Internship Report Sample
Internship Report Sample
By:
Sarthak Pachauri (171308)
Candidate’s Declaration
I hereby declare that the work presented in this report entitled “Internship
Report” in partial fulfilment of the requirements for the award of the degree of
Bachelor of Science in Artificial Intelligence and Data Analytics submitted in the
department of Computer Application, Hindustan Institute of Technology and
Science, Padur is an authentic record of my own work carried out over a period
from March 2021 to May 2021 under the supervision of Mr.Surjeet
Singh(JUIT) and Mr. Abhijit Joshi (Trainer at Cognizant).
The matter embodied in the report has not been submitted for the award of any
other degree or diploma.
This is to verify that the above statement made by the candidate is true to the
best of my knowledge.
Signature
Class Teacher Name Company Tariner/Incharge Name
Correct designation Company Name
2
ACKNOWLEDGEMENT
I wish to express my sincere gratitude to Mr. Abhijit Joshi, Trainer at Cognizant for
constantly monitoring and guiding us to the right path in terms of the various skills we
learned during these weeks. He constantly helped us in our research and the learning
wouldn’t be possible without his constant support. I would like to record my sincere
appreciation and gratitude towards all the officials and employees of cognizant, without
whose kind assistance, my internship program would not have succeeded. The facts and other
vital information provided by them have contributed towards making this report as
comprehensive as possible. I am indeed, thankful to them. I would also like to express my
gratitude to my college project supervisor Mr. Surjeet Singh for his valuable guidance and
help in completing this project report.
3
TABLE OF CONTENT (For the Course)
CHAPTER-1: ORGANIZATION.......................................................................................(7)
Background...................................................................................................(7)
Approval Letter..............................................................................................(9)
Course Completion Certificate
Evaluation of the course (Quiz/ Test mark)
CHAPTER-4: CONCLUSION............................................................................................(46)
Conclusion...................................................................................................(46)
4
TABLE OF CONTENT (For the Project)
CHAPTER-1: ORGANIZATION.......................................................................................(7)
Background...................................................................................................(7)
Approval Letter..............................................................................................(9)
Project Completion Certificate
Evaluation of the course (Quiz/ Test mark)
CHAPTER-4: CONCLUSION............................................................................................(46)
Conclusion...................................................................................................(46)
5
CHAPTER-1: ORGANIZATION
(1.1) Background
Cognizant offers various role in the company like develop, Designer, Tester and
Manager in the company, but, before becoming an associate every person should
complete the internship period and after the intern period there is one year of
probation period in the company.
The internship period varies and depends on the roles, which the intern gets, like
someone who got developer profile, for them internship period will be of around 4-5
months and for the quality insurance, it might vary from 5-6 month. The domain
allocation is random in the cognizant for the interns, but sometime it depends on the
assimilation test also, the person who got higher marks in assimilation test, will have
higher chances to get better profile or domain and it also depends on the first come
first serve basis.
(1.2) Mission
The only objective of Cognizant is to work with customers to strengthen organisations
via technology and process innovation, deep industry experience, and a global
resources.
(1.3) Vision
Cognizant Company's vision statement, which describes the company's long-term
strategy, identifies the many developing demands of the market, different consumer
habits, and current market conditions that will try to push the information economy.
6
(1.4) Values
Company values are as follows:
1. First and foremost, people are important to a company's success. When we
respect everyone, we interact with, we will make and keep strong connections
with our customers, coworkers, referral sources, suppliers, and the community.
2. Goal is to generate long-term customer loyalty by establishing trust,
trustworthiness, and honesty in our work and providing customers with
impartial advice.
3. Holding committed to principles of excellence, honesty, respect, fairness, and
professionalism at all times throughout our organisation.
(1.5) Objectives
7
CHAPTER-2: PROGRAM STRUCTURE
STAGE-1
QEA BASICS
Assessment:
8
(2.2) Functional Testing
Week-1
(2.2.1) Testing
A test is a method of determining whether or not a system or a component meets the defined
criteria. Verifying is doing a system run to find any deficiencies or mistakes in contradiction
to the specifications. Testing may be characterised as it is performed in multiple formats
across SDLC:
1. Analysis and verifying of criteria also are considered testing during the requirement
collection process.
2. In design review, you look at the design to try to enhance it.
9
Testing should strive to accomplish the following three basic goals: verification and validation.
1. Manual Testing- In manual testing, you do manual testing, which means you
use no automated tool or script. This form of test is done by the tester
becoming an end-user and executing the programme to search for any
unexpected or critical behaviour.
2. Automation Testing- Automation testing, often known as test automation, is a
method through which a tester utilises scripts and other tools to perform a
variety of tests on a product.
11
(2.2.4) Testing methods
12
FIG-7: Traditional Vs Agile SDLC
Test Case-A test case would be a collection of variables or situations that an engineer
will use to find out if a product under test is accurate and conforms to specifications.
One must include a wide range of fields in a test case.-
13
FIG-8: Test Case Template
Fundamentals Week-2
14
(2.3.2) JVM
A JVM is a run-time engine that can execute Java programmes. The JVM, the Java
Virtual Machine, initiates the call to the main function inside the Java code. JVM is a
component of the JRE (Java Runtime Environment). In contrast to Perl, Java
applications are known as (WORA-Write Once Run Anywhere). When this is said, it
implies that programmers may build Java source code on one machine and have
confidence that it will operate on any other Java-capable machine without any
modification. Due to the existence of the JVM, this is all feasible.
FIG-9: JVM
Java Runtime Environment (JRE) is another name for Java RTE. The Java Runtime
Environment (JRE) includes the Java Virtual Machine (JVM), core classes, and auxiliary
files, which provide the necessary for running a Java application.
15
(2.3.3) Java Identifiers
int a = 20;
Within the java code shown above, we have five distinct identifiers:
a: variable name.
1. Primitive Data Type: such as Boolean, char, int, short, byte, long, float, and double
2. Non-Primitive Data Type or Object Data type: such as String, Array, etc.
Primitive Data Types
16
Table-1: Primitive Data Types
Non-Primitive Data Type or Reference Data Types- Because the reference data types
wouldn’t keep a variable value immediately in memory, any reference data types will
now have a memory address that refers to the variable value. They are strings, objects,
arrays, etc.
17
(2.3.5) Variables
A variable is indeed a memory region with a name. A storage unit is one of the
fundamental building blocks of a programme. Variables have the ability to modify
their value while a programme is running.
FIG-11: Variable
Assigning a data from one data type to the other may not be possible. To facilitate
automated type conversion, Java can automatically convert the data types for you if
they are equivalent. Otherwise, you must manually convert or cast the values
(2.3.7) Loops
While loop: A while loop would be a control flow expression that repeats code
depending on a Boolean condition that holds true.
18
For Loop: The for loop is an easy method to represent the structure of a loop. On a for
loop, you may have just one initialization, one condition, and one increment or
decrement statement in one line, which is helpful when you are trying to analyse the
structure of your loops.
FIG-15: if-else
19
2. Nested-if: The if expression that would be the subject of someone else if or else is
known as a nested if. If statements may be nested, therefore if statements may be nested as
well.
statements.
4. Jump- break, continue, and return are all supported by Java's jump statement. Control is
transferred to other parts of the programme in these three phrases.
20
inside a loop.
21
Continue-If forcing an initial execution of a loop may be helpful, do so. In other
words, when you execute the for loop in this instance, you should continue executing
the loop, but not process the rest of the script in the loop body this time around.
Return-With the return statement, you may specify that a method should exit. For
instance, if a method causes a control process to transferring back to the caller, it
means the method will cause the called method to return.
In addition to the static variables described above, there are also static class variables
which are shared by all the objects of either the class and which may be accessed
using the class name.
Class-A class is a blueprint or template for creating things from which users derive
user-defined capabilities. All things of one type have the same attributes or methods.
Class declarations may comprise the following elements in this order::
1. Modifiers
2. Class name
3. Superclass (if any)
4. Interfaces (if any)
5. Body: The class body surrounded by braces, { }.
Objects are fundamental in object-oriented programming because they
correspond to physical things in the actual world. Let's use an example: A
shopping system that utilises the internet may feature such terms as "shopping
cart", "customer", and "product".
22
FIG-18: Class and Objects
Class, function Object() { [native code] }, variable, function, and data member scope
may be restricted using Java's access modifiers. Four different kinds of access
modifiers, with the suffix "Default", "Private", "Protected", and "Public" are
available in Java.
(2.3.13) Packages
Classes, sub packages, and interfaces may be safely and accurately packed within
Java packages.
(2.3.14) Inheritance
The way in which one class may inherit the characteristics (fields and methods) with
another class is found in Java's implementation of a class inheritance.
23
Types of Inheritance in Java:
1. Single Inheritance
2. Multilevel Inheritance
3. Hierarchical Inheritance
4. Multiple Inheritance (Through Interfaces)
5. Hybrid Inheritance (Through Interfaces)
(2.3.15) Constructors
(2.3.16) Interfaces
24
(2.3.17) Abstraction
Data Abstraction is indeed the feature that gives you the ability to present just the
necessary information to the user. Unimportant or unimportant factors are not made
apparent to the user. When looking at cars, people see them as vehicles rather than
separate components.
An abstract class is created having the abstract keyword defined inside it.
(2.3.18) Encapsulation
To encapsulate data is to enclose it inside a single unit. The means through which
code and data are connected is the mechanism. Another benefit of encapsulation is
1. Data hiding.
2. It enhances flexibility.
3. Reuse
4. The testing of code is simple.
At the moment the call happens, Java uses the property of the object being referenced
to to decide which version (superclass/subclasses) of that function is to be performed.
Thus, runtime polymorphism is the process by which a decision is made at runtime
and this occurrence is termed runtime polymorphism.
Overloading in Java
Some methods have almost the same identity, but have various signatures, based on
number of input arguments, whether the input parameters are of a certain type, or
both.
Overriding in Java
25
Week-3
(2.3.20) Collections
The collection of a items is made up of any set of independent things that are
displayed as a singular body. The “Collection Framework” is an additional
framework in Java that houses all of the collection classes & their associated
interfaces in Java SE 1.2.
(2.3.21) Iterators
In the Collection Framework in Java, iterators are used to obtain items one at a time.
Three iterators are involved.
1. Enumeration-To be able to get the items of older collections (Vector, Hash Table),
one must utilise an enumeration.
2. Iterator- it may be applied to any Collection object; it is universal since it can be used
with iterators. Because we use the Iterator, we can both read and delete data using it.
3. ListIterator-It can only be used on collection types like ArrayList, LinkedList, and
the like that implement List.
(2.3.22) ArrayList
Arrays may be found in the java.util package, which belongs to the collection
framework. It is Java's dynamic array.
(2.3.23) HashMap
(2.3.24) Sets
1. HashSet
26
2. Enum Set
27
(2.3.25) Exception Handling
Java's java.io package provides you with practically every I/O class you'll need to use
in Java. The source and destination of these many streams represents an input and an
output. In the java.io package, you may use streams to store many kinds of data,
including simple values, objects, localised characters, and more.
An Output Stream is needed to output data to a location. The 8-bit bytes that are read
and written using Java bytes streams are utilised for input and output. A stream may
be described as a succession of data that you may read and write. Input Stream: Used
to read from an origin and to read from a destination.
Week-4
(2.3.27) JDBC
It is known as Java Database Connectivity (JDBC) in Java. JDBC is really a Java API that
allows you to establish a connection and run a query on a database. The ability to use
JavaSE is an element of the Java SE platform (Java Standard Edition). The JDBC API
connects to the database via JDBC drivers. The four driver types are
28
FIG-20: JDBC Architecture
We may use JDBC APIs to connect to any relational database and get tabular data
contained in it. The JDBC API enables us to save, retrieve, update, and remove
information from the database. It is similar to the functionality given by Microsoft's
ODBC.
Week-5
(2.4.1) HTML
30
Table-3: Input and Form Tags
31
FIG-22: Sample of HTML code
(2.4.2) XML
Like HTML, but without specified tags to utilise, XML is a mark - up language that is
quite similar to HTML. You, however, establish your own tags with your unique
requirements in mind.
32
FIG-23: Basic XML Document
Table-5: Entities
(2.4.3) JSON
JSON is a common text-based format used to express structured data whose format is
defined using JavaScript object syntax. It is often used in online applications for
conveying data.
33
FIG-24: JSON Sample
Week-6
(2.4.4) JavaScript
34
Table-6: Data Types
35
Week-7
(2.4.5) CSS
In short, CSS is the programming that is used to style online content. The design of
HTML is not a language of programming, as with CSS. You aren't using HTML
either. Cascading Style Sheets (CSS) is a style sheet language. CSS is what you are
using to style HTML elements based on their specific elements.
FIG-26: CSS
36
Use of CSS is for web pages, and among other things, it incorporates design, layout,
and various display preferences and standards for different screen sizes.
FIG-27:CSS Sample
(2.4.6) Bootstrap
37
FIG-29: Bootstrap Sample
38
Week-8
(2.4.7) SQL
1. Statements and questions are made up of clauses, which are also constituents. This is
(in some circumstances) optional.
2. In addition to expressions, which may return scalar numbers or tables made up of rows
and columns of data, you may use expressions which yield more complex results.
3. Predicates, which define criteria that may be examined in SQL to determine whether
the logic evaluates to 3VL (true/false/unknown) or Boolean truth values, and that are
used to limit the impact of statements and queries, or to steer the course of execution.
4. A query is a tool used to search for data that you want, depending on certain
parameters. In terms of SQL, this is a critical factor.
5. Persistent statements, which might regulate transactions, programme flow,
connections, sessions, or diagnostics, or alter schemata and data.
The restrictions that are applied to the values of particular columns are called column
constraints.
1. Using the PRIMARY KEY constraint allows you to identify a single row.
2. UNIQUE columns include values that are unique to each row.
3. Only columns with a value are required to be of type NOT NULL.
4. The DEFAULT column will have a default value if no value is supplied when it is
created.
A new table is created in a database when you issue the command "CREATE
TABLE". Incorporating this feature enables one to identify and label the table and
each column inside it.
39
FIG-30: Create Table
Inserting new records (rows) into tables is done using the INSERT INTO command.
In other words, it has two distinct states:
To alter all columns of an existing table, use the ALTER TABLE statement. It is often
used in combination with the Create COLUMN clause to introduce a new column.
To remove records (rows) in such a table, use the DELETE command. In this example,
the WHERE clause is used to determine which record(s) should be destroyed. All
records will be erased if the WHERE clause is removed.
40
FIG-33: Delete Statement
(2.4.9) Queries
A SELECT query including the keyword SELECT* retrieves all columns from the
table referenced in the result set. This query will return all of the movies' columns and
records (rows).
Where is used to restrict the number of rows (records) that meet a certain criterion.
Every records in which the pub year is 2017 will be returned by the query.
You may use the BETWEEN operator to restrict your search to a certain range of
values. Text, integers, or date data may be in the range of values. Any movie released
between 1980 and 1990 will be found in the search results.
You may use the ORDER BY clause to sort the result set in alphabetical or numerical
order. Ordered in two ways: It may be ordered in two ways:
1. One may sort the results in decreasing order by using the keyword DESC.
2. ASC is a keyword used to sort the results in the order of increasing value
(default)
41
FIG-37: Order By
You may use the AND operator to evaluate several criteria. A result set may only
comprise records that meet both requirements connected by AND. This query will
return results for any blue vehicle that was manufactured after 2014.
Multiple criteria may be merged using the OR operator. Records containing either
the AND or the OR in their search criteria are recorded in the returned result set.
FIG-39: OR Operator
Grouping entries in a sequence database by similar value over one or even more
columns using the GROUP BY clause. When used with aggregate functions, it is
often it is often used to get data about entries that are comparable.
42
The HAVING clause is being used to offer additional filter groups to the result set
produced by the GROUP BY clause. When using aggregate functions in conjunction
with aggregate functions, you may filter result sets depending on to an aggregate
property.
Aggregate functions calculate a number on a group of values and return one number:
1. COUNT()
2. SUM()
3. MAX()
4. MIN()
5. AVG()
Every record in a SQL database has a unique primary key field, since that field is used
to identify each record. A main key must be populated..
FIG-42: Primary
The foreign key is indeed a reference from one table's records to the table that
contains. Foreign key functionality is crucial to retain numerous records for a given
row.
43
FIG-43: Foreign key
UNION is used to collect data from numerous SELECT queries and eliminate duplicates.
FIG-44: Union
A CROSS-JOIN clause has been used to connect each row through one table to each row
from another, and to do so, these clauses include specific rules that govern the contents of
each result set row
Using an ON clause, results from even more than one tables may be combined to provide
results based on their common column values.
FIG-46: ON Clause
44
Though the join requirement is not satisfied, rows from distinct tables are combined even if
the join expression has been specified. The left join retrieves every row in the left table, but
only if the join condition is fulfilled, which is why NULL values are used to fill in the fields
from the right table
FIG-47: Join
The WITH clause stores the result of a query in a temporary table (temporary movies) using
an alias. Multiple temporary tables can be defined with one instance of the WITH keyword.
45
CHAPTER-3: PERFORMANCE ANALYSIS
JavaScript CC 100/100
46
CHAPTER-4: CONCLUSION
My internship with cognizant will finish on August 16, 2021, however over these eight
weeks, I have increased my expertise in many technologies.
I'd want to thank all the coaches, SMEs, mentors, and trainers that assisted me throughout
my internship at Cognizant. They helped me when I was having problems, and were there
to handle all of my questions. My trainer, in particular, put in additional effort and served
as an intern while working to pass on all of our inquiries to the corporation's higher
authorities, including any queries about scheduling or workload.
My gratitude always go to TNP Officer Mr. Pankaj Kumar and Dr. Nafis U Khan, who
went above and beyond to support and help with the whole placement effort.
47
REFERENCES
[3] www.udemy.com
[4] www.geeks4geeks.com
[5] www.tutorialspoint.com
48
final project report
ORIGINALITY REPORT
1 %
SIMILARITY INDEX
13% 2% 12%
7
INTERNET SOURCES PUBLICATIONS STUDENT PAPERS
PRIMARY SOURCES
1
Submitted to Jaypee University of
Information Technology 2
Student Paper %
2
Submitted to Sogang University
Student Paper 2%
3
www.geeksforgeeks.org
Internet Source 2%
4
www.codecademy.com
Internet Source 2%
5
www.ir.juit.ac.in:8080
Internet Source 1%
6
www.nishorgo.org
Internet Source 1%
7
tutorialspoint.dev
Internet Source 1%
8
www.slideshare.n
et 1
%
9
www.scribd.co
m
1
10 en.wikipedia.org
Internet Source Submi
tted
Submitted to University of Wales to
11
Swansea Middl
Student Paper esex
12
Unive
Submitted to Central Queensland rsity
Student
University Paper
Student Paper
13
18 novatechsol.com
Internet Source
19
www.metaglossary.c
om <1
%
20
navinwbackup.blogspot.c
om
<1
< <1%
1
% <1%
<
1 <1%
%
< <1%
1
%
<
1
%
<
1
%
19
www.metaglossary.c
om <1
%
20
navinwbackup.blogspot.c
om
<1
www.
21 www.answers.com
Internet Source cours
ehero
.com
22 www.onlinetutorial.co.in Internet
Internet Source Source
23 data-flair.training
Internet Source
24 www.educba.com
Internet Source
26
codenza.app
Internet Source
27
github.com
Internet Source
28
text.123doc.org
Internet Source
29
tutorials.ducatindia.com
Internet Source
30
31
www.svecw.edu
.in <1
%
32
www.vsbec.co
m
<1
< <1%
1
% <1%
< <1%
1
% <1%
<
<1%
1
%
<
1
%
<
1
%
31
www.svecw.edu
.in <1
%
32
www.vsbec.co
m
<1
JAYPEE UNIVERSITY OF INFORMATION TECHNOLOGY, WAKNAGHAT
PLAGIARISM VERIFICATION REPORT
Date: 17-06-2021
Type of Document (Tick): PhD Thesis M.Tech Dissertation/ Report B.Tech Project Report Paper
UNDERTAKING
I undertake that I am aware of the plagiarism related norms/ regulations, if I found guilty of any plagiarism and
copyright violations in the above thesis/report even after award of degree, the University reserves the rights to
withdraw/revoke my degree/report. Kindly allow me to avail Plagiarism verification report for the document
mentioned above.
Total No. of Pages =51
Total No. of Preliminary pages =7
Total No. of pages accommodate bibliography/references =1
(Signature of Student)
FOR DEPARTMENT USE
We have checked the thesis/report as per norms and found Similarity Index at 17 (%). Therefore, we are
forwarding the complete thesis/report for final plagiarism check. The plagiarism verification report may be
handed over to the candidate.
Word Counts
All Preliminary
Pages
Bibliography/ Character Counts
Report Generated on
Images/Quotes
Submission ID Page counts
14 Words String
File Size
Checked by
Name & Signature Librarian
..……………………………………………………………………………………………………………………………………………………………………………
Please send your complete Thesis/Report in (PDF) & DOC (Word File) through your Supervisor/Guide at
[email protected]
ORIGINALITY REPORT
1 %
SIMILARITY INDEX
9%
INTERNET SOURCES
3%
PUBLICATIONS
6%
7
STUDENT PAPERS
PRIMARY SOURCES
github.com
4 Internet Source 1%
5
Satish Kumar Satti, K. Suganya Devi,
Prasenjit Dhar, P. Srinivasan. "A
1
%
machine learning approach for
detecting and tracking road boundary
lanes", ICT Express, 2020
Publication
6
www.thushv.com
Internet Source 1%
7
www.coursehero.com
Internet Source 1%
JAYPEE UNIVERSITY OF INFORMATION TECHNOLOGY, WAKNAGHAT
PLAGIARISM VERIFICATION REPORT
Date: 17-06-2021
Type of Document (Tick): PhD Thesis M.Tech Dissertation/ Report B.Tech Project Report Paper
UNDERTAKING
I undertake that I am aware of the plagiarism related norms/ regulations, if I found guilty of any plagiarism and
copyright violations in the above thesis/report even after award of degree, the University reserves the rights to
withdraw/revoke my degree/report. Kindly allow me to avail Plagiarism verification report for the document
mentioned above.
Total No. of Pages =51
Total No. of Preliminary pages =7
Total No. of pages accommodate bibliography/references =1
(Signature of Student)
FOR DEPARTMENT USE
We have checked the thesis/report as per norms and found Similarity Index at 17 (%). Therefore, we are
forwarding the complete thesis/report for final plagiarism check. The plagiarism verification report may be
handed over to the candidate.
Word Counts
All Preliminary
Pages
Bibliography/ Character Counts
Report Generated on
Images/Quotes
Submission ID Page counts
14 Words String
File Size
Checked by
Name & Signature Librarian
..……………………………………………………………………………………………………………………………………………………………………………
Please send your complete Thesis/Report in (PDF) & DOC (Word File) through your Supervisor/Guide at
[email protected]