project report on shopping application

140
ONLINE SHOPPING.COM INTRODUCTION Online Shopping provides the basic information related to the shopping so that anyone who wants to get the information related to Purchasing Item etc. can view online and search the details of their boys and girls online. My project is based on the Online Shopping, and it perform all functioning of Shopping that is Shopping, purchasing, Registration are done using this. In this online functioning all the function of Shopping is done through online. we can purchase the entire product online. In the offline functioning Customer suffers from many problems they purchased the entire item in different places. That is very time consuming process and it is not sufficient for every customer to purchase all the item from the different shop. On line process is helpful to performing easily shopping; customer directly purchased all the item and their related information very quickly. Today environment is on line based on which process is very helpful for all the Customer Page : 1/140

Upload: passionatepriya

Post on 15-Dec-2015

177 views

Category:

Documents


1 download

DESCRIPTION

this is a project report on online shopping management system

TRANSCRIPT

Page 1: Project report on shopping application

ONLINE SHOPPING.COM

INTRODUCTION Online Shopping provides the basic information related to the

shopping so that anyone who wants to get the information related to

Purchasing Item etc. can view online and search the details of their boys and

girls online.

My project is based on the Online Shopping, and it perform all

functioning of Shopping that is Shopping, purchasing, Registration are done

using this.

In this online functioning all the function of Shopping is done through

online. we can purchase the entire product online.

In the offline functioning Customer suffers from many problems they

purchased the entire item in different places. That is very time consuming

process and it is not sufficient for every customer to purchase all the item from

the different shop.

On line process is helpful to performing easily shopping; customer

directly purchased all the item and their related information very quickly.

Today environment is on line based on which process is very helpful

for all the Customer who lived in different place and purchased all the item at

a one place directly internet application webpage .They directly logon on the

webpage of online shopping and acquired all the information very quickly.

Page : 1/109

Page 2: Project report on shopping application

ONLINE SHOPPING.COM

Number Of Modules1. User Management

2. Product Management

3. Shopping Cart Management

4. Payment Management

5. Shopping Category Management

6. Order Management

7. Report

1 :- User Management

Whenever a new user wants to shop for a product. He will have to get

registered with the shopping site by providing this personal details and the

user name and password will be allocated to him to access the website.

.

2:- Product Management

This modules deal with the management of a Wied rang of products that are

covered in over business for the direct sale purpose. Maintaining the stocks,

sale of the products, assembling them with their accessories etc. are managed

here .Thus it forms an important units for the efficient working of any

shopping complex.

3:- Shopping Cart Management

When a user shops he can add number of product in this shopping cart he can

add or remove product from the cart and the cart is used to make purchase

order.

Page : 2/109

Page 3: Project report on shopping application

ONLINE SHOPPING.COM

4:- Payment Management

To confirm the order the user will have to pay the shopping amount this

module is used to collect all the details of the shopping payment such as cart

number , card number etc.

5:- Shopping Category Management

This module deals with the over all product categories available in over

mart.The categories to which one products have been sub-divided are

Books,Dolls,Clothes,Watches,Electronics,Fourwheelars,Sunglasses,Shoses

etc.

6:- Order Management

All the products selected into a shopping cart will have to ordered using this

form. The user provided a details such as cart no date of order ,payment no

etc.This table is used to collect the finl payment.

7:- Report (Crystal Report)

To generate the output various kind of report are generated such as:

1. Payment Report

2. Order & Shopping Report

3. Project Profile Management

Page : 3/109

Page 4: Project report on shopping application

ONLINE SHOPPING.COM

Preface

The continuous improvement in the field of technology along with the

ever-increasing complication day today activities has resulted in the computer-

aided management in almost each and every field of work.

Computer can process data towards logical conclusion, clarify and make

them readily available for use, with proper programming. Computerize system

are seen replacing manually systems.

Computers have not only allowed the enhancement in computation speed

but also have brought about considerable reduction in the error with cost

effectiveness.

Information technology has become the backbone of almost ever

management system and hence it is very vital for efficient management online

shopping.

Page : 4/109

Page 5: Project report on shopping application

ONLINE SHOPPING.COM

The Objective of my project is to

To provide the customer with the quick and accurate

information regarding the shopping.

Make the present manual system more interactive, speedy

and user friendly.

Reduce the cost of maintenance.

Provide online data.

Provide prompt and accurate Management system

Page : 5/109

Page 6: Project report on shopping application

ONLINE SHOPPING.COM

METHODOLOGY In the development, the Top Down methodology is adopted for designing

1. A design is said to be top down if it consist the hierarchy of module

with each module having single entry and single exit subroutine.

2. From the beginning of the project, Data Flow Diagram, Entity

Relationship model and next definition of each module and their

relationships defined in the project with adopted the top down

approach.

3. A program is partitioned into small independent modules; they are

arranged in modular hierarchy in a top down approach with detail

showed at bottom.

4. It is an attempt to minimize complexity and make problem more

manageable form by subdividing it in to smaller segments in which all

detail is present called Modularization or decomposition of the

problem.

5. The top level shows the most important task of the beginning, the

decision of the task is retained by the middle level and the detail and

testing, validation the task is performed by the bottom level of the

project. Users for the best interface of the S/W.

Page : 6/109

Page 7: Project report on shopping application

ONLINE SHOPPING.COM

System Analysis

Starting from a statement of the problem, the analyst builds a model of

the real-world situation showing its important properties. The analyst must

work with the request to understand the problem because problem

statements are rarely complete or correct. The analysis model is a concise,

precise abstraction of what the desired system must do, not how it will be

done. The objects in the model should be application-domain concepts and

not computer implementation concepts such as data structures. A good

model can be understood and criticized by application experts who are not

programmers. The analysis model should not contain any implementation

decisions.

Page : 7/109

Page 8: Project report on shopping application

ONLINE SHOPPING.COM

FEASIBILITY STUDY

Introduction:

Once a preliminary area of application has been identified, it may then

be subjected to a more rigorous examination in a feasibility study. In the

previous unit, it was discussed the steps that make up the initial investigation.

By the initial investigation, a user has recognized the need, user requirements

are determined and the problem has been defined. Apart from this, an initial

investigation is launched to study the present system and verify the problem in

a systematic way. The next step is to determine exactly what the proposed

system is to do by defining it expected performance. This kind of work will be

carried out in the feasibility study. A feasibility study is carried out to select

the best system that meets performance requirements.

Page : 8/109

Page 9: Project report on shopping application

ONLINE SHOPPING.COM

Different Types of Feasibility

In the conduct of the feasibility study, the analyst will usually consider seven

distinct, but inter-related types of feasibility. They are:

1. Technical Feasibility

2. Operational Feasibility

3. Economic Feasibility

Technical Feasibility

This is concerned with specifying equipment and software that will

successfully satisfy the user requirement. The technical needs of the system

may vary considerably, but might include:

The facility to produce outputs in a given time.

Response time under certain conditions.

Ability to process a certain volume of transaction at a particular speed.

Facility to communicate data to distant location.

In examining technical feasibility, configuration of the system is given

more importance than the actual make of hardware. The configuration should

give the complete picture about the system’s requirements how many

workstations are required, how theirs units are interconnected so that they

could operate and communicate smoothly. What speeds of input and out-put

should be achieved at particular quality of printing. The can be used as a basis

for the tender document against which dealers and manufactures can later

make their equipment bids. Specific hardware and software products can then

be evaluated keeping in view with the logical needs.

Page : 9/109

Page 10: Project report on shopping application

ONLINE SHOPPING.COM

Operational Feasibility

It is mainly related to human organizational and political aspects. The

points to be considered are:

What changes will be brought with the system?

What organizational structures are disturbed?

What new skills will be required?

Do the existing staff members have these skills?

If not, can they be trained in due course of time?

Generally project will not be rejected simply because of operational

infeasibility but such considerations are likely to critically affect the nature

and scope of the eventual recommendations. This feasibility study is carried

out by a small group of people who are familiar with information system

techniques, who understand the parts of the business that are relevant to the

project and are skilled in system analysis and design process.

Economic Feasibility

Economic analysis is the most frequently used technique for evaluation

the effectiveness a proposed system. More commonly known as cost/ benefit

analysis. The procedure is to determine the benefits and savings that are

expected from a proposed system and compare them with costs. If benefits

outweigh costs, a decision is taken to design and implement the system.

Otherwise, further justification or alternative in the proposed system will have

to be made if it is to have a chance of being approved. This is an ongoing

effort that improves in accuracy at each phase of the system life cycle.

Page : 10/109

Page 11: Project report on shopping application

ONLINE SHOPPING.COM

TOOLS AND PLATFORM USED

Hardware Requirements:-

Processor: PIII above

RAM: 128 MB

HDD: 20 MB Hard disk & above

Software Requirements:-

Operating System: XP/Windows2000 and above

Front End: DOT NET FRAMEWORK 2.0

Back End: SQL Server 2000 or above

Report: Crystal Report

Web Server: IIS (Internet Information Services)

Web Browser: IE (Internet Explorer) 6.0 or above

Page : 11/109

Page 12: Project report on shopping application

ONLINE SHOPPING.COM

ABOUT DOT NET

Microsoft recently announced the .NET platform as their latest vision

for building, deploying, and running distributed applications and systems

across the Internet. .NET is a general-purpose software development platform,

similar to Java. At its core is a virtual machine that turns intermediate

language (IL) into machine code. High-level language compilers for C#,

VB.NET and C++ are provided to turn source code into IL. The .NET

platform takes advantage of several new technology standards, such as

extended Markup Language (XML) and Simple Object Access Protocol

(SOAP), to fully utilize the abundance of computing and communications

resources available and in use today. With the .NET platform, Microsoft hopes

to supply the next-generation user experience by providing users with more

personalization and seamless integration between multiple applications and

devices.

Because .NET has been gaining momentum through the Internet

industry for a sufficient period of time much is known of the values it brings

to the development process. By all measurements of .NET deployments and

project completions compared to comparable projects under other

environments, .NET projects are completed on or before schedule and on or

under budget. Further due to standardization that is inherent in the tool,

deployment complexities and 11th hour crisis that so often plague applications

rollouts are significantly reduced in .NET projects.

A new developer resource that has changed the landscape of

implementation and deployment for designers is the .NET innovated

Page : 12/109

Page 13: Project report on shopping application

ONLINE SHOPPING.COM

development tool of C#. C# brings with it the development orientation of

managed code and metadata which is a concept that predates .NET but comes

into its full utilization in the .NET environment. Metadata introduces an

interpretation layer between code and data. In this way .NET can control the

code. Self describing metadata which is the structure of C# makes it possible

for code to be deployed in a diverse setting of applications, environments and

operating systems and it makes code immune to obsolescence due to

technology evolutions because the onus of tracking such change is

within, .NET not in the code itself. This is an xtraordinarily efficient design

principle which is the heart of the power that .NET brings to the development,

implementation and deployment setting.

Page : 13/109

Page 14: Project report on shopping application

ONLINE SHOPPING.COM

. NET Architecture

We can describe the .NET architecture as follows:-

It is a set of common services which can be used from a

number of object languages.

These services are executed in the form of intermediate code

that is independent of the underlying architecture.

They operate in a runtime (Common Language Runtime) which

manages resources and monitors application execution.

On reading this short description, one can be forgiven for

drawing a parallel with Java. Indeed, Microsoft makes no secret of the

fact that it drew its inspiration, in the most pragmatic sense, from

existing technology and Java in particular.

The primary goal of .NET is to provide developers with the

means to create interoperable applications using "Web Services" from

any sort of terminal, be it a PC, PDA, mobile phone, and so forth.

Page : 14/109

Page 15: Project report on shopping application

ONLINE SHOPPING.COM

SOFTWARE ENGINEERING PARADIGM (WATER FALL

MODEL)

1. Software Engineering and Modeling: because software is always the

part of the important system, works begin by establishing requirements for all

system elements and then allocating subset of these requirements to software.

2. Software Requirements Analysis: In this step it analyze the

requirements for both system and the software. Main work to be done in this

step is the proper documentation about the requirements of the system.

3. Design: In this step I worked on the de4signing of the software. The

design process translates the requirements into a representation of the

software.

4. Code Generation: In this step the design is translated into machine-

readable form.

5. Testing: Once the code has been generated, a program testing is

necessary. The testing process focuses on the logical internals of the software.

SOFTWARE REQUIREMENT SPECIFICATION

The Software requirement specification is produced at the culmination

of the analysis task. The function and performance allocated to software as

part of system engineering are refined by establishing a complete information

description, a detailed functional and behavioral description, an indication of

performance requirements and design constraints, appropriate validation

criteria, and other data pertinent to requirements.

Page : 15/109

Page 16: Project report on shopping application

ONLINE SHOPPING.COM

In software requirement three are dealing with the requirement of the

proposed system, that is, the capabilities that the system, which is yet to be

developed, should have it is because we are dealing with specifying a system

that does not exist in any form I the manual form of existence does not

generally have the same capabilities as the eventual automated system) that

the problem of requirements becomes complicated. Regardless of how the

requirement phase proceeds, it ultimately ends with the software requirements

specification (SRS). Generally, the SRS is a document that completely

describes what the proposed software should do without describing how the

software will do it.

Need for SRS

The origin of most software system is in the need of client, who either

wants to automate an existing manual system or desires a new software

system. The software system, it the developer creates self. Finally the end

users will use the completed system.

Thus there are three major parties interested in a new system the client, the

user and the developer. Somehow the requirements for the system that will

satisfy the needs of the clients and the concerns of the user have to be

communicated to the developer. The problem is that the client usually does not

understand software or the software development process, and the developer

often does not understand the client’s problem and application area.

Page : 16/109

Page 17: Project report on shopping application

ONLINE SHOPPING.COM

SYSTEM DESIGN

Introduction:

The systems objectives outlined during the feasibility study serve as

the basis from which the work of system design is initiated. Much of the

activities involved at this stage is of technical nature requiring a certain degree

of experience in designing systems, sound knowledge of computer related

technology and through understanding of computers available in the market

and the various facilities provided by the vendors. Nevertheless, a system

cannot be designed in isolation without the active involvement of the user. The

user has a vital role to play at this stage too. As we know that data collected

during feasibility study wills we utilized systematically during the system

design. It should, however be kept in mind that detailed study of the existing

system is not necessarily over with the completion of the feasibility study.

Depending on the plan of feasibility study, the level of detailed study will vary

and the system design stage will also vary in the amount of investigation that

still needs to be done. This investigation is generally an urgent activity during

the system. Sometimes, but rarely, this investigation may form a separate stage

between feasibility study and computer system design. Designing a new

system is a creative process, which calls for logical as will as lateral thinking.

The logical approach involves systematic moves towards the end product

keeping in mind the capabilities of the personnel and the equipment at each

Page : 17/109

Page 18: Project report on shopping application

ONLINE SHOPPING.COM

decision making step. Lateral thought implies encompassing of ideas beyond

the usual functions and equipment. This is to ensure that no efforts are being

made to fit previous solutions into new situations.

System Design Considerations

The system design process is not a step-by-step adherence of clear

procedures and guidelines. Though, certain clear procedures and guidelines

have emerged in recent days,

But still much of design work depends on knowledge and experience of the

designer.

When designer starts working on system design, he will face different

type of problems. Many of these will be due to constraints imposed by the user

or limitations of the hardware and software available in the market.

Sometimes, it is difficult to enumerate the complexity of the problems and

solutions thereof since the variety of likely problems is so great and no

solutions are exactly similar. However, following considerations should be

kept in mind during the system designing phase:

Design Objectives

The primary objective of the design of course, is to deliver the

requirements as specified in the feasibility reports. In general the following

design objectives should be kept in mind.

Practicality

the system must be stable and can be operated by people with average.

Page : 18/109

Page 19: Project report on shopping application

ONLINE SHOPPING.COM

Efficiency

This involves accuracy, timeliness and comprehensiveness to the system

output.

Cost

It is desirable to aim for a system with a minimum cost subject to the

condition that it must satisfy all the requirements.

Flexibility

The system should be modifiable depending on the changing needs of the user.

Such modifications should not entail extensive reconstructing or recreation of

software. It should also be portable to different computer systems.

Security

This is very important aspect of the design and should cover areas of

hardware reliability, fall back procedures, physical security of data and

provision for detection of fraud and abuse.

System design involves first logical design and then physical

construction of the system. The logical design describes the structure and

characteristics of features, like the outputs, inputs, files, database and

procedures. The physical construction, which follows the logical design,

produces actual program software, files and a working system.

Major System Design Activities

Several development activities are carried out during structured design.

They are database design, implementation planning, system test preparation,

system interface specification, and user documentation.

Database design

This activity deals with the design of the physical database. A key is to

determine how the access paths art to be implemented.

Page : 19/109

Page 20: Project report on shopping application

ONLINE SHOPPING.COM

Program design: In conjunction with database design is a decision on the

programming language to be used and the flowcharting, coding, and

debugging procedure prior to conversion. The operating system limits the

programming languages that will run of the system.

System and program test preparation

Each aspect of the system has a separate test requirement. System testing is

done after all programming and testing completed the test on system and

program test requirements become a part of design specifications a

prerequisite to implementation.In contrast to the system testing is acceptance

testing, which puts the system through a procedure design to convince the user

that the proposed system will meet the stated requirements. Acceptance testing

is technically similar to system testing but politically it is different.

Design Process

The computer system design process is an exercise of specifying how,

the system will work. It is an iterative process, which is based on what the

system will be do as shown in the feasibility report.

Mainly, following five parts have been included in the system design

process

Output Design

The starting point of the design process is the proper knowledge of

system requirements which will normally be converted in terms of output.

Input Design

Once the output requirements have been finalized, the next step is to

find out what data need to be made available to the system to produce the

desired outputs. The basic documents in which these data are available need to

Page : 20/109

Page 21: Project report on shopping application

ONLINE SHOPPING.COM

be identified. If necessary, these documents may have to be revised or new

documents may have to be introduced.

File Design

Once the input data is captured in the system, these may to be

preserved either for a short or long period. These data will generally be stored

in files in a logical manner. The designer will have to devise the techniques of

storing and retrieving data from these files.

Procedure Design

This step involves specifications of how processing will be performed.

In this, there are two aspects:

computer procedure

Non-computer procedure

The computer procedure will specify what functions will be carried out on

computer, what will be different programs and in what sequence the programs

will be run. The non-computer procedure will specify the manual procedures

for feeding input data, receiving outputs etc.

Control Design

The control design indicates necessary procedures which will ensure

correctness of processing, accuracy of data, timely output etc. this will ensure

that the system is functioning as per plan.

Development and Deployment Design

Major responsibilities include system Requirement Study, Preparing

System Design Document, Preparing the Program (Form) Specs, Peer Review

of the Specs, Implement Quality procedures as per the QMS Document,

Page : 21/109

Page 22: Project report on shopping application

ONLINE SHOPPING.COM

Documentation of SRS Revalidation & Design Documents, thorough grasping

of the user functionality and applying, approving the same in the project,

Developing, Testing & Debugging of Forms, User Training and

Implementation of the module.

INPUT DESIGN

Introduction:

Once the analysis and design of the system has been done, it would be

necessary to identify the data that are required to be processed to produce the

outputs. Input is one of the most expensive phases of the operation of a

computerized system and creates sometimes a major problem. Different type

of problem with a system can usually be traced back to faulty input design

method needless to say, therefore, that the input data are the lifeblood of a

system and have to be analyzed and designed with utmost care and

consideration. Input design features can ensure the reliability of the system

and generate correct reports form the accurate data. The input design also

determines whether the user can interact efficiently with the system.

Elements of Input Data

Inaccurate input data are the most common cause of errors in data

processing. Errors entered by data entry operators can be controlled by input

design. Input data are collected and organized into groups of similar data.

Once identified, appropriate input media are selected for processing.

Input Data

Page : 22/109

Page 23: Project report on shopping application

ONLINE SHOPPING.COM

The goal of designing input data is to make data entry as easy, logical

and error free from errors as possible. In entering data, operators need to know

the following:

The allocated space for each field.

Field sequence, which much match that in the source document.

The format in which data fields are entered for example, filling out the

date field is required through the edited format mm/dd/yy.

When we approach input data design, we design the source document.

Let us elaborate on each step.

Source Documents

Source data are captured initially on original paper or a source

document. For example, a cheque written against an account is a source

document. When it reaches the bank, it is encoded with special magnetic ink

character recognition so that a reader that is part of the information system of

the bank can process it. Therefore, source documents initiate a processing

cycle as soon as they are entered into the system. Source documents may be

entered into the system from punch cards, from diskettes, or even directly

through the keyboard. A source document may or may not be retained in the

proposed system. Thus, each source document may be evaluated in terms of.

Its continued use in the proposed system,

The extent of modification for the proposed system &

Replacement by an alternative source document.

A source document should be logical and easy to understand. Each area

in the form should be clearly identified and should specify for the user what to

write and where to write it.

Input Design Guidelines

The design of input play very significant role in getting the correct

output. It covers al phases of input from creation of initial data(original

recording) to actual entering the data to the system for processing. The input

design is the link that ties the information system into the world of its users.

Page : 23/109

Page 24: Project report on shopping application

ONLINE SHOPPING.COM

Some features of design may vary depending on whether the system is batch-

oriented or on-line. Here, we will discuss the various objectives of input

design. They focus on:

Controlling amount of input

Avoiding delay

Avoiding errors in data

Avoiding extra steps

Keeping the process simple

Each of the five objectives of input design is briefly discussed below:

Controlling Amount of Data

An effective design controls the quantity of data for input for the

following reasons:

Firstly, data preparation and data entry operations depend on people.

Since labor costs are high, the cost or preparing and entering data is also high.

It is quite evident, then that reducing data requirements mean lowering costs

through reduced labor expense.

Secondly, the input phase of computing can be slow process and take

many times longer than that needed by computers to carry out their tasks. In

fact, the computer itself may sit idle until data is prepared and input for

processing. By reducing input requirements, the analyst will speed the entire

process from data capture to processing to provide result to users.

Avoiding Delay

When processing is delayed owing to data preparation or data entry,

the cause is called a bottleneck. Avoid bottlenecks when designing input

should always be one of the objectives of the analyst.

Avoiding Errors in Data

The third objective deals with errors. In one sense, the rate at which

errors occur is dependent on the quantity of data. Since the lower the amount

of data is inputted, there are fewer opportunities for the error to occur.

Page : 24/109

Page 25: Project report on shopping application

ONLINE SHOPPING.COM

Firstly, the analyst can reduce this number by reducing the volume of

data dust must be entered for each transaction.

Secondly, the analyst can also affect error rates of an operation through

design. The manner in which data must be entered can reduce the chance of

errors.

Still, a third aspect of error control is the need to detect errors when

they do occur. Checks and balances in the data entry programs, called input

validation techniques, also detect errors input.

OUTPUT DESIGN

Introduction:

Presenting the data processed by a computer-based information system

in an attractive and usable form has become very essential these days success

and acceptance of a system to some extent depends on good presentation.

Therefore, system analyst must know fully how to design output report in an

attractive way. Many new output devices are being introduced in the market

because of recent development in computer technology. System analyst must

be aware of these new technologies and try to use these new output devices if

possible. Currently, excellent graphic displays are widely available. Speech

output system are also fast emerging.

There are three main reasons why outputs from the computer are

required. They are:

i. For communication to the persons concerned.

ii. For re-input to the computer for being connected with other

data and further processing.

iii. For permanent storage.

Types of Output

Page : 25/109

Page 26: Project report on shopping application

ONLINE SHOPPING.COM

Outputs of a system can take different forms. The most common are

reports, displays on screen, printed forms etc. the outputs also vary in terms of

their contents, type of stationery. Frequency and timing etc. besides, due

consideration also need to be given as to who will use the output and for what

purpose. All these points must be kept in mind while designing outputs so that

the objectives of the system are met in the best possible way.

Outputs of a data-processing system can be placed into two categories:

Application Output

Operating Output

Application Output

These are the outputs desired out of the system to meet its objectives.

These are of three types:

i. Output as a basis for decision-making. This type of output is generally

required by management for decision-making purposes.

ii. Output as a requirement to meet a functional objective. Invoices,

Excise Gate Pass, Purchase Orders are the examples of such output.

iii. Statutory outputs: All organization are required to produced a certain

amount of reports and forms as required by law.

Operating Output

These outputs are mainly generated for use of EDP staff and give

various indications as to how the system operates. System logs, error

messages, status indicators etc. are the examples of such output. These types

of output are not concerned for the users.

Page : 26/109

Page 27: Project report on shopping application

ONLINE SHOPPING.COM

DATABASE DESIGN

Data Base (SQL Server 2000)

Working with an access project is very similar to working with an

access database. The process of creation forms, reports, data access page

macros, and modules is virtually the same as that used to create an access

database.

Once your connect to and SQL Server database, you can view, create,

modify, and delete tables, views, procedures, user defined functions, and

database diagrams by using the database designer, table designer, query

designer, query builder, and SQL text editor. Although the user interface for

working with these database objects is different from the equivalent database

objects in an access database, it is just as user-friendly. An access project also

contains many of the same wizards as an access database, such as the form

wizard, the report wizard, the page wizard, and the input mask wizard, these

wizards help you to quickly create a prototype or simple application, and also

make it easier to create an advanced application.

Page : 27/109

Page 28: Project report on shopping application

ONLINE SHOPPING.COM

A Microsoft access project is and access data file that provides

efficient, native-mode access to a Microsoft SQL Server database through toe

OLE DB component architecture. Using an Access project, you can create a

client/server application as easily as a file server application. This client/server

application can be a traditional solution based on forms and reports, or a web-

based solution based on data access pages, or a combination of both. You can

connect the Access project to a remote SQL Server database, a local SQL

Server database, or local installation of SQL Server 2000 Desktop engine.

Tables

There are following type of modules in this project

1:-Table Name:-User registration

Page : 28/109

Page 29: Project report on shopping application

ONLINE SHOPPING.COM

Page : 29/109

S.NO. Column name Data type Length Discription

1. UserId Varchar 50 Primary key

2. Password Varchar 50

3. Title Varchar 50

4. FirstName Varchar 50

5. MiddleName Varchar 50

6. LastName Varchar 50

7. Home Address Varchar 50

8. City Varchar 50

9. State Varchar 50

10. Country Varchar 50

11. email Varchar 50

12. Alternateemail Varchar 50

13. ConfirmPassword Varchar 50

Page 30: Project report on shopping application

ONLINE SHOPPING.COM

Page : 30/109

Page 31: Project report on shopping application

ONLINE SHOPPING.COM

2:-Table Name:- Product

S.NO. Column name Data type Length Discription

1. ProductID varchar 50 Primary Key

2. ProducName varchar 50

3. Rate float 8

4. Discount varchar 50

5. Offersonproduct varchar 50

6. Quantity numeric 9

7. Category varchar 50

3:-Table Name:- CategoryName

S.NO Column name Data type Length Discription

1. CategoryName Varchar 50 Primary Key

2. SubCatagory

Item

Varchar 50

Page : 31/109

Page 32: Project report on shopping application

ONLINE SHOPPING.COM

4:-Table Name:- Contact1

S.NO Column name Data type Length Discription

1. Headofficeadd Varchar 50 Primary Key

2. Addressline1 Varchar 50

3. City Varchar 50

4. State Varchar 50

5. Contact numeric 9

6. Email Varchar 50

7. Fax Varchar 100

8. Branchofficeadd Varchar 50

9. BAddressline2 Varchar 50

10. BCity Varchar 50

11. BState Varchar 50

12. BContact numeric 9

13. BEmail Varchar 50

14. BFax Varchar 100

5:- Table Name:- MainCatagory

S.NO. Column name Data type Length Discription

1. CatagoryCode Int 4 Primary Key

2. CategoryName Varchar 50

3. PhotoUrl Varchar 255

Page : 32/109

Page 33: Project report on shopping application

ONLINE SHOPPING.COM

6:-Table Name:- OrderEnquiry

S.NO. Column name Data type Length Discription

1. Enqiryno numeric 9 Primary Key

2. Enqirydate datetime 8

3. Orderno numeric 9

4. Enqirydetails Varchar 50

5. Enqirystatus Varchar 50

7:-Table Name:- Ordernow

S.NO Column name Data type Length Discription

1. orderno int 4 Primary Key

2. dateoforder datetime 8

3. shoppingcartno int 4

4. paymentno numeric 9

5. orderbycustomername Varchar 50

6. Deliveryaddress1 Varchar 50

7. Deliveryaddress2 Varchar 50

8. Deliveryaddress3 Varchar 50

9. contact numeric 9

10. possibledeliverydate datetime 8

11. deliverystatus Varchar 50

Page : 33/109

Page 34: Project report on shopping application

ONLINE SHOPPING.COM

8:-Table Name:- Payment

S.NO. Column name Data type Length Discription

1. PaymentNo Int 4 Primary Key

2. PaymentDate Datetime 8

3. UserID varchar 50

4. ShoppingCartNo Int 4

5. TotalAmount Int 4

6. Dateofexpiry Datetime 8

7. PinNo numeric 9

8. PaymentMode varchar 50

9. cartno varchar 50

10. cardno varchar 50

9:-Table Name:- PriceCompare

S.NO. Column name Data type Length Discription

1. productname numeric 9 Primary Key

2. productname Varchar 50

3. company1 Varchar 50

4. price1 money 8

5. Company2 Varchar 50

6. Price2 money 8

7. Company3 Varchar 50

8. Price3 money 8

10:-Table Name:- priceentry

Page : 34/109

Page 35: Project report on shopping application

ONLINE SHOPPING.COM

S.NO. Column name Data type Length Discription

1. productname numeric 9 Primary Key

2. productname Varchar 50

3. company1 Varchar 50

4. price1 money 8

5. Company2 Varchar 50

6. Price2 money 8

7. Company3 Varchar 50

8. Price3 money 8

11:-Table Name:- ProjectProfileManagement

S.NO. Column name Data type Length Discription

1. ProductCode Int 4 Primary Key

2. maincatagory varchar 50

3. subcatagory varchar 50

4. Discription varchar 255

5. Rate numeric 9

6. Discount varchar 50

7. OfferScheme varchar 50

12:-Table Name:- ShoppingCart

Page : 35/109

Page 36: Project report on shopping application

ONLINE SHOPPING.COM

S.NO. Column name Data type Length Discription

1. ShoppingCart varchar 50

2. QuantityPurchased numeric 9

3. Rate money 8

4. Discount money 8

5. Productname varchar 50

6. Offersonproduct varchar 50

7. Total money 8

8. SHoppingId int 4 Primary Key

9. ShoppingCart int 4

10. UserId varchar 50

13:-Table Name:- SubCatagoryItem

S.NO. Column name Data type Length Discription

1. SubCatagoryCode Int 4 Primary Key

2. SubCatagoryName varchar 50

3. mainCatagory varchar 50

4. SubCatagoryPhotoUrl varchar 255

Page : 36/109

Page 37: Project report on shopping application

ONLINE SHOPPING.COM

DFD (Data Flow Diagram)

As information moves through software, it is modified by a series

of transformations. A data flow diagram is a graphical representation that

depicts information flow and the transforms that are applied as data move

from input to output. The basic form of a data flow diagram, also known as

a data flow graph or a bubble.

The data flow diagram may be used to represent a system or

software at any level of abstraction. In fact, DFDs may be partitioned into

levels that represent increasing information flow and functional detail.

Therefore, the DFD provides a mechanism for functional modeling as well

as information flow modeling.

Page : 37/109

Page 38: Project report on shopping application

ONLINE SHOPPING.COM

Data Flow DiagramZERO LEVEL DFD

Page : 38/109

Shopping Details

paymentno

Online shopping Managem

ent

Customer

Order management

Product managment

Pay Slip

Product List

Payment

Shopping CartOrder

information

Shopping deatils

PaymentNo

Payme

ntDate

UserID

UserID

PaymentDate

PaymentNo

ProductId

Rate

Discount

ProductId

Rate

Discount

orderno

ordeno

dateoforder

dateoforder

paymentno

ProductID PName

Rate

Rate

PName

ProductID

Request

Shopping

provideds

Page 39: Project report on shopping application

ONLINE SHOPPING.COM

FIRST LEVEL DFD

Page : 39/109

Sent

Shopping Details Shopping

Cart Data

SCCode,SCname,mainc

Pid,pname,rate

Pid,rate,discount

SCCode,SCname,mainc

1.0Master categor

y

5.0Order

management

Sub Category

Order Deatils

Main Category Main Category

Sub Category

Product Data

2.0Product

management

Product Details

User registratoin

3.0User

registration

User Data

4.0ShoppinCart management

Order Data

Payment Details

6.0Payment

management

Payment Data

Sub Category

Product Details

7.0Shopping

SearchEngine

Main Category

Searching Result

C_Code,C_Name

C_Code,C_Name

Pid,pname,rate

Uid,password

Uid,password

Pid,rate,discount

Ono,eno,edate

Ono,eno,edate

Pno,pdate,uid Pno,pda

te,uid

M_category,s_category,pid

M_category,s_category,pid

Page 40: Project report on shopping application

ONLINE SHOPPING.COM

SECOND 4.1 LEVEL DFD

Page : 40/109

Order Data

Payment Data

4.1

ShoppingCart

Management

User Data

Product Data

4.2View

Shopping Cart

4.3Order

Product

4.4Payment

Shopping Cart

Payment Details

Uid,password

Uid,password

Pid,pname,rate

Ono,odate

Pno,pdate Pno,pdate

Page 41: Project report on shopping application

ONLINE SHOPPING.COM

SECOND 5.1 LEVEL DFD

Page : 41/109

5.1Order

Process

Order Data

Shopping Cart

User Data

5.2Check

Product Stock

5.3Accept

Payment

5.4SubmitOrder

Uid,password

Uid,password

Ono,odate

Page 42: Project report on shopping application

ONLINE SHOPPING.COM

Data Flow Diagram (DFD)

Data flow diagram focuses on movment of data through the system and its transformations. It is divided in to levels. Level 0, also known as the context diagram, defines the system scope. It consists of external agents, system boundary, and the data flow between the external agents and the system. Level 1 is an explosion of Level 0, where all the major processes, data stores, and the data flow between them is shown. Level 2, Level 3, etc. show details of individual processes.

The notation used is the following:

External agents: They are external to the system, but interact with the system. They must be drawn at level 0, but need not be drawn at level 2 onwards. Duplicates are to be identified. They must be given meaningful names.

Process: They indicate information processing activity. They must be shown at all levels, At level 0, only a single process, depicting the system is shown. On subsequent levels, the number of processes should be limited to 7 ± 2. No duplicates are allowed.

Page : 42/109

Page 43: Project report on shopping application

ONLINE SHOPPING.COM

Data Stores: They are used to store information. They are not shown at level 0. All data stores should be shown at level 1. Duplicates must be indicated.

Data Flows: They indicate the flow of information. They must be shown at all levels and meaningful names must be given.

Page : 43/109

Page 44: Project report on shopping application

ONLINE SHOPPING.COM

Examples:

1. Customer places sales orders. The system checks for availability of products and updates sales information

2. Company receives applications. Checks for eligibility conditions. Invites all eligible candidates for interview. Maintains a list of all candidates called for interview. Updates the eligibility conditions as and when desired by the management

Getting started:

Identify the inputs or events which trigger the system and outputs or responses from the system

Identify the corresponding sources and destinations (external agents)

Produce a context diagram (Level 0). It should show the system boundary, external agents, and the dataflows connecting the system and the external agents.

Produce Level 1 diagram. It must show all the external agents, all the major processes, all the data stores, and all the dataflows connecting the various artifacts. The artifacts should be placed based on logical precedence rather than temporal precedence. Avoid dataflow crossings.

Refine the Level 1 diagram. Explode the individual processes as necessary.

Points to remember:

Page : 44/109

Page 45: Project report on shopping application

ONLINE SHOPPING.COM

1) Remember to name every external agent, every process, every data store, and every dataflow.

2) Do not show how things begin and end.

3) Do not show loops, and decisions.

4) Do not show dataflows between external agents. They are outside the scope of the system.

5) Do not show dataflow between an external agent and a data store. There should be a process in between.

6) Do not show dataflow between two data stores. There should be a process in between.

Page : 45/109

Page 46: Project report on shopping application

ONLINE SHOPPING.COM

7) There should not be any unconnected external agent, process, or data store.

8) Beware of read-only or write-only data stores

9) Beware of processes which take inputs without generating any outputs. Also, beware of processes which generate outputs spontaneously without taking any inputs.

Page : 46/109

Page 47: Project report on shopping application

ONLINE SHOPPING.COM

9) Ensure that the data flowing in to a process exactly matches the data flowing in to the exploded view of that process. Similarly for the data flowing out of the process.

10) Ensure that the data flowing out of a data store matches data that has been stored in it before.

See the appendix for the complete data flow diagram of "Material Procurement System (Case Study)"

Prev Up Next

  Course Contents

Page : 47/109

Page 48: Project report on shopping application

ONLINE SHOPPING.COM

Page : 48/109

Cantain

ShoppingCart

Entity Relationship Diagram

CategorizeInto

Has

RegisterWith

Shopping Complex

Customer

Product Main Category

Sub Category

Order Payment

Divided into

Shops

Prepare Has

CustomerEnquires

pid

Ratediscount

Ccode C_name

P_url

PID

Sid

SCn

SCC

OdateO_no

ContactPno

P_dateP_no

Uid Cartno

P_name

MC

Rate

Discount

Cardno

Goes to

Page 49: Project report on shopping application

ONLINE SHOPPING.COM

Entity Relationship Diagram

ERD complements DFD. While DFD focuses on processes

and data flow between them, ERD focuses on data and the

relationships between them. It helps to organise data used

by a system in a disciplined way. It helps to ensure

completeness, adaptability and stability of data. It is an

effective tool to communicate with senior management

(what is the data needed to run the business), data

administrators (how to manage and control data),

database designers (how to organise data efficiently and

remove redundancies). It consists of three components.

Entity

It represents a collection of objects or things in the real

world whose individual members or instances have the

following characteristics:

Each can be identified uniquely in some fashion.

Each plays a necessary role in the system we are

building.

Each can be described by one or more data elements

(attributes).

Page : 49/109

Page 50: Project report on shopping application

ONLINE SHOPPING.COM

Entities generally correspond to persons, objects,

locations, events, etc. Examples are employee, vendor,

supplier, materials, warehouse, delivery, etc.

There are five types of entities

Fundamental entity : It does not depend on any

other entity for its existence. For e.g. materials

Subordinate entity : It depends on another entity

for its existance. For example, in an inventory

management system, purchase order can be an

entity and it will depend on materials being

procured. Similarly invoices will depend on purchase

orders.

Associative entity : It depends on two or more

entities for its existence. For example, Shopping will

depend on the customer and the product.

Generalisation entity : It encapsulates common

characteristics of many subordinate entities. For

example, a four wheeler is a type of vehicle. A truck

is a type of four wheeler.

Aggregation entity : It consists of or an

aggregation of other entities. For example, a car

consists of engine, chasis, gear box, etc. A vehicle

can also be regarded as an aggregation entity,

Page : 50/109

Page 51: Project report on shopping application

ONLINE SHOPPING.COM

because a vehicle can be regarded as an

aggregation of many parts.

Attributes

They express the properties of the entities.

Every entity will have many attributes, but only a

subset, which are relevant for the system under study, will

be chosen. For example, an employee entity will have

professional attributes like name, designation, salary, etc.

and also physical attributes like height, weight, etc. But

only one set will be chosen depending on the context.

Attributes are classified as entity keys and entity descriptors.

Entity keys are used to uniquely identify instances of

entities. Attributes having unique values are called

candidate keys and one of them is designated as

primary key. The domains of the attributes should be

pre-defined. If 'name' is an attribute of an entity,

then its domain is the set of strings of alphabets of

predefined length.

Relationships

They describe the association between entities.

Page : 51/109

Page 52: Project report on shopping application

ONLINE SHOPPING.COM

They are characterised by optionality and cardinality.

Optionality is of two types, namely, mandatory and optional.

1. Mandatory relationship :means associated with

every instance of the first entity there will be atleast

one instance of the second entity.

2. Optional relationship: means that there may be

instances of the first entity, which are not associated

with any instance of the second entity. For example,

employee-spouse relationship has to be optional

because there could be unmarried employees. It is

not correct to make the relationship mandatory.

Cardinality:- It is three types:

1. one-to-one,

2. one-to-many,

3. many-to-many.

(1)One-to-one relationship : means an instance of the

first entity is associated with only one instance of the

second entity. Similarly, each instance of the second

entity is related to one instance of the first entity.

Page : 52/109

Page 53: Project report on shopping application

ONLINE SHOPPING.COM

(2)One-to-many relationship : means that one instance

of the first entity is related to many instances of the

second entity, while an instance of the second entity is

associated with only one instance of the first entity .

(3)many-to-many relationship : an instance of the first

entity is related to many instances of the second entity

and the same is true in the reverse direction also. Other

types of relationships are multiple relationships between

entities, relationships leading to associative entities,

relationship of entity with itself, EXCLUSIVE-OR and

AND relationships.

ERD notation

There are two type of notation used:

1. Peter Chen notation

2. Bachman notation.

Page : 53/109

Page 54: Project report on shopping application

ONLINE SHOPPING.COM

Not surprisingly, Peter Chen and Bachman are the name inventors of the notation. The following table gives the notation.

COMPONENT REPRESENTATION

ENTITY OR OBJECT TYPE

PURCHASE ORDER

RELATIONSHIP

CARDINALITY

OPTIONALITY

     

Page : 54/109

Page 55: Project report on shopping application

ONLINE SHOPPING.COM

Screen Shots

Shopping Home

Page : 55/109

Page 56: Project report on shopping application

ONLINE SHOPPING.COM

User Registration

Page : 56/109

Page 57: Project report on shopping application

ONLINE SHOPPING.COM

Admin Login

Page : 57/109

Page 58: Project report on shopping application

ONLINE SHOPPING.COM

Adminhome

Page : 58/109

Page 59: Project report on shopping application

ONLINE SHOPPING.COM

Contact

Page : 59/109

Page 60: Project report on shopping application

ONLINE SHOPPING.COM

Main Category Entry

Page : 60/109

Page 61: Project report on shopping application

ONLINE SHOPPING.COM

Price Entry

Page : 61/109

Page 62: Project report on shopping application

ONLINE SHOPPING.COM

Product Entry

Page : 62/109

Page 63: Project report on shopping application

ONLINE SHOPPING.COM

Sub Category

Page : 63/109

Page 64: Project report on shopping application

ONLINE SHOPPING.COM

Login Form

Page : 64/109

Page 65: Project report on shopping application

ONLINE SHOPPING.COM

Member Home

Page : 65/109

Page 66: Project report on shopping application

ONLINE SHOPPING.COM

Shop Now

Page : 66/109

Page 67: Project report on shopping application

ONLINE SHOPPING.COM

Page : 67/109

Page 68: Project report on shopping application

ONLINE SHOPPING.COM

Page : 68/109

Page 69: Project report on shopping application

ONLINE SHOPPING.COM

Page : 69/109

Page 70: Project report on shopping application

ONLINE SHOPPING.COM

Page : 70/109

Page 71: Project report on shopping application

ONLINE SHOPPING.COM

Page : 71/109

Page 72: Project report on shopping application

ONLINE SHOPPING.COM

Page : 72/109

Page 73: Project report on shopping application

ONLINE SHOPPING.COM

Page : 73/109

Page 74: Project report on shopping application

ONLINE SHOPPING.COM

Page : 74/109

Page 75: Project report on shopping application

ONLINE SHOPPING.COM

Page : 75/109

Page 76: Project report on shopping application

ONLINE SHOPPING.COM

Page : 76/109

Page 77: Project report on shopping application

ONLINE SHOPPING.COM

Page : 77/109

Page 78: Project report on shopping application

ONLINE SHOPPING.COM

Page : 78/109

Page 79: Project report on shopping application

ONLINE SHOPPING.COM

Page : 79/109

Page 80: Project report on shopping application

ONLINE SHOPPING.COM

Page : 80/109

Page 81: Project report on shopping application

ONLINE SHOPPING.COM

Page : 81/109

Page 82: Project report on shopping application

ONLINE SHOPPING.COM

Page : 82/109

Page 83: Project report on shopping application

ONLINE SHOPPING.COM

Page : 83/109

Page 84: Project report on shopping application

ONLINE SHOPPING.COM

Page : 84/109

Page 85: Project report on shopping application

ONLINE SHOPPING.COM

Page : 85/109

Page 86: Project report on shopping application

ONLINE SHOPPING.COM

Page : 86/109

Page 87: Project report on shopping application

ONLINE SHOPPING.COM

Page : 87/109

Page 88: Project report on shopping application

ONLINE SHOPPING.COM

Page : 88/109

Page 89: Project report on shopping application

ONLINE SHOPPING.COM

Order Enquiry

Page : 89/109

Page 90: Project report on shopping application

ONLINE SHOPPING.COM

Page : 90/109

Page 91: Project report on shopping application

ONLINE SHOPPING.COM

Page : 91/109

Page 92: Project report on shopping application

ONLINE SHOPPING.COM

Price Compare

Page : 92/109

Page 93: Project report on shopping application

ONLINE SHOPPING.COM

Product Details

Page : 93/109

Page 94: Project report on shopping application

ONLINE SHOPPING.COM

Contact Searching

Page : 94/109

Page 95: Project report on shopping application

ONLINE SHOPPING.COM

About us of Shopping

Page : 95/109

Page 96: Project report on shopping application

ONLINE SHOPPING.COM

Logout Form

Page : 96/109

Page 97: Project report on shopping application

ONLINE SHOPPING.COM

Page : 97/109

Page 98: Project report on shopping application

ONLINE SHOPPING.COM

Report of Product Entry

Page : 98/109

Page 99: Project report on shopping application

ONLINE SHOPPING.COM

Report of Order Now

Page : 99/109

Page 100: Project report on shopping application

ONLINE SHOPPING.COM

Report of Payment

Page : 100/109

Page 101: Project report on shopping application

ONLINE SHOPPING.COM

VALIDATION CHECKS

Validation checks are very important in any software. Validation in cooperated in the software so that the user is not able to make wrong entries in the database accidentally or otherwise. Accordingly keys are trapped from the keyboard and validation is enforced. If the user presses a wrong key the validation code checks to see the any wrong character is not entered. There is a mechanism engineered in the software through which it automatically corrects the case sensitivity of alphabets entered in the event of any lower case character to be fed in upper case or vice-versa.

Secondly, there is again a provision made in case the user leaves a entry empty, which was a mandatory field to be filled, when making inputs to the database if the user tries to enter a blank field in the database stipulated as mandatory, then a massage pops up warning the user that it is necessary to fill the field in question.

Input Verification And Control

If incorrect data enters the system, it is usually very costly to make the necessary corrections. Also how expensive would it be to have operator record a quantity of 100 rather than 10 for a shipment of sports cars. The shipping charges for sending the cars to the customer and then of having them returned would be only one of the costs. While the 90 extra cars were in transit, they would not be available to other customers (which could result in a loss of sales) or could be damaged. There are many methods, which are commonly used to verify data entering the system as input.

Key Verification

A second operator is a key the data already recorded. This method is used for verifying data recorded in Punched cards or on diskettes and magnetic tape. Then two floppies are compared to correct record, which mismatched during comparison after verifying, form the original documents. This is most effective method used by Computer Service bureaus for data validation.

Use Of Self-Checking Numbers

The computer can be programmed to reject numbers that have been transposed or have one or more wrong digits. Check digits and self-checking number routines can be effectively used for numbers in a series.

Visually Displaying An Identifying Characteristics

Page : 101/109

Page 102: Project report on shopping application

ONLINE SHOPPING.COM

When using a terminal, a part number is entered. Displayed in the VDT is the description of the part, which is visually confirmed by the operator.

Reasonableness Test

Based upon past history, some input can be checked to see if it is reasonable. For example, because of long-standing company policy, it is unlikely that any employee will have more than 20 hours of overtime. If more than 20 hours of overtime are recorded in an employee’s current transaction record, an error message will be generated as the data is being edited.

Similarly in ‘Date Of Birth’ field, it is checked that no date is more than 31, month number is not more than 12 and the year is not more than the current year or current year minus minimum age prescribed.

Verification Of Data Type Some input fields should contain only numeric data while others

should contain only alphabetic data. The fields can be edited to make certain that only the right type of data is recorded in each field.

Sequence Check

If the numbers in the source documents are serial and the documents are in order, the input records will also be in numerical sequence. A check can be made by the program to determine whether the records are in either ascending or descending order.

Page : 102/109

Page 103: Project report on shopping application

ONLINE SHOPPING.COM

TESTING

Testing Practice And Plans

It should be clear in mind that the philosophy behind testing is to find errors. Test cases are devised with this purpose in mind. A test case is a set of data that the system will process as normal input. However, the data are created with the express intent of determining whether the system will process them correctly.

Testing Objectives

The objective of the testing is:-Verify integration between objects.Verify integration of all components of the softwareTo identify the defects prior t deployment of software

There are two general strategies for testing software :

Code Testing and Specification Testing. In case testing, the analyst develops that case to execute every instructions and path in a program. Under specification testing, the analyst examines the program specifications and then writes test data to determine how the program operates under specific conditions. Regardless of which strategy the analyst follows, there are preferred practices to ensure that the testing is useful. The levels of tests and types of test data, combined with testing libraries, are important aspects of the actual test process.

Levels Of Tests:

Systems are not designed as entire systems nor are they tested as single systems. The analyst must perform both unit and system testing.

Unit Testing

In unit testing the analyst tests the programs making up a system. For this reason, unit testing is sometimes called program testing. Unit testing gives stress on the modules independently of one another, to find errors. This helps the tester in detecting errors in coding and logic that are contained within that module alone. The errors resulting form the interaction between modules are initially avoided. For each, it provides that ability to enter, modify or retrieve

Page : 103/109

Page 104: Project report on shopping application

ONLINE SHOPPING.COM

data and respond to different types of inquiries or print reports. The test cases needed for unit testing should exercise each condition and option.

System Testing

The important and essential part of the system development phase, after designing and developing the software is system testing. It cannot say that every program or system design is perfect and because of lack of communication between the user and the designer, some error is there in the software development. The number and nature of error in a newly designed system depend on some usual factors like communication between the user and the designer the programmer’s ability to generate a code that reflects exactly the system specifications and the time frame for the design.

Testing is an important function to the success of the system. System testing makes a logical assumption that if all the parts of the system are correct, the goal will be successfully activated. Another reason for system testing is its utility as a user-oriented vehicle before implementation.

System testing consists of the following five steps:Program Testing String Testing System TestingSystem DocumentationUser Acceptance Testing

Program TestingA program represents the logical elements of a system. For a program

to run satisfactorily, it must compile and test data correctly and tie in properly with other programs. It is the responsibility of programmer to have an error free program. At the time of testing the system, there exists two types of errors that should be checked. These errors are syntax and logic. A syntax error is a program statement that violates one or more rules of the language in which it is written. An improperly defined field dimension or omitted key words are common syntax errors. These errors are shown through error messages generated by the computer. A logic error on the other hand, deals with incorrect data fields out of range items, and invalid combinations. Since compiler does not detect the logical errors, the programmer must examine the output carefully to detect them.

When a program is tested, the actual output is compared with the expected output. When there is a discrepancy, the sequence of the instructions, must he traced to determine the problem. Breaking the program down into self-contained portions, each of which can be checked at certain key points, facilitates the process.

String Testing

Page : 104/109

Page 105: Project report on shopping application

ONLINE SHOPPING.COM

Programs are invariably related to one another and interact in a total system. Each program is tested to see whether it conforms to related programs in the system. Each part of the system is tested against the entire module with both test and live data before the whole system is ready to be tested.

System Testing System testing is designed to uncover weaknesses that were not found in earlier tests. This includes forced system failure and validation of total system as it will be implemented by its user in the operational environment. Under this testing, generally we take low volumes of transaction based on live data. This volume is increased until the maximum level for each transaction type is reached. The total system is also tested for recovery and fallback after various major failures to ensure that no data are lost during the emergency. All this is done with the old system still in operation. When we see that the proposed system is successful in the test, the old system is discontinued.

User Acceptance Testing

An acceptance test has the objective of selling the user on the validity and reliability of the system. It verifies that the system’s procedures operate to system specifications and that the integrity of important data is maintained. Performance of an acceptance test is actually the user’s show. User motivation is very important for the successful performance of the system. After that a comprehensive test report is prepared. This report shows the system’s tolerance, performance range, error rate and accuracy.

Designing Test Data:

The proper designing of test data is as important as the test itself. If test data as input are not valid or representation of the data to be provided by the user, Then the reliability of the output is doubtful. Test data may be live or artificial. The live data is that which is actually extracted from the user’s files. After a system is partially constructed, the programmers or analysts ask the users to key in a set of data from their normal activities. It is difficult to obtain live data in sufficient amount to conduct extensive testing.

Need For Documentation

Preparation of documentation is quite important as it depicts what the system is supposed to be and how to be and how it should perform its functions. It illustrates both technically and economically how a system would better serve the objectives and goals of the company. Documentation improves overall operation in addition to management and audit control. It also serves the following purposes:

i. Reviews the progress or development of application software.

Page : 105/109

Page 106: Project report on shopping application

ONLINE SHOPPING.COM

ii. Communicates facts about system to users.iii. Communicates between personnel working on a development

project.Provides necessary guidelines to allow correction or revision of a system or its computer programs.

SYSTEM IMPLEMENTATION

Introduction

A crucial phase in the system life cycle is the successful implementation of the new system design. Implementation includes all those activities that take place to convert form the old system to the new one. The new system may be completely new, replacing an existing manual or automated system or it may be major modification to an existing system. In either case, proper implementation becomes necessary so that a reliable system based on the requirements of the organization can be provided. Successful implementation may not guarantee improvement in the organization using the new system, but improper installation will prevent it. It has been observed that even the best system cannot show good result if the analysts managing the implementation do not attend to every important detail. This is an area where the systems analysts need do work with utmost care.

Post Implementation Review

After the system is implemented and conversion is complete, a review should be conducted to determine whether the system is meeting expectations and where improvements are needed. A post implementation review measures the systems performance against pre-defined requirements. It determines how well the system continues to meet performance specifications. It also provides information to determine whether major re-design or modification is required.

A post-implementation review is an revaluation of a system in terms of the extent to which the system accomplishes stated objectives and actual project costs initial estimates. It is usually a review of major problems that need converting and those that surfaced during the implementation phase.

The post implementation study begins with the review team, which gathers and review requests for evaluation. Unexpected change in the system that affects the user or system performance is a primary factor that prompts system review. Once request is filed, the user is asked how well the system is functioning to specifications or how well the measured benefits have been realized. Suggestions regarding changes and improvement are also asked for.

Page : 106/109

Page 107: Project report on shopping application

ONLINE SHOPPING.COM

SYSTEM MAINTENANCE

The last part of the system development life cycle is system maintenance, which is actually the implementation of the post-implementation review plan. When systems are installed, they are generally used for long periods. The average life of a system is 4 to 6 years, with oldest application often in use for over 10 years. However, this period of use brings with it the need to continually maintain the system. Programmers/ analyst spend sufficient time for maintaining programs. The study on the maintenance requirement for the information system revealed that are:

a. 60-90 per cent of the overall cost of software during the life of a system is spent on maintenance.

b. In documented cases, the cost of maintenance, when measured on the basis of writing each instruction in coding form, is more than 50 times the cost of developing a system.

c. The software demand is increasing at faster rate than supply. Many programmer are devoting more time on systems maintenance than on new software development. There is a backlog of new development work.

The maintenance can be classified as corrective, adoption or perceptive.

Corrective

Corrective maintenance means repairing, processing or performance failures or making alterations because of previously ill-defined problems.

Adoption

Adoption maintenance means changing the program functions. Enhancing the performance or modifying the programs according to user’s additional or changing needs are included in perceptive maintenance. The greatest amount of maintenance work is for user enhancement and improved documentation of the system for better efficiency. More time and money are spent on perceptive than on corrective and adaptive maintenance together

Page : 107/109

Page 108: Project report on shopping application

ONLINE SHOPPING.COM

Maintenance

Maintenance covers a wide range of activities including correcting coding and design errors, updating documentation and test data and upgrading user support. Many activities classified as maintenance actually fall under enhancements. Maintenance means restoring something to its original position. Unlike hardware, software does not wear out, it is corrected. In contrast, enhancement means adding, modifying or re-developing the code to support changes in the specifications. It is to keep with changing user needs and the operational environment.

The key to reduce the need for maintenance while making it possible to carry on with essential tasks more efficiently are as follows:

a. More accurately defining the user’s requirement during systems development.

b. Preparation of system documentation in a better way.c. Using more effective ways for designing processing logic and

communicating it to project team members.d. Making better use of existing tools and techniques.e. Managing the systems engineering process effectively.

An addition factor in the success of the maintenance programmer is the environment. A maintenance programmer has generally been paid fewer amounts and receives less recognition than other programmers. Lighted attention has been paid to their training and career plans within the MIS function. Maintenance demands more orientation and training then any other programming activities, especially for entry-level programmers. The environment must recognize the needs of the maintenance programmer for tools, methods and training.

Page : 108/109

Page 109: Project report on shopping application

ONLINE SHOPPING.COM

FUTURE SCOPE OF THE PROJECT

1. This project is more flexible because if any changes occur in future then it is easily accomplished by the use of this project.

2. Easy to maintain and quickly generates major reports about Shopping Cart, Product etc.

BIBLIOGRAPHY

Professional ASP.NET 2.0 -Wrox

Beginners ASP.NET 2.0 –Wrox

Black book

Microsoft asp.net

Microsoft SQL Server 2000

System Analysis and Design –Elias M.Awad

Page : 109/109