug information is not stored in the database for future reference.
-
8/4/2019 Documentation) Unaltered
25/93
3.2PROPOSED SYSTEM:
3.2.1AIM:
The purpose of the Bug Tracking System is to test the application for the bugs and report
it to the project manager and developer. The main intention behind the Bug Tracking System is
that to track bugs and report them. Store the bug information with a unique id in the database for
future reference. So, this makes the job of handling the bugs easy.
3.2.2 OBJECTIVES:
The main objectives of the Bug Tracking System are:
Identifying the bugs in the developed application. No bug will be unfixed in the developed application. Not merely identifying the bugs but also providing the bug information. As soon as the bugs are identified. They are reported to the project manager and
developer.
To ensure that who needs to know about the bug can learn soon after it is reported.
-
8/4/2019 Documentation) Unaltered
26/93
-
8/4/2019 Documentation) Unaltered
27/93
4.SYSTEM DESIGN AND DEVELOPMENT
4.1FILE DESIGN:
While developing the software product we not only develop the executable files and the
source codes but also various types of documents such as user manual, software requirements
specification document, design document, test document. File design is the process for creating
such documents.
4.2INPUT DESIGN:
Input design is the process of covering the useroriented description of the input to
computer based business system. Input design is to create an input layout that is easy to flow and
does not induce operated error. Validation checks are to be built in the system to avoid any error
entities. The goal of designing the input data is to make the data entry as easier and free from
error as possible. An input design should specify to the user what to write and where to write.
4.3OUTPUT DESIGN:
The normal procedure is to design the outputs and in detail first and then work back to
the inputs. The outputs can be in the form operational documents or lengthy reports. The inputs
have to be validated, edited, organized and accepted by the system before producing the outputs.
The next stage is to determine the most appropriate medium for output consideration with the
suitability of the device to the particular application.
-
8/4/2019 Documentation) Unaltered
28/93
4.4CODE DESIGN:
Code is a group of characters used to identify data. Codes used in the system are essential
to improve the process efficiency and to produce correct input and output. The coding method
and standards are used in such a way that codes are easily expandable. The code has to be
designed with the uniform size and format simplicity meaningfulness. The code has to be
adequate for present and anticipated data processing for machine and human use.
4.5DATABASE DESIGN:
The purpose of database design is to identify the major modules in the software and
describe its components and interfaces for each major module for the users to understand.
Database design is a crucial factor in the performance of a package, both in terms of system
timings and in the case with which the system can be maintained or modified. The database has
been designed based upon the entity relationship model. The database has different tables in
which each table contain various data needed for the package.
-
8/4/2019 Documentation) Unaltered
29/93
-
8/4/2019 Documentation) Unaltered
30/93
5.SYSTEM TESTING AND IMPLEMENTATION
SYSTEM TESTING:
System testing is the stage of implementation, which is aimed at ensuring that the system
works accurately and efficiently before live operation commences. Testing is vital to the success
of the system. An elaborate testing of data is prepared and the system is tested using this test
data. While testing errors they are noted and corrections are made. The users are trained to
operate the developed system. Both hardware and software securities are made to run the
developed system successfully in future.
TESTING STEPS
Unit Testing Integration Testing Validation Testing Output Testing User Acceptance Testing
1) UNIT TESTINGUnit testing focuses verification efforts on the smallest unit of software design, the
module. This is also known as Module Testing. The modules are tested separately. This testing
is carried out during programming stage itself. In this testing step each Module is found to be
working satisfactorily as regard to the expected output from the module.
-
8/4/2019 Documentation) Unaltered
31/93
2) INTEGRATION TESTINGIntegration testing is a systematic technique for constructing tests to uncover errors
associated within the interface. In this project, all the modules combined, and then entire
program is tested as a whole. Thus in the integration testing step, all the errors uncovered are
corrected for the next testing step.
3) VALIDATION TESTINGValidation testing is where requirements established as a part of software requirement
analysis is validated against the software that has been constructed. This test provides the final
assurance that the software meets all functional, behavioral and performance requirements. The
errors, which are uncovered during integration testing, are corrected during this phase.
4) OUTPUT TESTINGAfter performing the validation testing, the next step is output testing of the proposed
system since no system could be useful if it does not produce required output in this specific
format. The output generated or displayed by the system under consideration is tested asking the
users about the format required by them. Here, the output is consideration into two ways: one is
on the screen and the other is in printed format.
The output format on the screen is found to be correct as the format designed according
to the user needs. For the hardcopy also the output comes out as specified by the user. Hence
output testing doesnt result in any connection in the system.
-
8/4/2019 Documentation) Unaltered
32/93
5) USER ACCEPTANCE TESTINGThe testing of the software began along with coding. Since the design was fully object-
oriented, first the interface was developed and tested. Then unit testing was done for every
module in the software for various inputs, such that each line of the code is at least once
executed. User acceptance of a system is key factor for the success of any system. The system
under consideration is tested for user acceptance by constantly keeping in touch with the
prospective system users, at time of developing and making for PROXY SERVER.
After all modules were coded the integration test was carried out. Some minor errors
were found in the output at the earlier stage and each of them was corrected. In the
implementation of user interface part no major errors was found. After the software was
completely developed, the testing was done. The outputs of the software were correct and
accurate during the time of demonstration after that no errors were reported.
MAINTENANCE
This phase of the software life cycle is time period in which the software performance
useful work. Maintenance activities involve making enhancement to software products, adopting
products to new environment and solving current problems. The software product enhancement
may involve producing new functional capabilities, improving user displays and modes
extraction, upgrading external documents or upgrading the performance characteristics of a
system.
-
8/4/2019 Documentation) Unaltered
33/93
In order to enhance the maintainability, various types of standards and guidelines are
developed during analysis phase. During architectural design, emphasis is done for clarity,
modularity and ease of modification. Also, during implementation care is taken for producing
software that is easy to understand and easy to modify. Maintenance can be done by
development member or any separate person. A person who developed will be familiar with
system so that maintenance actually will be easier than done by other person. The software is to
develop that enable further modification in the future to suit the changing work condition in the
organization.
The software maintenance is the important one in the software development process,
because more amount of money is spent for maintenance. All maintenance request s are through
a single or a group who will be familiar with the production program. Thus reporting must be
done where if an error is encountered, a complete description of circumstances leading to error
must be included.
Reporting is an important phase. It is unable to occur the effectiveness of the
maintenance techniques quality of production really costs. Coding style effects range from
nuisance errors detected and cleared during testing that can cause software failure, data side
effects can be limited through design documentation side effects can be reduced for the entire
configuration is reviewed.
-
8/4/2019 Documentation) Unaltered
34/93
SYSTEM IMPLEMENTATION:
The implementation of the system in the organization comes as the steps of the system
developed in general. This phase of the system consists of:
1. The developed program is tested with sample data.
2. Any error identified is corrected.
3. The files of the system are checked with the actual data.
4. A parallel run of the system is performed and if any calculation error is
present, it would be corrected
5. The user personals are trained.
6. Verified every required data in the database.
7. Checked out the time taken for each process.
The implementation is done in the correct or in the formal method to user satisfaction.
Such an implementation precedes the system for efficient and fast, which the developers like
most.
Implementation is a stage in the project where the theoretical design is turned into a
working system. If the implementation stage is not properly planned and controlled, it can cause
chaos. Thus it can be considered to be the most crucial stage in achieving a successful new
system and giving the users confidence that the new system will work and be effective and acc
-
8/4/2019 Documentation) Unaltered
35/93
-
8/4/2019 Documentation) Unaltered
36/93
6.CONCLUSION
The BUG TRACKING project has been successfully implemented using ASP.Net and
SQL Server. I am sure that this application will be very useful in maintaining the
communications between the employees of a software company. It plays a vital role in
maintaining the bug details identified during testing for future reference.
-
8/4/2019 Documentation) Unaltered
37/93
-
8/4/2019 Documentation) Unaltered
38/93
7.BIBLIOGRAPHYBOOKS REFERED:
1. Maxim Gurevich, System Analysis and Design.2. Richard Fairley, Software Engineering Concepts.3. Mridula Parihar, ASP.Net Bible.4. Bill Hamilton, Programming SQL Server 2005.5. Jeffrey R. Shapiro, SQL Server 2005.
WEBSITES REFERED:
www.vb.netheaven.com www.programmersresource.com www.dotnet.com www.123aspx.com
-
8/4/2019 Documentation) Unaltered
39/93
-
8/4/2019 Documentation) Unaltered
40/93
8.1DATA FLOW DIAGRAM
A Data Flow Diagram (DFD) is a graphical technique that depicts information flow and
the transforms that are applied as data move from input to output.
Data flow diagram is a logical model of a system. The model does not depend on
hardware, software, and data structure or file organization. It only shows the data flow between
modules to module of the entire system. Data flow diagrams can be completed using only four
notations as follows,
Data Flow: Data move in a specific direction from an origin to destination. The data flow is a
packet of data.
Process: People, procedures or devices that produce data. The physical component is not
identified.
Source or Destination of Data: External sources or destinations of data, which may be people
or organizations or other entities.
Data Source: Here a process references the data in the system
-
8/4/2019 Documentation) Unaltered
41/93
Context Level DFD for BTS
BTS
Tester
Projectmanager Developer
-
8/4/2019 Documentation) Unaltered
42/93
A1: User id, Password, Designation
First Level DFD for BTS
User Login
Process
File
Handler
D1 Userinfo
Projectmanager
Developer
Tester
A1
Pass
Fail
-
8/4/2019 Documentation) Unaltered
43/93
Second Level DFD for Project Manager
Projectmanager
Project info
Assigninfo
Change
passwordD1 Userinfo
NewPassword
User info
Display
Bugreport
D4 BuginfoBugid
-
8/4/2019 Documentation) Unaltered
44/93
Second Level DFD for Developer
Developer
Display
Assigned
Display
Buginfo
D4 Buginfo D1 Userinfo
Details Bugid
Change
Password
D2 Assigninfo
-
8/4/2019 Documentation) Unaltered
45/93
A2: Bug id, Details
Second Level DFD for Tester
Tester
Track
Bugs
D4 Buginfo
D1 Userinfo
View
Assign
projects
D3 Assigninfo
Change
Password
A2 NewPassword
-
8/4/2019 Documentation) Unaltered
46/93
Third Level DFD for Project Manager
Userinfo
Adduser
Delete
User
D 1 Userinfo
Userdetails
User
id UserDetails
Modify
User
-
8/4/2019 Documentation) Unaltered
47/93
Third Level DFD for Project Manager
Add
Project
Delete
Project
Modify
Project
Project
Details
Project
IdProjectDetails
D2 Projectinfo
Project
info
-
8/4/2019 Documentation) Unaltered
48/93
Third Level DFD for Project Manager
Assign
info
Assigning
Projects
Display
Projects
D3 Assigninfo
D2 Projectinfo
-
8/4/2019 Documentation) Unaltered
49/93
8.2TABLE STRUCTURE
1. Table Name: login
Field Name Type
USERNAME nvarchar(25)
PASSWORD nvarchar(25)
DESIGNATION varchar(25)
MAILID nvarchar(50)
2. Table Name: add1
Field Name Type
EMPLOYEE NAME varchar(25)
ADDRESS nvarchar(100)
PHONENO numeric(25)
GENDER varchar(25)
QUALIFICATION varchar(25)
USERNAME nvarchar(25)
PASSWORD nvarchar(25)
DESIGNATION varchar(25)
-
8/4/2019 Documentation) Unaltered
50/93
3. Table Name: add2
Field Name Type
PROJECTNAME nvarchar(25)
STATUS varchar(25)
LOCATION nvarchar(50)
DESCRIPTION nvarchar(200)
4. Table Name: assign
Field Name Type
USERNAME nvarchar(25)
DESIGNATION varchar(25)
PROJECTNAME nvarchar(25)
SDATE Datetime
CDATE Datetime
-
8/4/2019 Documentation) Unaltered
51/93
5. Table Name: send1
Field Name Type
TOID nvarchar(50)
FROMID nvarchar(50)
MESSAGE nvarchar(500)
6. Table Name: buginfo
Field Name Type
PROJECTNAME nvarchar(25)
USERNAME nvarchar(25)
BUGLOCATION nvarchar(100)
BUGDESCRIPTION nvarchar(500)
BUGSTATUS nvarchar(25)
OPERATINGSYSTEM nvarchar(25)
BUGID numeric(10)
-
8/4/2019 Documentation) Unaltered
52/93
8.3 SAMPLE CODINGSImports System.Data.OleDb
PartialClass Default2
Inherits System.Web.UI.Page
Dim con AsNew
OleDbConnection("Provider=SQLOLEDB.1;Password=123TRECstep;Persist Security
Info=True;User ID=sa;Initial Catalog=bugtracking;Data Source=192.168.2.2")
Dim cmd AsNew OleDbCommand
Dim re As OleDbDataReader
Dim ds As DataKey
Dim ad AsNew OleDbDataAdapter
ProtectedSub Button1_Click(ByVal sender AsObject, ByVal e As System.EventArgs)
Handles Button1.Click
Dim i As Int16
IfTextBox1.Text ""And TextBox2.Text ""Then
con.Open()
cmd = New OleDbCommand("select *from login", con)
re = cmd.ExecuteReader()While (re.Read())
IfTextBox1.Text = re.GetString(0) And TextBox2.Text = re.GetString(1) And
DropDownList1.Text = re.GetString(2) Then
IfDropDownList1.SelectedIndex = 0 Then
i = 1
ExitWhile
ElseIfDropDownList1.SelectedIndex = 1 Then
i = 2
ExitWhile
ElseIfDropDownList1.SelectedIndex = 2 Then
i = 3
ExitWhile
EndIf
Else
-
8/4/2019 Documentation) Unaltered
53/93
i = 0
EndIf
EndWhile
Ifi = 1 Then
Response.Redirect("projectmanager.aspx")
ElseIfi = 2 Then
Response.Redirect("developer.aspx")
ElseIfi = 3 Then
Response.Redirect("tester.aspx")
ElseIfi = 0 Then
TextBox1.Text = ""
TextBox2.Text = ""MsgBox("Invalid Username or Password", MsgBoxStyle.OkOnly)
EndIf
re.Close()
con.Close()
Else
MsgBox("Enter All The Details", MsgBoxStyle.Information, "ENTER ALL THE
DETAILS")
EndIf
EndSub
ProtectedSub Button2_Click(ByVal sender AsObject, ByVal e As System.EventArgs)
Handles Button2.Click
TextBox1.Text = ""
TextBox2.Text = ""
EndSub
ProtectedSub Button3_Click(ByVal sender AsObject, ByVal e As System.EventArgs)
Handles Button3.Click
Response.Redirect("welcome.aspx")
EndSub
EndClass
-
8/4/2019 Documentation) Unaltered
54/93
Imports System.Data.OleDb
Partial Class Default12
Inherits System.Web.UI.Page
Dim con As New
OleDbConnection("Provider=SQLOLEDB.1;Password=123TRECstep;Persist Security
Info=True;User ID=sa;Initial Catalog=bugtracking;Data Source=192.168.2.2")
Dim cmd As New OleDbCommand
Dim re As OleDbDataReader
Dim ds As DataKey
Dim ad As New OleDbDataAdapter
Protected Sub Button1_Click(ByVal sender As Object, ByVal e As System.EventArgs)
Handles Button1.ClickIf TextBox1.Text "" And TextBox2.Text "" And TextBox3.Text "" And
TextBox4.Text "" Then
con.Open()
Dim i As Int16
cmd = New OleDbCommand("select *from login", con)
re = cmd.ExecuteReader
While (re.Read())
If TextBox1.Text = re.GetString(0) And TextBox2.Text = re.GetString(1) Then
i = 0
Exit While
Else
i = 1
End If
End While
If i = 0 Then
cmd = New OleDbCommand("update login set PASSWORD='" & TextBox3.Text & "'
where USERNAME='" & TextBox1.Text & "'", con)
cmd.ExecuteNonQuery()
MsgBox("Password Changed", MsgBoxStyle.OkOnly, "PASSWORD CHANGED")
Else
-
8/4/2019 Documentation) Unaltered
55/93
MsgBox("Invalid Username & password", MsgBoxStyle.OkOnly, "INVALID
USERNAME & PASSWORD")
End If
re.Close()
con.Close()
Else
MsgBox("Enter All The Details", MsgBoxStyle.OkOnly, "ENTER ALL THE
DETAILS")
End If
End Sub
Protected Sub Button2_Click(ByVal sender As Object, ByVal e As System.EventArgs)
Handles Button2.ClickResponse.Redirect("projectmanager.aspx")
End Sub
Protected Sub Button3_Click(ByVal sender As Object, ByVal e As System.EventArgs)
Handles Button3.Click
TextBox1.Text = ""
TextBox2.Text = ""
TextBox3.Text = ""
TextBox4.Text = ""
End Sub
End Class
-
8/4/2019 Documentation) Unaltered
56/93
Imports System.Data.OleDb
Partial Class send1
Inherits System.Web.UI.Page
Dim con As New
OleDbConnection("Provider=SQLOLEDB.1;Password=123TRECstep;Persist Security
Info=True;User ID=sa;Initial Catalog=bugtracking;Data Source=192.168.2.2")
Dim cmd As New OleDbCommand
Dim re As OleDbDataReader
Dim ds As DataKey
Dim ad As New OleDbDataAdapter
Protected Sub Button2_Click(ByVal sender As Object, ByVal e As System.EventArgs)
Handles Button2.Click
TextBox1.Text = ""
End Sub
Protected Sub Button1_Click(ByVal sender As Object, ByVal e As System.EventArgs)
Handles Button1.Click
con.Open()
If TextBox1.Text "" Then
cmd = New OleDbCommand("insert into send1 values('" &
DropDownList1.SelectedValue & "','" & DropDownList2.SelectedValue & "','" &TextBox1.Text & "')", con)
cmd.ExecuteNonQuery()
MsgBox("Message sent", MsgBoxStyle.OkOnly, "MESSAGE SENT")
Else
-
8/4/2019 Documentation) Unaltered
57/93
MsgBox("Enter the Message", MsgBoxStyle.OkOnly, "ENTER THE MESSAGE")
End If
con.Close()
End Sub
Protected Sub LinkButton1_Click(ByVal sender As Object, ByVal e As System.EventArgs)
Handles LinkButton1.Click
con.Open()
DropDownList1.Items.Clear()
DropDownList2.Items.Clear()
cmd = New OleDbCommand("select *from login", con)
re = cmd.ExecuteReader()
While (re.Read())
DropDownList1.Items.Add(re.GetValue(3))
End While
re.Close()
con.Close()
con.Open()
cmd = New OleDbCommand("select *from login", con)
re = cmd.ExecuteReader()
While (re.Read())
DropDownList2.Items.Add(re.GetValue(3))
End While
re.Close()
-
8/4/2019 Documentation) Unaltered
58/93
con.Close()
End Sub
Protected Sub Button3_Click(ByVal sender As Object, ByVal e As System.EventArgs)
Handles Button3.Click
Response.Redirect("projectmanager.aspx")
End Sub
Protected Sub TextBox1_TextChanged(ByVal sender As Object, ByVal e As
System.EventArgs) Handles TextBox1.TextChanged
End Sub
End Class
-
8/4/2019 Documentation) Unaltered
59/93
8.4 SAMPLE INPUT/OUTPUT
WELCOME
-
8/4/2019 Documentation) Unaltered
60/93
ABOUT BUG TRACKING SYSTEM
-
8/4/2019 Documentation) Unaltered
61/93
PROJECT MANAGER LOGIN
-
8/4/2019 Documentation) Unaltered
62/93
PROJECT MANAGER
-
8/4/2019 Documentation) Unaltered
63/93
USER INFORMATION
-
8/4/2019 Documentation) Unaltered
64/93
ADD USER
-
8/4/2019 Documentation) Unaltered
65/93
MODIFY USER
-
8/4/2019 Documentation) Unaltered
66/93
DELETE USER
-
8/4/2019 Documentation) Unaltered
67/93
PROJECT INFORMATION
-
8/4/2019 Documentation) Unaltered
68/93
ADD PROJECT
-
8/4/2019 Documentation) Unaltered
69/93
MODIFY PROJECT
-
8/4/2019 Documentation) Unaltered
70/93
DELETE PROJECT
-
8/4/2019 Documentation) Unaltered
71/93
PROJECT ASSIGN INFO
-
8/4/2019 Documentation) Unaltered
72/93
SELF
-
8/4/2019 Documentation) Unaltered
73/93
INBOX
-
8/4/2019 Documentation) Unaltered
74/93
SEND
-
8/4/2019 Documentation) Unaltered
75/93
REPORTS
-
8/4/2019 Documentation) Unaltered
76/93
USER DATA
-
8/4/2019 Documentation) Unaltered
77/93
PROJECT DATA
-
8/4/2019 Documentation) Unaltered
78/93
BUG DATA
-
8/4/2019 Documentation) Unaltered
79/93
DEVELOPER LOGIN
-
8/4/2019 Documentation) Unaltered
80/93
DEVELOPER
-
8/4/2019 Documentation) Unaltered
81/93
VIEW PROJECT
-
8/4/2019 Documentation) Unaltered
82/93
BUG DETAILS
-
8/4/2019 Documentation) Unaltered
83/93
CHANGE BUG STATUS
-
8/4/2019 Documentation) Unaltered
84/93
.
SELF
-
8/4/2019 Documentation) Unaltered
85/93
INBOX
-
8/4/2019 Documentation) Unaltered
86/93
SEND
-
8/4/2019 Documentation) Unaltered
87/93
TESTER LOGIN
-
8/4/2019 Documentation) Unaltered
88/93
TESTER
-
8/4/2019 Documentation) Unaltered
89/93
VIEW PROJECT
-
8/4/2019 Documentation) Unaltered
90/93
POST BUGS
-
8/4/2019 Documentation) Unaltered
91/93
SELF
-
8/4/2019 Documentation) Unaltered
92/93
LOGIN
-
8/4/2019 Documentation) Unaltered
93/93
SEND