online shopping mart

Upload: sami-zama

Post on 01-Jun-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/9/2019 Online Shopping Mart

    1/87

    A PROJECT REPORT ON

    “ONLINE SHOPPING MART”

    Submitted in the partial ulillment ! the re"uirement !r the

    A#ard ! de$ree ! 

      BACHELOR OF COMPUTER

    APPLICATION

     Submitted %& Submitted t!'

    Neha (harma Mr)*I*E+ANAN, PAN,E-R!ll n!) ./00123

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 0

  • 8/9/2019 Online Shopping Mart

    2/87

    Pl!t N!) 45 In(tituti!nal Area5 +n!#led$e Par6 7 /5Greater N!ida5 8ttar Prade(h 91/210

     

    DECLARATION

    I Neha sharma, hereby declare that the project work entitled “ONLINE SHOPPING MART” is

    an authenticated work carried out by me at High Technologies Solutions Under the guidance of 

    Mr)*I*E+ANAN, PAN,E-  for the partial fulfillment of the award of the degree of 

    BACHELOR OF COMPTER APPLICATION and this work has not been submitted for 

    similar purpose anywhere else except to  HIMT ! GREATER NOIDA, affiliated to CCS

    NI"ERSIT#! MEERT$

    ,ate'

    Pla:e'

    Neha (harma

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 1

  • 8/9/2019 Online Shopping Mart

    3/87

    AC%NO&LEDGEMENT

    It is high privilege for me to express my deep sense of gratitude to all those faculty members

    who helped me in the completion of the project, especially my internal guide

    Mr)*I*E+ANAN, PAN,E-  who was always there at hour of need

    !y special thanks to "rofessor M'$  N('en)'( **()h(+(  #$%&' for helping me in the

    completion of project work and its report submission

      ,Neh( Sh('-(.

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage (

  • 8/9/2019 Online Shopping Mart

    4/87

    TABLE OF CONTENTS

    Int'o)uction

    O/0ecti1es

    S+ste- An(l+sis

    I)enti2ic(tion o2 the nee) P'eli-in('+ In1estig(tion

    Fe(si/ilit+ Stu)+

    Technic(l Fe(si/ilit+

    Econo-ic(l Fe(si/ilit+

    O*e'(tion(l Fe(si/ilit+

    So2t3('e Enginee'ing P('()ig- (**lie)

    So2t3('e (n) H(')3('e Re4ui'e-ent S*eci2ic(tion

    S+ste- Design

    Co)ing

    Co)e e22icienc+ O*ti-i5(tion o2 co)e

    "(li)(tion Chec6s

    Testing ,Testing Techni4ues 7 Testing st'(tegies.

    I-*l8-ent(tion

    E1(lu(tion

    M(inten(nce

    Secu'it+ Me(su'es t(6en

    Cost Esti-(tion o2 the P'o0ect

    Re*o'ts

    PERT Ch('t

    G(ntt Ch('t

    Futu'e Sco*e o2 the P'o0ect

    Bi/liog'(*h+

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage )

  • 8/9/2019 Online Shopping Mart

    5/87

    INTRODCTION

    *he %nline +hopping !art eb site is the application that provides customers with online

    shopping *hrough a eb browser, a customer can browse the catalog, place items to purchase

    into a virtual shopping cart, create and sign in to a user account, and purchase the shopping cart

    contents by placing an order with a credit card

      *he -pplication is a working demonstration of how to use blueprints principles in a real

    application design *his document is an online guide to the design and the implementation of 

    the application .nterprise -pplications with web technology

    .ach release of the application maintains consistent design features such as separating

    logic and presentation, using web component for control and web pages for presentation, using

     business components, and so on high/level design features, this document goes deeper into the

    implementation details of the current application release

    *his document is provided as an online/only resource so that it may be continually

    extended and updated *his document begins with a description of the separate applications

    that the sample application comprises, describes the modular structure of the .!-* application,

    and provides an in/depth description of several pieces of the modules

    .ach %NIN. +$%""IN !-2* module has different re3uirements from the others *his

    section describes the re3uirements, design, and implementation of each module

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 4

  • 8/9/2019 Online Shopping Mart

    6/87

    OB9ECTI"ES

    • *his is a web/based +hopping site intended to provide automated solution for customers

    as well as .mployers on the basis of various categories of "roducts , "roducts are

    available in different 5ities of India and even abroad

    • *his +hopping site provides some innovative features

    o  providing platform to other consultant is highly commendable

    o It is extremely User friendly

    • .ven if job seeker does not have idea about resume making and other job criteria then he

    or she can directly take suggestions from career counseling 6one

    • 5onsultants and .mployers from different locations get registered and post the job

    according to the re3uirement so that job seekers can look for it and apply for same if they

    have desired profile

    • %nline +hopping 7enefits 8 +olutions

    o et 2ight products in shortest time

    o "aperless database hence paperless office

    o 9ind -vailable products in shortest time

    • "rovides +ervices to the 5ustomers

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage :

  • 8/9/2019 Online Shopping Mart

    7/87

    P R O 9 E C T C A T E G O R #

    *he software which is being developed comes under both %%"+ and 2&7!+ category *he proposed project based on 5 +harp N.* as a front end and +; +erver as a back end hile

    taking 5

    • A/st'(ction: *he ability to create an abstract representation of a concept in code *he

    techni3ue of creating new data types that are well suited to an application to be

     programmed is known as data abstraction It provides ability to create user/defined data

    types, for modeling a real world object, having the properties of built in data types and aset of permitted operators

    • Enc(*sul(tion:  .ncapsulation is all about the separation between implementation and

    interface In other words, when you encapsulate and object, you make its code and datainternal and no longer accessible to the outside except through a well/defined interface

    *his is also called data hiding

    • Pol+-o'*his-: *his is all about creating procedure that can operate on object of 

    different types 5 +harp N.* handles polymorphism with both late binding and multiple

    interfaces

    • Inhe'it(nce:  Inheritance allows us to derive new classes from other classes *he idea

    here is that if we were to create, for example, a class for a specific c sharp form and thenderive a new type of form from that class, thee derived class will inherit all the base

    class?s functionality, even before we start adding code or customi6ing the new form

    S;L Se'1e' provides a suite of tools for managing all aspects of +; +erver development,

    3uerying, tuning, and administration hile designing a database, the database administrator creates database objects such as tables, columns, keys, indices, relationships, constraints, and

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage @

  • 8/9/2019 Online Shopping Mart

    8/87

    views *o help create these objects, the +; +erver !anagement +tudio provides access to

    visual database tools *hese tools provide three mechanisms to aid in database design> the

    &atabase &esigner, the *able &esigner, and the view designer

    *he integrated ;uery .ditor provides a simple graphical user interface for running +; 3ueries

    and viewing the results *he ;uery .ditor also provides a graphical representation of show plan,the steps chosen by the optimi6er for 3uery execution

    +; +erver supports the hosting of the N.* 5ommon anguage 2untime #52' inside the +;+erver process to enable database programmers to write business logic as functions, stored

     procedures, triggers, data types, and aggregates *he ability to run

    -pplication code inside the database adds flexibility to the design of application architectures

    that re3uires business logic to execute close to the data and cannot afford the cost of shipping

    data to middle/tier process to perform computation outside the database -pplication code is

    deployed inside the database by using assemblies, which are the units of packaging, deployment,and versioning of application code in N.* &eployment of application code inside the database

     provides uniform way to administer, 7ack up, and restore complete database applications

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage A

  • 8/9/2019 Online Shopping Mart

    9/87

    S#STEM ANAL#SIS

    I&.N*I9I5-*I%N %9 N..&

    BInformation is the basic ingredients of any organi6ationC It is integral to all living organisms

    *hese statements indicate that information is essential to all human activity and in fact to the

    very nature of being alive

    +ince the commencement of modern era, especially after industriali6ation, the need for effective

    and 3uick communications has always been reali6ed *he dynamic growth of commerce and

    industry began to place new and considerable pressures on the service industry &espite rapid

    advancement in the electronic communications and transport industries, the need to transport

     parcels and documents within a short time become a pressing need

    -t the heart of system analysis, I identified the need, in terms of a detail understanding of all

    important facets of the business area under investigation In order to fulfill the users?

    re3uirements, the companies have to do a lot of paper work *hat leads to time consumption

    issues particularly when the work load is heavy, which affects the productivity and efficiency of 

    the employees

    *his project BOnline Sho**ing M('tC has been developed keeping in mind the heights

    BInformation *echnology has reachedC and when everything is powered with computers does

    make a great difference *his website contains information about discount offers run in their hot

    city and the combination of offers which customer get more discount and achieve maximum

    discount and customer also can compare available offers etc as well as -dviser can post offer for 

    customer

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage D

  • 8/9/2019 Online Shopping Mart

    10/87

    "2.I!IN-2E INF.+*I-*I%N

    *his is one of the crucial phases of the software development life cycle which is responsible for 

    reliable product delivery 9or the sake of 3ualitative product delivery, which could meet the

    re3uirements of the client, the preliminary investigation plays an important role because this is

    the crucial part of analysis which defines the Gwhat? actually the system does In other words, it

    specifies that what the system does hat are the features and functionality of the proposed

    systemH hat are the present circumstances and the problem which is being faced by the

    organi6ationH

    *he preliminary investigation phase is the axle of the software development around which

    reliable and customer satisfactory product development depends -s far as current project Online

    Sho**ing M('t concerned it helps in faster retrieval of data in less time and least complexity

    -fter going through certain investigations, we got to know the problems faced by the current

    system In the context of manual existing system that it is 3uite difficult to take 3uick decision on

    the basis of existing information -lthough the information of the system is being maintained

    manually but the information retrieval is slow 9or example, whenever any customer needs to

    know the current status of any promotional offer in different city, it takes time to know the result

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage

  • 8/9/2019 Online Shopping Mart

    11/87

    9.-+I7II*E +*U&E

    *he word feasible means capable of being carried out successfully -n event is said to be feasible

    if it is considered possible and practicable *he 9easibility +tudy is an investigation into how possible a proposed scheme might be, and whether it is capable of being carried out successfully

    *his is usually assessed on four standard criteria for feasibility but other considerations may be

    relevant and necessary depending on the specific nature of the project and its environment It

    refers to the phase where the proposed system is tested whether it is really re3uired in the present

    working conditions or not It is a very important step in system development as its result

    determines whether the system has to be developed or not *he process followed in making this

    is called feasibility study hen the developer is building any system, heJshe should make sure

    that the system heJshe is going to build is feasible

    +ince the feasibility study may lead to commitment of large resources, it becomes necessary that

    it should be conducted competently and that no fundamental errors of judgment are made

    Preliminary investigation examines ro!e"t #easi$ility% te li'elioo( te

    system )ill $e *se#*l to te organi+ation, Tree imortant test o# #easi$ility

    are (es"ri$e( $elo)-

    • Econo-ic(l 2e(si/ilit+

    • Technic(l 2e(si/ilit+

    • O*e'(tion(l 2e(si/ilit+

    • Soci(l 2e(si/ilit+

    In feasibility study, we check the durability, reliability, operability, compatibility etc of the

    system - feasibility study is a preliminary study undertaken to determine and document a

     projectKs viability *he results of this study are used to make a decision whether to proceed with

    the project, or table it If it indeed leads to a project being approved, it will / before the real work

    of the proposed project starts / be used to ascertain the likelihood of the projectKs success It is an

    analysis of possible alternative solutions to a problem and a recommendation on the best

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 10

  • 8/9/2019 Online Shopping Mart

    12/87

    alternative It, for example, can decide whether an order processing be carried out by a new

    system more efficiently than the previous one

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 11

  • 8/9/2019 Online Shopping Mart

    13/87

    "2%=.5* "-NNIN

    "roject planning is very important in every aspect of development work 9or successful

    completion of the project, good managers carefully monitor developments at various phases

    Improper planning leads to failure of the project "roject planning can be viewed as the

    following>

    ithin the organi6ation, it is important to consider that how the project is to be implementedH

    hat are various constraints #time, cost, and staffH' hat is market strategyH

    -part from these, it is also important to consider the customers response and their satisfaction

    9or this purpose, a weekly or timely meeting with the customer with presentations on status

    reports is supposed to be essential steps 5ustomer feedback is also taken and further 

    modifications and developments are done "roject milestones and deliverables are also presented

    to the customer

    9or the success of proposed project, essential and re3uired steps have been taken *his can be

    seen as follows>

    • Selection o2 ( *'o0ect<

    hile selecting the proposed project, project?s aims and objectives is identified *o meet

    the customer need we elaborated their re3uirements and specification 9or this purpose,

    analysis, design and implementation, their corresponding testing techni3ues and proper 

    documentation has been done

    • P'o0ect -ilestones (n) )eli1e'(/les<

    9or completing the project on time, it was always considered their project milestones -t

    specific time, how many milestones has been achieved and for what deliverables it is

    ready It helped us to achieve the success one by one

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 1(

  • 8/9/2019 Online Shopping Mart

    14/87

    • Bu)get (lloc(tion<

    In budget allocation, we consider that the, for the sake of completion of the project it

    should not exceed the limits within control

    • P'o0ect esti-(tes<

    In project estimation, we consider the cost, time, si6e of code, duration of the project It

    estimated the cost which was re3uired to complete *he si6e of code is anticipated in the

    right way because cost and duration depend on the line of codes

    • Resou'ce (lloc(tion<

    9or the sake of the development of the project, it is important to consider the resource

    7ecause, lack of resource, we can?t imagine about the development of the product *he

     proper hardware, software should be their "revious relevant project information and

    digital library plays an important role for proper estimation of product

    • Ris6 -(n(ge-ent<

    -ny problem that occurs during customer specification, design, design, coding,

    implementation and testing can be termed as a risk If they are ignored, then they

     propagate further down and it is termed ripple effect 2isk management deals with

    avoidance and detection of risk at every phase of the software development cycle &uring

    the development of the project, it is considered that there should not be raised any risk

    9or this purpose, proper exception handling has been done for every block of codes sothat any run time error does not occur

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 1)

  • 8/9/2019 Online Shopping Mart

    15/87

    • Sche)uling techni4ues<

    It is important to schedule the project development duration for the completion of product

    on time 7ecause, the exceeding the development time duration lead the different

     problem and customer dissatisfaction

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 14

  • 8/9/2019 Online Shopping Mart

    16/87

    +%9*-2. 2.;UI2.!.N*

    =$ Int'o)uction

    *his section contains the software re3uirement specificationL it is a description of the different

    modules of the system that can be used in this project +oftware 2e3uirement +pecification

    document provides a complete detail re3uired for designing and developing the system It is the

    description of system proposed which we get while preliminary investigation of the organi6ation

    =$= Pu'*ose

    *he purpose of the project named BOnline Sho**ing M('tC is to deal with the 3ueries of user 

    for a company simultaneously running its &iscount offers in different/different cities where the

    users can see, buy and view the status online about what the offer available is

    “Online Sho**ing M('t” is being developed for the need of Users and "roduct selling company

    running simultaneously *his is specially meant for their frontline user service information *his

    is one of the best efforts by us to prove that how Internet can be helpful in entire service industry

    where in3uiries are always in 3ueue *his system however is a snap shot of the whole scenario

    for the booming .commerce industry

    >$ O1e'(ll Desc'i*tion

    *he overall development summary and description of this project are as follows>

    >$= De1elo*-ent<

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 1:

  • 8/9/2019 Online Shopping Mart

    17/87

    *he environment for development, operation and maintenance can be categori6ed into

    hardware re3uirement specification and software re3uirement specification .ach of these

    re3uirements has been dealt with as given below>/

    *he website is developed using Fisual +tudio N.* Fersion ): as N.* 9ramework 

    (010 and +; +erver (00: as a backend for the sake of database storage

    *he minimum system specification in which the system is developed are as follows >

    HARD&ARE<

    P'ocesso' Intel Pentiu- >$? GH@

    Me-o'+ > M$B$! D$D$R$ RAMNet3o'6 A)(*te' Ethe'net A)(*te'

    Mo)e- 6*/s "oice F( D(t(

    Secon)('+ Sto'(ge S(-sungSe(g(te H(') )is6 ,? G$B.

    In fact, it is recommended hardware re3uirement for the sake of better development

    environment

    So2t3('e Re4ui'e-ent<

    Pl(t2o'- &in)o3s

    O*e'(ting S+ste- &in)o3s P

    F'(-e3o'6 $Net FRAME&OR% $

    F'ont:En) Tool "isu(l Stu)io >

    Sc'i*ting L(ngu(ge C! HTML

    Inte'2(ce HTML! "isu(l Stu)io

    Se'1e' Inte'net In2o'-(tion Se'1e'

    B(c6:En) Tool S;L Se'1e' >

    Technolog+ ASP$NET

    >$> O*e'(tion<

    *o successfully install the proposed system named BOnline Sho**ing M('tC the system must

    meet the above system re3uirements

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 1@

  • 8/9/2019 Online Shopping Mart

    18/87

    *his project will provide the organi6ation a new environment and changes which will energi6e

    the employee and their concerned individual to get rid from the problem which was being faced

     by them earlier *his would give the organi6ation a new motivation to the employee that they are

    getting new work environment which is similar to the real life top organi6ation *hey would have

    the feeling of up/to/date work environment which plays an important role to utili6e optimum

    employees? skills and their productivity

    >$ Const'(ints

    -s we know that there is nothing in the world which can be said complete In other words

    everything has its own limitation +o far as this project is concerned it eliminates the manual

    system which had a lot of paper work +o this project is not only time saving but also it is simple

    9or example the searching for any booking information or modifying any office description has

     become easier

    $ S*eci2ic Re4ui'e-ents

    -fter going through  the analysis report of the proposed project, we found that the main

    re3uirement of the organi6ation is that, they wanted to have a better organi6ed system which is

    easy to understand and easy to learn and they can feel the ease of working in spite of complex

    and peak load of work environment

    $= Ete'n(l Inte'2(ces

    hile designing the proposed project we have given the specific attention to the interface

     because the website is being developed for the medium skilled people .mployee of the

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 1A

  • 8/9/2019 Online Shopping Mart

    19/87

    concerned organi6ation is not any computer expert +o due to this reason the interface is easy to

    understand and very simple It?s all design is also very simpler and attractive +o the people who

    have very little knowledge of computers can also use this website, they will take very less time to

    operate this

    $> Pe'2o'-(nce Re4ui'e-ents

    *he performance characteristic includes various factors which is responsible for efficient

     performance of the project *he primary and secondary memory re3uirements which is

    recommended for optimum performance is minimum (:@ !7 2-! and (0 7 hard disc and

    "entium 4 processor as well

    $ Pe'2o'-(nce Results<

    *he analysis and comparison of the different websites of its similar type, the proposed project is

    efficient which provides an insight on the most effective Online Sho**ing M('t system in terms

    of their user friendliness and utili6ation *his will increase the effective utili6ation of the

    available resource and hence the work efficiency will improve

    It will also be helpful to new employee who has just joined the company because the design of 

    the website made the entire company information just a click away from the user %ver all this

    must be helpful for optimi6e the performance

    S#STEM DESIGN

    DESIGN PATTERN

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 1D

  • 8/9/2019 Online Shopping Mart

    20/87

    *his software based on concept of the !odel Fiew 5ontroller #!F5' design pattern Fiew

    renders the data from the !odel in response to the re3uest made to the model by controlled

    events made by user interaction

    !odel Fiew 5ontroller is a design approach to separate the application object model from UI,

    originally invented around D0s *hen later on it has become a widely accepted common design pattern *he main objective behind this pattern is to decouple the view of the data #presentation

    layer' from the actual data processing so that the same model can be used for various views *his

    is achieved by using three different types of objects that interact with each other in looselycoupled manner with their discreet set of tasks

    *hese three objects are known as !odel, Fiew and 5ontroller

    "IE&<

    Fiew is the graphical data presentation #outputting' irrespective of the real data processing Fiew

    is the responsible for look and feel, some custom formatting, sorting etc Fiew is completelyisolated from actual complex data operations 9or example, online product catalogue view is

    completely separated from database connection, 3uery, tables etc It simply gets final row/data

    from the model and puts some cosmetics and formatting before displaying it in browser

    Fiew provides interface to interact with the system *he beauty of !F5 approach is that itsupports any kind of view, which is challenging in today?s distributed and multi/platform

    environment

    - !F5 model can have multiple views, which are controlled by controller Fiew interface can

     be of .7/9%2!+, $*!, M!JM+*, M*!, and ! or can be indows forms etc

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 1

  • 8/9/2019 Online Shopping Mart

    21/87

    MODEL<

    !odel is responsible for actual data processing, like database connection, 3uerying database,

    implementing business rules etc It feeds data to the view without worrying about the actual

    formatting and look and feel &ata provided by !odel is display/neutral so it can be interfacedwith as many views without code redundancyL this eases your code maintenance and reduces

     bugs and allows code / reuse at good extent !odel responds to the re3uest made by controllers

    and notifies the registered views to update their display with new data

    CONTROLLER<

    5ontroller is responsible for Notice of action 5ontroller responds to the mouse or keyboardinput to command model and view to change 5ontrollers are associated with views User

    interaction triggers the events to change the model, which in turn calls some methods of model to

    update its state to notify other registered views to refresh their display

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage (0

  • 8/9/2019 Online Shopping Mart

    22/87

    Bene2its<

    9ollowing are the few of the benefits of !F5 design pattern

    • +ince !F5 handles the multiple views using the same enterprise model it is easier to

    maintain, test and upgrade the multiple system• It will be easier to add new clients just by adding their views and controllers• +ince the !odel is completely decoupled from view it allows lot of flexibilities to design

    and implement the model considering reusability and modularity *his model also can be

    extended for further distributed application• It is possible to have development process in parallel for model, view and controller

    SECRIT#

    *his module controls security and integrity of database in each module with multilevel

     password that can be assigned to authori6ed users by the super user

    -55.++ 5%N*2% #ho has the right to access the software'

    -U*$%2I+-*I%N #&efining rights of an user'

    -U*$.N*I5-*I%N #5hecking who the user is'

    &-*- IN*.2I*E #"rotection of data from modification and deletion'

    &-*- +.5U2I*E #!aintain confidentiality of data'

    "-++%2& IN*.2I*E #.ncryption of passwords'

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage (1

  • 8/9/2019 Online Shopping Mart

    23/87

    MODLARISATION DETAILS

    P'o0ect Mo)ules<

    *he proposed website will have its main page and will be mainly divided into partially

    dependent and partially independent modules as/

    2egistration J ogin maintenance

    -dmin

    User

    +alesman

    User ogin +ucceed

     "rofile

    "roduct allery

    5art Items

    +old "roducts

    -dmin ogin +ucceed

    -dd Item *ype

    -dd Items

    -dd Item &etails

    "roduct &etails

    -dd +alesman

      +alesman ogin +ucceed

    5ustomer &etails

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage ((

  • 8/9/2019 Online Shopping Mart

    24/87

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage ()

  • 8/9/2019 Online Shopping Mart

    25/87

    DATA STRCTRE

    *he normali6ed form of the table with their structure is describe as under/

    Login T(/le<

    P'o)uct Det(ils T(/le<

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage (4

  • 8/9/2019 Online Shopping Mart

    26/87

    se' P'o2ile T(/le<

    S(les-(n T(/le<

     

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage (:

  • 8/9/2019 Online Shopping Mart

    27/87

    C('t T+*e T(/le<

    A)) To C('t T+*e T(/le<

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage (@

  • 8/9/2019 Online Shopping Mart

    28/87

    DATA FLO& DIAGRAMS

     

    Note<

    2epresents .xternal .ntity

    2epresents the "rocess

    2epresents the flow of 5ontrolJ&ata

    2epresents 5lose &atabase

    2epresents %pen *able

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage (A

    A)-in login

    se' Login

    S(les-(n login

    A)-in

    se'

    S(les-(n

    Online Sho**ing

    M('t

    Contet Le1el )i(g'(-

  • 8/9/2019 Online Shopping Mart

    29/87

    A)-in Mo)ule

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage (D

    -dmin

    "roduct

    detail

    1

    Catego

    ry

    A)ise

    Sear"

    11

    ro(*"t.D

    5reate New account og In "rocess

    9or New User 

    -dd Item

    (1

    (

      -dding

    "rocess

    ((

     -ddItem

    ((

    -dmin

      A((

    salesman

    salesman

    ssssssaaaSal

    esman

    Massanger

    ()

    5reating

    account for

    matched jobs

    +alesman

  • 8/9/2019 Online Shopping Mart

    30/87

    E-*lo+e's Mo)ule DFD 

    "roduct allery

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage (

    U+.2 5reate New account

    og In

    "rocess 9or

    User 

    (

    og In

    1

    +earch -nd

    "urchase Item

    1(

    et -ccess %f"roduct info

    1(

    User *ab

    "roduct

    &etails

  • 8/9/2019 Online Shopping Mart

    31/87

    SCREENSHOTS <

    Fo' Login P(ge:<

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage )0

  • 8/9/2019 Online Shopping Mart

    32/87

    Fo' A)-in Login

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage )1

  • 8/9/2019 Online Shopping Mart

    33/87

    Fo' Ite- T+*e

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage )(

  • 8/9/2019 Online Shopping Mart

    34/87

    SER Sign *<

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage ))

  • 8/9/2019 Online Shopping Mart

    35/87

    se' P'o2ile<

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage )4

  • 8/9/2019 Online Shopping Mart

    36/87

    CODING

    *he coding step of the development phase translates the software design into a programminglanguage that can be executed by a computer

    Login'

    *sing System%*sing System,Data%*sing System,Con/g*ration%*sing System,Colle"tions%*sing System,0e$%*sing System,0e$,Se"*rity%

    *sing System,0e$,UI%*sing System,0e$,UI,0e$Controls%*sing System,0e$,UI,0e$Controls,0e$Parts%*sing System,0e$,UI,1tmlControls%*sing System,Data,S2lClient%

    *$li" artial "lass UserLogin - System,0e$,UI,Page3  S2lConne"tion "on 4 ne) S2lConne"tion5Con/g*rationManager,Conne"tionStrings67"on78,Conne"tionString9%

      S2lDataA(ater (a%  DataSet (s%

      rote"te( voi( Page.Loa(5o$!e"t sen(er: EventArgs e9  3  Text;ox

  • 8/9/2019 Online Shopping Mart

    37/87

      int n 4 Convert,ToInt?5(a,Sele"tComman(,Exe"*teS"alar599%  i#  5n 44 ,7%  Text;ox

  • 8/9/2019 Online Shopping Mart

    38/87

    se'P'o2ile<

    *sing System%*sing System,Data%*sing System,Con/g*ration%*sing System,Colle"tions%*sing System,0e$%*sing System,0e$,Se"*rity%*sing System,0e$,UI%*sing System,0e$,UI,0e$Controls%*sing System,0e$,UI,0e$Controls,0e$Parts%

    *sing System,0e$,UI,1tmlControls%*sing System,Data,S2lClient%

    *$li" artial "lass UserIn;ox.C*stomerPro/le - System,0e$,UI,Page3  S2lConne"tion "on 4 ne) S2lConne"tion5Con/g*rationManager,Conne"tionStrings67"on78,Conne"tionString9%  S2lDataA(ater (a%  DataSet (s%

      rote"te( voi( Page.Loa(5o$!e"t sen(er: EventArgs e9  3  i#  5"on,State 44 Conne"tionState,Close(9  3  "on,Oen59%  =

      i#  5Page,IsPost;a"' >4 tr*e9  3  i#  5Session,Co*nt 9  3

      HetArtistPro/le5Convert,ToInt?5Session67*i(78,ToString5999%  =  else  3  Resonse,Re(ire"t57G1ome,asx79%  =  =

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage )A

  • 8/9/2019 Online Shopping Mart

    39/87

      =

      rivate voi( HetArtistPro/le5int *i(9  3  (a 4 ne) S2lDataA(ater57sele"t

    #name:lname:gen(er:email:"ity:state:"o*ntry:mo$ileno #rom t$l."onta"t)ere *i(47 B *i( B 7 7: "on9%  (s 4 ne) DataSet59%  (a,Fill5(s: 7t$l."onta"t79%  i#  5(s,Ta$les,Co*nt && (s,Ta$les67t$l."onta"t78,Ro)s,Co*nt 9  3  Text;ox

  • 8/9/2019 Online Shopping Mart

    40/87

    A)-inLogin<

    *sing System%*sing System,Data%*sing System,Con/g*ration%*sing System,Colle"tions%*sing System,0e$%*sing System,0e$,Se"*rity%*sing System,0e$,UI%*sing System,0e$,UI,0e$Controls%*sing System,0e$,UI,0e$Controls,0e$Parts%*sing System,0e$,UI,1tmlControls%

    *$li" artial "lass a(minlogin - System,0e$,UI,Page

    3  rote"te( voi( Page.Loa(5o$!e"t sen(er: EventArgs e9  3

      =  rote"te( voi( ;*tton

  • 8/9/2019 Online Shopping Mart

    41/87

    CODING EFFICIENC#

    E22icienc+ means

    $ow cryptic the coding is

    -voiding dead/code

    2emove unnecessary code and redundant processing

    +pend time documenting

    +pend ade3uate time analy6ing business re3uirements, process flows,

    data/structures and data/model

    ;uality assurance is key> plan and execute a good test plan and testing

    methodology

    - good way to see which code is more efficient is to compile is the code and generate the

    assembler code

    +ee which one produces the most lines of code #%5' *he one with the least %5 is the one

    that is more efficient and will most probably run faster 5ounting the number of lines of code

    tells you nothing !any times the compiler will do optimi6ations that are intended to improve

     performance #speed' at the expense of space

    $ow code efficiency is achieved in the projectH

    e have made use of general procedures which we have used across a number of forms

      *he code written for the auto generation procedure is very efficient

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 40

  • 8/9/2019 Online Shopping Mart

    42/87

    OPTIMI@ATION OF CODE

    5ode optimi6ation involves the application of rules and algorithms to program code with the goal

    of making it faster, smaller, more efficient, and so on %ften these types of optimi6ations conflict

    with each other, for instance, faster code usually ends up larger, not smaller *here are two goals

    for optimi6ing code>

    1 %ptimi6ing for time efficiency #runtime savings'

    ( %ptimi6ing for memory conservation

    In some cases both optimi6ations go hand in hand, in other cases you trade in one for the other

    Using less memory means to transfer less memory which reduces the time needed for memory

    transfers 7ut often memory is used to store pre calculated values to avoid the actual calculation

    at runtime In this case you trade space consumption for runtime efficiency

    O*ti-i5ing 2o' ti-e e22icienc+

    2educing the number of calculations

    Using a diferent algorithm

    &eclaring things constant

    2educing fre3uency of function calls

    %ptimi6ing for memory conservation

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 41

  • 8/9/2019 Online Shopping Mart

    43/87

    +hared use of memory

    &ata structure

    &ata type si6e

    $ow code optimi6ation is achieved in the projectH

    e have made the use of the concept of global variable which we are declaring only once in

    a single form and which can be used across the forms in the project $ence less memory will

     be used *his global variable is used to check the particular user who create , update , modify

    data in any form e have declared global variable 5reated7y, 5reated&ate, Updated7y

    and Updated&ate only once in a form

    DECLARE

    BEGIN

     

  • 8/9/2019 Online Shopping Mart

    44/87

    "ERIFICATION 7 "ALIDATION

    Falidation refers to the process of using software in a live environment using real data *he

     process of validation refers to a set of activities that ensure that the software that has been built is

    matching to customer re3uirement Falidation is successful when software functions in a manner 

    that can be reasonably expected by the customer

    S*ita$le vali(ation "e"'s ave $een *t )erever nee( )as #elt so as to

    avoi( )rong (ata in*t, Co(ing as $een (one so as to avoi( )rong entries

    in te ta$les, For examle N*meri" "ara"ter are not allo)e( in te

    S*$s"ri$ers name, ario*s mo(*les ave (iQerent ro"ess logi": )i"

    involves sorting o# (ata on (iQerent attri$*tes an( sele"tion o# re2*ire(

    attri$*te (een(ing *on "on(itions ave $een (e"i(e(, Most o# tese are

    SL 2*eries,

    T3o t+*es o2 " 7 "

    "e'i2ic(tion

    =. D(te "(li)(tion< *he validation on date data type has been specified to be of the format

    &&J!!JEE -ny other format is unacceptable

    >. A-ount "(li)(tion< *here is a validation on amount that is entered in rupees in the following

    format B00,000,000$00C .g 1:,@:,AD00

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 4)

  • 8/9/2019 Online Shopping Mart

    45/87

    . F'o- D(te to D(te

  • 8/9/2019 Online Shopping Mart

    46/87

    TESTING ,TESTING TECHNI;ES AND TESTING STRATEGIES.

    All so#t)are inten(e( #or *$li" "ons*mtion so*l( re"eive some level o#

    testing, 0ito*t testing : yo* ave no ass*ran"e tat so#t)are )ill $eave as

    exe"te(, Te res*lts in *$li" environment "an $e tr*ly em$arrassing,

     Testing is a "riti"al element o# so#t)are 2*ality ass*ran"e an( reresents te

    *ltimate revie) o# se"i/"ation: (esigning: an( "o(ing, Testing is (one

    tro*go*t te system (eveloment at vario*s stages, I# tis is not (one:

    ten te oorly teste( system "an #ail a#ter installation, Testing is a veryimortant art o# SDLC an( ta'es aroximately Jo# te time,

    *he first step in testing is developing a test plan based on the product re3uirements *he test plan

    is usually a formal document that ensures that the product meets the following standards>

    Is thoroughly *ested/ Untested code adds an unknown element to the product and

    increases the risk of product failure

    !eets product re3uirements/ *o meet customer needs, the product must provide the

    features and behavior described in the product specification &oes not contain defects/ 9eatures must work within established 3uality standards and

    those standards should be clearly stated within the test plan

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 4:

  • 8/9/2019 Online Shopping Mart

    47/87

    Testing Techni4ues

    Bl(c6 /o Testing>  aims to test a given program?s behavior against its specification or 

    component without making any reference to the internal structures of the program or the

    algorithms used *herefore the source code is not needed, and so even purchased modules can be

    tested  e study the system by examining its inputs and related outputs *he key is to devise

    inputs that have a higher likelihood of causing outputs that reveal the presence of defects e use

    experience and knowledge of the domain to identify such test cases 9ailing this a systematic

    approach may be necessary .3uivalence partitioning is where the input to a program falls into a

    number of classes eg positive numbers vs negative numbers "rograms normally behave the

    same way for each member of a class "artitions exist for both input and output "artitions may

     be discrete or overlap Invalid data #ie outside the normal partitions' is one for which partitions

    should be tested *est cases are chosen to exercise each portion -lso test boundary cases

    #atypical, extreme, 6ero' should be considered since these fre3uently show up defects 9or 

    completeness, test all combinations of partitions 7lack box testing is rarely exhaustive #because

    one doesnKt test every value in an e3uivalence partition' and sometimes fails to reveal corruption

    defects caused by weird combination of inputs 7lack box testing should not be used to try and

    reveal corruption defects caused, .xample, by assigning a pointer to point to an object of the

    wrong type +tatic inspection #or using a better programming language' is preferred

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 4@

  • 8/9/2019 Online Shopping Mart

    48/87

    &hite /o Testing

    Usual method is to ensure that every line of code is executed at least once

    *est capabilities rather than components #eg concentrate on tests for data loss over ones

    for screen layout'

    *est old in preference to new #users less effected by failure of new capabilities'

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 4A

  • 8/9/2019 Online Shopping Mart

    49/87

     Test tyi"al "ases rater tan $o*n(ary ones 5ens*re normal oeration

    )or's roerly9,

    De/ugging

  • 8/9/2019 Online Shopping Mart

    50/87

    5onstraints

    O"ER"IE& OF TESTING STRATEGIES<

    - strategy for software testing integrates test case design methods into a well/planned series of 

    steps that result in the successful construction of software It provides a road map for the

    software developer, the 3uality assurance organi6ation and the customer/ a road map that

    describes the steps to be conducted as part of testing, when these steps are planned and then

    undertaken, and how much effort, time and resources will be re3uired *herefore, any testing

    strategy must incorporate test planning, test case design, test execution, and resultant data

    collection and evaluation

    arge system are usually tested using a mixture of strategies &ifferent strategies may be needed

    for different parts of the system or at a stage of the process

    Testing St'(tegies

    Test T+*e &escription

    nit Test .ach independent piece of code works correctly

    Integ'(tion Test -ll units work together without errors

    Inte'2(ce TestUsually done at integration stage when modules or sub/systems are

    combined %bjective is to detect errors or invalid assumptions

    about interfaces between modules 2eason these are not shown up

    in unit testing is that test case may perpetuate same incorrect

    assumption made by module designer "articularly important when

    %% development has been used

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage 4

  • 8/9/2019 Online Shopping Mart

    51/87

    global variable' %ne places data there and the other retrieves it

    architectures

    Reg'ession Test  Newly -dded features do not introduce errors to other features that are

    already working

    Lo() Test ,(lso

    c(lle) St'ess Test.*he product continues to work under extreme usage *est systemKs

    ability to cope with a specified load #eg transactions per second'

    "lan tests to increase load incrementally o beyond design limit

    until system fails #this test particularly important for distributed

    systems'

    Pl(t2o'- Test *he product works on all the target hardware and software platforms

    To* Do3n Test*his approach tests high levels of system before detailed components

    *his is appropriate when developing the system top/down as it is

    likely to show up structural design errors early Falidation #as

    distinct from verification' can begin early Its disadvantage is that

    stubs needs to be generated #extra effort' and might be impractical

    if component is complex #eg converting an array into a linked

    listL unrealistic to generate random listL therefore end up

    implementing unit anyway' *est output may be difficult to

    observe #needs creation of artificial environment' *his is not

    appropriate for %% systems #except within a class'

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage :0

  • 8/9/2019 Online Shopping Mart

    52/87

    Botto- * Test*his is opposite of top/down testing *his testing test low/level unit

    then works up hierarchy Its advantages and disadvantages of 

     bottom/up mirror those of top/down In this testing there is need to

    write test drivers for each unit *hese are as reusable as the unit

    itself 5ombining top/down development with bottom/up testing

    means that all parts of system must be implemented before testing

    can begin, therefore does not accord with incremental approach

    discussed above

    B(c6 To B(c6 Test 5omparison of test results from different versions of the system #eg

    comparing the prototype with previous version or different

    configuration' *he process involves running the first system,

    saving test case results *hen running the second system, also

    saving its results 9inally comparing the results files It is

    important to note that no difference doesnKt imply no bugs 7oth

    systems may have made the same mistake

    Testing Done in ou' S+ste-

    *he best testing is to test each subsystem separately as we have done in our project It is best to

    test a system during the implementation stage in form of small sub steps rather then large chunks

    e have tested each module separately ie have completed unit testing first and system testing

    was done after combining Jlinking all different !odules with different menus and thorough

    testing was done %nce each lowest level unit has been tested, units are combined with related

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage :1

  • 8/9/2019 Online Shopping Mart

    53/87

    units and retested in combination *his proceeds hierarchically bottom/up until the entire system

    is tested as a whole $ence we have used the To* * (**'o(ch for testing our system

    *ypical levels of testing in our system>

    Unit /procedure, function, method

    !odule /package, abstract data type

    +ub/system / collection of related modules, method/message paths

    -cceptance *esting / whole system with real data#involve customer, user , etc'

    Bet( Testing is acceptance testing with a single client It is conducted at the developer?s site by a

    customer *he software is used in a natural setting with the developer Blooking over the

    shoulderC of the user and recording errors and usage problems conducted in a controlled

    environment Usually comes in after the completion of basic design of the program *he project

    guide who looks over the program or other knowledgeable officials may make suggestions and

    give ideas to the designer for further improvement *hey also report any minor or major 

     problems and help in locating them and may further suggest ideas to get rid of them Naturally a

    number of bugs are expected after the completion of a program and are most likely to be known

    to the developers only after the alpha testing

    involves distributing the system to potential customers to use and provide feedback It is

    conducted at one or more customer sites by the end/user of the software Unlike alpha testing,

    the developer is generally not present *herefore, the beta test is a BliveC application of the

    software in an environment that cannot be controlled by the developer *he customer records all

     problems #real or imagined' that are encountered during beta testing and reports these to the

    developer at regular intervals -s a result of problems reported during beta test, software

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage :(

  • 8/9/2019 Online Shopping Mart

    54/87

    engineers make modifications and then prepare for release of the software product to the entire

    customer base 

    In, this project, *his exposes system to situations and errors that might not be anticipated by us

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage :)

  • 8/9/2019 Online Shopping Mart

    55/87

    We performed the load testin on o!r appli"ation and the report

    #as as follo#s$%

    Test t+*e< D+n(-ic

    +imultaneous client 5onnections :

    *est duration> 00>00>04>00

    *est iterations> )0&etailed test results generated> Ees

    *otal number of client re3uests> 1:

    *otal number of client connections 1:0-verage client re3uests per second>0@A:

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage :4

  • 8/9/2019 Online Shopping Mart

    56/87

    Testing Ph(senit Testing

    TEST PLAN AND TEST REPORT OF OR S#STEM

    De1elo*e' i

    Fo'-s

    5heck whether all

    validations are

     performed properlyand whether  

    appropriate values

    are added to the

    database and whether 

    data is retrieved fromthe database properly

    Testing o2 Sc'eens to chec6 (ll the necess('+ con)itions ('e /eing 2ul2ille)

    Login Sc'een

    5heck whether the ogin screen

    enables only the valid user 

    selected from the master 

    database to login into our 

    +ystem

  • 8/9/2019 Online Shopping Mart

    57/87

    P5heck whether the auto generation

     process is working efficiently

    and generating uni3ue Ids for 

    each and every data being

    entered in the respectiveforms

    P 5heck whether the data is being

    retrieved from database upon 3uerying

     performed by the user

    P 5heck whether 

      new records are  getting entered into

    the forms

    P 5heck whether the data being

    entered in the forms is getting savedinto the respective tables

    P 5heck whether the 3uerying process

    can be performed on selected records

    to obtain their details already existing

    in the database

    P 5heck whether the records can bedeleted from the database via the

    forms

    P 5heck whether all the navigational

    triggers are working properly, eg*he cursor is able to move to the 9irst

  • 8/9/2019 Online Shopping Mart

    58/87

    , ast, Next , "revious 2ecord at the

    click of a button

    P 5heck whether the form can be

    cleared in one shot

    P 5heck whether the .&I*%2 is being

    activated at the time of modification

    P 5heck whether the isting of Falues#%F' pops on re3uest on the re3uired

    text field

    P 5heck the user is able to exit from

    the form properly

    data after

    selectingfrom the

    list

    < 9orm cleared

    < 5hangesaccepted

    < &ata

    unacceptable

    < &ata accepted

    < 9orm .xited

    < 9orm cleared

    < 5hangesaccepted

    < &ata

    unacceptable

    < &ata accepted%F trigger

    works suitably

    < 9orm .xited

    .xit triggers

    works well

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage :A

  • 8/9/2019 Online Shopping Mart

    59/87

    Su/sc'*tion Ent'+ Fo'-

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage :D

  • 8/9/2019 Online Shopping Mart

    60/87

    -ll the above conditions have been

    checked for this too

    P 5heck whether our "ost ;uery

    concept works

    P 5heck the price amount should beentered in the pre defined format

    P5heck numeric data cannot be

    entered into the character field and

    vice versa

    P5heck that the data entered does

    not exceed the predefined length

  • 8/9/2019 Online Shopping Mart

    61/87

    P5heck whether the data beingselected from the ist of Falues

    #%F' are having their Ids stored in

    the database

  • 8/9/2019 Online Shopping Mart

    62/87

    Integration Testing

    5heck whether all

    independent

    modules work 

     properly after 

    integration

    -ll the

    !odu

    les

    after 

    thorou

    gh

    indivi

    dual

    testing are

    merge

    d

    togeth

    er and

    run in

    the

    9!M

    #exec

    utable'

    setup

    -bsolute success

    in running

    the

    system

    5omplete success in running the

    system as a whole with a

    few minor problems

    regarding the client

    server connection which

    were resolved after some

    trials on the spot

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage @1

  • 8/9/2019 Online Shopping Mart

    63/87

    E"ALATION

    e have following approaches for the evaluation

    1' 7enchmarking/ 5omparing the performance of hardware and software

    (' .xperience of other users/ Fendors generally gives a list of users who are satisfied

    with their work 7ut it is advisable to seek the opinion independently

    )' 2eport of independent research organi6ations/ !any research organi6ations

    undertake project of evaluating the proprietary software offered by various

    software agencies *hey publish the report at regular interval *he prospective

     buyer of a software package can have faith in their evaluation

    In our case we have evaluated our +ystem and found that the hardware and software are in

    absolute sync with each other *heir performance has been found to be upto the mark e also

    compared our software with other +ubscription systems on other platforms and found that we

    were offering a much better system at a lesser price and on a more sophisticated and user friendly

    technology "lus we offered complete maintenance and support for a certain period of time

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage @(

  • 8/9/2019 Online Shopping Mart

    64/87

    IMPLEMENTATION

    Implementation includes all those activities that take place to convert from old system to the new

    one *he new system may be completely new +uccessful Implementation may not guarantee

    improvement in the organi6ation using the new system, improper installation will prevent it

    Implementation uses the design document to produce code &emonstration that the program

    satisfies its specifications validates the code *ypically, sample runs of the program

    demonstrating the behavior for expected data values and boundary values are re3uired +mall

     programs are written using the model> It may take several iterations

    of the model to produce a working program -s programs get more complicated, testing and

    debugging alone may not be enough to produce reliable code Instead, we have to write programs

    in a manner that will help insure that errors are caught or avoided

    To*:)o3n i-*le-ent(tion<

    *op down implementation begins with the user invoked module and works toward the modules

    that do not call any other modules *he implementation may proceed depth/first or breadth/first

    Botto-: * i-*le-ent(tion<

    Implementation begins with modules that do not call any other modules and work toward the

    main program *est harness are used to test individual modules *he main module constitutes the

    final test harness

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage @)

  • 8/9/2019 Online Shopping Mart

    65/87

    Stu/s<

    +tub programming is the implementation analogue of top/down and stepwise refinement It

    supports incremental program development by allowing for error and improvement - stub

     program is a stripped/down, skeleton version of a final program It doesnKt implement details

    of the algorithm or fulfill all the job re3uirements $owever, it does contain rough versions

    of all subprograms and their parameter lists 9urthermore, it can be compiled and run

    .xtensive use of procedures and parameter are the difference between stub programs and

     prototypes ;uick and dirty prototypes should be improved and rewritten - stub program

    helps demonstrates that a programKs structure is plausible Its procedures and functions are

    unsophisticated versions of their final forms, but they allow limited use of the entire

     program In particular, it may work for a limited data set %ften the high/level procedures

    are ready to call lower/level code, even if the more detailed subprograms havenKt even been

    written

    Inc'e-ent(l *'og'(- )e1elo*-ent<

    -s program becomes more complex, changes have a tendency to introduce unexpected effects

    Incremental programming tries to isolate the effects of changes e add new features in

     preference to adding new functions, and add new function rather than writing new programs

    *he program implementation model becomes>

    define typesJcompileJfixL

    add load and dump functionsJcompileJtestL

    add first processing functionJcompileJtestJfixL

    add featuresJcompileJtestJfixL

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage @4

  • 8/9/2019 Online Shopping Mart

    66/87

    add second processing functionJcompileJtestJfixL

    keep adding featuresJand compilingJand testingJ and fixing

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage @:

  • 8/9/2019 Online Shopping Mart

    67/87

    %ur +ystem was implemented at the client site in the following manner>

    1' 9irst of all we did a thorough system check on the client?s machine in terms of hardware

    and software to ensure that there was enough space to load and run our application with

    ease

    (' *hen we installed +; +erver #frontend' and &eveloper @i #back end' on the server

    +ince the software was present on other systems and running properly, there wasn?t much

    trouble in obtaining and installation

    )' *hen came the process of &atabase 5reation at the server site which involved the

    generation *his procedure is also known as &atabase

    4' *o establish contact with the server as per their re3uirement and each re3uest should be

    implemented *his task actually is fairly crucial depending on the number of users trying

    to access the server at same time so a load test needs to be performed

    :' 9inally came the job of training the users which meant that the clients were given instructions

    regarding the working of the system which included teaching them the hen the user was

    fully trained, he or she was asked to run the system independently and enter different sorts of

    data to test the system to its limits

    @' %ur system not only met the user re3uirements but to certain extent exceeded in achieving

    much more then what was actually needed

    +tep in generating the executable form #9!M' of our system

    1 9irst go to the folder where &eveloper @i is installed #in our case &ev@', further 

    go to the 7IN folder, now select i2'un and create a short cut on desktop

    ( 2ight click on the newly created shortcut and choose properties option

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage @@

  • 8/9/2019 Online Shopping Mart

    68/87

    ) hen the properties option opens, set target path of the first 9!M file with ogin

    specifications

    .>Sdev@S7inSifvrun@0exe .>SsmitSstartfmb ceSce

    4 *his will create the executable format of our system clicking upon which the end

    user will be able to gain entry

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage @A

  • 8/9/2019 Online Shopping Mart

    69/87

    MAINTAINENCE

     

    *he maintenance starts after the final software product is delivered to the client *he

    maintenance phase identifies and implements the change associated with the correction of 

    errors that may arise after the customer has started using the developed software *his also

    maintains the change associated with changes in the software environment and customer 

    re3uirements %nce the system is a live one, !aintenance phase is important +ervice after 

    sale is a must and usersJ clients must be helped after the system is implemented If heJshe

    faces any problem in using the system, one or two trained persons from developer?s side can

     be deputed at the client?s site, so as to avoid any problem and if any problem occurs

    immediate solution may be provided

    *he maintenance provided with our system after installation is as follows>

    9irst of all there was a 5lassification of !aintenance "lan which meant that the people

    involved in providing the after support were divided *he main responsibility was on the

    shoulders of the "roject !anager who would be informed in case any bug appeared in the

    system or any other kind of problem rose causing a disturbance in functioning *he "roject

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage @D

  • 8/9/2019 Online Shopping Mart

    70/87

    leader in turn would approach us to solve the various problems at technical level #.g *he

    form isn?t accepting data in a proper format or it is not saving data in the database'

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage @

  • 8/9/2019 Online Shopping Mart

    71/87

    SECRIT# FEATRES

    -uthentication is the process of identifying users -uthori6ation is the process of granting access

    to users based on identity *ogether, authentication and authori6ation provide the means to keep

    your application secure from intruders

    *he kind of security measures used in our +ystem are as follows>

    se' Authentic(tion

    %nly the Falid users, who are present in the pre defined list of Users stored in User 

    !aster table are granted permissions to enter the +ystem -ny user apart from 2ecord of Users

    are denied access

    se' Autho'i5(tion

    - *'i1ilege is a right to execute a particular type of +; statement or to access

    another user?s object +ome examples of privileges include the right to

    5onnect to the database #create a session'

    5reate a table

    +elect rows from another user?s table

    .xecute another user?s stored procedure

    "rivileges are granted to users so that they can accomplish tasks re3uired for their jobs -

     privilege should be granted only to a user who absolutely re3uires it to accomplish necessary

    task .xcessive granting can compromise security

    - privilege can be granted in ( ways>

    a' rant privileges to users explicitly

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage A0

  • 8/9/2019 Online Shopping Mart

    72/87

     b' rant privileges to a role #a named group of privileges', and then grant the role to one or 

    more users 7ecause roles allow for easier and better management of privileges, you should

    normally grant privileges to roles and not to specific users

    *here are two distinct categories of privileges>

    +ystem privileges

    +chema object privileges

    S+ste- P'i1ileges

    - system privilege is the right to perform a particular action, or to perform an action on

    any schema objects of a particular type 9or example, the privileges to create tablespaces and to

    delete the rows of any table in a database are system privileges *here are over @0 distinct system

     privileges Eou can grant or revoke system privileges to users and roles %nly users who have

     been granted a specific system privilege with the -&!IN %"*I%N or users with the system

     privileges 2-N* -NE "2IFI.. or 2-N* -NE %7=.5* "2IFI.. can grant or 

    revoke system privileges to other users e grant system privileges only to administrative

     personnel and application developers .nd users normally do not re3uire the associated

    capabilities

    Sche-( O/0ect P'i1ileges

    - schema object privilege  is a privilege or right to perform a particular action on a

    specific schema object>

    *able

    Fiew

    +e3uence

    "rocedure

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage A1

  • 8/9/2019 Online Shopping Mart

    73/87

    9unction

    "ackage

    - user automatically has all object privileges for schema objects contained in his or 

    her schema - user can grant any object privilege on any schema object he or she

    owns to any other user or role

    Roles

    %racle provides for easy and controlled privilege management through roles 2oles are named

    groups of related privileges that we grant to users or other roles 2oles are designed to ease the

    administration of end/user system and schema object privileges $owever, roles are not meant to

     be used for application developers, because the privileges to access schema objects within stored

     programmatic constructs need to be granted directly

    *hese following properties of roles enable easier privilege management within a database>

    Re)uce) *'i1ilege ()-inist'(tion

    2ather than granting the same set of privileges explicitly to several users, you can grant

    the privileges for a group of related users to a role, and then only the role needs to be granted to

    each member of the group

    D+n(-ic *'i1ilege -(n(ge-ent

    If the privileges of a group must change, only the privileges of the role need to be

    modified *he security domains of all users granted the group?s role automatically reflect the

    changes made to the role

    -ny user granted a can grant or revoke that role to or 

    from other users or roles of the database *his option allows administrative powers

    for roles on a selective basis

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage A(

  • 8/9/2019 Online Shopping Mart

    74/87

      52.-*. 2%. -&!IN5%N*2%L

      2-N* -&!IN5%N*2% *% -&!INI+*2-*%2L

     Master User

    *he !aster User has been given schema object privileges like select, insert, update , delete

    operations to be performed on the master tables No other user except the !asters can gain

    access into the !aster tables and perform manipulations

    e have given the 2ole to !aster user using the following syntax>

    52.-*. 2%. !-+*.2U+.2L

      2-N* +..5*, IN+.2* , U"&-*. , &..*. %N *U+.2!+ *% !-+*.2U+.2L

      2-N* +..5*, IN+.2* , U"&-*. , &..*. %N *-+"!+ *% !-+*.2U+.2L

      2-N* +..5*, IN+.2* , U"&-*. , &..*. %N *+U7!+ *% !-+*.2U+.2L

      2-N* +..5*, IN+.2* , U"&-*. , &..*. %N *+U7+%U25.!+ *%

    !-+*.2U+.2L

      2-N* +..5*, IN+.2* , U"&-*. , &..*. %N *IN+**E".!+ *% !-+*.2U+.2

      2-N* +..5*, IN+.2* , U"&-*. , &..*. %N *7-NO!+ *% !-+*.2U+.2L

      2-N* +..5*, IN+.2* , U"&-*. , &..*. %N *+%U25.!+ *%

    !-+*.2U+.2L

      2-N* +..5*, IN+.2* , U"&-*. , &..*. %N *+*-*.!+ *%

    !-+*.2U+.2L

      2-N* +..5*, IN+.2* , U"&-*. , &..*. %N *"%&!+ *% !-+*.2U+.2L

      2-N* +..5*, IN+.2* , U"&-*. , &..*. %N *5%!"&+ *% !-+*.2U+.2L

      2-N* +..5*, IN+.2* , U"&-*. , &..*. %N *!%N*2-5O *%!-+*.2U+.2L

    *he !asterUser 2ole has +elect , Insert , Update , &elete "rivileges on all the above mentioned

    tables *his 2ole can now be granted to additional users

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage A)

  • 8/9/2019 Online Shopping Mart

    75/87

     Regular User 

    *he 2egular User has been given schema object privileges like select, insert, update , delete

    operations to be performed on the selective tables like *+ubscription!s , *"%&!s ,

    *5omp&s *hese users cannot gain access or perform any kind of manipulations on the

    specific tables which have been assigned to the !aster Users

    e have given the 2ole to 2egular User using the following syntax >

      52.-*. 2%. 2.U-2U+.2L

      2-N* +..5*, IN+.2* , U"&-*. , &..*. %N *5%!"&+ *% 2.U-2U+.2L

    *he 2egularUser 2ole can be granted to a number of users

    2-N* 2.U-2U+.2 *% user-2-N* 2.U-2U+.2 *% user5L

     Now users user- , user7 , user5 have a number privileges on above ) tables

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage A4

  • 8/9/2019 Online Shopping Mart

    76/87

    T(/le Le1el Secu'it+

    +chema object privileges for tables allow table security at the level of &ata !anipulation

    anguage and &ata &efinition anguage operations

    D(t( M(ni*ul(tion L(ngu(ge O*e'(tions

    e can grant privileges to use the various &! statements like &..*., IN+.2*,

    +..5*, and U"&-*. to perform operations on a table or view e grant these privileges only

    to users and roles that need to 3uery or manipulate a table?s data

    ith selective IN+.2*, a privileged user can insert a row with values for the

    selected columns -ll other columns receive NU or the column?s default value

    ith selective U"&-*., a user can update only specific column values of a row

    +elective IN+.2* and U"&-*. privileges are used to restrict a user?s access to

    sensitive data

    D(t( De2inition L(ngu(ge O*e'(tions

    In our system we have used && operations to maintain the table level security

    e have a system which keeps a track of each and every user gaining access into the system at any

     perform any changes on the various tables *he listing of these users along with the access dates

    seen by the administrator

    *he concept used here is that we have maintained some columns hidden away from the user as they

    appear on the forms Using these columns we maintain trail of all the valid users along with their log

    and time there by determining which end user has performed what sort of change on a table $ere w

    use of lobal Fariables which captures every user entering the system and browsing through it and

    changes

    Using the syntax>

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage A:

  • 8/9/2019 Online Shopping Mart

    77/87

    >%7-52.-*.&7E>TU+.2N-!.L

    >%7-U"&-*.&7E>TU+.2N-!.L

    PRE:INSERT TRIGGER 

     

  • 8/9/2019 Online Shopping Mart

    78/87

    COST ESTIMATION

    *he cost estimation depends upon the following>

    • "roject complexity

    • "roject si6e

    • &egree of structural uncertainty

    • $uman, technical, environmental, political can affect the ultimate cost of software

    and effort applied to develop it

    • &elay estimation until late in the project

    • 7ase estimates on similar projects that have already been completed

    • Use relatively simple decomposition techni3ues to generate project cost and effort

    estimates

    • Use one or more empirical models for software cost and effort estimation

    "roject complexity, project si6e and the degree of structural uncertainty all affect the reliability of 

    estimates 9or complex, custom systems, a large cost estimation error can make the difference

     between profit and loss - model is based on experience and takes the form>

    & T f#Fi'

    here d is one of a number of estimated values #eg effort, cost, project duration' and #Fi' are

    selected independent parameters #eg estimated %5 #ine of 5ode' or 9" #9unctional

     parameters''

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage AA

  • 8/9/2019 Online Shopping Mart

    79/87

    Ne3 H(')3('e 7 So2t3('e<

    Intel "entium IF "rocessor

    Windows 2000 (Proessional)+; +erver #+ingle User with 1: icenses'

    &eveloper @i #icense for 1: Users'

    DIFFERENT PHASES OF PROPOSED SOFT&ARE DE"ELOPMENT

    1 +ystem +tudy

    ( +2+ #+ystem 2e3uirement +tudy' &ocuments and approval

    $ A)1(nce A-ount , o2 )e1elo*-ent ch('ges 2ull cost o2 the so2t3('e.

    4 +tarting %f development #Interface &esign and -pproval'

    : &evelopment

    @ "resentation of New +ystem

    >n) *('ti(l )e1elo*-ent ch('ges ,Rest .$

    A User training

    D Implementation

    +upport

    10 +upport for the futuristic changes

    P'ice ;uot(tion

    • *he process will start after the system study and with an advance amount of :0V

    from the corporate as advance *he rest in at the time of implementation

    • *he project will approximately re3uire D man months #D person for 1 month' to be

    completed

    • *he development cost for this proposed software will be

    2s 11,:00 #per man month' P D #man months' T 2s (,000J/

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage AD

  • 8/9/2019 Online Shopping Mart

    80/87

    • 5ost of original software #+; +erver' 2s :D,000 #approx', #&eveloper @i' 2s

    1D,000 #approx' excluding 4V +*

    Tot(l< Rs =!! ,Eclu)ing LST on So2t3('e.

    @@Te a$ove mentione( ri"e in"l*(es #ree onsite maintenan"e an( minor

    "anges #or monts starting #rom te (ay o# /nal imlementation an( visit

    "arges 5tat )ill $e ma(e )ile training an( imlementation o# te ro!e"t9

    as )ell as imorting o# te external G ra) (ata #rom (iQerent (ata so*r"es to

    te master (ata$ase,

    -nnual !aintenance of software #-!5' can be undertaken only after getting the consent

    from the concerned corporate J organi6ation with proper documents only

    AMC st(n)s 2o' Annu(l M(inten(nce Cont'(ct$

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage A

  • 8/9/2019 Online Shopping Mart

    81/87

    PRO9ECT PROCESS FLO&

    PERT GANTT CHART

    In order to ensure the success of a project, it is necessary for the team members involved in

    the project development and the customers to have a clear vision of the project goals and

    objectives %nce we have estimated of the effort and time re3uirement for the different phases a

    schedule for the project can be prepared *his schedule will then be used later for monitoring the

     progress of the project

     .stablishing a project vision offers the following advantages

    5larification of "roject goals

    "rioriti6ing of processes

    Integration with other products

    7asis for future planning

    Two general techniques of scheduling are Program evalutation and review technique (PERT)

    charts and Gantt charts

    The Gantt chart: is perhaps the simplest form of formal project management Gantt !hart 

    (developed "# $enr#% & Gantt) is a project control technique that can "e used for several 

     purposes% including scheduling and resource planning

    It is a bar chart with each bar representing an activity *he bars are drawn against a

    time line *he length of each bar is proportional to the length of the time planned for 

    the activity

    It is used almost exclusively for scheduling purposes and therefore controls only the

    time dimension of projects

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage D0

  • 8/9/2019 Online Shopping Mart

    82/87

    It helps in scheduling the activities of the project but not in identifying them

    It is best for resource scheduling

    It shows the tasks and their duration clearly, however do not show the intertasks

    dependencies plainly

    - antt chart helps in scheduling the activities identified in the work break down structure

    &uring the scheduling activity and also during implementation of the project, new activities may

     be identified that were not envisioned during the initial planning *he manager must then go

     back and revise the break down structure and schedule to deal with these new activities

    *he antt chart in the figure is actually an enhanced version of standard antt charts

    *he white part of the bar shows the length of time each task is estimated to take *he black part

    shows the actual time, that is, the latest time by which a task is finished

    antt charts can take different forms depending on their intended use *hey are

    for resource scheduling hen a 7ar chart is used as a project control method , milestones or 

    check points usually are placed at the completion of each task #they may also placed with in

    task' *hey indicate the completion of particular task and the project are on scheduleL when a

    checkpoint is reached, the task just completed and the entire project are reviewed and evaluated

    2eviewers ask where resources allocated have been properly utili6ed and indication of which

    task must be completed before others are begun and project costs must be accumulated and

    evaluated using other methods

    antt chart uses a calendars oriented chart for representing the project schedule .ach

    activity is represented as a bar in the calendar starting from the starting date of the activity and

    ending at the ending date for that activity *he start 8 end of each activity become milestones for 

    the project

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage D1

  • 8/9/2019 Online Shopping Mart

    83/87

    *he main drawback of the antt chart is that it doesn?t depict the dependent relations

    among the different activities $ence the effort of slippage in one activity on other activities or 

    on the overall project schedule cannot be determined $owever, it is conceptually simple 8 easy

    to understand, and is heavily used It is sufficient for small 8 mediumsi6ed projects

    *he antt chart for my project made in the year (00) is as follows> /

    The PERT Ch('t

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage D(

    St(n)s 2o' Pl(nne) Du'(tion

    St(n)s 2o' Actu(l Du'(tion

  • 8/9/2019 Online Shopping Mart

    84/87

    5an be both a cost and time management system

    Is a scheduling device that shows graphically which tasks must be completed before others

    are begun

    7y displaying various paths, enables the calculation of a critical path

    +hows the task dependencies directly

    Is designed to facilitate getting a project back on schedule

    So-e o2 the ()1(nt(ges o2 PERT ('e (s 2ollo3s<

    It enforces the manager to plan

    It shows the interrelationships among the tasks in the project and, in particular, clearly identifies

    the critical path of the project, thus helping to focus on it

    It exposes all possible parallelism in the activities and thus helps in allocating resources

    ".2* chart for my project is as follows>

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage D)

    : &ays

    : &ays

    : &ays: &ays

    @: &ays

    (( &ays)) &ays

    0 &ay (: &ays

    10 &ays

    4D &ays

    0 &ay

    Start 

    Syste

    m

    Study 

    SRS

    Planni

    ng

    Project 

    Desig

    n

    oding

    lient

    Site!esting

    "m#leme

    ntation

    $nd%aintenan

    ce

    & Su##ort 

    Sel 

    !esting

  • 8/9/2019 Online Shopping Mart

    85/87

    ".2* is organi6ed by events and activities or tasks ".2* has several advantages over bar chart

    and likely to be used with more complex projects %ne advantage of ".2* is that it is scheduling

    device that also shows graphically which task must be completed before others are begun

    -lso by displaying the various task paths, pert enables the calculation of a critical path

    .ach path consists of combination of task, which must be completed *he time 8 cost associated

    with each task along a path are calculated and the path that re3uires the greatest amount of 

    elapsed time is the critical path 5alculation of the critical path enables project managers to,

    monitors this series of task more closely than others and to shift resources to it if it begins to fall

     behind schedule

    &espite these advantages, ".2* is just a tool, and its use doesn?t automatically guarantee the

    success of the project *he manager has much latitude in how ".2* is used ".2* is highly

    developed methodology and full description of it is into computer programs and is available

    as computeri6ed management system

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage D4

  • 8/9/2019 Online Shopping Mart

    86/87

    FTRE SCOPE OF THE PRO9ECT

      *his software can be easily upgraded in the future -nd also include many more*his software can be easily upgraded in the future -nd also include many more

    features for existing systemfeatures for existing system

    It is connected with the internet for easily retrieved data about differentIt is connected with the internet for easily retrieved data about differenttypes of products, newly launched products can be easily added into thetypes of products, newly launched products can be easily added into the

    site using databasesite using database

    -ll the information can be easily accessed the 5ustomer like their details,-ll the information can be easily accessed the 5ustomer like their details,

    order status, stock,order status, stock,

    *ransaction It can be modify and the others details can be easily provided*ransaction It can be modify and the others details can be easily provided

    to customerto customer

    2eport on the different basis will be easily created on the demand2eport on the different basis will be easily created on the demand

    DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONPage D:

  • 8/9/2019 Online Shopping Mart

    87/87

    BIBLIOGRAPH#<

    Boo6s:

    !icrosoft Fisual 5

    wwwgooglecom

    wwww)schoolscom

    wwwdotnetspidercom

    wwwjavasciptcom

    http://www.google.com/http://www.w3schools.com/http://www.dotnetspider.com/http://www.javascipt.com/http://www.google.com/http://www.w3schools.com/http://www.dotnetspider.com/http://www.javascipt.com/