online shopping mart
Post on 01-Jun-2018
215 Views
Preview:
TRANSCRIPT
-
8/9/2019 Online Shopping Mart
1/87
A PROJECT REPORT ON
“ONLINE SHOPPING MART”
Submitted in the partial ulillment ! the re"uirement !r the
A#ard ! de$ree !
BACHELOR OF COMPUTER
APPLICATION
Submitted %& Submitted t!'
Neha (harma Mr)*I*E+ANAN, PAN,E-R!ll n!) ./00123
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 0
-
8/9/2019 Online Shopping Mart
2/87
Pl!t N!) 45 In(tituti!nal Area5 +n!#led$e Par6 7 /5Greater N!ida5 8ttar Prade(h 91/210
DECLARATION
I Neha sharma, hereby declare that the project work entitled “ONLINE SHOPPING MART” is
an authenticated work carried out by me at High Technologies Solutions Under the guidance of
Mr)*I*E+ANAN, PAN,E- for the partial fulfillment of the award of the degree of
BACHELOR OF COMPTER APPLICATION and this work has not been submitted for
similar purpose anywhere else except to HIMT ! GREATER NOIDA, affiliated to CCS
NI"ERSIT#! MEERT$
,ate'
Pla:e'
Neha (harma
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 1
-
8/9/2019 Online Shopping Mart
3/87
AC%NO&LEDGEMENT
It is high privilege for me to express my deep sense of gratitude to all those faculty members
who helped me in the completion of the project, especially my internal guide
Mr)*I*E+ANAN, PAN,E- who was always there at hour of need
!y special thanks to "rofessor M'$ N('en)'( **()h(+( #$%&' for helping me in the
completion of project work and its report submission
,Neh( Sh('-(.
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage (
-
8/9/2019 Online Shopping Mart
4/87
TABLE OF CONTENTS
Int'o)uction
O/0ecti1es
S+ste- An(l+sis
I)enti2ic(tion o2 the nee) P'eli-in('+ In1estig(tion
Fe(si/ilit+ Stu)+
Technic(l Fe(si/ilit+
Econo-ic(l Fe(si/ilit+
O*e'(tion(l Fe(si/ilit+
So2t3('e Enginee'ing P('()ig- (**lie)
So2t3('e (n) H(')3('e Re4ui'e-ent S*eci2ic(tion
S+ste- Design
Co)ing
Co)e e22icienc+ O*ti-i5(tion o2 co)e
"(li)(tion Chec6s
Testing ,Testing Techni4ues 7 Testing st'(tegies.
I-*l8-ent(tion
E1(lu(tion
M(inten(nce
Secu'it+ Me(su'es t(6en
Cost Esti-(tion o2 the P'o0ect
Re*o'ts
PERT Ch('t
G(ntt Ch('t
Futu'e Sco*e o2 the P'o0ect
Bi/liog'(*h+
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage )
-
8/9/2019 Online Shopping Mart
5/87
INTRODCTION
*he %nline +hopping !art eb site is the application that provides customers with online
shopping *hrough a eb browser, a customer can browse the catalog, place items to purchase
into a virtual shopping cart, create and sign in to a user account, and purchase the shopping cart
contents by placing an order with a credit card
*he -pplication is a working demonstration of how to use blueprints principles in a real
application design *his document is an online guide to the design and the implementation of
the application .nterprise -pplications with web technology
.ach release of the application maintains consistent design features such as separating
logic and presentation, using web component for control and web pages for presentation, using
business components, and so on high/level design features, this document goes deeper into the
implementation details of the current application release
*his document is provided as an online/only resource so that it may be continually
extended and updated *his document begins with a description of the separate applications
that the sample application comprises, describes the modular structure of the .!-* application,
and provides an in/depth description of several pieces of the modules
.ach %NIN. +$%""IN !-2* module has different re3uirements from the others *his
section describes the re3uirements, design, and implementation of each module
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 4
-
8/9/2019 Online Shopping Mart
6/87
OB9ECTI"ES
• *his is a web/based +hopping site intended to provide automated solution for customers
as well as .mployers on the basis of various categories of "roducts , "roducts are
available in different 5ities of India and even abroad
• *his +hopping site provides some innovative features
o providing platform to other consultant is highly commendable
o It is extremely User friendly
• .ven if job seeker does not have idea about resume making and other job criteria then he
or she can directly take suggestions from career counseling 6one
• 5onsultants and .mployers from different locations get registered and post the job
according to the re3uirement so that job seekers can look for it and apply for same if they
have desired profile
• %nline +hopping 7enefits 8 +olutions
o et 2ight products in shortest time
o "aperless database hence paperless office
o 9ind -vailable products in shortest time
• "rovides +ervices to the 5ustomers
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage :
-
8/9/2019 Online Shopping Mart
7/87
P R O 9 E C T C A T E G O R #
*he software which is being developed comes under both %%"+ and 2&7!+ category *he proposed project based on 5 +harp N.* as a front end and +; +erver as a back end hile
taking 5
• A/st'(ction: *he ability to create an abstract representation of a concept in code *he
techni3ue of creating new data types that are well suited to an application to be
programmed is known as data abstraction It provides ability to create user/defined data
types, for modeling a real world object, having the properties of built in data types and aset of permitted operators
• Enc(*sul(tion: .ncapsulation is all about the separation between implementation and
interface In other words, when you encapsulate and object, you make its code and datainternal and no longer accessible to the outside except through a well/defined interface
*his is also called data hiding
• Pol+-o'*his-: *his is all about creating procedure that can operate on object of
different types 5 +harp N.* handles polymorphism with both late binding and multiple
interfaces
• Inhe'it(nce: Inheritance allows us to derive new classes from other classes *he idea
here is that if we were to create, for example, a class for a specific c sharp form and thenderive a new type of form from that class, thee derived class will inherit all the base
class?s functionality, even before we start adding code or customi6ing the new form
S;L Se'1e' provides a suite of tools for managing all aspects of +; +erver development,
3uerying, tuning, and administration hile designing a database, the database administrator creates database objects such as tables, columns, keys, indices, relationships, constraints, and
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage @
-
8/9/2019 Online Shopping Mart
8/87
views *o help create these objects, the +; +erver !anagement +tudio provides access to
visual database tools *hese tools provide three mechanisms to aid in database design> the
&atabase &esigner, the *able &esigner, and the view designer
*he integrated ;uery .ditor provides a simple graphical user interface for running +; 3ueries
and viewing the results *he ;uery .ditor also provides a graphical representation of show plan,the steps chosen by the optimi6er for 3uery execution
+; +erver supports the hosting of the N.* 5ommon anguage 2untime #52' inside the +;+erver process to enable database programmers to write business logic as functions, stored
procedures, triggers, data types, and aggregates *he ability to run
-pplication code inside the database adds flexibility to the design of application architectures
that re3uires business logic to execute close to the data and cannot afford the cost of shipping
data to middle/tier process to perform computation outside the database -pplication code is
deployed inside the database by using assemblies, which are the units of packaging, deployment,and versioning of application code in N.* &eployment of application code inside the database
provides uniform way to administer, 7ack up, and restore complete database applications
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage A
-
8/9/2019 Online Shopping Mart
9/87
S#STEM ANAL#SIS
I&.N*I9I5-*I%N %9 N..&
BInformation is the basic ingredients of any organi6ationC It is integral to all living organisms
*hese statements indicate that information is essential to all human activity and in fact to the
very nature of being alive
+ince the commencement of modern era, especially after industriali6ation, the need for effective
and 3uick communications has always been reali6ed *he dynamic growth of commerce and
industry began to place new and considerable pressures on the service industry &espite rapid
advancement in the electronic communications and transport industries, the need to transport
parcels and documents within a short time become a pressing need
-t the heart of system analysis, I identified the need, in terms of a detail understanding of all
important facets of the business area under investigation In order to fulfill the users?
re3uirements, the companies have to do a lot of paper work *hat leads to time consumption
issues particularly when the work load is heavy, which affects the productivity and efficiency of
the employees
*his project BOnline Sho**ing M('tC has been developed keeping in mind the heights
BInformation *echnology has reachedC and when everything is powered with computers does
make a great difference *his website contains information about discount offers run in their hot
city and the combination of offers which customer get more discount and achieve maximum
discount and customer also can compare available offers etc as well as -dviser can post offer for
customer
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage D
-
8/9/2019 Online Shopping Mart
10/87
"2.I!IN-2E INF.+*I-*I%N
*his is one of the crucial phases of the software development life cycle which is responsible for
reliable product delivery 9or the sake of 3ualitative product delivery, which could meet the
re3uirements of the client, the preliminary investigation plays an important role because this is
the crucial part of analysis which defines the Gwhat? actually the system does In other words, it
specifies that what the system does hat are the features and functionality of the proposed
systemH hat are the present circumstances and the problem which is being faced by the
organi6ationH
*he preliminary investigation phase is the axle of the software development around which
reliable and customer satisfactory product development depends -s far as current project Online
Sho**ing M('t concerned it helps in faster retrieval of data in less time and least complexity
-fter going through certain investigations, we got to know the problems faced by the current
system In the context of manual existing system that it is 3uite difficult to take 3uick decision on
the basis of existing information -lthough the information of the system is being maintained
manually but the information retrieval is slow 9or example, whenever any customer needs to
know the current status of any promotional offer in different city, it takes time to know the result
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage
-
8/9/2019 Online Shopping Mart
11/87
9.-+I7II*E +*U&E
*he word feasible means capable of being carried out successfully -n event is said to be feasible
if it is considered possible and practicable *he 9easibility +tudy is an investigation into how possible a proposed scheme might be, and whether it is capable of being carried out successfully
*his is usually assessed on four standard criteria for feasibility but other considerations may be
relevant and necessary depending on the specific nature of the project and its environment It
refers to the phase where the proposed system is tested whether it is really re3uired in the present
working conditions or not It is a very important step in system development as its result
determines whether the system has to be developed or not *he process followed in making this
is called feasibility study hen the developer is building any system, heJshe should make sure
that the system heJshe is going to build is feasible
+ince the feasibility study may lead to commitment of large resources, it becomes necessary that
it should be conducted competently and that no fundamental errors of judgment are made
Preliminary investigation examines ro!e"t #easi$ility% te li'elioo( te
system )ill $e *se#*l to te organi+ation, Tree imortant test o# #easi$ility
are (es"ri$e( $elo)-
• Econo-ic(l 2e(si/ilit+
• Technic(l 2e(si/ilit+
• O*e'(tion(l 2e(si/ilit+
• Soci(l 2e(si/ilit+
In feasibility study, we check the durability, reliability, operability, compatibility etc of the
system - feasibility study is a preliminary study undertaken to determine and document a
projectKs viability *he results of this study are used to make a decision whether to proceed with
the project, or table it If it indeed leads to a project being approved, it will / before the real work
of the proposed project starts / be used to ascertain the likelihood of the projectKs success It is an
analysis of possible alternative solutions to a problem and a recommendation on the best
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 10
-
8/9/2019 Online Shopping Mart
12/87
alternative It, for example, can decide whether an order processing be carried out by a new
system more efficiently than the previous one
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 11
-
8/9/2019 Online Shopping Mart
13/87
"2%=.5* "-NNIN
"roject planning is very important in every aspect of development work 9or successful
completion of the project, good managers carefully monitor developments at various phases
Improper planning leads to failure of the project "roject planning can be viewed as the
following>
ithin the organi6ation, it is important to consider that how the project is to be implementedH
hat are various constraints #time, cost, and staffH' hat is market strategyH
-part from these, it is also important to consider the customers response and their satisfaction
9or this purpose, a weekly or timely meeting with the customer with presentations on status
reports is supposed to be essential steps 5ustomer feedback is also taken and further
modifications and developments are done "roject milestones and deliverables are also presented
to the customer
9or the success of proposed project, essential and re3uired steps have been taken *his can be
seen as follows>
• Selection o2 ( *'o0ect<
hile selecting the proposed project, project?s aims and objectives is identified *o meet
the customer need we elaborated their re3uirements and specification 9or this purpose,
analysis, design and implementation, their corresponding testing techni3ues and proper
documentation has been done
• P'o0ect -ilestones (n) )eli1e'(/les<
9or completing the project on time, it was always considered their project milestones -t
specific time, how many milestones has been achieved and for what deliverables it is
ready It helped us to achieve the success one by one
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 1(
-
8/9/2019 Online Shopping Mart
14/87
• Bu)get (lloc(tion<
In budget allocation, we consider that the, for the sake of completion of the project it
should not exceed the limits within control
• P'o0ect esti-(tes<
In project estimation, we consider the cost, time, si6e of code, duration of the project It
estimated the cost which was re3uired to complete *he si6e of code is anticipated in the
right way because cost and duration depend on the line of codes
• Resou'ce (lloc(tion<
9or the sake of the development of the project, it is important to consider the resource
7ecause, lack of resource, we can?t imagine about the development of the product *he
proper hardware, software should be their "revious relevant project information and
digital library plays an important role for proper estimation of product
• Ris6 -(n(ge-ent<
-ny problem that occurs during customer specification, design, design, coding,
implementation and testing can be termed as a risk If they are ignored, then they
propagate further down and it is termed ripple effect 2isk management deals with
avoidance and detection of risk at every phase of the software development cycle &uring
the development of the project, it is considered that there should not be raised any risk
9or this purpose, proper exception handling has been done for every block of codes sothat any run time error does not occur
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 1)
-
8/9/2019 Online Shopping Mart
15/87
• Sche)uling techni4ues<
It is important to schedule the project development duration for the completion of product
on time 7ecause, the exceeding the development time duration lead the different
problem and customer dissatisfaction
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 14
-
8/9/2019 Online Shopping Mart
16/87
+%9*-2. 2.;UI2.!.N*
=$ Int'o)uction
*his section contains the software re3uirement specificationL it is a description of the different
modules of the system that can be used in this project +oftware 2e3uirement +pecification
document provides a complete detail re3uired for designing and developing the system It is the
description of system proposed which we get while preliminary investigation of the organi6ation
=$= Pu'*ose
*he purpose of the project named BOnline Sho**ing M('tC is to deal with the 3ueries of user
for a company simultaneously running its &iscount offers in different/different cities where the
users can see, buy and view the status online about what the offer available is
“Online Sho**ing M('t” is being developed for the need of Users and "roduct selling company
running simultaneously *his is specially meant for their frontline user service information *his
is one of the best efforts by us to prove that how Internet can be helpful in entire service industry
where in3uiries are always in 3ueue *his system however is a snap shot of the whole scenario
for the booming .commerce industry
>$ O1e'(ll Desc'i*tion
*he overall development summary and description of this project are as follows>
>$= De1elo*-ent<
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 1:
-
8/9/2019 Online Shopping Mart
17/87
*he environment for development, operation and maintenance can be categori6ed into
hardware re3uirement specification and software re3uirement specification .ach of these
re3uirements has been dealt with as given below>/
*he website is developed using Fisual +tudio N.* Fersion ): as N.* 9ramework
(010 and +; +erver (00: as a backend for the sake of database storage
*he minimum system specification in which the system is developed are as follows >
HARD&ARE<
P'ocesso' Intel Pentiu- >$? GH@
Me-o'+ > M$B$! D$D$R$ RAMNet3o'6 A)(*te' Ethe'net A)(*te'
Mo)e- 6*/s "oice F( D(t(
Secon)('+ Sto'(ge S(-sungSe(g(te H(') )is6 ,? G$B.
In fact, it is recommended hardware re3uirement for the sake of better development
environment
So2t3('e Re4ui'e-ent<
Pl(t2o'- &in)o3s
O*e'(ting S+ste- &in)o3s P
F'(-e3o'6 $Net FRAME&OR% $
F'ont:En) Tool "isu(l Stu)io >
Sc'i*ting L(ngu(ge C! HTML
Inte'2(ce HTML! "isu(l Stu)io
Se'1e' Inte'net In2o'-(tion Se'1e'
B(c6:En) Tool S;L Se'1e' >
Technolog+ ASP$NET
>$> O*e'(tion<
*o successfully install the proposed system named BOnline Sho**ing M('tC the system must
meet the above system re3uirements
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 1@
-
8/9/2019 Online Shopping Mart
18/87
*his project will provide the organi6ation a new environment and changes which will energi6e
the employee and their concerned individual to get rid from the problem which was being faced
by them earlier *his would give the organi6ation a new motivation to the employee that they are
getting new work environment which is similar to the real life top organi6ation *hey would have
the feeling of up/to/date work environment which plays an important role to utili6e optimum
employees? skills and their productivity
>$ Const'(ints
-s we know that there is nothing in the world which can be said complete In other words
everything has its own limitation +o far as this project is concerned it eliminates the manual
system which had a lot of paper work +o this project is not only time saving but also it is simple
9or example the searching for any booking information or modifying any office description has
become easier
$ S*eci2ic Re4ui'e-ents
-fter going through the analysis report of the proposed project, we found that the main
re3uirement of the organi6ation is that, they wanted to have a better organi6ed system which is
easy to understand and easy to learn and they can feel the ease of working in spite of complex
and peak load of work environment
$= Ete'n(l Inte'2(ces
hile designing the proposed project we have given the specific attention to the interface
because the website is being developed for the medium skilled people .mployee of the
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 1A
-
8/9/2019 Online Shopping Mart
19/87
concerned organi6ation is not any computer expert +o due to this reason the interface is easy to
understand and very simple It?s all design is also very simpler and attractive +o the people who
have very little knowledge of computers can also use this website, they will take very less time to
operate this
$> Pe'2o'-(nce Re4ui'e-ents
*he performance characteristic includes various factors which is responsible for efficient
performance of the project *he primary and secondary memory re3uirements which is
recommended for optimum performance is minimum (:@ !7 2-! and (0 7 hard disc and
"entium 4 processor as well
$ Pe'2o'-(nce Results<
*he analysis and comparison of the different websites of its similar type, the proposed project is
efficient which provides an insight on the most effective Online Sho**ing M('t system in terms
of their user friendliness and utili6ation *his will increase the effective utili6ation of the
available resource and hence the work efficiency will improve
It will also be helpful to new employee who has just joined the company because the design of
the website made the entire company information just a click away from the user %ver all this
must be helpful for optimi6e the performance
S#STEM DESIGN
DESIGN PATTERN
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 1D
-
8/9/2019 Online Shopping Mart
20/87
*his software based on concept of the !odel Fiew 5ontroller #!F5' design pattern Fiew
renders the data from the !odel in response to the re3uest made to the model by controlled
events made by user interaction
!odel Fiew 5ontroller is a design approach to separate the application object model from UI,
originally invented around D0s *hen later on it has become a widely accepted common design pattern *he main objective behind this pattern is to decouple the view of the data #presentation
layer' from the actual data processing so that the same model can be used for various views *his
is achieved by using three different types of objects that interact with each other in looselycoupled manner with their discreet set of tasks
*hese three objects are known as !odel, Fiew and 5ontroller
"IE&<
Fiew is the graphical data presentation #outputting' irrespective of the real data processing Fiew
is the responsible for look and feel, some custom formatting, sorting etc Fiew is completelyisolated from actual complex data operations 9or example, online product catalogue view is
completely separated from database connection, 3uery, tables etc It simply gets final row/data
from the model and puts some cosmetics and formatting before displaying it in browser
Fiew provides interface to interact with the system *he beauty of !F5 approach is that itsupports any kind of view, which is challenging in today?s distributed and multi/platform
environment
- !F5 model can have multiple views, which are controlled by controller Fiew interface can
be of .7/9%2!+, $*!, M!JM+*, M*!, and ! or can be indows forms etc
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 1
-
8/9/2019 Online Shopping Mart
21/87
MODEL<
!odel is responsible for actual data processing, like database connection, 3uerying database,
implementing business rules etc It feeds data to the view without worrying about the actual
formatting and look and feel &ata provided by !odel is display/neutral so it can be interfacedwith as many views without code redundancyL this eases your code maintenance and reduces
bugs and allows code / reuse at good extent !odel responds to the re3uest made by controllers
and notifies the registered views to update their display with new data
CONTROLLER<
5ontroller is responsible for Notice of action 5ontroller responds to the mouse or keyboardinput to command model and view to change 5ontrollers are associated with views User
interaction triggers the events to change the model, which in turn calls some methods of model to
update its state to notify other registered views to refresh their display
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage (0
-
8/9/2019 Online Shopping Mart
22/87
Bene2its<
9ollowing are the few of the benefits of !F5 design pattern
• +ince !F5 handles the multiple views using the same enterprise model it is easier to
maintain, test and upgrade the multiple system• It will be easier to add new clients just by adding their views and controllers• +ince the !odel is completely decoupled from view it allows lot of flexibilities to design
and implement the model considering reusability and modularity *his model also can be
extended for further distributed application• It is possible to have development process in parallel for model, view and controller
SECRIT#
*his module controls security and integrity of database in each module with multilevel
password that can be assigned to authori6ed users by the super user
-55.++ 5%N*2% #ho has the right to access the software'
-U*$%2I+-*I%N #&efining rights of an user'
-U*$.N*I5-*I%N #5hecking who the user is'
&-*- IN*.2I*E #"rotection of data from modification and deletion'
&-*- +.5U2I*E #!aintain confidentiality of data'
"-++%2& IN*.2I*E #.ncryption of passwords'
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage (1
-
8/9/2019 Online Shopping Mart
23/87
MODLARISATION DETAILS
P'o0ect Mo)ules<
*he proposed website will have its main page and will be mainly divided into partially
dependent and partially independent modules as/
2egistration J ogin maintenance
-dmin
User
+alesman
User ogin +ucceed
"rofile
"roduct allery
5art Items
+old "roducts
-dmin ogin +ucceed
-dd Item *ype
-dd Items
-dd Item &etails
"roduct &etails
-dd +alesman
+alesman ogin +ucceed
5ustomer &etails
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage ((
-
8/9/2019 Online Shopping Mart
24/87
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage ()
-
8/9/2019 Online Shopping Mart
25/87
DATA STRCTRE
*he normali6ed form of the table with their structure is describe as under/
Login T(/le<
P'o)uct Det(ils T(/le<
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage (4
-
8/9/2019 Online Shopping Mart
26/87
se' P'o2ile T(/le<
S(les-(n T(/le<
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage (:
-
8/9/2019 Online Shopping Mart
27/87
C('t T+*e T(/le<
A)) To C('t T+*e T(/le<
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage (@
-
8/9/2019 Online Shopping Mart
28/87
DATA FLO& DIAGRAMS
Note<
2epresents .xternal .ntity
2epresents the "rocess
2epresents the flow of 5ontrolJ&ata
2epresents 5lose &atabase
2epresents %pen *able
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage (A
A)-in login
se' Login
S(les-(n login
A)-in
se'
S(les-(n
Online Sho**ing
M('t
Contet Le1el )i(g'(-
-
8/9/2019 Online Shopping Mart
29/87
A)-in Mo)ule
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage (D
-dmin
"roduct
detail
1
Catego
ry
A)ise
Sear"
11
ro(*"t.D
5reate New account og In "rocess
9or New User
-dd Item
(1
(
-dding
"rocess
((
-ddItem
((
-dmin
A((
salesman
salesman
ssssssaaaSal
esman
Massanger
()
5reating
account for
matched jobs
+alesman
-
8/9/2019 Online Shopping Mart
30/87
E-*lo+e's Mo)ule DFD
"roduct allery
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage (
U+.2 5reate New account
og In
"rocess 9or
User
(
og In
1
+earch -nd
"urchase Item
1(
et -ccess %f"roduct info
1(
User *ab
"roduct
&etails
-
8/9/2019 Online Shopping Mart
31/87
SCREENSHOTS <
Fo' Login P(ge:<
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage )0
-
8/9/2019 Online Shopping Mart
32/87
Fo' A)-in Login
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage )1
-
8/9/2019 Online Shopping Mart
33/87
Fo' Ite- T+*e
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage )(
-
8/9/2019 Online Shopping Mart
34/87
SER Sign *<
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage ))
-
8/9/2019 Online Shopping Mart
35/87
se' P'o2ile<
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage )4
-
8/9/2019 Online Shopping Mart
36/87
CODING
*he coding step of the development phase translates the software design into a programminglanguage that can be executed by a computer
Login'
*sing System%*sing System,Data%*sing System,Con/g*ration%*sing System,Colle"tions%*sing System,0e$%*sing System,0e$,Se"*rity%
*sing System,0e$,UI%*sing System,0e$,UI,0e$Controls%*sing System,0e$,UI,0e$Controls,0e$Parts%*sing System,0e$,UI,1tmlControls%*sing System,Data,S2lClient%
*$li" artial "lass UserLogin - System,0e$,UI,Page3 S2lConne"tion "on 4 ne) S2lConne"tion5Con/g*rationManager,Conne"tionStrings67"on78,Conne"tionString9%
S2lDataA(ater (a% DataSet (s%
rote"te( voi( Page.Loa(5o$!e"t sen(er: EventArgs e9 3 Text;ox
-
8/9/2019 Online Shopping Mart
37/87
int n 4 Convert,ToInt?5(a,Sele"tComman(,Exe"*teS"alar599% i# 5n 44 ,7% Text;ox
-
8/9/2019 Online Shopping Mart
38/87
se'P'o2ile<
*sing System%*sing System,Data%*sing System,Con/g*ration%*sing System,Colle"tions%*sing System,0e$%*sing System,0e$,Se"*rity%*sing System,0e$,UI%*sing System,0e$,UI,0e$Controls%*sing System,0e$,UI,0e$Controls,0e$Parts%
*sing System,0e$,UI,1tmlControls%*sing System,Data,S2lClient%
*$li" artial "lass UserIn;ox.C*stomerPro/le - System,0e$,UI,Page3 S2lConne"tion "on 4 ne) S2lConne"tion5Con/g*rationManager,Conne"tionStrings67"on78,Conne"tionString9% S2lDataA(ater (a% DataSet (s%
rote"te( voi( Page.Loa(5o$!e"t sen(er: EventArgs e9 3 i# 5"on,State 44 Conne"tionState,Close(9 3 "on,Oen59% =
i# 5Page,IsPost;a"' >4 tr*e9 3 i# 5Session,Co*nt 9 3
HetArtistPro/le5Convert,ToInt?5Session67*i(78,ToString5999% = else 3 Resonse,Re(ire"t57G1ome,asx79% = =
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage )A
-
8/9/2019 Online Shopping Mart
39/87
=
rivate voi( HetArtistPro/le5int *i(9 3 (a 4 ne) S2lDataA(ater57sele"t
#name:lname:gen(er:email:"ity:state:"o*ntry:mo$ileno #rom t$l."onta"t)ere *i(47 B *i( B 7 7: "on9% (s 4 ne) DataSet59% (a,Fill5(s: 7t$l."onta"t79% i# 5(s,Ta$les,Co*nt && (s,Ta$les67t$l."onta"t78,Ro)s,Co*nt 9 3 Text;ox
-
8/9/2019 Online Shopping Mart
40/87
A)-inLogin<
*sing System%*sing System,Data%*sing System,Con/g*ration%*sing System,Colle"tions%*sing System,0e$%*sing System,0e$,Se"*rity%*sing System,0e$,UI%*sing System,0e$,UI,0e$Controls%*sing System,0e$,UI,0e$Controls,0e$Parts%*sing System,0e$,UI,1tmlControls%
*$li" artial "lass a(minlogin - System,0e$,UI,Page
3 rote"te( voi( Page.Loa(5o$!e"t sen(er: EventArgs e9 3
= rote"te( voi( ;*tton
-
8/9/2019 Online Shopping Mart
41/87
CODING EFFICIENC#
E22icienc+ means
$ow cryptic the coding is
-voiding dead/code
2emove unnecessary code and redundant processing
+pend time documenting
+pend ade3uate time analy6ing business re3uirements, process flows,
data/structures and data/model
;uality assurance is key> plan and execute a good test plan and testing
methodology
- good way to see which code is more efficient is to compile is the code and generate the
assembler code
+ee which one produces the most lines of code #%5' *he one with the least %5 is the one
that is more efficient and will most probably run faster 5ounting the number of lines of code
tells you nothing !any times the compiler will do optimi6ations that are intended to improve
performance #speed' at the expense of space
$ow code efficiency is achieved in the projectH
e have made use of general procedures which we have used across a number of forms
*he code written for the auto generation procedure is very efficient
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 40
-
8/9/2019 Online Shopping Mart
42/87
OPTIMI@ATION OF CODE
5ode optimi6ation involves the application of rules and algorithms to program code with the goal
of making it faster, smaller, more efficient, and so on %ften these types of optimi6ations conflict
with each other, for instance, faster code usually ends up larger, not smaller *here are two goals
for optimi6ing code>
1 %ptimi6ing for time efficiency #runtime savings'
( %ptimi6ing for memory conservation
In some cases both optimi6ations go hand in hand, in other cases you trade in one for the other
Using less memory means to transfer less memory which reduces the time needed for memory
transfers 7ut often memory is used to store pre calculated values to avoid the actual calculation
at runtime In this case you trade space consumption for runtime efficiency
O*ti-i5ing 2o' ti-e e22icienc+
2educing the number of calculations
Using a diferent algorithm
&eclaring things constant
2educing fre3uency of function calls
%ptimi6ing for memory conservation
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 41
-
8/9/2019 Online Shopping Mart
43/87
+hared use of memory
&ata structure
&ata type si6e
$ow code optimi6ation is achieved in the projectH
e have made the use of the concept of global variable which we are declaring only once in
a single form and which can be used across the forms in the project $ence less memory will
be used *his global variable is used to check the particular user who create , update , modify
data in any form e have declared global variable 5reated7y, 5reated&ate, Updated7y
and Updated&ate only once in a form
DECLARE
BEGIN
-
8/9/2019 Online Shopping Mart
44/87
"ERIFICATION 7 "ALIDATION
Falidation refers to the process of using software in a live environment using real data *he
process of validation refers to a set of activities that ensure that the software that has been built is
matching to customer re3uirement Falidation is successful when software functions in a manner
that can be reasonably expected by the customer
S*ita$le vali(ation "e"'s ave $een *t )erever nee( )as #elt so as to
avoi( )rong (ata in*t, Co(ing as $een (one so as to avoi( )rong entries
in te ta$les, For examle N*meri" "ara"ter are not allo)e( in te
S*$s"ri$ers name, ario*s mo(*les ave (iQerent ro"ess logi": )i"
involves sorting o# (ata on (iQerent attri$*tes an( sele"tion o# re2*ire(
attri$*te (een(ing *on "on(itions ave $een (e"i(e(, Most o# tese are
SL 2*eries,
T3o t+*es o2 " 7 "
"e'i2ic(tion
=. D(te "(li)(tion< *he validation on date data type has been specified to be of the format
&&J!!JEE -ny other format is unacceptable
>. A-ount "(li)(tion< *here is a validation on amount that is entered in rupees in the following
format B00,000,000$00C .g 1:,@:,AD00
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 4)
-
8/9/2019 Online Shopping Mart
45/87
. F'o- D(te to D(te
-
8/9/2019 Online Shopping Mart
46/87
TESTING ,TESTING TECHNI;ES AND TESTING STRATEGIES.
All so#t)are inten(e( #or *$li" "ons*mtion so*l( re"eive some level o#
testing, 0ito*t testing : yo* ave no ass*ran"e tat so#t)are )ill $eave as
exe"te(, Te res*lts in *$li" environment "an $e tr*ly em$arrassing,
Testing is a "riti"al element o# so#t)are 2*ality ass*ran"e an( reresents te
*ltimate revie) o# se"i/"ation: (esigning: an( "o(ing, Testing is (one
tro*go*t te system (eveloment at vario*s stages, I# tis is not (one:
ten te oorly teste( system "an #ail a#ter installation, Testing is a veryimortant art o# SDLC an( ta'es aroximately Jo# te time,
*he first step in testing is developing a test plan based on the product re3uirements *he test plan
is usually a formal document that ensures that the product meets the following standards>
Is thoroughly *ested/ Untested code adds an unknown element to the product and
increases the risk of product failure
!eets product re3uirements/ *o meet customer needs, the product must provide the
features and behavior described in the product specification &oes not contain defects/ 9eatures must work within established 3uality standards and
those standards should be clearly stated within the test plan
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 4:
-
8/9/2019 Online Shopping Mart
47/87
Testing Techni4ues
Bl(c6 /o Testing> aims to test a given program?s behavior against its specification or
component without making any reference to the internal structures of the program or the
algorithms used *herefore the source code is not needed, and so even purchased modules can be
tested e study the system by examining its inputs and related outputs *he key is to devise
inputs that have a higher likelihood of causing outputs that reveal the presence of defects e use
experience and knowledge of the domain to identify such test cases 9ailing this a systematic
approach may be necessary .3uivalence partitioning is where the input to a program falls into a
number of classes eg positive numbers vs negative numbers "rograms normally behave the
same way for each member of a class "artitions exist for both input and output "artitions may
be discrete or overlap Invalid data #ie outside the normal partitions' is one for which partitions
should be tested *est cases are chosen to exercise each portion -lso test boundary cases
#atypical, extreme, 6ero' should be considered since these fre3uently show up defects 9or
completeness, test all combinations of partitions 7lack box testing is rarely exhaustive #because
one doesnKt test every value in an e3uivalence partition' and sometimes fails to reveal corruption
defects caused by weird combination of inputs 7lack box testing should not be used to try and
reveal corruption defects caused, .xample, by assigning a pointer to point to an object of the
wrong type +tatic inspection #or using a better programming language' is preferred
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 4@
-
8/9/2019 Online Shopping Mart
48/87
&hite /o Testing
Usual method is to ensure that every line of code is executed at least once
*est capabilities rather than components #eg concentrate on tests for data loss over ones
for screen layout'
*est old in preference to new #users less effected by failure of new capabilities'
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 4A
-
8/9/2019 Online Shopping Mart
49/87
Test tyi"al "ases rater tan $o*n(ary ones 5ens*re normal oeration
)or's roerly9,
De/ugging
-
8/9/2019 Online Shopping Mart
50/87
5onstraints
O"ER"IE& OF TESTING STRATEGIES<
- strategy for software testing integrates test case design methods into a well/planned series of
steps that result in the successful construction of software It provides a road map for the
software developer, the 3uality assurance organi6ation and the customer/ a road map that
describes the steps to be conducted as part of testing, when these steps are planned and then
undertaken, and how much effort, time and resources will be re3uired *herefore, any testing
strategy must incorporate test planning, test case design, test execution, and resultant data
collection and evaluation
arge system are usually tested using a mixture of strategies &ifferent strategies may be needed
for different parts of the system or at a stage of the process
Testing St'(tegies
Test T+*e &escription
nit Test .ach independent piece of code works correctly
Integ'(tion Test -ll units work together without errors
Inte'2(ce TestUsually done at integration stage when modules or sub/systems are
combined %bjective is to detect errors or invalid assumptions
about interfaces between modules 2eason these are not shown up
in unit testing is that test case may perpetuate same incorrect
assumption made by module designer "articularly important when
%% development has been used
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 4
-
8/9/2019 Online Shopping Mart
51/87
global variable' %ne places data there and the other retrieves it
architectures
Reg'ession Test Newly -dded features do not introduce errors to other features that are
already working
Lo() Test ,(lso
c(lle) St'ess Test.*he product continues to work under extreme usage *est systemKs
ability to cope with a specified load #eg transactions per second'
"lan tests to increase load incrementally o beyond design limit
until system fails #this test particularly important for distributed
systems'
Pl(t2o'- Test *he product works on all the target hardware and software platforms
To* Do3n Test*his approach tests high levels of system before detailed components
*his is appropriate when developing the system top/down as it is
likely to show up structural design errors early Falidation #as
distinct from verification' can begin early Its disadvantage is that
stubs needs to be generated #extra effort' and might be impractical
if component is complex #eg converting an array into a linked
listL unrealistic to generate random listL therefore end up
implementing unit anyway' *est output may be difficult to
observe #needs creation of artificial environment' *his is not
appropriate for %% systems #except within a class'
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage :0
-
8/9/2019 Online Shopping Mart
52/87
Botto- * Test*his is opposite of top/down testing *his testing test low/level unit
then works up hierarchy Its advantages and disadvantages of
bottom/up mirror those of top/down In this testing there is need to
write test drivers for each unit *hese are as reusable as the unit
itself 5ombining top/down development with bottom/up testing
means that all parts of system must be implemented before testing
can begin, therefore does not accord with incremental approach
discussed above
B(c6 To B(c6 Test 5omparison of test results from different versions of the system #eg
comparing the prototype with previous version or different
configuration' *he process involves running the first system,
saving test case results *hen running the second system, also
saving its results 9inally comparing the results files It is
important to note that no difference doesnKt imply no bugs 7oth
systems may have made the same mistake
Testing Done in ou' S+ste-
*he best testing is to test each subsystem separately as we have done in our project It is best to
test a system during the implementation stage in form of small sub steps rather then large chunks
e have tested each module separately ie have completed unit testing first and system testing
was done after combining Jlinking all different !odules with different menus and thorough
testing was done %nce each lowest level unit has been tested, units are combined with related
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage :1
-
8/9/2019 Online Shopping Mart
53/87
units and retested in combination *his proceeds hierarchically bottom/up until the entire system
is tested as a whole $ence we have used the To* * (**'o(ch for testing our system
*ypical levels of testing in our system>
Unit /procedure, function, method
!odule /package, abstract data type
+ub/system / collection of related modules, method/message paths
-cceptance *esting / whole system with real data#involve customer, user , etc'
Bet( Testing is acceptance testing with a single client It is conducted at the developer?s site by a
customer *he software is used in a natural setting with the developer Blooking over the
shoulderC of the user and recording errors and usage problems conducted in a controlled
environment Usually comes in after the completion of basic design of the program *he project
guide who looks over the program or other knowledgeable officials may make suggestions and
give ideas to the designer for further improvement *hey also report any minor or major
problems and help in locating them and may further suggest ideas to get rid of them Naturally a
number of bugs are expected after the completion of a program and are most likely to be known
to the developers only after the alpha testing
involves distributing the system to potential customers to use and provide feedback It is
conducted at one or more customer sites by the end/user of the software Unlike alpha testing,
the developer is generally not present *herefore, the beta test is a BliveC application of the
software in an environment that cannot be controlled by the developer *he customer records all
problems #real or imagined' that are encountered during beta testing and reports these to the
developer at regular intervals -s a result of problems reported during beta test, software
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage :(
-
8/9/2019 Online Shopping Mart
54/87
engineers make modifications and then prepare for release of the software product to the entire
customer base
In, this project, *his exposes system to situations and errors that might not be anticipated by us
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage :)
-
8/9/2019 Online Shopping Mart
55/87
We performed the load testin on o!r appli"ation and the report
#as as follo#s$%
Test t+*e< D+n(-ic
+imultaneous client 5onnections :
*est duration> 00>00>04>00
*est iterations> )0&etailed test results generated> Ees
*otal number of client re3uests> 1:
*otal number of client connections 1:0-verage client re3uests per second>0@A:
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage :4
-
8/9/2019 Online Shopping Mart
56/87
Testing Ph(senit Testing
TEST PLAN AND TEST REPORT OF OR S#STEM
De1elo*e' i
Fo'-s
5heck whether all
validations are
performed properlyand whether
appropriate values
are added to the
database and whether
data is retrieved fromthe database properly
Testing o2 Sc'eens to chec6 (ll the necess('+ con)itions ('e /eing 2ul2ille)
Login Sc'een
5heck whether the ogin screen
enables only the valid user
selected from the master
database to login into our
+ystem
-
8/9/2019 Online Shopping Mart
57/87
P5heck whether the auto generation
process is working efficiently
and generating uni3ue Ids for
each and every data being
entered in the respectiveforms
P 5heck whether the data is being
retrieved from database upon 3uerying
performed by the user
P 5heck whether
new records are getting entered into
the forms
P 5heck whether the data being
entered in the forms is getting savedinto the respective tables
P 5heck whether the 3uerying process
can be performed on selected records
to obtain their details already existing
in the database
P 5heck whether the records can bedeleted from the database via the
forms
P 5heck whether all the navigational
triggers are working properly, eg*he cursor is able to move to the 9irst
-
8/9/2019 Online Shopping Mart
58/87
, ast, Next , "revious 2ecord at the
click of a button
P 5heck whether the form can be
cleared in one shot
P 5heck whether the .&I*%2 is being
activated at the time of modification
P 5heck whether the isting of Falues#%F' pops on re3uest on the re3uired
text field
P 5heck the user is able to exit from
the form properly
data after
selectingfrom the
list
< 9orm cleared
< 5hangesaccepted
< &ata
unacceptable
< &ata accepted
< 9orm .xited
< 9orm cleared
< 5hangesaccepted
< &ata
unacceptable
< &ata accepted%F trigger
works suitably
< 9orm .xited
.xit triggers
works well
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage :A
-
8/9/2019 Online Shopping Mart
59/87
Su/sc'*tion Ent'+ Fo'-
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage :D
-
8/9/2019 Online Shopping Mart
60/87
-ll the above conditions have been
checked for this too
P 5heck whether our "ost ;uery
concept works
P 5heck the price amount should beentered in the pre defined format
P5heck numeric data cannot be
entered into the character field and
vice versa
P5heck that the data entered does
not exceed the predefined length
-
8/9/2019 Online Shopping Mart
61/87
P5heck whether the data beingselected from the ist of Falues
#%F' are having their Ids stored in
the database
-
8/9/2019 Online Shopping Mart
62/87
Integration Testing
5heck whether all
independent
modules work
properly after
integration
-ll the
!odu
les
after
thorou
gh
indivi
dual
testing are
merge
d
togeth
er and
run in
the
9!M
#exec
utable'
setup
-bsolute success
in running
the
system
5omplete success in running the
system as a whole with a
few minor problems
regarding the client
server connection which
were resolved after some
trials on the spot
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage @1
-
8/9/2019 Online Shopping Mart
63/87
E"ALATION
e have following approaches for the evaluation
1' 7enchmarking/ 5omparing the performance of hardware and software
(' .xperience of other users/ Fendors generally gives a list of users who are satisfied
with their work 7ut it is advisable to seek the opinion independently
)' 2eport of independent research organi6ations/ !any research organi6ations
undertake project of evaluating the proprietary software offered by various
software agencies *hey publish the report at regular interval *he prospective
buyer of a software package can have faith in their evaluation
In our case we have evaluated our +ystem and found that the hardware and software are in
absolute sync with each other *heir performance has been found to be upto the mark e also
compared our software with other +ubscription systems on other platforms and found that we
were offering a much better system at a lesser price and on a more sophisticated and user friendly
technology "lus we offered complete maintenance and support for a certain period of time
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage @(
-
8/9/2019 Online Shopping Mart
64/87
IMPLEMENTATION
Implementation includes all those activities that take place to convert from old system to the new
one *he new system may be completely new +uccessful Implementation may not guarantee
improvement in the organi6ation using the new system, improper installation will prevent it
Implementation uses the design document to produce code &emonstration that the program
satisfies its specifications validates the code *ypically, sample runs of the program
demonstrating the behavior for expected data values and boundary values are re3uired +mall
programs are written using the model> It may take several iterations
of the model to produce a working program -s programs get more complicated, testing and
debugging alone may not be enough to produce reliable code Instead, we have to write programs
in a manner that will help insure that errors are caught or avoided
To*:)o3n i-*le-ent(tion<
*op down implementation begins with the user invoked module and works toward the modules
that do not call any other modules *he implementation may proceed depth/first or breadth/first
Botto-: * i-*le-ent(tion<
Implementation begins with modules that do not call any other modules and work toward the
main program *est harness are used to test individual modules *he main module constitutes the
final test harness
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage @)
-
8/9/2019 Online Shopping Mart
65/87
Stu/s<
+tub programming is the implementation analogue of top/down and stepwise refinement It
supports incremental program development by allowing for error and improvement - stub
program is a stripped/down, skeleton version of a final program It doesnKt implement details
of the algorithm or fulfill all the job re3uirements $owever, it does contain rough versions
of all subprograms and their parameter lists 9urthermore, it can be compiled and run
.xtensive use of procedures and parameter are the difference between stub programs and
prototypes ;uick and dirty prototypes should be improved and rewritten - stub program
helps demonstrates that a programKs structure is plausible Its procedures and functions are
unsophisticated versions of their final forms, but they allow limited use of the entire
program In particular, it may work for a limited data set %ften the high/level procedures
are ready to call lower/level code, even if the more detailed subprograms havenKt even been
written
Inc'e-ent(l *'og'(- )e1elo*-ent<
-s program becomes more complex, changes have a tendency to introduce unexpected effects
Incremental programming tries to isolate the effects of changes e add new features in
preference to adding new functions, and add new function rather than writing new programs
*he program implementation model becomes>
define typesJcompileJfixL
add load and dump functionsJcompileJtestL
add first processing functionJcompileJtestJfixL
add featuresJcompileJtestJfixL
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage @4
-
8/9/2019 Online Shopping Mart
66/87
add second processing functionJcompileJtestJfixL
keep adding featuresJand compilingJand testingJ and fixing
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage @:
-
8/9/2019 Online Shopping Mart
67/87
%ur +ystem was implemented at the client site in the following manner>
1' 9irst of all we did a thorough system check on the client?s machine in terms of hardware
and software to ensure that there was enough space to load and run our application with
ease
(' *hen we installed +; +erver #frontend' and &eveloper @i #back end' on the server
+ince the software was present on other systems and running properly, there wasn?t much
trouble in obtaining and installation
)' *hen came the process of &atabase 5reation at the server site which involved the
generation *his procedure is also known as &atabase
4' *o establish contact with the server as per their re3uirement and each re3uest should be
implemented *his task actually is fairly crucial depending on the number of users trying
to access the server at same time so a load test needs to be performed
:' 9inally came the job of training the users which meant that the clients were given instructions
regarding the working of the system which included teaching them the hen the user was
fully trained, he or she was asked to run the system independently and enter different sorts of
data to test the system to its limits
@' %ur system not only met the user re3uirements but to certain extent exceeded in achieving
much more then what was actually needed
+tep in generating the executable form #9!M' of our system
1 9irst go to the folder where &eveloper @i is installed #in our case &ev@', further
go to the 7IN folder, now select i2'un and create a short cut on desktop
( 2ight click on the newly created shortcut and choose properties option
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage @@
-
8/9/2019 Online Shopping Mart
68/87
) hen the properties option opens, set target path of the first 9!M file with ogin
specifications
.>Sdev@S7inSifvrun@0exe .>SsmitSstartfmb ceSce
4 *his will create the executable format of our system clicking upon which the end
user will be able to gain entry
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage @A
-
8/9/2019 Online Shopping Mart
69/87
MAINTAINENCE
*he maintenance starts after the final software product is delivered to the client *he
maintenance phase identifies and implements the change associated with the correction of
errors that may arise after the customer has started using the developed software *his also
maintains the change associated with changes in the software environment and customer
re3uirements %nce the system is a live one, !aintenance phase is important +ervice after
sale is a must and usersJ clients must be helped after the system is implemented If heJshe
faces any problem in using the system, one or two trained persons from developer?s side can
be deputed at the client?s site, so as to avoid any problem and if any problem occurs
immediate solution may be provided
*he maintenance provided with our system after installation is as follows>
9irst of all there was a 5lassification of !aintenance "lan which meant that the people
involved in providing the after support were divided *he main responsibility was on the
shoulders of the "roject !anager who would be informed in case any bug appeared in the
system or any other kind of problem rose causing a disturbance in functioning *he "roject
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage @D
-
8/9/2019 Online Shopping Mart
70/87
leader in turn would approach us to solve the various problems at technical level #.g *he
form isn?t accepting data in a proper format or it is not saving data in the database'
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage @
-
8/9/2019 Online Shopping Mart
71/87
SECRIT# FEATRES
-uthentication is the process of identifying users -uthori6ation is the process of granting access
to users based on identity *ogether, authentication and authori6ation provide the means to keep
your application secure from intruders
*he kind of security measures used in our +ystem are as follows>
se' Authentic(tion
%nly the Falid users, who are present in the pre defined list of Users stored in User
!aster table are granted permissions to enter the +ystem -ny user apart from 2ecord of Users
are denied access
se' Autho'i5(tion
- *'i1ilege is a right to execute a particular type of +; statement or to access
another user?s object +ome examples of privileges include the right to
5onnect to the database #create a session'
5reate a table
+elect rows from another user?s table
.xecute another user?s stored procedure
"rivileges are granted to users so that they can accomplish tasks re3uired for their jobs -
privilege should be granted only to a user who absolutely re3uires it to accomplish necessary
task .xcessive granting can compromise security
- privilege can be granted in ( ways>
a' rant privileges to users explicitly
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage A0
-
8/9/2019 Online Shopping Mart
72/87
b' rant privileges to a role #a named group of privileges', and then grant the role to one or
more users 7ecause roles allow for easier and better management of privileges, you should
normally grant privileges to roles and not to specific users
*here are two distinct categories of privileges>
+ystem privileges
+chema object privileges
S+ste- P'i1ileges
- system privilege is the right to perform a particular action, or to perform an action on
any schema objects of a particular type 9or example, the privileges to create tablespaces and to
delete the rows of any table in a database are system privileges *here are over @0 distinct system
privileges Eou can grant or revoke system privileges to users and roles %nly users who have
been granted a specific system privilege with the -&!IN %"*I%N or users with the system
privileges 2-N* -NE "2IFI.. or 2-N* -NE %7=.5* "2IFI.. can grant or
revoke system privileges to other users e grant system privileges only to administrative
personnel and application developers .nd users normally do not re3uire the associated
capabilities
Sche-( O/0ect P'i1ileges
- schema object privilege is a privilege or right to perform a particular action on a
specific schema object>
*able
Fiew
+e3uence
"rocedure
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage A1
-
8/9/2019 Online Shopping Mart
73/87
9unction
"ackage
- user automatically has all object privileges for schema objects contained in his or
her schema - user can grant any object privilege on any schema object he or she
owns to any other user or role
Roles
%racle provides for easy and controlled privilege management through roles 2oles are named
groups of related privileges that we grant to users or other roles 2oles are designed to ease the
administration of end/user system and schema object privileges $owever, roles are not meant to
be used for application developers, because the privileges to access schema objects within stored
programmatic constructs need to be granted directly
*hese following properties of roles enable easier privilege management within a database>
Re)uce) *'i1ilege ()-inist'(tion
2ather than granting the same set of privileges explicitly to several users, you can grant
the privileges for a group of related users to a role, and then only the role needs to be granted to
each member of the group
D+n(-ic *'i1ilege -(n(ge-ent
If the privileges of a group must change, only the privileges of the role need to be
modified *he security domains of all users granted the group?s role automatically reflect the
changes made to the role
-ny user granted a can grant or revoke that role to or
from other users or roles of the database *his option allows administrative powers
for roles on a selective basis
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage A(
-
8/9/2019 Online Shopping Mart
74/87
52.-*. 2%. -&!IN5%N*2%L
2-N* -&!IN5%N*2% *% -&!INI+*2-*%2L
Master User
*he !aster User has been given schema object privileges like select, insert, update , delete
operations to be performed on the master tables No other user except the !asters can gain
access into the !aster tables and perform manipulations
e have given the 2ole to !aster user using the following syntax>
52.-*. 2%. !-+*.2U+.2L
2-N* +..5*, IN+.2* , U"&-*. , &..*. %N *U+.2!+ *% !-+*.2U+.2L
2-N* +..5*, IN+.2* , U"&-*. , &..*. %N *-+"!+ *% !-+*.2U+.2L
2-N* +..5*, IN+.2* , U"&-*. , &..*. %N *+U7!+ *% !-+*.2U+.2L
2-N* +..5*, IN+.2* , U"&-*. , &..*. %N *+U7+%U25.!+ *%
!-+*.2U+.2L
2-N* +..5*, IN+.2* , U"&-*. , &..*. %N *IN+**E".!+ *% !-+*.2U+.2
2-N* +..5*, IN+.2* , U"&-*. , &..*. %N *7-NO!+ *% !-+*.2U+.2L
2-N* +..5*, IN+.2* , U"&-*. , &..*. %N *+%U25.!+ *%
!-+*.2U+.2L
2-N* +..5*, IN+.2* , U"&-*. , &..*. %N *+*-*.!+ *%
!-+*.2U+.2L
2-N* +..5*, IN+.2* , U"&-*. , &..*. %N *"%&!+ *% !-+*.2U+.2L
2-N* +..5*, IN+.2* , U"&-*. , &..*. %N *5%!"&+ *% !-+*.2U+.2L
2-N* +..5*, IN+.2* , U"&-*. , &..*. %N *!%N*2-5O *%!-+*.2U+.2L
*he !asterUser 2ole has +elect , Insert , Update , &elete "rivileges on all the above mentioned
tables *his 2ole can now be granted to additional users
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage A)
-
8/9/2019 Online Shopping Mart
75/87
Regular User
*he 2egular User has been given schema object privileges like select, insert, update , delete
operations to be performed on the selective tables like *+ubscription!s , *"%&!s ,
*5omp&s *hese users cannot gain access or perform any kind of manipulations on the
specific tables which have been assigned to the !aster Users
e have given the 2ole to 2egular User using the following syntax >
52.-*. 2%. 2.U-2U+.2L
2-N* +..5*, IN+.2* , U"&-*. , &..*. %N *5%!"&+ *% 2.U-2U+.2L
*he 2egularUser 2ole can be granted to a number of users
2-N* 2.U-2U+.2 *% user-2-N* 2.U-2U+.2 *% user5L
Now users user- , user7 , user5 have a number privileges on above ) tables
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage A4
-
8/9/2019 Online Shopping Mart
76/87
T(/le Le1el Secu'it+
+chema object privileges for tables allow table security at the level of &ata !anipulation
anguage and &ata &efinition anguage operations
D(t( M(ni*ul(tion L(ngu(ge O*e'(tions
e can grant privileges to use the various &! statements like &..*., IN+.2*,
+..5*, and U"&-*. to perform operations on a table or view e grant these privileges only
to users and roles that need to 3uery or manipulate a table?s data
ith selective IN+.2*, a privileged user can insert a row with values for the
selected columns -ll other columns receive NU or the column?s default value
ith selective U"&-*., a user can update only specific column values of a row
+elective IN+.2* and U"&-*. privileges are used to restrict a user?s access to
sensitive data
D(t( De2inition L(ngu(ge O*e'(tions
In our system we have used && operations to maintain the table level security
e have a system which keeps a track of each and every user gaining access into the system at any
perform any changes on the various tables *he listing of these users along with the access dates
seen by the administrator
*he concept used here is that we have maintained some columns hidden away from the user as they
appear on the forms Using these columns we maintain trail of all the valid users along with their log
and time there by determining which end user has performed what sort of change on a table $ere w
use of lobal Fariables which captures every user entering the system and browsing through it and
changes
Using the syntax>
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage A:
-
8/9/2019 Online Shopping Mart
77/87
>%7-52.-*.&7E>TU+.2N-!.L
>%7-U"&-*.&7E>TU+.2N-!.L
PRE:INSERT TRIGGER
-
8/9/2019 Online Shopping Mart
78/87
COST ESTIMATION
*he cost estimation depends upon the following>
• "roject complexity
• "roject si6e
• &egree of structural uncertainty
• $uman, technical, environmental, political can affect the ultimate cost of software
and effort applied to develop it
• &elay estimation until late in the project
• 7ase estimates on similar projects that have already been completed
• Use relatively simple decomposition techni3ues to generate project cost and effort
estimates
• Use one or more empirical models for software cost and effort estimation
"roject complexity, project si6e and the degree of structural uncertainty all affect the reliability of
estimates 9or complex, custom systems, a large cost estimation error can make the difference
between profit and loss - model is based on experience and takes the form>
& T f#Fi'
here d is one of a number of estimated values #eg effort, cost, project duration' and #Fi' are
selected independent parameters #eg estimated %5 #ine of 5ode' or 9" #9unctional
parameters''
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage AA
-
8/9/2019 Online Shopping Mart
79/87
Ne3 H(')3('e 7 So2t3('e<
Intel "entium IF "rocessor
Windows 2000 (Proessional)+; +erver #+ingle User with 1: icenses'
&eveloper @i #icense for 1: Users'
DIFFERENT PHASES OF PROPOSED SOFT&ARE DE"ELOPMENT
1 +ystem +tudy
( +2+ #+ystem 2e3uirement +tudy' &ocuments and approval
$ A)1(nce A-ount , o2 )e1elo*-ent ch('ges 2ull cost o2 the so2t3('e.
4 +tarting %f development #Interface &esign and -pproval'
: &evelopment
@ "resentation of New +ystem
>n) *('ti(l )e1elo*-ent ch('ges ,Rest .$
A User training
D Implementation
+upport
10 +upport for the futuristic changes
P'ice ;uot(tion
• *he process will start after the system study and with an advance amount of :0V
from the corporate as advance *he rest in at the time of implementation
• *he project will approximately re3uire D man months #D person for 1 month' to be
completed
• *he development cost for this proposed software will be
2s 11,:00 #per man month' P D #man months' T 2s (,000J/
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage AD
-
8/9/2019 Online Shopping Mart
80/87
• 5ost of original software #+; +erver' 2s :D,000 #approx', #&eveloper @i' 2s
1D,000 #approx' excluding 4V +*
Tot(l< Rs =!! ,Eclu)ing LST on So2t3('e.
@@Te a$ove mentione( ri"e in"l*(es #ree onsite maintenan"e an( minor
"anges #or monts starting #rom te (ay o# /nal imlementation an( visit
"arges 5tat )ill $e ma(e )ile training an( imlementation o# te ro!e"t9
as )ell as imorting o# te external G ra) (ata #rom (iQerent (ata so*r"es to
te master (ata$ase,
-nnual !aintenance of software #-!5' can be undertaken only after getting the consent
from the concerned corporate J organi6ation with proper documents only
AMC st(n)s 2o' Annu(l M(inten(nce Cont'(ct$
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage A
-
8/9/2019 Online Shopping Mart
81/87
PRO9ECT PROCESS FLO&
PERT GANTT CHART
In order to ensure the success of a project, it is necessary for the team members involved in
the project development and the customers to have a clear vision of the project goals and
objectives %nce we have estimated of the effort and time re3uirement for the different phases a
schedule for the project can be prepared *his schedule will then be used later for monitoring the
progress of the project
.stablishing a project vision offers the following advantages
5larification of "roject goals
"rioriti6ing of processes
Integration with other products
7asis for future planning
Two general techniques of scheduling are Program evalutation and review technique (PERT)
charts and Gantt charts
The Gantt chart: is perhaps the simplest form of formal project management Gantt !hart
(developed "# $enr#% & Gantt) is a project control technique that can "e used for several
purposes% including scheduling and resource planning
It is a bar chart with each bar representing an activity *he bars are drawn against a
time line *he length of each bar is proportional to the length of the time planned for
the activity
It is used almost exclusively for scheduling purposes and therefore controls only the
time dimension of projects
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage D0
-
8/9/2019 Online Shopping Mart
82/87
It helps in scheduling the activities of the project but not in identifying them
It is best for resource scheduling
It shows the tasks and their duration clearly, however do not show the intertasks
dependencies plainly
- antt chart helps in scheduling the activities identified in the work break down structure
&uring the scheduling activity and also during implementation of the project, new activities may
be identified that were not envisioned during the initial planning *he manager must then go
back and revise the break down structure and schedule to deal with these new activities
*he antt chart in the figure is actually an enhanced version of standard antt charts
*he white part of the bar shows the length of time each task is estimated to take *he black part
shows the actual time, that is, the latest time by which a task is finished
antt charts can take different forms depending on their intended use *hey are
for resource scheduling hen a 7ar chart is used as a project control method , milestones or
check points usually are placed at the completion of each task #they may also placed with in
task' *hey indicate the completion of particular task and the project are on scheduleL when a
checkpoint is reached, the task just completed and the entire project are reviewed and evaluated
2eviewers ask where resources allocated have been properly utili6ed and indication of which
task must be completed before others are begun and project costs must be accumulated and
evaluated using other methods
antt chart uses a calendars oriented chart for representing the project schedule .ach
activity is represented as a bar in the calendar starting from the starting date of the activity and
ending at the ending date for that activity *he start 8 end of each activity become milestones for
the project
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage D1
-
8/9/2019 Online Shopping Mart
83/87
*he main drawback of the antt chart is that it doesn?t depict the dependent relations
among the different activities $ence the effort of slippage in one activity on other activities or
on the overall project schedule cannot be determined $owever, it is conceptually simple 8 easy
to understand, and is heavily used It is sufficient for small 8 mediumsi6ed projects
*he antt chart for my project made in the year (00) is as follows> /
The PERT Ch('t
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage D(
St(n)s 2o' Pl(nne) Du'(tion
St(n)s 2o' Actu(l Du'(tion
-
8/9/2019 Online Shopping Mart
84/87
5an be both a cost and time management system
Is a scheduling device that shows graphically which tasks must be completed before others
are begun
7y displaying various paths, enables the calculation of a critical path
+hows the task dependencies directly
Is designed to facilitate getting a project back on schedule
So-e o2 the ()1(nt(ges o2 PERT ('e (s 2ollo3s<
It enforces the manager to plan
It shows the interrelationships among the tasks in the project and, in particular, clearly identifies
the critical path of the project, thus helping to focus on it
It exposes all possible parallelism in the activities and thus helps in allocating resources
".2* chart for my project is as follows>
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage D)
: &ays
: &ays
: &ays: &ays
@: &ays
(( &ays)) &ays
0 &ay (: &ays
10 &ays
4D &ays
0 &ay
Start
Syste
m
Study
SRS
Planni
ng
Project
Desig
n
oding
lient
Site!esting
"m#leme
ntation
$nd%aintenan
ce
& Su##ort
Sel
!esting
-
8/9/2019 Online Shopping Mart
85/87
".2* is organi6ed by events and activities or tasks ".2* has several advantages over bar chart
and likely to be used with more complex projects %ne advantage of ".2* is that it is scheduling
device that also shows graphically which task must be completed before others are begun
-lso by displaying the various task paths, pert enables the calculation of a critical path
.ach path consists of combination of task, which must be completed *he time 8 cost associated
with each task along a path are calculated and the path that re3uires the greatest amount of
elapsed time is the critical path 5alculation of the critical path enables project managers to,
monitors this series of task more closely than others and to shift resources to it if it begins to fall
behind schedule
&espite these advantages, ".2* is just a tool, and its use doesn?t automatically guarantee the
success of the project *he manager has much latitude in how ".2* is used ".2* is highly
developed methodology and full description of it is into computer programs and is available
as computeri6ed management system
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage D4
-
8/9/2019 Online Shopping Mart
86/87
FTRE SCOPE OF THE PRO9ECT
*his software can be easily upgraded in the future -nd also include many more*his software can be easily upgraded in the future -nd also include many more
features for existing systemfeatures for existing system
It is connected with the internet for easily retrieved data about differentIt is connected with the internet for easily retrieved data about differenttypes of products, newly launched products can be easily added into thetypes of products, newly launched products can be easily added into the
site using databasesite using database
-ll the information can be easily accessed the 5ustomer like their details,-ll the information can be easily accessed the 5ustomer like their details,
order status, stock,order status, stock,
*ransaction It can be modify and the others details can be easily provided*ransaction It can be modify and the others details can be easily provided
to customerto customer
2eport on the different basis will be easily created on the demand2eport on the different basis will be easily created on the demand
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage D:
-
8/9/2019 Online Shopping Mart
87/87
BIBLIOGRAPH#<
Boo6s:
!icrosoft Fisual 5
wwwgooglecom
wwww)schoolscom
wwwdotnetspidercom
wwwjavasciptcom
http://www.google.com/http://www.w3schools.com/http://www.dotnetspider.com/http://www.javascipt.com/http://www.google.com/http://www.w3schools.com/http://www.dotnetspider.com/http://www.javascipt.com/
top related