Industrial Training Report PDF

Download as pdf or txt
Download as pdf or txt
You are on page 1of 22

CHAPTER 1

Organizational Structure of Company

 Introduction of Company :-
Company name is WhiteCode Technologies Solutions Pvt. Ltd. WhiteCode is
solution provider for Internet based and software applications. In the company there
are 35 employees are there. WhiteCode provides high quality services for software
development on a broad range of software platforms and latest technologies.

Within its years of operations, WhiteCode has carved a niche for itself in the
IT industry and has increased its business by acquiring some major international
projects. Company developed Mobile Application and Web Application. In the
Mobile Application company creates Android Apps, IOS Apps and Hybrid Apps. In
the Web Application company creates Block chain Application, E-Commerce
Application and Custom Application.

 Location :- WhiteCode Technologies Solutions Pvt. Ltd.


Office no 305, 3rd floor, Navale Icon Building, Navale Bridge,
Narhe, Pune, Maharashtra-411041

 Hierchy of Different Post In The Company :-

Managing Director (MD)

Chief Executive Officer (CEO)

Human Resource(HR)

Business Development Department Development Department

1. Business Development 1. Senior Software Developer


Executive 2. Junior Software Developer
2. Sales Executive 3. Trainee Software Developer

Testing Department 1 Accounting Department


 Responsibility of Different Posts

Post Responsibility
Chief Executive Making major corporate decisions, managing the overall
Officer(CEO) operations and resources of company. Acting as the main
point of communication between the board of directors and
corporate operations & being public face of the company.

Human Resource(HR) Hiring, training and maintaining employees. These


professionals create policies and ensure employees are
satisfied with their job.

Business Development Provide prospective clients with all services offered &
Executive(BDE) additional presentation as needed and work with clients to
create solutions for their needs.

Sales Executive Conducting market research to identify selling possibilities


and evaluate selling customer needs.

Development Department Developed product i.e. coding, design etc.

Testing Department Test code check users requirements are fulfill or not and
perform various testing method such as unit testing,
integration testing etc.

2
CHAPTER 2
Introduction of Industry

 History of Company :-
Gahanshyam Nanvare and Amit Patil started company at 06/06/2010. This
year company completed its 9 year. Company has 9 years old history. At the starting
in the company 8 to 9 employees are had worked but today in the company 35
employees are work.

 Turnover :-
90l to 1cr (Previous Year)

 Types of Product/ Services Provided By Company :-

1. Blockchain Apps :-
The blockchain is an incorruptible digital ledger of economic transactions that
can be programmed to record not just financial transactions but virtually everything
of value.
 What is Blockchain Technology?
A blockchain is, in the simplest of terms, a time-stamped series of
immutable record of data that is managed by cluster of computers not owned
by any single entity. Each of these blocks of data (i.e. block) are secured and
bound to each other using cryptographic principles (i.e. chain).
By allowing digital information to be distributed but not copied,
blockchain technology created the backbone of a new type of internet.
Originally devised for the digital currency, Bitcoin, (Buy Bitcoin) the tech
community has now found other potential uses for the technology.
 Company worked on following blockchain applications. :-
A. An application to buy/sell and perform various operations on non-
fungible tokens built using ERC 721 in the form of cupids to
express love and commitment over as Ethereum Blockchain.
B. ICO application to generate an ethereum and bitcoin address along
with a dashboard to display various currency balance amount.

2. Mobile Apps :-
 What is Mobile Apps?
A mobile app is a software application developed specifically for use
on small, wireless computing devices, such as smartphones and tablets, rather
than desktop or laptop computers.

 Some Mobile Apps Developed By Company :-


I. Mobile Library :-
https://play.google.com/store/apps/details?id=com.whitecode.mobilelibrary
II. Balak Palak :-
https://play.google.com/store/apps/details?id=com.whitevertical.balakpalak

3
Infinity Street Dog Squad

Mobile Library Balak Palak

4
3. E-Commerce Apps :-
 What is E-Commerce Apps?
Ecommerce enables you to buy and sell products on a global
scale, twenty-four hours a day without incurring the same overheads as
you would with running a brick and mortar store. For the best
marketing mix and the best conversion rate, an Ecommerce venture
should also have a physical presence; this is better known as a click
and mortar store.
 Some E-Commerce Apps Developed By Company :-

Link :- http://infinitycivilacademy.com/

5
4. Custom Apps :-
 What is Custom Apps?
Custom software development is the designing of software applications
for a specific user or group of users within an organization. Such software is
designed to address their needs precisely as opposed to the more traditional
and widespread off-the-shelf software. Such software is typically created just
for that specific entity by a third-party by contract or in-house group of
developers and is not packaged for reselling.

 Some Custom Apps Developed By Company :-

6
Link: - http://www.justrightcinema.com/

7
CHAPTER 3
Types of Equipment Used In Industry

 Machines Used in the Company :-


1. Apple MacBook: - There are 4 MacBook in Company.
 Configuration:-
Processor 1.6GHz dual-core Intel Core i5, Turbo Boost up to 3.6GHz, with 4MB L3
cache
Storage 128GB PCIe-based SSD
Memory 8GB of 2133MHz LPDDR3 on-board memory
Graphics Intel UHD Graphics 617
Wireless 802.11ac Wi-Fi wireless networking; IEEE 802.11a/b/g/n compatible
Bluetooth 4.2 wireless technology
Price Rs. 1, 00,000(per)

2. Dell Desktop: - There are 13 Dell Computers in the company.


 Configuration:-
Operating System Ubuntu
Processor Intel Core i5
Storage 500GB HDD
Memory 8GB RAM
Price Rs. 40,000(per)

3. Server Racks :-
Price Rs. 2,500

8
4. Switch :-
Processor Count 1
Wireless Type 802.11ac
Wattage 384
Price Rs. 30,000

5. Ethernet Cables :-
Max Transmission Speed 1000MBS/1GBPS
Max Bandwidth >250MHz
Price Rs. 3,500( 305 M)

6. Router :-
Speed 300Mbps
Price Rs. 1,000

9
7. Printer :-
Paper Size A3, A4
Price Rs. 10,000

10
CHAPTER 4
Manufacturing Process

In the company to design and developed software SDLC process will follow.
Software Development Life Cycle (SDLC) is a process used by the software industry to
design, develop and test high quality software. The SDLC aims to produce a high-quality
software that meets or exceeds customer expectations, reaches completion within times and
cost estimates.

 SDLC is the acronym of Software Development Life Cycle.

 It is also called as Software Development Process.

 SDLC is a framework defining tasks performed at each step in the software


development process.

 ISO/IEC 12207 is an international standard for software life-cycle processes. It aims


to be the standard that defines all the tasks required for developing and maintaining
software.

What is SDLC?
SDLC is a process followed for a software project, within a software organization. It
consists of a detailed plan describing how to develop, maintain, replace and alter or enhance
specific software. The life cycle defines a methodology for improving the quality of
software and the overall development process.
The following figure is a graphical representation of the various stages of a typical
SDLC. :-

11
In The Company Iterative Model is Used to developed software.

Iterative Model

Iterative process starts with a simple implementation of a subset of the software


requirements and iteratively enhances the evolving versions until the full system is
implemented. At each iteration, design modifications are made and new functional
capabilities are added. The basic idea behind this method is to develop a system through
repeated cycles (iterative) and in smaller portions at a time (incremental).

The following illustration is a representation of the Iterative and Incremental model −

Iterative and Incremental development is a combination of both iterative design or


iterative method and incremental build model for development. "During software
development, more than one iteration of the software development cycle may be in progress
at the same time." This process may be described as an "evolutionary acquisition" or
"incremental build" approach."

In this incremental model, the whole requirement is divided into various builds.
During each iteration, the development module goes through the requirements, design,
implementation and testing phases. Each subsequent release of the module adds function to
the previous release. The process continues till the complete system is ready as per the
requirement.

The key to a successful use of an iterative software development lifecycle is


rigorous validation of requirements, and verification & testing of each version of the
software against those requirements within each cycle of the model. As the software evolves
through successive cycles, tests must be repeated and extended to verify each version of the
software.

12
Iterative Model - Application

Like other SDLC models, Iterative and incremental development has some specific
applications in the software industry. This model is most often used in the following
scenarios −

 Requirements of the complete system are clearly defined and understood.


 Major requirements must be defined; however, some functionalities or requested
enhancements may evolve with time.
 There is a time to the market constraint.
 A new technology is being used and is being learnt by the development team while
working on the project.
 Resources with needed skill sets are not available and are planned to be used on
contract basis for specific iterations.
 There are some high-risk features and goals which may change in the future.

13
CHAPTER 5
Testing Tools Used in Company

In the company testing is done by manually.


 Types of testing
 Manual Testing
Manual testing includes testing a software manually, i.e., without using
any automated tool or any script. In this type, the tester takes over the role of
an end-user and tests the software to identify any unexpected behavior or bug.
There are different stages for manual testing such as unit testing, integration
testing, system testing, and user acceptance testing.
Testers use test plans, test cases, or test scenarios to test a software to
ensure the completeness of testing. Manual testing also includes exploratory
testing, as testers explore the software to identify errors in it.
 Automation Testing
Automation testing, which is also known as Test Automation, is when
the tester writes scripts and uses another software to test the product. This
process involves automation of a manual process. Automation Testing is used
to re-run the test scenarios that were performed manually, quickly, and
repeatedly.
Apart from regression testing, automation testing is also used to test the
application from load, performance, and stress point of view. It increases the
test coverage, improves accuracy, and saves time and money in comparison to
manual testing.

 Methods of Testing
 Black-Box Testing
The technique of testing without having any knowledge of the interior
workings of the application is called black-box testing. The tester is oblivious
to the system architecture and does not have access to the source code.
Typically, while performing a black-box test, a tester will interact with the
system's user interface by providing inputs and examining outputs without
knowing how and where the inputs are worked upon.

 White-Box Testing
White-box testing is the detailed investigation of internal logic and
structure of the code. White-box testing is also called glass testing or open-box
testing. In order to perform white-box testing on an application, a tester needs
to know the internal workings of the code.
The tester needs to have a look inside the source code and find out
which unit/chunk of the code is behaving inappropriately.

14
 Grey-Box Testing
Grey-box testing is a technique to test the application with having a
limited knowledge of the internal workings of an application. In software
testing, the phrase the more you know, the better carries a lot of weight while
testing an application.
Mastering the domain of a system always gives the tester an edge over
someone with limited domain knowledge. Unlike black-box testing, where the
tester only tests the application's user interface; in grey-box testing, the tester
has access to design documents and the database. Having this knowledge, a
tester can prepare better test data and test scenarios while making a test plan.

 Levels of Testing

1. Unit Testing
This type of testing is performed by developers before the setup is
handed over to the testing team to formally execute the test cases. Unit testing
is performed by the respective developers on the individual units of source
code assigned areas. The developers use test data that is different from the test
data of the quality assurance team.
The goal of unit testing is to isolate each part of the program and show
that individual parts are correct in terms of requirements and functionality.

2. Integration Testing
Integration testing is defined as the testing of combined parts of an
application to determine if they function correctly. Integration testing can be
done in two ways: Bottom-up integration testing and Top-down integration
testing.

3. System Testing
System testing tests the system as a whole. Once all the components are
integrated, the application as a whole is tested rigorously to see that it meets
the specified Quality Standards. This type of testing is performed by a
specialized testing team.

4. Regression Testing
Whenever a change in a software application is made, it is quite possible
that other areas within the application have been affected by this change.
Regression testing is performed to verify that a fixed bug hasn't resulted in
another functionality or business rule violation. The intent of regression testing is
to ensure that a change, such as a bug fix should not result in another fault being
uncovered in the application.

15
5. Acceptance Testing
This is arguably the most important type of testing, as it is conducted by
the Quality Assurance Team who will gauge whether the application meets the
intended specifications and satisfies the client’s requirement. The QA team
will have a set of pre-written scenarios and test cases that will be used to test
the application.
By performing acceptance tests on an application, the testing team will
reduce how the application will perform in production. There are also legal
and contractual requirements for acceptance of the system.

6. Alpha Testing
This test is the first stage of testing and will be performed amongst the
teams (developer and QA teams). Unit testing, integration testing and system
testing when combined together is known as alpha testing. During this phase,
the following aspects will be tested in the application −
 Spelling Mistakes
 Broken Links
 Cloudy Directions
 The Application will be tested on machines with the lowest
specification to test loading times and any latency problems.

16
CHAPTER 6

Safety Procedures
 Safety Equipment:-
1. Firewall:-
A firewall is a system designed to prevent unauthorized access to or from
a private network. You can implement a firewall in either hardware or
software form, or a combination of both. Firewalls prevent
unauthorized internetusers from accessing private networks connected to the
internet, especially intranets. All messages entering or leaving the intranet (the
local network to which you are connected) must pass through the firewall,
which examines each message and blocks those that do not meet the specified
security criteria.

2. Antivirus:-
Antivirus software was originally developed to detect and remove computer
viruses, hence the name. However, with the proliferation of other kinds
of malware, antivirus software started to provide protection from other computer
threats.In particular, modern antivirus software can protect users from:
malicious browser,ransomware, keyloggers, backdoors, rootkits, trojan
horses, worms,malicious LSPs, dialers, fraudtools, adware and spyware. Some
products also include protection from other computer threats, such as infected and
malicious URLs, spam, scam and phishing attacks.

17
CHAPTER 7

Practical Experiences In Industry

My internship at the WhiteCode Technologies Solutions Pvt. Ltd. started in 15-May-


2019 and lasts for a six week. In the WhiteCode, Development Department, I was expected
to apply my knowledge of Android Studio to solve problems, make corrections, and
compose maps based on the project I was assigned. My supervisor would brief me with a
project that was being worked on and assign me to a specific task, from there I would work
on it until completion. Project durations ranged from an hour, to a few days, to even over the
course of a month.

How did this prepare you for next professional endeavor?

This experience is preparing me in a number of ways from office etiquette, to


working with deadlines, to gaining knowledge from hands on training. I have learned how to
deal with client, who oversees what, and how to network with the different departments I've
been exposed to. In the future I will be well prepared to embrace deadlines and make sure
that I'm applying myself in the best manner to complete the project. Lastly, the most valuable
experience has been the hands on work I've been exposed to. I've been able to able the
information learned in university courses to real life problems and truly understand the
programs and tools that aid in the professional world.

18
CHAPTER 8

Description of The Project


 Introduction of Project
This project is related to mobile number verification. This is not complete
project this just one module or one function in application.In this project we have to
enter a mobile number, after entering complete mobile number set otp button will
enable. After click on send otp button otp will send on given mobile number. In this
project not required to enter otp manually, after otp received application will
automatically read otp from inbox and fill into otp textbox. This module is used in
many of applications today’s.

 Tools & Technology Used


To developed this application we need Android Studio.

1. Android:-
Android is basically an operating system for smartphones. We can now find
Android on PDAs, touch pads, televisions, cars and netbooks. The OS was created by
the start-up of the same name, which is owned by Google since 2005.
At the moment Traxivity is only made for Android and Android Wear system. So
we have used Android Studio to code for these two systems. Android Studio is the
officially integrated development environment for the Android platform based on
JetBrains IntelliJ IDEA who is one of the best software to code in Java.
To do some tests we have used our Android phone or some emulator and the
University have lent us two types of smartwatches like Sony SmartWatch 3 on
Android Wear and Huawei Watch on Android Wear 2.
Probably in the next years, an iOS application will be available with Apple Watch.
So all users on the most used mobile operating system will be able to use this
application.

2. Android Studio:-

Android Studio is the official IDE for android application development. It works
based on IntelliJ IDEA, If you are new to installing Android Studio on windows, you
will find a file, which is named as android-studio-bundle-143.3101438-

19
windows.exe.So just download and run on windows machine according to android
studio wizard guideline.
If you are installing Android Studio on Mac or Linux, You can download the
latest version from Android Studio Mac Download, or Android Studio Linux
Download, check the instructions provided along with the downloaded file for Mac
OS and Linux. This tutorial will consider that you are going to setup your
environment on Windows machine having Windows 8.1 operating system.

 Module Used in Project


 MainActivity.java
In the MainActivity.java file main code is written i.e. button listener code,
intended activity code and also API also write for get response from HTTP
web pages these API written using volley library.

 activity_main.xml
In the activity_main.xml file all design code will written and required
components are added such buttons, edittext, different Layout, image button
etc.

 activity_main_keyboard.xml
In this file I made own keyboard for project, it means in this project I am
not using system keyboard.

 Result(Snapshot):-

20
 Conclusion:-
After creating this project we study about layout, buttons, how to create
background in various design, how to perform some action after click on button ,
how to get permission from user for our application and most important how to used
volley library in android application for send request to http API and get response
from http API

21
CONCLUSION

This internship was for me a first professional experience in the world of computer
science. In a nutshell, this internship was an excellent and rewarding experience. I was able to
meet and network with many people. I learned that I needed to be organized and have
questions ready to get feedback.
This internship offered me opportunities to learn and develop in many areas and I
gained a lot of experience in Android development and in database development notably by
learning a new and innovative database with a strong evolution in the professional field.
Thanks to this exchange I took part of the amazing Erasmus life, I improve my
English as a result of meeting a lot of people from around the world.
Finally, this internship allowed me, autonomously, to acquire skills in design and
architecture application. This is a new exercise for me: the fact that my code will be taken up
by other developers made me more rigorous and more attentive about the application design
requirements.

22

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy