0% found this document useful (0 votes)
5 views23 pages

Final Report Online Security Guard Hiring System

The Online Security Guard Hiring System is a digital platform designed to streamline the hiring, management, and scheduling of security personnel, addressing inefficiencies in traditional hiring methods. It features job posting, candidate profiles, real-time scheduling, payment integration, and compliance checks to enhance transparency and efficiency. By connecting employers with qualified guards, the system aims to simplify security staffing and improve overall security management for various needs.

Uploaded by

Arshiya Sultana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views23 pages

Final Report Online Security Guard Hiring System

The Online Security Guard Hiring System is a digital platform designed to streamline the hiring, management, and scheduling of security personnel, addressing inefficiencies in traditional hiring methods. It features job posting, candidate profiles, real-time scheduling, payment integration, and compliance checks to enhance transparency and efficiency. By connecting employers with qualified guards, the system aims to simplify security staffing and improve overall security management for various needs.

Uploaded by

Arshiya Sultana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 23

Online Security Guard Hiring System

Abstract

In today's world, where security concerns are ever-increasing, ensuring the safety of physical
spaces is of paramount importance. The traditional process of hiring security guards often suffers
from inefficiencies, including lack of transparency, communication gaps, and time-consuming
manual procedures. To address these challenges, the Online Security Guard Hiring System offers
a modern, streamlined solution. This system leverages digital technology to transform the hiring
process by providing a centralized platform where clients can easily connect with skilled and
verified security personnel. The platform ensures a seamless experience through features such as
detailed candidate profiles, automated application management, and real-time communication
between employers and candidates. By eliminating the limitations of manual processes, this
system not only enhances transparency and efficiency but also ensures a faster, more reliable
hiring process. The Online Security Guard Hiring System represents a significant step forward in
utilizing technology to strengthen personal and organizational security, enabling users to meet
their safety needs with greater ease and confidence.

The Online Security Guards Hiring System is an innovative web-based solution designed to
simplify the recruitment, management, and scheduling of security personnel. It provides a user-
friendly interface for employers to post job requests, search for qualified security guards, and
manage bookings in real time. The system is structured to cater to a wide range of security needs,
including event security, corporate premises, residential properties, and construction sites.

Key features of the system include:

1. Job Posting & Customization: Employers can post specific job requirements, including
the number of security guards needed, work shifts, location, and any special skills (e.g.,
armed/unarmed, first aid, etc.).
2. Security Guard Profiles: Guards can create profiles with detailed information about
their skills, experience, certifications, and availability, making it easy for employers to
find the right fit for their needs.
3. Search & Match Algorithm: The system uses advanced matching algorithms to connect
employers with the most suitable guards based on location, skills, and availability.
4. Real-Time Scheduling & Booking: Employers can manage shifts, confirm bookings,
and receive notifications about any changes or updates in real time.
5. Payment Integration: A secure payment gateway ensures that employers can easily pay
for services while guards can receive timely compensation.
6. Ratings & Feedback System: Both employers and guards can rate each other, helping to
maintain high standards and build trust within the system.
7. Compliance & Legal Features: The system ensures that all hired security personnel
meet legal and industry standards, including background checks, certifications, and
insurance.

By providing a centralized platform for both employers and security guards, the Online Security
Guards Hiring System reduces the time and effort required to hire qualified personnel, enhances
the security management process, and creates a more efficient and transparent way of handling
security staffing.

INTRODUCTION

Welcome to the Online Security Guard Hiring System presentation. In today’s fast-paced world,
security is a critical aspect of every business, event, and establishment. Whether for corporate
offices, residential buildings, events, or construction sites, having reliable and skilled security
personnel is essential to safeguard assets, people, and property. However, traditional methods of
hiring security guards often involve cumbersome procedures, including time-consuming
recruitment processes, lack of transparency, and inefficient scheduling systems. These challenges
have led to a need for a more streamlined, effective, and scalable approach to security personnel
hiring.

The Online Security Guards Hiring System is designed to address these issues by providing a
digital platform that simplifies the recruitment and management of security personnel. This
system connects employers with qualified security guards in an efficient, secure, and transparent
manner. It allows employers to post job requests, browse security guard profiles, schedule shifts,
and make payments—all through an easy-to-use interface.
By leveraging technology, the system ensures that both security guards and employers can find
the right fit for each specific security need. For employers, it minimizes the time and effort spent
on the hiring process while ensuring they can hire experienced professionals with the right skills.
For security guards, the platform offers the opportunity to connect with a broad range of
employers and job opportunities. The Online Security Guards Hiring System is an all-
encompassing solution that combines user-friendly features, real-time management tools, and
secure payment mechanisms to create a seamless experience. It reduces the need for
intermediaries, thus cutting costs and providing a direct connection between the employer and
the security staff. With this system, both parties benefit from a more efficient and transparent
hiring process, making it an essential tool for businesses and individuals seeking reliable security
services. In essence, this platform aims to revolutionize the way security personnel are hired and
managed, offering a modern, secure, and scalable solution for today’s security needs. In an era of
increasing digital reliance and growing security concerns, ensuring the safety and protection of
physical spaces has become a top priority for individuals and organizations alike. Traditional
methods of hiring security guards are often plagued with inefficiencies, such as manual
paperwork, lack of transparency, communication delays, and limited access to verified
personnel. Recognizing these challenges, we introduce a revolutionary approach to streamline,
simplify, and enhance the process of hiring professional security personnel through the Online
Security Guard Hiring System. This innovative platform leverages cutting-edge technology to
provide a centralized and efficient solution that connects clients with skilled and reliable security
guards. It offers real-time access to verified guard profiles, automated application processes, and
seamless communication, enabling a faster and more effective hiring experience. By combining
convenience, transparency, and security in a single platform, this system addresses the evolving
needs of modern society, empowering users to ensure the safety of their physical spaces with
confidence and ease.

OBJECTIVE

The Online Security Guard Hiring System focuses on addressing key areas to enhance its
effectiveness and user satisfaction. Strengthening security remains a top priority, ensuring that
both the platform and its processes are robust and reliable. Enhancements to the recruitment
process will streamline operations, making it more efficient and transparent for both employers
and candidates. Improving the candidate experience is also a critical goal, offering user-friendly
features and personalized support to attract and retain top talent. Fostering diversity in
recruitment will create an inclusive environment, ensuring equal opportunities for individuals
from various backgrounds. The integration of training modules within the platform will help
security personnel develop their skills and meet evolving industry demands. By incorporating
tools to monitor performance metrics, employers can evaluate and track guard effectiveness,
enabling data-driven decisions. Lastly, the system will prioritize continuous improvement,
adapting to new challenges and technologies to remain a leader in the security hiring industry.
The Online Security Guards Hiring System aims to provide an efficient, transparent, and user-
friendly platform that addresses the challenges associated with hiring, managing, and scheduling
security personnel. The primary objectives of the system are:
1. Streamline the Hiring Process:
o Simplify the process of hiring security guards by enabling employers to post job
requests, view guard profiles, and make informed decisions quickly.
2. Enhance Accessibility:
o Provide easy access for employers and security guards to connect anytime and
anywhere through a digital platform.
3. Match Employers with Qualified Security Guards:
o Ensure that employers can find and hire security personnel with the right
qualifications, skills, and availability based on specific job requirements.
4. Improve Scheduling and Shift Management:
o Enable employers to efficiently manage schedules, shifts, and guard assignments,
reducing the risk of errors and scheduling conflicts.
5. Ensure Security and Payment Transparency:
o Offer a secure and reliable payment gateway for seamless transactions between
employers and guards, ensuring transparency and fairness in payment.
6. Build Trust and Accountability:
o Incorporate a rating and feedback system where both employers and security
guards can review each other’s performance, fostering a trustworthy relationship.
7. Compliance with Legal Standards:
o Ensure that all security personnel hired through the platform meet legal and
industry standards, including certifications and background checks.
8. Cost and Time Efficiency:
o Save time and reduce operational costs for both employers and security guards by
eliminating the need for intermediaries and manual processes.

PROPOSED DEFINATION
The shift to an online security guard hiring system is driven by the shortcomings of traditional
methods, which often involve time-consuming manual processes, excessive paperwork, and
limited accessibility for both employers and job seekers. These conventional approaches lack
transparency, making it difficult for employers to verify the qualifications and background of
candidates efficiently. Additionally, communication challenges, such as delays in
correspondence and difficulty in scheduling interviews, further hinder the hiring process. An
online hiring system addresses these issues by providing a centralized platform where employers
can post job requirements and candidates can submit their applications seamlessly. Features like
automated applicant tracking, real-time notifications, and integrated verification tools enhance
efficiency and reduce administrative overhead. Furthermore, the system enables employers to
access a wider talent pool
and leverage advanced
filtering options to identify
the most suitable candidates.
By streamlining workflows,
improving communication,
and ensuring greater
accountability, an online
security guard hiring system
not only simplifies the
recruitment process but also
fosters trust and reliability in
the industry.

SYSTEM ARCHITECTUIRE
Modules of the Online Security Guards Hiring System:
The system can be divided into several modules, each designed to handle specific tasks
efficiently. Below are the key modules:
1. User Authentication and Profile Management:
o Employer and Guard Registration: Employers and security guards can create
accounts by providing necessary details, such as contact information, job
preferences, skills, and experience.
o Login/Logout System: Secure login functionality with role-based access for
employers and guards.
o Profile Management: Users can update their personal information, skills,
certifications, and availability.
2. Job Posting and Search:
o Job Posting (Employer Module): Employers can post job requirements such as
the number of security guards, job location, shift times, required skills, and other
specifications.
o Search and Filter (Guard Module): Guards can search for available jobs based
on location, job type, skill requirements, and shift preferences.
o Matching Algorithm: The system uses a matching algorithm to recommend
suitable security guards based on their skills, experience, and availability.
3. Guard Profile and Rating System:
o Guard Profile Management: Guards can create detailed profiles showcasing
their experience, certifications, and areas of expertise (e.g., armed/unarmed, first
aid).
o Employer Ratings and Reviews: Employers can rate guards based on their
performance, which helps maintain high standards and builds trust within the
platform.
o Guard Ratings and Feedback: Guards can rate their experience with employers,
fostering a transparent environment.
4. Scheduling and Shift Management:
o Real-Time Scheduling: Employers can view guard availability and schedule
shifts accordingly, making the process of shift allocation smoother.
o Automatic Shift Reminders: Automated notifications are sent to both employers
and guards about upcoming shifts or any changes in the schedule.
o Shift Confirmation and Updates: Employers can confirm shifts, and guards can
accept or decline the assignments.
5. Payment System and Transaction Management:
o Payment Gateway Integration: Secure online payments are facilitated through
integrated gateways, allowing employers to pay for security services and guards
to receive timely payments.
o Payment History and Invoices: Both employers and guards can track transaction
history, including payments made, earnings, and invoices.
o Payment Confirmation and Alerts: The system sends alerts and confirmations
to both parties once payment transactions are completed.
6. Compliance and Verification:
o Guard Verification: The system verifies guards' credentials, background checks,
and certifications before allowing them to be hired.
o Compliance Tracking: Ensures guards meet industry standards, including
licensing and insurance.
o Legal Documentation Upload: Guards can upload certificates, identification,
and other necessary legal documentation for validation.
7. Admin Panel and Reporting:
o Admin Dashboard: The platform’s administrators can manage users, monitor
system activities, and resolve disputes.
o Data Analytics and Reporting: Admins and employers can generate reports
related to guard performance, job statistics, payments, and ratings.
o System Monitoring and Management: Admins can track all activities within the
system to ensure proper functioning and resolve issues promptly.

Feasibility Study:

After doing the system study and analyzing all the existing or required functionalities of the
system, the next task is to do the feasibility study for the project. All projects are feasible - given
unlimited resources and infinite time. Feasibility study includes consideration of all the possible
ways to provide a solution to the given problem. The proposed solution should satisfy all the user
requirements and should be flexible enough so that future changes can be easily done based on
the future upcoming requirements.

A. Economical Feasibility

This is a very important aspect to be considered while developing a project. We decided the
technology based on minimum possible cost factor. All hardware and software cost has to be
borne by the organization. Overall we have estimated that the benefits the organization is going
to receive from the proposed system will surely overcome the initial costs and the later on
running cost for system.

B. Technical Feasibility

This included the study of function, performance and constraints that may affect the ability to
achieve an acceptable system. For this feasibility study, we studied complete functionality to be
provided in the system, as described in the System Requirement Specification (SRS), and
checked if everything was possible using Visual Basic 6.0 and MS Access.

C. Operational Feasibility

No doubt the proposed system is fully GUI based that is very user friendly and all inputs to be
taken all self-explanatory even to a layman. Besides, a proper training has been conducted to let
know the essence of the system to the users so that they feel comfortable with new system. As
far our study is concerned the clients are comfortable and happy as the system has cut down their
loads and doing.

LITERATURE SURVEY

HTML
HTML, which stands for Hypertext Markup Language, is the predominant markup
language for web pages. It provides a means to create structured document by denoting structural
semantic for text such as heading, paragraphs, list, links, quotes, and other items. It allows
images and objects to be embedded and can be used to create interactive forms. It is written in
the form of HTML elements consisting of “tags” surrounded by angle brackets within the web
page content. It can embed script in language such as JavaScript which affects the behaviour of
HTML WebPages. HTML can also be used to include Cascading Style Sheet(CSS) to define the
appearance and layout of text and other material. The W3C, maintainer of both HTML and CSS
standards, encourages the use of CSS over exlicit presentation markup.

Markup
HTML markup consists of several key component, including element(and attribute), character-
based data types, character reference and entity reference. Another important component is the
document type declaration, which specifies the Document Type Definition. As of HTML 5, no
Document Type Definition will need to be specified and will only determine the layout mode.
Elements
HTML document are composed entirely of HTML element that, in their most general form have
three components: a pair of element tags with a “start tag” and “end tag”; some element
attributes gives to be the element within the tags; and finally, all the actual textual and
information content that will be rendered on the display. An HTML element is everything
between and including the tags. A tags is a keyword enclosed in angle brackets.
Attributes
Most of the attributes of an element are name-value pairs, separated by “=” and written within
the start tag of an element after the element’s name. the value may be enclosed in single or
double quotes, although values consisting of certain character can be left unquoted in HTML(but
not XHTML). Leaving attribute values unquoted is considered unsafe. In contracts with name-
value pair attributes, there are some attributes that affects the element simply by their presence in
the start tag of the element(like the is map attributes for the img element). The case attributes
provides a way of classifying similar elements. This can be used for semantic or presentation
purpose. Semantically, for example, classes are used in micro forms. Presentational, for example,
an HTML document might use the designation class=”notation” to indicate that all element with
this class values are subordinates to the main text of the document. Such element might be
gathered together and presented as footnotes on page instead of appearing in the place where
they occur in the HTML source.
Data types
HTML defines several data type for element content, such as script data and style sheet data, and
a plethora of type for attributes values, including IDs, names, URIs, number, units of length,
languages, media description, colors, character encodings, dates and times, and so on. All of
these data types are specialization of character data.
Document type declaration
HTML document are required to start with a Document Type Declaration(informally,
“doctype”). In browser, the function of the doctype is to indicate the rendering mode-
particularly to avoid quirks mode.The original purpose of the doctype was to enable parsing and
validation of HTML document by SGML tools based on the Document Type Definition (DTD).
The DTD to which the DOCTYPE refers contains machine-readable grammar specifying the
permitted and prohibited content for a document conforming to such a DTD. Browser on the
other hand, does not implement HTML as an application of SGML and by consequence does not
read the DTD. HTML 5 does not define a DTD, because of the technology inherent limitation, so
in HTML 5 the doctype declaration, <!doctype html>, does not refer to a DTD.
About CSS
Cascading Style Sheet (CSS) is a style sheet language used to described the presentation
semantics (that is, the look and formatting) of a document written in a markup language. It’s
most common application is to style web pages written in HTML and XHTML, but the language
can also be applied to any kind of XML document, including SVG and XUL. CSS is
designed primarily to enable the separation of document content (written in HTML or a similar
markup language) form document presentation, including elements such as the layout, colors,
fonts, this separation can improve content accessibility, provide more flexibility and control in
the specification of presentation characteristics, enable multiple pages to share formatting, and
reduce complexity and repetition in the some markup pages to be presented in different styled for
different rendering methods, such as on-screen, in print, by voice(when read out by a speech-
based browser or screen reader) and on Braille-based, tactile devices. While the author of a
document to a CSS style sheet, reader can use a different style sheet, perhaps one on their own
computer, to override the one the author has specified.CSS specified a priority scheme to
determine which style rules apply if more than one rule matches against a particular element. In
this so-called cascade, priorities or weight are calculated and assigned to rules, so that the results
are predictable.
About PHP
What is PHP?
 Php stands for hypertext pre-processor
 PHP is a server side scripting language, like ASP
 PHP scripts are executed on the server
 PHP support many database (MYSQL, Informix, Sybase, Solid, postgreSQL,
Generic ODBC, etc)
 PHP is an open source software
 PHP free to download and use
What is PHP file ?

 PHP files can contain text, HTML tags and scripts


 PHP files are returned to the browser as plain HTML
 PHP files have extensions “.php”, “.phtml”
PHP typically used in combination with a web server like Apache, request for PHP script are
received by the web server, and handle by the PHP interpreter. The results obtained after
execution are returns top the web server, which takes care of transmitting them to client browser.
Within the PHP script itself, the sky’s the limit-your script can perform calculation, process user
input, interact with a database, read write files basically anything u can do with regular
programming language, you can do inside your PHP script. From the above, it is clear that in
order to begin using PHP, you need to have a proper development environment set up.
About MySQL
MySQL is very fast multi-threaded, multi-user and robust SQL relational database server.
MySQL is free software; it is licensed under GNU General Public Licence. It was written and
maintained by the Swedish company MySQL AB, which sells support service contracts as well
as commercially licensed copies of MySQL and employs people all over the world who
communicate over the internet.
MySQL is originally lacked support for transaction; however this feature is now available. The
full ANSI SQL standard is extended in some areas and not implement in others; probably the
most often requested feature which is not yet implemented is “Sub-SELECT” or “nested
SELECT”.
The preferred pronunciation of MySQL is “MY S-Q-L and not MY-Sequel”.
 MySQL is a database management system
 MySQL is a relational database management system
 MySQL software is open source
 The MySQL database is very fast, reliable and easy to use
 MySQL server was originally developed to handle the large database
much faster than existing solution and has been successfully used highly
demanding production environment for several years.
The MySQL database software is a client/server system that consists of multi threaded SQL
server support different backend, several clients programs and libraries and wide range of
Application Programming Interface (APIs).
PhpMyAdmin
PhpMyAdmin is a free software tool written in PHP intended to handle the administrated of
MySQL over the WOLRLD WIDE WEB. PhpMyAdmin supports a wide range of operations
with MySQL. The most frequently used operation are supported by the user interface, while you
still have the ability to execute any SQL statement.
Features of PhpMyAdmin
 Intuition web interface
 Support for most MySQL feature: browser and drop database, tables, views, fields, and
indexes, create, copy, drop, rename and alter database, tables, fields, and indexes,
maintenance server, database, and tables, with proposals on server configuration, execute,
edit and bookmark and SQL-statement, even batch-queries
 Manage MySQL user and privileges
 Manage stored procedure and triggers
 Import data from CSV and SQL
 Export data to various formate: CVS, SQL, XML, PDF, ISO/IEC 26300
 Administrating multiple severs

EXPERIMENTAL SETUP
The development of the web application was done on a system with the following hardware
profile:
 PROCESSOR : Intel Core i3.
 RAM : 4 GB DDR2 RAM
 MONITOR : 15” COLOR
 HARD DISK : 100 GB

The software packages used, as well as the languages employed in each one of them are as
follows:
 Front End : HTML, CSS, JavaScript
 Back End : MYSQL, PHP
 Operating System : Windows 10

ER Diagram:
DFD Diagram

First Level DFD


Second Level DFD

Product Perspectives:

The proposed system falls under RDBMS (Relational Data Base Management System) category.
I have adopted PHP as front end for the software and MYSQL as back end. PHP is at present one
of the most popular development platform for web based system that is efficient for web
programming. MYSQL is at present the most reliable and secure RDBMS tool. MYSQL Server
works to efficiently manage its resource, a database of information, among the multiple clients
requesting and sending data in the network. MYSQL has many important features that make it
not only an exceptional database management system but also an excellent database server
choice for client/server database computing. So the overall system will prove to reliable, secure
and efficient for the organization

Operating Environment
The proposed software is to run on client/server model network. A client/server can deliver the
better performance than the f ile server system because a client application and database server
work together to split processing load of applications (thus the term distributed processing). The
server manages the database among the number of clients, while the client send, request, and
analyze the data entry form with small specific data set, such as rows in a table not file as in the
file server system. A database server is intelligent enough so that it lock and return only the rows
a client request, which ensure concurrency, minimize the network traffic and increase the system
performance.

Assumptions and Dependencies

While cost estimation of the proposed system it has been assumed that the cost hardware and for
license of Operating System and back end will be met by client (the organization). Hence only
the cost incurred for the proposed software is included therein. The followings are identified as
some of the potential risk factors or dependencies:

(1) Non-availability of required resources.

(2) Power cuts.

(3) Slippage of schedule due to unpredictable holidays, etc.

Life Cycle Model

I am using SDLC model that begin at system level and progresses through analysis, design,
coding, testing, implementation and maintenance.

External Interface Requirements

User Interfaces – It has been required that every form’s interface should be user friendly and
simple to use. Besides, there should be facility of accessing the system through keyboard along
with the mouse i.e. keyboard shortcuts.

Software Interfaces – It has been required that there could be a necessity of using the stored
data for some kind of report that is not supported by proposed system at present. So the proposed
system is required to export its data as text file so that some other application software can
import the data.
System Future Requirement – Other than descriptions provided above, the following features
were required by the client:

(1) The system should be secured enough to rely upon.

(2) Users should not be allowed to delete/modify any records.

(3) Users should not be allowed to take financial reports.

(4) Every users report should keep the tracks of user inputting the record.

(5) System should provide facility of exporting its data in text format.

(6) System should be able to integrate with its Phase II developments.

Other Nonfunctional Requirements

Performance Requirements – As it is going to be used by all the concerned employees within


the organization, the system should have a good performance in terms of speed and accuracy.
The proposed system should be accurate and fast enough to handle huge data. It should provide
fast communication between server and clients.

Safety Requirements – As the system is going to handle records for a long run eliminating the
manual system, it is supposed to ensure the retaining of data avoiding or eliminating any
probable cause for data loss.

Security Requirements – The software should not allow unauthorized access to any module of
the system. Besides, it should maintain the privileges granted to users at various user levels.

Software Quality Attributes – The prioritization of the software quality attributes are assumed
as under: (1) Accurate and hence reliable.

(2) Secured.

(3) Fast speed.

(4) Compatibility.

(5) Portability.

System Design
In this phase, a logical system is built which fulfils the given requirements. Design phase of
software development deals with transforming the customer’s requirements into a logically
working system. Normally, design is performed in the following in the following two steps:

1) Primary Design Phase: In this phase, the system is designed at block level. The blocks are
created on the basis of analysis done in the problem identification phase. Different blocks are
created for different functions emphasis is put on minimising the information flow between
blocks. Thus, all activities which require more interaction are kept in one block.

2) Secondary Design Phase : In the secondary phase the detailed design of every block is
performed.

The general tasks involved in the design process are the following:

I. Design various blocks for overall system processes.


II. II. Design smaller, compact and workable modules in each block
III. Design various database structures.
IV. Specify details of programs to achieve desired functionality.
V. Design the form of inputs, and outputs of the system.
VI. Perform documentation of the design.
VII. System reviews.

User Interface Design

User Interface Design is concerned with the dialogue between a user and the computer. It is
concerned with everything from starting the system or logging into the system to the eventually
presentation of desired inputs and outputs. The overall flow of screens and messages is called a
dialogue

The following steps are various guidelines for User Interface Design:

1) The system user should always be aware of what to do next.

2) The screen should be formatted so that various types of information, instructions and
messages always appear in the same general display area.
3) Message, instructions or information should be displayed long enough to allow the system
user to read them.

4) Use display attributes sparingly.

5) Default values for fields and answers to be entered by the user should be specified.

6) A user should not be allowed to proceed without correcting an error.

7) The system user should never get an operating system message or fatal error

TESTING

Testing is the process in which the system is run on manually created input so that the system is
correctly working as desired or not. During systems testing, the system is used experimentally to
ensure that the software does not fail. In other words, we can say that it will run according to its
specifications and in the way users expect. Special test data are input for processing, and the
results examined. A limited number of users may be allowed to use the system so that analyst
can see whether they try to use it in unforeseen ways. It is desirable to discover any surprises
before the organization implements the system and depends on it. Testing of a system is
generally done in two phases – One is Unit Testing which is done for each module independently
on its completion and the other one is System Testing which is done at the end of a project.

VALIDATION CRITERIA

The validation criteria in this project are as follows..

All the screens have a similar look and feel. They all have the almost same color combinations in
its background. This provides a better user interface to the users.

1) The primary key values cannot be duplicated.

2) All the entries in any combo box have been sorted in alphabetical order. This helps a user
while selecting a value from the combo box.

IMPORTANCE OF TESTING

During systems testing, the system is used experimentally to ensure that the software does not
fail. In other words, we can say that it will run according to its specifications and in the way
users expect. Special test data are input for processing, and the results examined. The importance
of system testing is that the system is expected to run according to member’s requirement before
delivering it to the customer. The System is tested on the basis of specification so that it does not
fail on user site.

Implementation and Testing

Implementation Detailed Design of Implementation

This phase of the systems development life cycle refines hardware and software specifications,
establishes programming plans, trains users and implements extensive testing procedures, to
evaluate design and operating specifications and/or provide the basis for further modification.

Technical Design - This activity builds upon specifications produced during new system design,
adding detailed technical specifications and documentation.

Test Specifications and Planning - This activity prepares detailed test specifications for
individual modules and programs, job streams, subsystems, and for the system as a whole.

Programming and Testing - This activity encompasses actual development, writing, and testing
of program units or modules.

User Training - This activity encompasses writing user procedure manuals, preparation of user
training materials, conducting training programs, and testing procedures

Acceptance Test - A final procedural review to demonstrate a system and secure user approval
before a system becomes operational.

Installation Phase - In this phase the new Computerized system is installed, the conversion to
new procedures is fully implemented, and the potential of the new system is explored.

System Installation: The process of starting the actual use of a system and training user personnel
in its operation.

Review Phase - This phase evaluates the successes and failures during a systems development
project, and to measure the results of a new Computerized Transystem in terms of benefits and
savings projected at the start of the project.
Development Recap - A review of a project immediately after completion to find successes and
potential problems in future work.

Post-Implementation Review - A review, conducted after a new system has been in operation
for some time, to evaluate actual system performance against original expectations and
projections for cost-benefit improvements. Also identifies maintenance projects to enhance or
improve the system

THE STEPS IN THE SOFTWARE TESTING

The steps involved during Unit testing are as follows:

a) Preparation of the test cases.

b) Preparation of the possible test data with all the validation checks.

c) Complete code review of the module.

d) Actual testing done manually.

e) Modifications done for the errors found during testing.

f) Prepared the test result scripts.

The unit testing done included the testing of the following items:

1) Functionality of the entire module/forms.

2) Validations for user input.

3) Checking of the Coding standards to be maintained during coding.

4) Testing the module with all the possible test data.

5) Testing of the functionality involving all type of calculations etc.

6) Commenting standard in the source files. After completing the Unit testing of all the modules,
the whole system is integrated with all its dependencies in that module. While System
Integration, We integrated the modules one by one and tested the system at each step. This
helped in reduction of errors at the time of the system testing.
The steps involved during System testing are as follows:

 Integration of all the modules/forms in the system.


 Preparation of the test cases.
 Preparation of the possible test data with all the validation checks.
 Actual testing done manually.
 Recording of all the reproduced errors.
 Modifications done for the errors found during testing.
 Prepared the test result scripts after rectification of the errors.

The System Testing done included the testing of the following items:

1. Functionality of the entire system as a whole.

2. User Interface of the system.

3. Testing the dependent modules together with all the possible test data scripts.

4. Verification and Validation testing.

5. Testing the reports with all its functionality.

After the completion of system testing, the next following phase was the Acceptance Testing.
Clients at their end did this and accepted the system with appreciation. Thus, we reached the
final phase of the project delivery. There are other six tests, which fall under special category.
They are described below:

i. Peak Load Test: It determines whether the system will handle the volume of activities
that occur when the system is at the peak of its processing demand. For example, test
the system by activating all terminals at the same time.
ii. Storage Testing: It determines the capacity of the system to store transaction data on a
disk or in other files.
iii. Performance Time Testing: it determines the length of time system used by the
system to process transaction data. This test is conducted prior to implementation to
determine how long it takes to get a response to an inquiry, make a backup copy of a
file, or send a transmission and get a response.
iv. Recovery Testing: This testing determines the ability of user to recover data or re-
start system after failure. For example, load backup copy of data and resume
processing without data or integrity loss.
v. Procedure Testing: It determines the clarity of documentation on operation and uses
of system by having users do exactly what manuals request. For example, powering
down system at the end of week or responding to paper-out light on printer.

Human Factors Testing: It determines how users will use the system when processing data or
preparing reports.

CONCLUSION
The "Online Security Guard Hiring System" aims to revolutionize security services by
connecting agencies with skilled professionals through an advanced platform. Key features
include user registration, Rating and Review, Mobile Compatibility. It sets new standards,
emphasizing security and legal compliance.

References and Bibliography:

 http://www.wampserver.com/en/
 http://www.php.net/
 http://www.tutorialspoint.com/mysql/
 httpd.apache.org/docs/2.0/misc/tutorials.html

You might also like