Reecha Mittal Reecha Mittal 80802218036

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 86

SODHI HEALTH INDIA.

COM
PROJECT REPORT
ON

SODHI HEALTH INDIA.COM


(MCA (N2)-601) Year: 2011
TITLE OF THE PROJECT

SODHI HEALTH INDIA.COM


Submitted in partial fulfillment of the requirement for Master Degree in
Computer Application
Under Punjab Technical University, Jalandar

SUBMITTED BY: REECHA MITTAL


NAME OF STUDENT: REECHA MITTAL
UNIVERSITY ROLL No:

80802218036

Under the guidance of

Mr. Valjeet Patial


Ms. Amritpal Kaur
SUBMITTED TO: Mr. Sushil Garg
DEPT. OF COMPUTER SCIENCE & ENGINEERING
RIMT- INSTITUTE OF ENGINEERING & TECHNOLOGY
MANDI GOBINDGARH
1|Page

SODHI HEALTH INDIA.COM


DECLARATION
I hereby declare that the project work entitled SODHI HEALTH INDIA.COM
is an authentic record of my own work carried out at Avaptech

Training And

Development Unit (Chandigarh) as requirements of MAJOR PROJECT in 6 th semester for


the award of degree of Master Degree in Computer Application at RIMT Institute of
Engineering & Technology, Mandi Gobindgarh, under the guidance of Mr.Valjeet Patial
and Ms. Amritpal Kaur, during January to June , 2011.

(Signature of student)
Name of Student : Reecha Mittal
Univ. Roll No.

: 80802218036

Date: 01June, 2011

Certified that the above statement made by the student is correct to the best of our
knowledge and belief.

(Signature of Project Guide)


Name: Mr.Valjeet Patial
Designation: Corporate Trainer
(Signature of HOD)
2|Page

SODHI HEALTH INDIA.COM

ACKNOWLEDGEMENT

Learning is an active process. We learn by doing. Only knowledge that is used remains in
your mind. College has been a place where we learnt the basics and made our foundations
strong. We started as laymen and under the valuable guidance of Lecturers at college we
are now in Third year in MCA. At this point of time, an exposure to the corporate world is
most important as a step ahead to applying the knowledge gained during our MCA to real
life situations. My training at AVAPTECH TRAINING AND DEVELOPMENT UNIT
proved to be really beneficial for me. The congenial atmosphere at work is the biggest
advantage!
It gives us immense pleasure to have an opportunity to express our heartiest gratitude to
lecturers Mr.Valjeet Patial and Technical Tutor at AVAPTECH
DEVELOPMENT

TRAINING AND

UNIT. who guided us in the completion of project on "SODHI

HEALTH INDIA.COM.
The cooperation of our trainer Mr.Valjeet Patial was excellent. It was the coordinated
efforts of his only that the project was able to complete well within the time.
I am also thankful to the Institute for lending us the support and providing us with all the
required facilities.

Reecha Mittal

3|Page

SODHI HEALTH INDIA.COM

TABLE OF CONTENTS

Introduction
Software Methodology
SDLC
Feasibility Study
System Analysis
System Design
Data Flow Diagrams(DFD)
ER Diagrams
Database Description
System Testing
System Objective
SnapShot
Conclusion
Future Scope
References

4|Page

SODHI HEALTH INDIA.COM

INTRODUCTION

5|Page

SODHI HEALTH INDIA.COM

Who are we?

Avaptech is one of the most acknowledged names in Sotware Development and


Training . Apart from providing Software Solutions to the various Companies ,
Avaptech is also involved in imparting High-end project based training to students
Of MCA and B.Tech. Etc. of various institutes . The training professionals are
basically Software Developers having Industry experience & exposure to live projects
On Various Technologies like PHP,JAVA(With Advanced Java), VB.NET, ASP.NET
C Sharp, Oracle etc. Avaptech

has trained thousands of

the

Engineering /MCA

students of various institutes by providing Industrial training . Special emphasis is


laid on exposure to Real Time Projects .
The Trainees are equipped with through knowledge of various modules from basic
To advanced in the software involved in their projects . With a right blend of
interactive coaching , laboratory toturing and a case study based approach ; the skills
of the trainees are sharpened to their best.
AVAPTECH

has

an

excellent

infrastructure

with Air-conditioned

labs,

and

classrooms and fully equipped library. The lab extended to the trainees is
unparalleled with every trainee having an independent system access for the
entire training period.
In Short , AvapTech

is guided by a dynamic management team that believes in

integrity, quality, continuous learning and personal dedication , So as to prepare the


6|Page

SODHI HEALTH INDIA.COM


trainees to have a broader view of the IT scenario and its prospects in the days to
come.
The very purpose of providing the Industrial Training is to familiarize the trainees
with the software Industry Environment of leading companies, Trainees at AvapTech
have found placements in

leading companies like Satyam , TCS, HFCL, Radius

Power, Drish, C-DAC,Siemens..etc.

OBJECTIVES OF THE ORGANISATION

Establish itself as an excellence for imparting education and training to generate quality
manpower in areas of information Electronics and Communication Technology (ICET).
Facilitate education and training institutes in the non-formal sector.
Develop a mechanism for dynamic revision of course curriculum and development of the
learning materials in the textbook, CD-ROM and web-based form.
Impact continuing education/refresher training and corporate training to engineering
graduates, working professionals and others.
Develop and implement new schemes of courses in emerging areas as required by
Industries and others.
Undertake develop projects and provide services in IT and related areas.

7|Page

SODHI HEALTH INDIA.COM

8|Page

SODHI HEALTH INDIA.COM

SYSTEM DEVELOPMENT LIFE CYCLE (SDLC)


SDLC Objectives:
Life Cycle Management Should be used to Ensure a Structured Approaches to
Information Systems Development, Maintenance and Operation. This guidance
SDLC describes an overall structured approached to information management.
Primary emphasis is given on the information, system decisions and the proper
timing of the decisions. It provides a flexible framework for approaching a variety
of systems projects. The Framework enables system developers, project managers,
program/account analysts and system owners/users to combine activities, processes
and products as appropriate and to select the tools and methodologies best suited
to the unique needs of each project.
The objectives are as following:

To reduce the risk of the project failure.

To consider system and data requirements throughout the entire life of the
system.

To identify technical and management issues early.

To foster realistic expectations of what the system will and will not
provide.

To encourage periodic evaluations to identify systems that are no longer


effective.

To measure progress and status for effective corrective action.

To support effective resource management and budget planning.

To consider meeting current and future business requirements.

To disclose life cycle costs to guide decisions.

9|Page

SODHI HEALTH INDIA.COM

Phases of SDLC
1.

Initiation Phase: The initiation of a system( or project) begins when a business


needs or opportunity is identified. A Project Manager should be appointed to
manage the project. This business need is documented in a Concept Proposal.
After the concept proposal is approved, the System Concept

Development

phase begins.
2.

System Concept Development Phase: Once a business need is approved, the


approaches for accomplishing the concept are reviewed for feasibility and
appropriateness. The Systems Boundary Document identifies the scope of the
system and requires Senior Official approval and funding before beginning the
Planning Phase.

3.

Planning Phase: The concept is further developed to describe how the


business will operate once the approved system is implemented, and how the
system will impact employee and customer privacy. To ensure the products
and/or services provide the required capability on-time and within budget,
project

resources,

activities,

schedules,

tools

and

reviews

are

defined.

Additionally, security certification and accreditation activities begin with the


identification of system security requirements and the completion of a high
level assessment.
4.

Requirement Analysis Phase: Functional user requirements are defined and


delineate the requirements in terms of data, system performance, security and
maintainability requirements for the system. All requirements are defined to a
level of detail sufficient for systems design to proceed. All requirements need
to be measurable and testable and relate to the business need or opportunity
identified in the Initiation Phase.

10 | P a g e

SODHI HEALTH INDIA.COM


5.

Design Phase: The physical characteristics of the system are designed during
this phase. The operating environment is established, major subsystems and
their inputs and outputs are defined and processes are allocated to the
resources. Everything requiring user input or approval must be documented and
reviewed by the user. The physical characteristics of the system are specified
and a detailed design is prepared. Subsystems are identified during design are
used to create a detailed structure of the system. Each subsystem is partitioned
into one or more design units or modules. Detailed logic specifications are
prepared for each software module.

6.

Development Phase: The detailed specifications produced during the design


phase are translated into hardware, communications and executable software.
Software shall be unit tested, integrated and retested in a systematic manner.
Hardware is assembled and tested.

7.

Integration and Test Phase: The various components of the system are
integrated and systematically tested. The user tests the system to ensure that
the

functional

requirements, as

defined

in

the

functional

requirements

document, are satisfied by the developed or modified system. Prior to


installing and operating the system in a production environment, the system
must undergo certification and accreditation activities.
8.

Implementation Phase: The system or system modifications are installed and


made operational in a production environment. The phase is initiated after the
system has been tested and accepted by the user. This phase continues until
the system is operating in production in accordance with the defined user
requirements.

9.

Operations and Maintenance Phase: The system operation is ongoing. The


system is monitored for continued performance in accordance with user
requirements

and

needed

system

modifications

are

incorporated.

The

operational system is periodically assessed through In-Process Reviews to


11 | P a g e

SODHI HEALTH INDIA.COM


determine how the system can be made more efficient and effective.
Operations continue as long as the system can be effectively adapted to
respond to an organizations needs. When modifications or changes are
identified as necessary, the system may re-enter the planning phase.
10. Disposition Phase: The disposition activities ensures the orderly termination of
the system and preserve the vital information about the system so that some
or all of the information may be re-activated in the future if necessary.
Particular emphasis is given to proper preservation of the data processed by
the system, so that the data is effectively migrated to another system or
archived in accordance with applicable records management regulations and
policies for potential future access

12 | P a g e

SODHI HEALTH INDIA.COM

PLATFORM USED
Windows XP Professional
Windows (Operating System)
a)

Window derived from its name from the on-screen WINDOWS that it used
to display informations.

b)

Windows XP Professional is a multi-user operating system. It has been


designed and developed by Microsoft Co-operation.

c)

When a computer is switch on for working, it needs the operating system


because all the activities of a system are supervised by the operating system.

The features of the operating system are:1. Provides an interactive environment.


2. Graphical user interfaces.
i. The Commands are displayed on the screen and we dont have to
remember all commands.
ii. GUI makes it easy to work with disks and directories. It can display tree
like diagram of directories, sub-0 directories on hard disk.
3. Point and Click.
4. User friendly.
13 | P a g e

SODHI HEALTH INDIA.COM

Several programs at the same.

FRONT-END USED

PHP
Introduction to PHP

PHP is a scripting language originally designed for producing dynamic web pages. It has
evolved to include a command line interface capability and can be used in standalone
graphical applications.
While PHP was originally created by Rasmus Lerdorf in 1995, the main implementation of
PHP is now produced by The PHP Group and serves as the de facto standard for PHP as
there

is

no

formal

specification.

C:\Documents

and

Settings\Administrator\Desktop\PHP.htm-cite_note-history-2 PHP is free software released


under the PHP License, however it is incompatible with the GNU General Public License
(GPL), due to restrictions on the usage of the term PHP.
PHP is a widely-used general-purpose scripting language that is especially suited for web
development and can be embedded into HTML. It generally runs on a web server, taking
PHP code as its input and creating web pages as output. It can be deployed on most web
servers and on almost every operating system and platform free of charge. PHP is installed
on more than 20 million websites and 1 million web servers.

History

14 | P a g e

SODHI HEALTH INDIA.COM


PHP originally stood for Personal Home Page It began in 1994 as a set of Common
Gateway Interface binaries written in the C programming language by the
Danish/Greenlandic programmer Rasmus Lerdorf. Lerdorf initially created these Personal
Home Page Tools to replace a small set of Perl scripts he had been using to maintain his
personal homepage. The tools were used to perform tasks such as displaying his rsum
and recording how much traffic his page was receiving. He combined these binaries with
his Form Interpreter to create PHP/FI, which had more functionality.
PHP/FI included a larger implementation for the C programming language and could
communicate with databases, enabling the building of simple, dynamic web applications.
Lerdorf released PHP publicly on June 8, 1995 to accelerate bug location and improve the
code.This release was named PHP version 2 and already had the basic functionality that
PHP has today. This included Perl-like variables, form handling, and the ability to embed
HTML. The syntax was similar to Perl but was more limited, simpler, and less consistent.
Zeev Suraski and Andi Gutmans, two Israeli developers at the Technion IIT, rewrote the
parser in 1997 and formed the base of PHP 3, changing the language's name to the
recursive initialism PHP: Hypertext Preprocessor. The development team officially
released PHP/FI 2 in November 1997 after months of beta testing. Afterwards, public
testing of PHP 3 began, and the official launch came in June 1998. Suraski and Gutmans
then started a new rewrite of PHP's core, producing the Zend Engine in 1999. They also
founded Zend Technologies in Ramat Gan, Israel.
On May 22, 2000, PHP 4, powered by the Zend Engine 1.0, was released On July 13,
2004, PHP 5 was released, powered by the new Zend Engine II.PHP 5 included new
features such as improved support for object-oriented programming, the PHP Data Objects
extension (which defines a lightweight and consistent interface for accessing databases),
and numerous performance enhancements.] The most recent update released by The PHP
Group is for the older PHP version 4 code branch. As of August, 2008 this branch is up to
version 4.4.9. PHP 4 is no longer under development nor will any security updates be
released
In 2008, PHP 5 became the only stable version under development. Late static binding has
been missing from PHP and will be added in version 5.3. PHP 6 is under development
alongside PHP 5. Major changes include the removal of register_globals, magic quotes,
15 | P a g e

SODHI HEALTH INDIA.COM


and safe mode. The reason for the removals was because register_globals had given way to
security holes, and magic quotes had an unpredictable nature, and was best avoided.
Instead, to escape characters, magic quotes may be substituted with the addslashes()
function, or more appropriately an escape mechanism specific to the database vendor itself
like mysql_real_escape_string() for MySQL.
PHP does not have complete native support for Unicode or multibyte strings;Unicode
support will be included in PHP 6 Many high profile open source projects ceased to
support PHP 4 in new code as of February 5, 2008, due to the GoPHP5 initiative, provided
by a consortium of PHP developers promoting the transition from PHP 4 to PHP 5.
It runs in both 32-bit and 64-bit environments, but on Windows the only official
distribution is 32-bit, requiring Windows 32-bit compatibility mode to be enabled while
using IIS in a 64-bit Windows environment. There is a third-party distribution available for
64-bit Windows.

Usage
PHP is a general-purpose scripting language that is especially suited for web development.
PHP generally runs on a web server, taking PHP code as its input and creating web pages
as output. It can also be used for command-line scripting and client-side GUI applications.
PHP can be deployed on most web servers, many operating systems and platforms, and can
be used with many relational database management systems. It is available free of charge,
and the PHP Group provides the complete source code for users to build, customize and
extend for their own use.
PHP primarily acts as a filter, taking input from a file or stream containing text and/or PHP
instructions and outputs another stream of data; most commonly the output will be HTML.
It can automatically detect the language of the user From PHP 4, the PHP parser compiles
input to produce byte code for processing by the Zend Engine, giving improved
performance over its interpreter predecessor.
Originally designed to create dynamic web pages, PHP's principal focus is server-side
scripting, and it is similar to other server-side scripting languages that provide dynamic
content from a web server to a client, such as Microsoft's Active Server Pages, Sun
16 | P a g e

SODHI HEALTH INDIA.COM


Microsystems' Java Server Pages, and mod_perl. PHP has also attracted the development
of many frameworks that provide building blocks and a design structure to promote rapid
application development (RAD). Some of these include CakePHP, Symfony, CodeIgniter,
and Zend Framework, offering features similar to other web application frameworks.
The LAMP architecture has become popular in the web industry as a way of deploying
web applications. PHP is commonly used as the P in this bundle alongside Linux, Apache
and MySQL, although the P may also refer to Python or Perl.
As of April 2007, over 20 million Internet domains were hosted on servers with PHP
installed, and PHP was recorded as the most popular Apache module. Significant websites
are written in PHP including the user-facing portion of

Facebook, Wikipedia

(MediaWiki), Yahoo!, My Yearbook, Digg, Word Press and Tagged.


In addition to server-side scripting, PHP can be used to create stand-alone, compiled
applications and libraries, it can be used for shell scripting, and the PHP binaries can be
called from the command line.

Speed optimization
As with many scripting languages, PHP scripts are normally kept as human-readable
source code, even on production web servers. [41] In this case, PHP scripts will be compiled
at runtime by the PHP engine, which increases their execution time. PHP scripts are able to
be compiled before runtime using PHP compilers as with other programming languages
such as C (the language PHP and its extensions are written in).
Code optimizers aim to reduce the computational complexity of the compiled code by
reducing its size and making other changes that can reduce the execution time with the
overall goal of improving performance. The nature of the PHP compiler is such that there
are often opportunities for code optimization, and an example of a code optimizer is the
Zend Optimizer PHP extension.
Another approach for reducing overhead for high load PHP servers is using PHP
accelerators. These can offer significant performance gains by caching the compiled form
of a PHP script in shared memory to avoid the overhead of parsing and compiling the code
every time the script runs.
17 | P a g e

SODHI HEALTH INDIA.COM


Security
The National Vulnerability Database stores all vulnerabilities found in computer software.
The overall proportion of PHP-related vulnerabilities on the database amounted to: 12% in
2003, 20% in 2004, 28% in 2005, 43% in 2006, 36% in 2007, and 35% in 2008. Most of
these PHP-related vulnerabilities can be exploited remotely: they allow hackers to steal or
destroy data from data sources linked to the web server (such as an SQL database), send
spam or contribute to DOS attacks using malware, which itself can be installed on the
vulnerable servers.
These vulnerabilities are caused mostly by not following best practice programming rules:
technical security flaws of the language itself or of its core libraries are not frequent.
Recognizing that programmers cannot be trusted, some languages include taint checking to
detect automatically the lack of input validation which induces many issues. Such a feature
is being developed for PHP. Although it may be included in mainstream PHP in a future
release, its inclusion has been rejected several times in the past.
Hosting PHP applications on a server requires a careful and constant attention to deal with
these security risks.[50] There are advanced protection patches such as Suhosin and
Hardening-Patch, especially designed for web hosting environments. Installing PHP as a
CGI binary rather than as an Apache module is the preferred method for added security.
With respect to securing the code itself, PHP code can be obfuscated to make it difficult to
read while remaining functional.

Syntax
Main article: PHP syntax and semantics

18 | P a g e

SODHI HEALTH INDIA.COM

Syntax-highlighted PHP code embedded within HTML


PHP only parses code within its delimiters. Anything outside its delimiters is sent directly
to the output and is not parsed by PHP. The most common delimiters are <?php and ?>,
which are open and close delimiters respectively. <script language="php"> and </script>
delimiters are also available. Short tags can be used to start PHP code, <? or <?= (which is
used to echo back a string or variable) and the tag to end PHP code, ?>. These tags are
commonly used, but like ASP-style tags (<% or <%= and %>), they are less portable as
they can be disabled in the PHP configuration. For this reason, the use of short tags and
ASP-style tags is discouraged. The purpose of these delimiters is to separate PHP code
from non-PHP code, including HTML.
Variables are prefixed with a dollar symbol and a type does not need to be specified in
advance. Unlike function and class names, variable names are case sensitive. Both doublequoted ("") and heredoc strings allow the ability to embed a variable's value into the string.
PHP treats new lines as white space in the manner of a free-form language (except when
inside string quotes), and statements are terminated by a semicolon. PHP has three types of
comment syntax: /* */ serves as block comments, and // as well as # are used for inline
comments. The echo statement is one of several facilities PHP provides to output text (e.g.
to a web browser).
In terms of keywords and language syntax, PHP is similar to most high level languages
that follow the C style syntax. If conditions, for and while loops, and function returns are
similar in syntax to languages such as C, C++, Java and Perl.

19 | P a g e

SODHI HEALTH INDIA.COM


Data types
PHP stores whole numbers in a platform-dependent range. This range is typically that of
32-bit signed integers. Unsigned integers are converted to signed values in certain
situations; this behavior is different from other programming languages. Integer variables
can be assigned using decimal (positive and negative), octal, and hexadecimal notations.
Floating point numbers are also stored in a platform-specific range. They can be specified
using floating point notation, or two forms of scientific notation . C:\Documents and
Settings\Administrator\Desktop\PHP.htm-cite_note-types-58 .
PHP has a native Boolean type that is similar to the native Boolean types in Java and C++.
Using the Boolean type conversion rules, non-zero values are interpreted as true and zero
as false, as in Perl and C++. The null data type represents a variable that has no value. The
only value in the null data type is NULL. Variables of the "resource" type represent
references to resources from external sources. These are typically created by functions
from a particular extension, and can only be processed by functions from the same
extension; examples include file, image, and database resources. Arrays can contain
elements of any type that PHP can handle, including resources, objects, and even other
arrays. Order is preserved in lists of values and in hashes with both keys and values, and
the two can be intermingled. PHP also supports strings, which can be used with single
quotes, double quotes, or heredoc syntax.
The Standard PHP Library (SPL) attempts to solve standard problems and implements
efficient data access interfaces and classes.

Functions
PHP has hundreds of base functions and thousands more via extensions. These functions
are well documented on the PHP site, however, the built-in library has a wide variety of
naming conventions and inconsistencies. PHP currently has no functions for thread
programming.

20 | P a g e

SODHI HEALTH INDIA.COM


Objects
Basic object-oriented programming functionality was added in PHP 3 and improved in
PHP 4. Object handling was completely rewritten for PHP 5, expanding the feature set and
enhancing performance. In previous versions of PHP, objects were handled like primitive
types. The drawback of this method was that the whole object was copied when a variable
was assigned or passed as a parameter to a method. In the new approach, objects are
referenced by handle, and not by value.
PHP 5 introduced private and protected member variables and methods, along with
abstract classes and final classes as well as abstract methods and final methods. It also
introduced a standard way of declaring constructors and destructors, similar to that of other
object-oriented languages such as C++, and a standard exception handling model.
Furthermore, PHP 5 added interfaces and allowed for multiple interfaces to be
implemented. There are special interfaces that allow objects to interact with the runtime
system. Objects implementing Array Access can be used with array syntax and objects
implementing Iterator or IteratorAggregate can be used with the for each language
construct. There is no virtual table feature in the engine, so static variables are bound with
a name instead of a reference at compile time.
If the developer creates a copy of an object using the reserved word clone, the Zend engine
will check if a __clone () method has been defined or not. If not, it will call a default
__clone () which will copy the object's properties. If a __clone () method is defined, then it
will be responsible for setting the necessary properties in the created object. For
convenience, the engine will supply a function that imports the properties of the source
object, so that the programmer can start with a by-value replica of the source object and
only override properties that need to be changed.

Resources
PHP includes free and open source libraries with the core build. PHP is a fundamentally
Internet-aware system with modules built in for accessing FTP servers, many database
servers, embedded SQL libraries such as embedded PostgreSQL, MySQL and SQLite,

21 | P a g e

SODHI HEALTH INDIA.COM


LDAP servers, and others. Many functions familiar to C programmers such as those in the
stdio family are available in the standard PHP build.
PHP

has

traditionally

used

features

such

as

"magic_quotes_gpc"

and

"magic_quotes_runtime" which attempt to escape apostrophes (') and quotes (") in strings
in the assumption that they will be used in databases, to prevent SQL injection attacks.
This leads to confusion over which data is escaped and which is not, and to problems when
data is not in fact used as input to a database and when the escaping used is not completely
correct. To make code portable between servers which do and do not use magic quotes,
developers can preface their code with a script to reverse the effect of magic quotes when
it is applied.
PHP allows developers to write extensions in C to add functionality to the PHP language.
These can then be compiled into PHP or loaded dynamically at runtime. Extensions have
been written to add support for the Windows API, process management on Unix-like
operating systems, multibyte strings (Unicode), cURL, and several popular compression
formats. Some more unusual features include integration with Internet Relay Chat,
dynamic generation of images and Adobe Flash content, and even speech synthesis. The
PHP Extension Community Library (PECL) project is a repository for extensions to the
PHP language.

List of PHP Editors

Free editors
Windows

ConTEXT - Free-ware editor with syntax highlighting.

CodeLobster

Crimson Editor - Lightweight editor. Supports FTP

EditPlus - Lightweight editor. Supports FTP (free download only - Shareware)

HTML-Kit - Syntax highlighting, Supports FTP

22 | P a g e

SODHI HEALTH INDIA.COM

Netbeans IDE - A dedicated PHP coding environment and complete integration


with web standards.

Notepad++ - Supports FTP and is maintained a lot

Programmer's Notepad

PSPad - Supports FTP

Linux

Bluefish - Supports any protocol that is supported by GnomeVFS. (FTP, SSH...)

Geany

gedit

gPHPEdit

Kate - Supports any protocol that is supported by KDE. (FTP, SSH...)

KDevelop - Supports any protocol that is supported by KDE. (FTP, SSH...)

Komodo Edit - Editor with code completion.

Quanta Plus - Supports any protocol that is supported by KDE. (FTP, SSH...)

Mac OS X

Smultron

TextWrangler - Supports SFTP and FTP

Multiple OS

ActiveState Komodo Edit

Aptana

Eclipse - PHPEclipse and PHP Development Tools projects. With additional


plugins supports

SVN, CVS, Database Modeling, SSH/FTP access, Database

Navigation, Trac integration, and others.

Emacs - Advanced text editor. The nXhtml addon has special support for PHP (and
other template languages).

jEdit - Versatile Free/Open source editor. Supports SFTP and FTP.

nano

NetBeans 6.5

pico

Vim provides PHP syntax highlighting.


23 | P a g e

SODHI HEALTH INDIA.COM


Web Based

PHPanywhere.net

Commercial Editors

Adobe Dreamweaver - Supports SFTP and FTP

Adobe Golive - Discontinued as of April 2008

BBEdit - Supports FTP

Coda

Delphi for PHP

EditPlus - Supports SFTP and FTP; Trial available

EmEditor

PHPEd - Supports SFTP and FTP; Trial Available

PHPEdit - Supports SFTP and FTP

skEdit

SlickEdit

24 | P a g e

SODHI HEALTH INDIA.COM

25 | P a g e

SODHI HEALTH INDIA.COM

BACK-END USED

MySQL
Introduction to MySQL Server

MySQL is a relational database management system (RDBMS) which has more than 11
million installations. The program runs as a server providing multi-user access to a number
of databases.s
"MySQL" is officially pronounced /maskjul/ (My S Q L), not "My sequel" /ma
sikwl/. This adheres to the official ANSI pronunciation; SEQUEL was an earlier IBM
database language, a predecessor to the SQL language. However, the developers did not
take issue with the pronunciation "My sequel" or other local variations.
The project's source code is available under terms of the GNU General Public License, as
well as under a variety of proprietary agreements. MySQL is owned and sponsored by a
single for-profit firm, the Swedish company MySQL AB, now a subsidiary of Sun
26 | P a g e

SODHI HEALTH INDIA.COM


Microsystems, which holds the copyright to most of the codebase. On April 20th, 2009
Oracle Corp., which develops and sells the proprietary Oracle database, announced a deal
to acquire Sun Microsystems.

Uses

MySQL is popular for web applications and acts as the database component of the LAMP
platform. Its popularity for use with web applications is closely tied to the popularity of
PHP, which is often combined with MySQL. Several high-traffic web sites (including
Flicker, Face book, Wikipedia, Google (not for searching), Nokia and YouTube) use
MySQL for its data storage and logging of user data.

The MySQL Administrator in Linux

MySQL is written in C and C++. The SQL parser uses yacc and a home-brewed lexer,
sql_lex.cc
MySQL works on many different system platforms, including AIX, BSDi, FreeBSD, HPUX, i5/OS, Linux, Mac OS X, NetBSD, Novell NetWare, OpenBSD, OpenSolaris,
eComStation , OS/2 Warp, QNX, IRIX, Solaris, Symbian, SunOS, SCO OpenServer, SCO
UnixWare, Sanos, Tru64 and Microsoft Windows. A port of MySQL to OpenVMS is also
available.
Libraries for accessing MySQL databases are available in all major programming
languages with language-specific APIs. In addition, an ODBC interface called MyODBC
allows additional programming languages that support the ODBC interface to
communicate with a MySQL database, such as ASP or ColdFusion. The MySQL server
and official libraries are mostly implemented in ANSI C/ANSI C++.

27 | P a g e

SODHI HEALTH INDIA.COM


To administer MySQL databases one can use the included command-line tool (commands:
mysql and mysqladmin). Also downloadable from the MySQL site are GUI administration
tools: MySQL Administrator and MySQL Query Browser. Both of the GUI tools are now
included in one package called tools/5.0.html MySQL GUI Tools.
In addition to the above-mentioned tools developed by MySQL AB, there are several other
commercial and non-commercial tools available. Examples include Navicat Free Lite
Edition or SQLyog Community Edition, they are free desktop based GUI tools and
phpMyAdmin, a free Web-based administration interface implemented in PHP.

Features
As of April 2009, MySQL offers MySQL 5.1 in two different variants: the MySQL
Community Server and Enterprise Server.
They have a common code base and include the following features:

Cross-platform support

Stored procedures

Triggers

Cursors

Updatable Views

True VARCHAR support

INFORMATION_SCHEMA

Strict mode

X/Open XA distributed transaction processing (DTP) support; two phase commit


as part of this, using Oracle's InnoDB engine

Independent storage engines (MyISAM for read speed, InnoDB for transactions
and referential integrity, MySQL Archive for storing historical data in little space)

Transactions with the InnoDB, BDB and Cluster storage engines; savepoints with
InnoDB
28 | P a g e

SODHI HEALTH INDIA.COM

SSL support

Query caching

Sub-SELECTs (i.e. nested SELECTs)

Replication with one master per slave, many slaves per master, no automatic
support for multiple masters per slave.

Full-text indexing and searching using MyISAM engine

Embedded database library

Partial Unicode support (UTF-8 sequences longer than 3 bytes are not supported;
UCS-2 encoded strings are also limited to the BMP)

ACID compliance using the InnoDB, BDB and Cluster engines


The MySQL Enterprise Server is released once per month and the sources can be
obtained either from MySQL's customer-only Enterprise site or from MySQL's
Bazaar repository, both under the GPL license. The MySQL Community Server is
published on an unspecified schedule under the GPL and contains all bug fixes that
were shipped with the last MySQL Enterprise Server release. Binaries are no
longer provided by MySQL for every release of the Community Server.

Replication support (i.e. Master-Master Replication & Master-Slave Replication)

Distinguishing features

The following features are implemented by MySQL but not by some other RDBMS
software:

Multiple storage engines, allowing you to choose the one that is most effective for
each table in the application (in MySQL 5.0, storage engines must be compiled in;
in MySQL 5.1, storage engines can be dynamically loaded at run time):
o

Native storage engines (MyISAM, Falcon, Merge, Memory (heap),


Federated, Archive, CSV, Blackhole, Cluster, Berkeley DB, EXAMPLE,
and Maria)
29 | P a g e

SODHI HEALTH INDIA.COM


o

Partner-developed

storage

engines

(InnoDB,

solidDB,

NitroEDB,

BrightHouse)
o

Community-developed storage engines

(memcached, httpd, PBXT,

Revision Engine)
o

Custom storage engines

Commit grouping, gathering multiple transactions from multiple connections


together to increase the number of commits per second.

Server compilation type

There are 3 types of MySQL Server Compilations for Enterprise and Community users:

Standard: The MySQL-Standard binaries are recommended for most users, and
include the InnoDB storage engine.

Max: (not MaxDB, which is a cooperation with SAP AG) is mysqld-max Extended
MySQL Server. The MySQL-Max binaries include additional features that may not
have been as extensively tested or are not required for general usage.

The MySQL-Debug binaries have been compiled with extra debug information,
and are not intended for production use, because the included debugging code may
cause reduced performance.

Beginning with MySQL 5.1, MySQL AB has stopped providing these different package
variants. There will only be one MySQL server package, which includes a mysqld binary
with all functionality and storage engines enabled. Instead of providing a separate debug
package, a server binary with extended debugging information is also included in the
standard package.

History
Milestones in MySQL development include:

MySQL was first released internally on 23 May 1995


30 | P a g e

SODHI HEALTH INDIA.COM

Windows version was released on 8 January 1998 for Windows 95 and NT

Version 3.23: beta from June 2000, production release January 2001

Version 4.0: beta from August 2002, production release March 2003 (unions)

Version 4.1: beta from June 2004, production release October 2004 (R-trees and
B-trees, subqueries, prepared statements)

Version 5.0: beta from March 2005, production release October 2005 (cursors,
stored procedures, triggers, views, XA transactions)

Sun Microsystems acquired MySQL AB on 26 February 2008.

Version 5.1: production release 27 November 2008 (event scheduler, partitioning,


plugin API, row-based replication, server log tables)

Future releases

The MySQL 6 roadmap outlines support for:

Referential integrity (foreign keys)

Additional Unicode characters utf16, utf32, and 4-byte utf8

New transactional storage engine (Falcon).

Support for parallelization is also part of the roadmap for future versions.
Support for supplementary Unicode characters, beyond the 65,536 characters of the Basic
Multilingual Plane (BMP) is announced for MySQL 6.0.
Foreign key support for all storage engines is targeted for release in MySQL 6.1 (although
it has been present since version 3.23.44 for InnoDB).
A new storage engine is also in the works, called Falcon. A preview of Falcon is already
available on MySQL's website.

Support and licensing

31 | P a g e

SODHI HEALTH INDIA.COM


Via MySQL Enterprise MySQL AB offers support itself, including a 24/7 service with 30minute response time, the support team has direct access to the developers as necessary to
handle problems. In addition it hosts forums and mailing lists, employees and other users
are often available in several IRC channels providing assistance.
Buyers of MySQL Enterprise have access to binaries and software that is certified for their
particular operating system, and access to monthly binary updates with the latest bug fixes.
Several levels of Enterprise membership are available, with varying response times and
features ranging from how to and emergency support through server performance tuning
and system architecture advice. The MySQL Network Monitoring and Advisory Service
monitoring tool for database servers is available only to MySQL Enterprise customers.
MySQL Server is available as free software under the GNU General Public License (GPL),
and the MySQL Enterprise subscriptions include a GPL version of the server, with a
traditional proprietary version available on request at no additional cost for cases where the
intended use is incompatible with the GPL.
Both the MySQL server software itself and the client libraries are distributed under a duallicensing format. Users may choose the GPL which MySQL has extended with a FLOSS
License Exception. It allows Software licensed under other OSI-compliant Open Source
licenses, which are not compatible to the GPL, to link against the MySQL client libraries.
Customers that do not wish to be bound to the terms of the GPL may choose to purchase a
proprietary license.
Like many open-source programs, the name "MySQL" is trademarked and may only be
used with the trademark holder's permission.

Criticism

MySQL recently (2008) released version 5.1 with 20 known crashing and wrong result
bugs in addition to the 35 present in version 5.0. Critical bugs sometimes do not get fixed
for long periods of time. An example is a bug with status critical existing since 2003.
32 | P a g e

SODHI HEALTH INDIA.COM


MySQL shows poor performance when used for data warehousing; this is partly due to
inability to utilize multiple CPU cores for processing a single query.
The developer of the Federated Storage Engine states that "The Federated Storage Engine
is a proof-of-concept storage engine", though it was included and turned on by default in
the main distributions of MySQL version 5.0. Some of the short-comings are documented
in the "MySQL Federated Tables: The Missing Manual".

Competition

In October 2005, Oracle Corporation acquired Innobase OY, the Finnish company that
developed the InnoDB storage engine that allows MySQL to provide such functionality as
transactions and foreign keys. A press release by Oracle that was issued after the
acquisition, mentioned that the contracts that make the company's software available to
MySQL AB would be due for renewal (and presumably renegotiation) some time in 2006.
During the MySQL Users Conference in April 2006, MySQL issued a press release which
confirmed that MySQL and Innobase OY agreed to a multi-year extension of their
licensing agreement.
In February 2006, Oracle Corporation acquired Sleepycat Software, makers of the
Berkeley DB, a database engine onto which another MySQL storage engine was built.
In April 2009, Oracle Corporation entered into an agreement to purchase Sun
Microsystems, current owners of the MySQL intellectual property. Although the deal was
approved by Sun's board of directors, it has not yet been finalized.

33 | P a g e

SODHI HEALTH INDIA.COM

34 | P a g e

SODHI HEALTH INDIA.COM

SYSTEM STUDY

FEASIBILITY STUDY

Feasibility studies aim to objectively and rationally uncover the strengths and weaknesses
of the existing business or proposed venture, opportunities and threats as presented by the
environment, the resources required to carry through, and ultimately the prospects for
success

Economic Feasibility : Economic analysis is the most frequently used method for
evaluating

the effectiveness of a new system

Technical Feasibility : The Technical Feasibility Study assesses the details of how
you will

deliver a product or service . A technical feasibility study is an excellent


35 | P a g e

SODHI HEALTH INDIA.COM


tool for trouble-shooting

and long-term planning. In some regards it serves as a flow

chart of how your products and

services evolve and move through your business to

physically reach your market.


Operational Feasibility : Operational feasibility is a measure of how well a
proposed system

solves

the

problems,

opportunities identified during scope definition

and

takes

and

how

advantage
it

of

the

satisfies

the

requirements identified in the requirements analysis phase of system


development .

Economic Analysis :
Economic analysis is the most frequently used method for evaluating the
effectiveness of a new

system. More commonly known as cost/benefit analysis, the

procedure is to determine the benefits

and savings that are expected from a

candidate system and compare them with costs. If benefits outweigh


decision is made to design and implement the system. An entrepreneur

costs,

then

the

must accurately

weigh the cost versus benefits before taking an action.


Cost-based study : It is important to identify cost and benefit factors, which can
be categorized

follows:
1. Development costs; and
2. Operating costs.
This is an analysis of the costs to be incurred in the system and the benefits

derivable out

of the system

Technical Analysis :

36 | P a g e

SODHI HEALTH INDIA.COM


During technical analysis, the technical merits of the system are studied and at the same
time collecting

additional information about performance ,reliability, maintainability

,and predictability .

Technical analysis begins with an assessment of the technical viability of the proposed
system.
What technologies are required to accomplished system function and performance ?
What new materials, methods, algorithms or processes are required and what is their
development risk ?
How will these obtained from technical analysis from the basis for another go/no-go
decision
on the test system ?
Front-End : PHP
Back-End : MYSQL as Back End

37 | P a g e

SODHI HEALTH INDIA.COM

SYSTEM ANALYSIS

38 | P a g e

SODHI HEALTH INDIA.COM

INTRODUCTION
System analysis is the process of studying the business processors and procedures,
generally reffered to as business systems ,to see how they can operate and whether
improvement is needed.
This may involve examining data movement and storage, machines and technology used in
the system, programs that control the machines, people providing inputs, doing the
processing and receiving the outputs.

Investigation Phase :
The investigation phase is also known as the fact-finding stage or the analysis of the
current system. This
is a detailed study conducted with the purpose of wanting to fully understand the existing
system and to identity the basic information requirements. Various techniques may be used
in fact-finding and all fact obtained must be recorded.
A through investigation was done in every effected aspect when determining whether the
purposed system
Is feasible enough to be implemented.

CONSTRAINTS AND LIMITATIONS

The Constraints and limitations wihin a system are the drawbacks that occur during the
implementation of the system. These limitations and constraints can crop up in almost
every system . The most important fact is to find a way to overcome these problems.

Software design is the first of three technical activities

Design
39 | P a g e

SODHI HEALTH INDIA.COM

Code Generation

Test

Those are required to build and verify the software . Each activity transforms information
in manner that ultimately results in validated computer software .
The design task produces a data design, an architectural design, an interface design and
component design.

40 | P a g e

SODHI HEALTH INDIA.COM

SYSTEM DESIGN

41 | P a g e

SODHI HEALTH INDIA.COM

SYSTEM DESIGN
System design is the process of developing specification for a candidate system that meet
the criteria established in the system analysis .The plan of the project provides a review of
the different modules in which the project is divided .The modules are designed and tested
individually and then merged together to form an integrated project.

Activity

Timeline

System Design
Start

Develop
System
Requirements
Document

Finish

System
Design
Planning

System
Design
Review

System Design Work

Instrument
Team

Doc's

W.M.K.O.

System
Requirements
Document

System
Design
Proposal

Systems
Engineering
Management
Plan

System
Design
Manual

System
Design Report

System
Design
Review Report

Instrument
Team

Decision
Points

W.M.K.O.

Proceed with
System
Definition

Commit to
System
Design

Proceed to
Preliminary
Design

42 | P a g e

SODHI HEALTH INDIA.COM

There are four major documentation products that result from the system design phase:
1. System Design Proposal
The System Design Proposal establishes the scope of work, WBS and cost estimate for
the system design phase.
2. Systems Engineering Management Plan
The Systems Engineering Management Plan (SEMP) describes the management
processes that will be used throughout the new instrument development project.
The SEMP includes the following:

Staff and organization

Roles and responsibilities

Project work flow

Decision making process

Reporting and documentation requirements

3. System Design Manual


The System Design Manual establishes the scope of work for the remaining design
phases and describes how the technical and scientific challenges of the instrument
requirements will be met.
The system design manual includes the following:

Describes the functional requirements and relates them to the system requirements

Indicates the preferred design approach

Describes the architecture

Indicates technology drivers and research needs

Gives an error budget


43 | P a g e

SODHI HEALTH INDIA.COM

Gives a risk analysis

Establishes a framework for remaining design phases (preliminary and detail


design)

3. System Design Report


The System Design Report summarizes the work accomplished in the system design
phase and presents the initial estimate of performance for the instrument, the work plan
for the preliminary design phase and an estimate of cost and schedule to completion.

44 | P a g e

SODHI HEALTH INDIA.COM

DATA FLOW DIAGRAM

45 | P a g e

SODHI HEALTH INDIA.COM

DATA FLOW DIAGRAM

The data flow diagram is also known as bubble chart has the purpose of clarifying
system requirements and identifying major transformations that will become programs in
system design so it is the starting point of specification down to the lowest level of detail .
A DFDs consists of a series if bubbles joined by lines. The bubbles represent data
transformation and the lines represent the data flow in the system.

DFD SYMBOLS

A system defined a source or destination of data.

An arrow identifies data flow, data in motion.


A circle represents the process that transforms incoming data flow to outgoing data
flow.
An open rectangular is data store-data at rest or a temporary repository of data

46 | P a g e

SODHI HEALTH INDIA.COM

SODHI
HEALTH
INDIA
REQUEST

REQUEST
RESPONSE

RESPONSE

CUSTOMER

ADMINISTRATOR

47 | P a g e

SODHI HEALTH INDIA.COM

DATABASE Description
E-R DIAGRAM

48 | P a g e

SODHI HEALTH INDIA.COM

Tables in database

tbHeadline
s

tbAchiviev
ements

tbFacilities

tbuser

tbOther

Clinicdb

49 | P a g e

SODHI HEALTH INDIA.COM

Admin Login Table :


This table contain the information about the authorized users

Upass

Uname

Admin

50 | P a g e

SODHI HEALTH INDIA.COM

tbuser

Uname

Upass

tbuser

51 | P a g e

SODHI HEALTH INDIA.COM

System Testing

52 | P a g e

SODHI HEALTH INDIA.COM


TESTING
Testing is the process of detecting errors. Testing performs a very critical role for
quality assurance and for ensuring the reliability of the software. The results of
testing are used later on during maintenance also. Testing is vital to the success of
the system. System testing makes a logical assumption that if the parts of the
system are correct, the goal will be successfully achieved. In adequate testing or
non-testing leads to errors that may not appear until months or even years later.
This creates two problems:
1. The time lag between the causes and the appearance of the problem.
2. The time interval effect of the system errors on the files and the records on
the system.
A small error can conceivably explodes into a much larger problem. Effective
testing early in the process translates directly into long term cost savings from a
reduced number of errors.
Another reason for system testing is its utility as a user oriented vehicle before
implementation. The best program is worthless , if it does not meet the user
requirements. Unfortunately, the users demands are often compromised by efforts to
facilitate program or design efficiency in terms of processing time or design
efficiency.
Thus

in phase we went to test the code we wrote. Whether the results gave

desired output on given inputs? Whether it was ready to be installed on the users
computer or some more modifications were needed?

53 | P a g e

SODHI HEALTH INDIA.COM


TESTING OBJECTIVES
The main objective of testing is to uncover a host of errors, systematically and
with minimum effort and time.

Testing is the process of executing a program with the indent of finding an


error.

A successful test is one that uncovers an as yet undiscovered error.

A good test case is one that has high probability of finding error, if it
exists.

The tests are inadequate to detect possibly present errors.

The software more or less confirms to the quality and reliable standards.

Approaches for Testing

Prepare data for both the valid and invalid cases.

Define test cases to verify the requirements against the SRS document.

Define the test cases to verify the validations and constraints specified in the
design document.

Define the expected results.

Inspect results The actual results will be inspected with the expected results.

54 | P a g e

SODHI HEALTH INDIA.COM

Basic Levels Of Testing

Client Needs

Acceptance Testing

Requirements

System Testing

Design

Integration Testing

Code

Unit Testing

55 | P a g e

SODHI HEALTH INDIA.COM

Levels Of Testing
1. Unit Testing
This is first level of Testing. In this, different modules are tested against the
specification produced during design for the modules. It is essentially for
verification of the code produced during the coding phase, and goal is to test
the internal logic of the modules. It is especially done by the programmer of
the module. A module considered for integration is used by others only after it
has been tested satisfactorily. Due to this association the coding phase is
frequently called coding and unit testing. Structural testing is used mostly at
the unit testing level.
2. Integration Testing
This second level of

testing. In this, many unit tested are combined into

subsystems, which are then tested. The goal is to check if modules can be
integrated properly. The emphasis is on testing interfaces between modules. This
testing activity can be considered testing the design. The integration testing is
done to see whether the integration effects any working by giving different
combinations of input.
3. System Testing
In this type of testing, entire software system is tested. The reference document
for this process is the requirements document, and the goal is to se if the
software meets its requirements. This is essentially a validation exercise, and in
many situations it is the only validation activity.
4 Acceptance Testing
This is performed with realistic data of the client to demonstrate that the
software is

working satisfactorily. This testing focuses on the external behavior of

the system ; the

internal logic is not emphasized. Mostly, functional testing is

performed at these level. Test

cases should be selected so that the largest

number of attributes of an equivalence class is exercised at once. The testing phase


56 | P a g e

SODHI HEALTH INDIA.COM


is an important part of software development. It is the

process

errors and missing operations and also a complete verification to

of

finding

determine

whether the objectives are met and the user requirements are satisfied.
These level of testing are performed when a system is being built from the
components

that

have been

coded. There

is

another

level of

testing, called

regression testing, that is

performed when some changes are made to an existing

system. The changes are

fundamental to software; any software must undergo

changes. Frequently, a change is made

to upgrade the software by adding new

features to be added.

As modifications are made to an existing system, testing also has to done to


make sure

that the modification has not any undesired side effect of making

some of the earlier services faulty. Besides ensuring the desired behavior of the
new services, testing has to

ensure that the desired behavior of the old

service is maintained. This is task of regression testing.


For regression testing, some test cases that have been executed on the old
system are

maintained, along with the output produced by the old system. These

test cases are

executed

again

compared with the earlier output to

on

the

modified

system

and

its

output

make sure that the system is working as

before on these test cases. This is a major task when modifications are to be made
to existing systems.

57 | P a g e

SODHI HEALTH INDIA.COM

Methods Of Testing
THE BOX APPROACH
Black Box Testing:
Black Box Testing treats a software as a black box- without any knowledge of
internal implementation. This testing method considers module as a single unit and
checks the unit at interface and communication with other modules rather getting
into details at statement level. The module will be treated as a block that will take
some input and generate output. Output for a given set of input combinations are
forwarded to other modules.
Black Box test are designed to uncover functions test requirement without regard
to the internal workings of a program. Black Box testing techniques focus on the
information domain of the software, deriving test cases by portioning the input and
output domain of a program in a manner that provides through test coverage. The
Black Box test is used to demonstrate that software functions are operational, that
input is properly produced, and that the integrity of external information is
maintained. A Black Box test examines some fundamental aspect of a system with
little or no regard for the internal logical structure of the software.
Graph Based testing methods explore the relationship and behavior between
program objects. Equivalence partitioning divides the input classes

of data are

likely to exercise specific software function. Boundary values analysis probes the
programs ability to handle data at the limits of acceptability.
White Box Testing
White Box Testing also known as Glass Box Testing focuses on the internal data
structures and algorithms including the code that implement these. It mainly
emphasis on the program control structure. Test cases are derived to ensure that all
statement in the program control structure and all statement in the program has
58 | P a g e

SODHI HEALTH INDIA.COM


been executed at least once during testing and all logical conditions have been
exercised. Basis, a white box testing technique, makes use of program graphs to
derive the set of linearly independent test that will ensure coverage. Condition and
data flow testing further exercising degree of complexity.

59 | P a g e

SODHI HEALTH INDIA.COM

TESTING MECHANISM

Testing is vital to the success of the system. System testing makes a logical
assumption that if all the parts of the system are correct, the goal will be
successfully achieved. Effective testing early in the process translates directly
into long-term cost savings from a reduced number of errors. Another Reason for
system testing is its utility as a user-oriented vehicle before implementation. The
best program is worthless if it doesnt meet user needs.
After developing a test plan, system testing begins by testing program modules
separately, followed by testing by bundled modules as a unit.

SYSTEM TESTING CONSISTS OF THE FOLLOWING


STEPS:
1. Program(s) testing.
2. String Testing.
3. System Testing.
4. System Documentation.
5. User Acceptance Testing.

Program(s) Testing: For a program to run satisfactorily, it must compile and


test data correctly and tie in properly with other programs. Program Testing
Checks for two types of errors: Syntax and Logic.
When we tested our ASTROLOGY.COM program, the actual output is
compared with the expected output. The idea is to compare program values
against desk-calculated values to isolate the problem.

String Testing : Here we tested our program to see whether it confirms to


related programs in the system. Each portion of the system is tested against the
60 | P a g e

SODHI HEALTH INDIA.COM


entire module with both test and live data before the entire system is ready to be
tested.

System Testing: It is designed to uncover weaknesses that were not found in


earlier tests. This includes forced system as it will be implemented by its user(s)
in the operational environment. Generally, it begins with low volumes of
transactions based on live data. The volume is increased until the maximum level
for each transaction type is reached. All this is done with the old system still in
operation. After the candidate system passes the test, the old system is
discontinued.

System Documentation: All design and test documentation are finalized


and entered in the library for future reference.

User Acceptance Testing: An acceptance test has the objective of selling


the user on the validity and reliability of the system. Performance of an
acceptance test is actually the users show. Now a comprehensive test report is
prepared. The report indicates the systems tolerance, performance range, error
rate and accuracy.

61 | P a g e

SODHI HEALTH INDIA.COM

PROJECT GUIDE INFORMATION


Project Undertaken

: Avaptech Training and Development Unit

Name of Organization & Address : Avaptech Training and Development Unit


S.C.O 106 Sector-40/c , CHD
External Guide Name

Mr. Valjeet Patial, Ms. Amrit Pal Kaur

External Guide Designation

Head Trainer

External Guide phone No.

9815440929,9888788455

External Guide E-mail

valijeetpatial@gmail.com

62 | P a g e

SODHI HEALTH INDIA.COM

OBJECTIVE OF ASTROLOGY.COM PROJECT


This system will maintain a database of information related to the clinic . It will cover the
following activities:

Maintenance clinic information.

Maintenance of all records of all type of important information like about various
facilities, headlines.

Maintenance of data related to all the required field.

63 | P a g e

SODHI HEALTH INDIA.COM

SNAPSHOTS

64 | P a g e

SODHI HEALTH INDIA.COM


Main Web Page:

For the information regarding the hospital facility the user has to click one of
the link of these:

65 | P a g e

SODHI HEALTH INDIA.COM

Cardiology Web Page:

66 | P a g e

SODHI HEALTH INDIA.COM

Panel of consultant Web Page:

67 | P a g e

SODHI HEALTH INDIA.COM

Administrator

Login Page:

68 | P a g e

SODHI HEALTH INDIA.COM

Admin Panel:

69 | P a g e

SODHI HEALTH INDIA.COM

facilities:

70 | P a g e

SODHI HEALTH INDIA.COM

Health headlines:

71 | P a g e

SODHI HEALTH INDIA.COM

Achievement in edit mode:

72 | P a g e

SODHI HEALTH INDIA.COM

Other page menu:

73 | P a g e

SODHI HEALTH INDIA.COM

Add new Article:

74 | P a g e

SODHI HEALTH INDIA.COM

Change Password:

75 | P a g e

SODHI HEALTH INDIA.COM

SYSTEM DATABASE
SUMMARY

SNO

TABLE NAME

DETAILS

1.

Tbuser

details of
Password

Username

and

2.

Tbachievements

details description of all


achievements

3.

Tbothers

details of all top menu links

4.

Tbfacilities

details of all Facilites in


Hospital
76 | P a g e

SODHI HEALTH INDIA.COM

5.

Tbheadlines

details of all health headlines

Detailed Table Structure

77 | P a g e

SODHI HEALTH INDIA.COM

TABLE tbfacilities

78 | P a g e

SODHI HEALTH INDIA.COM

TABLE tbheadlines

79 | P a g e

SODHI HEALTH INDIA.COM

Test data in TABLES


Detail of tbuser

80 | P a g e

SODHI HEALTH INDIA.COM

Detail of tbfacilities

81 | P a g e

SODHI HEALTH INDIA.COM

Detail of tbother:

82 | P a g e

SODHI HEALTH INDIA.COM

83 | P a g e

SODHI HEALTH INDIA.COM


CONCLUSION

The project was started keeping in mind two aspects. Firstly the project fulfills the users
requirement, Secondly it could be used as a utility.
The project undertaken has been successful in covering both the aspects.
Although there is always a scope for improvement, this project has the feature for up
gradation and can be easily up grated to the changing requirements as when required. It
was a small effort from our team of two students to make something exactly of the
requirements or the property dealers.
This project would not have been possible without the support and guidance of the
institution, teachers and the trainer who helped us in every way to complete it in time.
Hope this project paves the way for further such efforts.

84 | P a g e

SODHI HEALTH INDIA.COM


FUTURE SCOPE

The SODHI HEALTH INDIA.COM Project is developed while keeping in mind the
necessities of the information of health. So we have tried to bring all possible
developments into our Project. But there is always a good scope for improving the project.
There can be many improvements that can be made but they are all dependent on the
future requirements. There is no need of any improvements to be done at this junction of
time.

85 | P a g e

SODHI HEALTH INDIA.COM

REFERENCES
Books Referred

HTML Complete Reference by STEPHEN EMACK.

HTML 4.0 No Experience Required by STEPHEN EMACK.

PHP SCRIPT the Complete Reference by THOMAS POWELL.

PHP SCRIPT & DHTML by COOKBOOK, OREILLY.

Beginning PHP 5, APACHE, MYSQL, WEBDEVELOPMENT by WROX.

SOFTWARE ENGINEERING by ROGER S.PRESSMAN.

SOFTWARE ENGINEERING by JALOTE.

Websites Referred

http://www.php.net
http://www.w3schools.com
http://www.google.com
http://www.wikipedia.com

86 | P a g e

You might also like