r
r
A Project report submitted in partial fulfillment of the requirements for the award of degree
Of
BACHELOR OF TECHNOLOGY
IN
G. RUTHVIKA 226T1A0406
(2022-2026)
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
CERTIFICATE
This is certified that the project entitled Java Virtual Internship Certificate is being
submitted for the partial fulfilment of the requirement for the award of Bachelor of
technology in Electronics and communication engineering to Pydah college of
engineering, patavala, is a Bonafede work done by Ruthvika under my guidance during
the academic year 2022-26 ansd it has been found suitable for acceptance according to
the requirement of the university.
The result embodied in this thesis have not been submitted to any other university or
institute for the award of any degree.
External Examiner
ACKNOWLEDGEMENT
We are thankful to both teaching and non-teaching staff of ECE department for their
kind cooperation and all sorts of help bringing out this project work successfully.
G. RUTHVIKA
DECLARATION
We do hereby declare that the project report entitled Speed Control “JAVA VITRUAL
INTERNSHIP ” submitted by us to PYDAH COLLEGE OF ENGINEERING, Patavala,
in partial fulfillment of requirement for the award of Degree in BACHELOR OF
TECHNOLOGY in ELECTRONICS AND COMMUNICATION ENGINEERING
DEPARTMENT is a record of Bonafede project work carried out by G.Ruthvika under the
guidance of Madam K. DURGA DEVI and I further declare that the work reported in this
project has not been submitted and will not be submitted either in part or full, for the award of
any other degree or diploma in this Institutions or University.
6
Chapter 1 Introduction
1.1 Background:
To get a Gen-C position, you would take a position in a certain organization
until the internship is over. They placed her in an internship that was 12 weeks in
length, which consisted of training programs, webinars, Udemy classes, and project
work projects.
A big American and Indian IT firm A great number of people from India were hired
by Cognizant last year, and it has about 3 lakh workers. The Cognizant Corporation
often attracts and employs foreign employees from around the world.
Cognizant provides different positions in the business including developer, tester,
and manager but before making the decision to work there is a year of planning
after the internship for each.
Cognizant offers compensation to interns and is about Rs.12,000 a month over the
internship time. A thousand dollars comes in cash, but Rs.12000 gets reduced by
the levy.This internship takes on a bit of a sliding scale. It changes depending on
what kind of job the intern takes. With a developer profile, it may be only 4
months, but with QEA, it is as long as 6.It will vary between the cognizant variation
for the students, but it's all based on the assimilatory measure, and first arrive, first
done.
Cognizant’s task, vision, value proposition, and creative/strategic goals
Cognizant goal is to put the newly hired talent into training. All who were invited
were offered an internship with organization
In addition to trainees, every year many colleges give associateships to graduates of
cognizant courses of study. This candidate is impressive, since he or she comes
from all across India.
They put a lot of time, effort, resources, and money into teaching the intern before
they start doing it in the real world
Students who are newly hired will go into our ongoing onboarding training course
so long as they are either a college graduate or college graduates.
1.2 Values
By and large, these are the ideals of the organization:
Their biggest asset is the employees. To keep high-quality partnerships with our
customers, knowledgeable peers, retailers, the suppliers, community leaders,and
the general public, we have to treat all of them with dignity.
7
We are working to gain long-term consumer satisfaction through respecting each
individual's company and customer interests, as well as doing so with utmost
dedication and honesty, and we want to have a long-term and positive impact on
each customer by serving as an impartial adviser.
Everyone in the company will uphold the commitments to excellence, justice,
integrity, and professionalism in all of their operations.
Keys to Success:
1. Be out front and truthful in the completion of the project.
2. finish the project on schedule.
3. How can you finish the job?
4. Finish the job on budget.
5. SMEs, personal trainers, and mentors will all be very helpful if you make
an effort to pick up their advice and take it in.
6. An eager, open student is always a good student.
1.3 Objectives
In order to concentrate on what we are the company doing best, Cognizant would
aim to focus on a few areas and be a national market leader.
In Expanding the company to be simultaneously growth-inducing and manageable.
8
Chapter 2: Introduction
2.1 Stage 1 – QEA Basics
I was recruited before I began QEA. This is a similar training to SDET, but we have
to master additional software and do research assignments for the duration of the
SDET internship.
2.2 Week 1
Throughout the internship, all of the competency-based classes must be complete
(not only the Udemy ones).
Since reading about the core quality assurance concepts in week 1, we worked on
things like practical monitoring and app testing.
following the online Udemy courses, we performed a quick hands-on, which was
required for all interns, and then a lengthy final exam which was used for the
performance assessment.
As critical as covering all the bases of QEA, Agile, and black box and white box
testing was for the creative part of this week, so that we will be able to design
effectively
It has given some research techniques in addition to spreadsheets as well.
2.2.1 Concepts Studied.
1. Flexible testing: reflects the principles of agile product growth. In
contrast to the Waterfall testing, Agile testing can begin early in a project and
works together with progress. The Agile Testing approach is non-iterative, not done
in a certain order, but it is done during the creation phase.
2. A test plan for agile: Includes test data specifications, test environment
conditions, and results from the previous version. Agile technique, as opposed to
waterfall methodology, puts the focus on writing and revising a test plan each time
a release is done. Agile test programmers’ usually include:
1. Elements which are being experimented with
2. Often known as either as function checking
3. loading and stress testing
4. Minimizing risk in the infrastructure Strategy implementation and
Milestones
For agile testing, there are four distinct phases: planning, doing, studying,
9
components of the whole software development phase." The term "software testing"
should not be limited to a single action. The methodical set of operations aid in the
validation of your applications. The life cycle of software testing is referred to as an
STLC.
The Creativity Phases Any STLC has the following six stages:
1. Analysis of Requirements
2. Test Preparation
3. The development of test cases and the establishment of a test environment
4. Execution of the Test
5. Closure of the Test Cycle
Entry and Expiry: Exit criteria to be completed includes beginning to end, end to
beginning, and beginning to end (STLC)
In the Entry Criteria column are all the prerequisites for the experiment; before the
experiment may begin, these must be completed.
Exit conditions can be described as those activities that must be completed prior to
testing.
It is the first of two phases of the quality assurance process, where a senior QA
manager outlines the test strategy, the commitment, and expense expectations.
Tools, research setting, test constraints, and testing times are almost all
predetermined, The test plan is over.
Writing a research schedule and approach with different testing methods
Selecting a test tool, apportioning effort among various test cases, testing various
functions, determining roles and resources unbiased research A manager in charge
of project quality assurance decides on a research strategy and estimates how much
time and money the project would take to test it as well. The tools, research setting,
as well as the test design specification, test length, and testing requirements are also
decided. The plan of action (Test Plan) is developed in the same process.
The following are the most popular varieties of Black Box Testing:
Functional research has two dimensions: the outer layer and the inner
layer.Non-functional research is looking for parameters rather than
technical features, such as performance and scalability, when functionality
is tested using black-box testing.
In order to guarantee the new technology does not affect the existing code,
regression testing is done before going live, as modifications are made,
10
, even when everything is run to see that everything still works properly. The
following are the most common test techniques in black box technology.
Same equivalence reducing the amount of research cases while ensuring complete
test coverage
Limit Checking: Limit testing focuses on the limit values defined at the limits. To
test if a value set is suitable to the scheme, you may use this tool. The less the test
cases you have, the better, in my opinion. It is preferable for devices whose
numbers of inputs lie between a certain set.
For judgement tables, testing conditions and outcomes are arrayed in a row. There
are six columns in a list; each has a different combination.
White box testing is a software testing strategy which requires looking within the
product and at its architecture to see if its functionality and design are sound, and
finding any flaws in the input-output framework. In addition to "white box
checking", "open box testing", "transparent box testing", and "glass testing", it is
often classified as "code-based testing", "glass testing", and "code-based",
"observable" Not only is it part of the software engineering methodology known as
Box Testing, but it's also one of two components
A number of research approaches can be referred to as 'creative' when they are
applied to evaluate the programme, the code, or a particular software package's
creativity. A number of form classes follows:
Memory leaks can be tested regularly. Memory leaks are very often seen in slow-
running applications. When you have a memory-leaking application, you need a
specialised software testing specialist who knows about finding latent problems
with slow-running software.
checking and iterating." It is not uncommon for unit research to be the first kind of
testing done. Each new piece of code goes through unit testing as it is created. The
primary responsibility of the compiler is to verify the correctness of the software.
Testing also means writing a small amount of code, writing a single function, or
writing simple classes before going on to the next level. In the early stages of
software production, unit testing helps to find many of the problems. Bugs are less
costly and simpler to track down at this point.
Code coverage is widely adopted as an effective tool for White box checking. code
coverage informs us which tests have been executed, and which have not. It finds
software components that aren't exercised in the test suite. When the weak points of
the app have been identified, you verify the unknowns in the test cases, improving
11
the overall consistency of the product.
In the software testing phase, any comment that can be made is done.
Any branch approach that is examined in the research and development of a
programmed is part of the single source methodology .
2.2.2 Assignments
Hotel Booking
Table 2.2 All Possible Test Cases with the Given Constraint
12
Table 2.3 Defect Report with possible defects
13
Table 2.4 Requirement Table
14
Table 2.5 Possible Test Scenarios with scenario ID
Table 2.6 All Possible Test Cases with the Given Constraint
15
Table 2.7 Defect Report with possible defects
16
Chapter 3 Java Programming Fundamentals
3.1 Week-2
18
Waste Management and the solid memory maintenance give it more emphasis than
other computer languages.
3.1.2 JVM
At runtime, the JVM serves as a Java programme host. A JVM runs the code that
invokes the key function that is included in a Java source file. Feature is needed for
a successful installation of Java Runtime Environment. disposable from the wealth
of acronyms All runs on Java, which ensures that if you can understand and write
Java code, you can be certain it will work on every Java-powered machine. This
can all be done because of the Java Virtual Machine (JVM). A .class file (which is a
filename containing bytecode) is created whenever we compilation the .java
document. This class file progresses through many distinct stages as it is
executed. It gives you the entire picture of the Virtual machine
20
methods, constructors, and class names.
3.1.4 Data Types
Programming languages such as Java must predefine any form of data (integer,
character, decimal, and so on) whereas strict typing is enforced statically since each
constant or vector must reference an actual part of the language definition.
JavaScript has two types of data: uninterpreted and scripted.
The primitive data elements such as binary, character, integer, and so on, as well as
the non-primitive types of data are presented.
Simplistic data are simply data with just a single attribute and don't have any
unique capabilities. Primitive data types in Java are made up of eight basic data
types.
Non-Primitive Data Type or Reference Data Types-The Reference Data Types will
contain a memory address of variable value because the reference types won’t store
the variable value directly in memory. They are strings, objects, arrays, etc.
3.1.5 Variables
An expression refers to a memory spot, often known as a vector. The fundamental
element in a curriculum. During the software execution, the value of a variable may
be modified.
The variable is a designation for only: everything that happens to the memory
position; everything that is achieved with the variable changes the memory
location. Java requires all variables to be made known before they are included.
21
as members), are known as Instance variables.
You may distinguish between instance variables and static variables from the
context in which they are used: instance variables are used within a process or other
instance, whereas static variables are not.
3.1.6 Type Conversion
Value of one data form assigned to another is unlikely to be comparable. Automatic
style conversion happens if the first time the data is fetched; afterward, you have to
manually cast or transform it if you need to. To do something like this, you can do,
for instance, assign an integer to a longer variable.
3.1.7 Loops
Using a looping languages allows a series of instructions/functions to be executed
when any optimized delivery to be valid is a very useful feature for writing
software For example, a while loop performs an action while a variable remains
true. although statements can be imagined as repeated a "while" looping
FOR loops are provided by for various reasons, but this is one of the more notable
ones.As compared to a while loop, a for loop initialises, tests, and
increments/decrements in one sentence, the for method offers simpler, readable
form in which iterates a certain number of times.
There are two versions of the while loop; while, which only verifies the position
after performing states in the block, and do while, which tests for the conditions
while performing sentences.
3.1.8 Decision Making
Programming choices are the same as life-altering choices. We sometimes require a
line of statement to be executed for such circumstances in programming.
circumstances that have been predetermined They're programmed by a computer
such that when the software changes, the flow of operations changes as well.
If the state is true, the blocks will be executed. Unless, of course, we prefer to do
something else. Here's where the if comes in. We will use the Else Statement to
execute the following sentence of statement if a condition is wrong.
22
Fig 3.3 Syntax for if statement
23
if statements mean an if statement inside an if statement.
Switch-Case The switch statement is a multiway branch statement. It provides an
easy way to dispatch execution to different parts of code based on the value of the
expression.
The RETURN statement is used to explicitly return from a method. That is, it
causes a program control to transfer back to the caller of the method
3.1.12 Static Variable
A static element is also known as a class variable which is often considered a static.
You can access it by class name or using its value and is exclusive to the class, but
not always.
3.1.13 Non-Static Variable
Any variable of a class which is not static is called a non-static variable or an
instance variable.
3.1.14 Classes and Objects
Object-Oriented Programming is built on object - oriented as their core principles
revolve in the actual world.
Objects are derived from class-A classes; Class-A classes are self-defined
blueprints or mock-ups that aid in the construction of others.The property or
process may be called from every entity of that kind. This part will appear in a class
declaration, generally::
A class may be public or a member function may provide public access.
Class defines a type which is used to define a type, whether it is well-designed.
A letter, and then be followed by additional letters, numbers, or numbers, that are
each followed by an alphabetically-delimited sequence of underscores"
best-and-division classification )if some (parent) class name is followed by the term
"extends", then a parent class extends class A class may only be a subset of one
class.
combination of features the class name and their inclusion in the section, if any, if
present. More than one user type should be used to enforce an interface.
24
Fig 3.4 Relationship between class and object in JAVA
26
Fig 3.5 Difference between Interface and Abstract
3.1.13 Abstraction
Data Abstraction leaves out the unnecessary information such that only the
important facts appear to the viewer. The marginal or the non-essentials units are
never shown to the customer. Ex: A car is regarded as an automobile rather than its
particular components.
Hide-and-and-polymorph groups and Polymorph-only approaches An arbitrary
class is created with the superclass. An abstract method must be formulated without
defining any concrete data and must be defined without describing the code..
3.1.14 Encapsulation
The packing up of data into a single device is known as encapsulation. It's the glue
that holds coding and the information it tries to manipulate together.
Encapsulation's Benefits:
1. Hiding Data
2. Greater adaptability
3. Adaptability
4. It's simple to test code.
3.1.15 Runtime Polymorphism
Polymorphism is one of the aspects that Java embraces the notion of method
overriding. Java looks up the instance method to call when an overridden method is
invoked from a superclass reference. To conclude, this is all decided on the fly.
Method execution relies on the form of the object being invoked.
Overloading makes methods have the same name, but various parameter types and
different numbers of input parameters, while boxing restricts methods to just the
27
sam.
28
In any object-oriented language, a function which allows an existing method to be
overridden is referred to as "overriding".
The single unit of every set of items is defined as the collection.,the collection
classes are specified in a separate "Collections Framework" module. A framework
is a set of pre-built classes and protocols which supplies a basic design.
3.2 Week-3
3.2.1 Collections
All items that are seen as a single entity are classified as an array. The “Collection
Framework” was used as a separate project, holding all of the collections
groups and their associated interfaces.A program is a system of pre-made classes
and objects that makes an architecture easier to design.
The below are some of the benefits of the Collection Framework:
1. API that is consistent
2. Increases software pace and consistency thus reducing programming
commitment.
3. The Object Interface expands the iterable interface which is enforced by all
of the collection new framework classes. This gui includes many of the simple
methods that any database has, such as applying data to the collection, extracting
data from the collection, removing data, and so on.
3.2.2 Iterators
In the Collection system, iterators are used to go over a list and extract items one at
a time. Each of the three ideas is an iterator
Enumeration. This is used to retrieve items from existing collections . It works for
every Collection object; it's an iterator in all collections. Use Iterator, they can read
and delete operations at the same time. This is an enhanced variant of Enumeration
that provides the feature of having an aspect that can be removed. List Iterators like
ArrayList are just to be used for list, LinkedList and several other collections. With
bi-directional possibilities In applications where we need to walk the elements of a
List, we must use a ListIterator. This cursor offers a greater variety of features than
the iterator. This is similar to the Java collection framework which is an
implementation of the Collection interface. This list is used to provide a skeletal
application of the List interface, using a database as the underlying data
warehouse . Abstract SequentialList should be preferred to this type of associative
list for linked list results.
29
3.2.3 ArrayList
30
including primitives, objects, localizable strings, and more
It is a series of data represented as a river. Streams may be divided into two classes:
31
clearly noxious and harmless.
Source − To interpret metadata, use the Source.To write data to a target, use the
Output Stream.
The aim of the Byte Streams in Java is to transfer ASCII characters and to and
display 8-bit bytes. While there are several file input/output stream-related classes,
the most commonly encountered ones are those that are subclasses of class
java.io.io.InputStream.READ, WRITE the whole files
A stream is a flow of data. The origin stream reads data and the target is where it is
written.
3.3 Week-4
3.3.1 JDBC
Java Database Connectivity. A query API connects and queries the database, and
JDBC enables you to do so with Java. An essential feature of Java SE . A
JDBC API connects to a JDBC database using drivers.
There is little to stop one from using JDBC to get tabular data from every database
system. We have been able to successfully save, modify, delete, and fetch our game
data with JDBC API. This is as if Microsoft had invented Open Database
Connectivity. Everyone who will use JDBC.
By implementing a common series of interfaces, JDBC allows for easy access to
involvement with the study on different platforms. a Java could be used to compose
executables that perform various functions, including
1. Applications written in Java
2. Applets in Java
3. Servlets in Java
4. Pages for Java Server (JSPs)
5. JavaBeans for Company (EJBs).
32
Fig 3.6 Architecture of JAVA DATABASE CONNECT
Both of these various programmers have access to the records with a JDBC engine,
and may even use storage data. JAVA DATABASE CONNECT is, in short, has the
same functionality as JDBC, thereby enabling non-database-specific applications to
run on any and all Java programmers.
33
Chapter 4 Conclusion
4.1 Conclusion
I'm currently doing my intern with cognizant, and I've grown a lot through it. It's
helped me shape my personality and equip me with the understanding of these
innovations.
My last internship assignment is still with cognizant internship, and I will try my
very utmost to complete it.
I'd like to express my gratitude in advance to the cognizant mentors, SME, tutor,
and teacher who led me through my internship at cognizant and answered all of my
questions. Coaches, Sme, Mentor, and Tutor were all pleasant people who assisted
me if I made a mistake and influenced me during my internship.
My instructor, in particular, put in extra energy and during intern and forwarded all
of our questions to the company's higher authorities, whether they were relevant to
retaking the evaluation, logistical issues encountered during the assessment, or
having more time to complete the project.
Since cognizant is a top fortune organization in the technology industry, I would
strongly advise my juniors to plan well for the offer and get the internship
opportunity from the cognizant.
I'd like to express my gratitude to my TNP officer, Mr. Pankaj Kumar, and faculty
member, Dr. Nafis.U Khan, for their assistance and dedication during entire
placement period, as I understand how difficult it is to handle a placement drive.
34
35