Online Shopping Cart: Using C# A Project Report

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 40

ONLINE SHOPPING CART

USING C#

A PROJECT REPORT

SUBMITTED IN THE PARTIAL FULFILMENT

FOR

AWARDING THE DEGREE OF

BACHLOR OF COMPUTER APPLICATION

FROM

MANAGALAYATAN UNIVERSITY

SUBMITTED BY: DEPARTMENT


BHAWANI VARSHNEY I.E.T (CS)
2007UCS211
CS (D+B)
CERTIFICATE OF PROJECT COMPLETION

This is to certify that Miss.BHAWANI VARSHNEY, student of B.TECH Final Year in


MANGALAYATAN UNIVERSITY has worked under my guidance and supervision on
the project entitled-

“ONLINE SHOPPING CART”

For the purpose of his final year project as per the guidelines of PRAKASH SINGH
While forwarding the project work and report on the mentioned topic above, I certify
that the candidate has completed his project work in the prescribed period and that
the project work incorporates the results of the job done by him during this period.

Guided By Submitted By

PRAKASH SINGH BHAWANI VARSHNEY


ACKNOWLEDGEMENT

The extensive endeavor, bliss euphoria that accompanies the successful completion of
any task would not be complete without the expression of gratitude to the people who
made it possible. I take the opportunity to acknowledge all those whose guidance and
encouragement helped me in winding up this project.

For his able guidance, cooperation and constant encouragement throughout the period of
compilation of this dissertation work. I got not only technical support from him but a lot
of moral support also. I will be thankful to him forever.

Last but never the least; I thank my parents, family members and friends who gave me
the much needed moral support during my project.
INDEX

S.No. Project Content

1. Introduction

2. Scope of the Project

3. About the Project

4. Technology Used

5. Advantages of .NET

6. Software and Hardware Requirement

7. Software Development Life Cycle

8. Software Requirement Specification

9. Block Diagram

10. Data Flow Diagram

11. Entity Relationship Diagram

12. Data Diagram

13. Web Forms

14. Tables Used

15. System Testing

16. System Implementation & Maintenance


INTRODUCTION
CETPA Group includes three main concerns viz. CETPA Education, CETPA
Consultancy Services and CETPA InfoTech Pvt. Ltd. CETPA is the mission, which is
working for the promotion of latest technologies in INDIA and abroad. We are the group
of professionals who are united together and working for the promotion of technology.
The acronym of CETPA is COMPUTER EDUCATION AND TECHNOLOGY
PROMOTION ASSOCIATION. We conduct Training Programs for professionals and
engineering students. We have a branch CETPA INFOTECH PVT. LTD. at Greater
Noida, Lucknow in India & also in Germany & Ukraine. which is working towards
the development of software, high level applications and embedded system products in
conjunction with our premier goal, that is promotion of technology, such as .NET,
VHDL, Embedded System, Adv. Embedded System, C & C++, Oracle, Autocad, Matlab,
Verilog HDL, CATIA, MATLAB, Java, J2EE, J2ME, AutoCAD, Linux, Unix and many
more.

CETPA DEVELOPMENT

In Today's rapidly changing environment every organization has to face new standards of
quality assurance, new competition, increasing customer expectations etc. As a result
business enterprises are in constant need of reviewing and reengineering their processes
in order to survive and grow under competitive environment. Therefore our designed
application software's can help you meeting these cut throat competition requirements.

requirements.

CETPA EDUCATION

CETPA is always dedicated to provide quality training to CETPA Certified students and
to provide high profile jobs to CETPA Certified students through its concern CETPA
Consultancy Services. CETPA Education is proud to announce the successful completion
of its Summer/Vocational Training Program at STEP, IIT Roorkee, Greater Noida,
Gwalior, Jaipur, Moradabad Ajmer. Over 3000 Students had been provided successful
training with project in .NET, VHDL, Embedded System, Adv. Embedded System, C &
C++, Oracle, Autocad, Matlab, Verilog HDL, Catia, Java, J2EE, J2ME, Linux, Unix,
Web Designing and many more in Summer Training 2008.

CETPA Objectives

*Promote Computer Education & Technology.


*Open platform for the development jobs.
*Provide World Class Computer Education.
*Organize Paper Presentation & Quizes.
*Organize Conferences & Seminars.
*Collaboration with Other Institutions.
*Launch Research Papers & Projects of the Members.
On Campus Training Programs@ Different Engineering Colleges

*Kumaon Engineering College, Almora


*Dehradun Institute Of Technology, Dehradun
*Birla Institute of Applied Sciences, Bhimtal
*G.B. Pant Engineering College, Pauri Garhwal
*Rakshpal Bhadur Managment Institute, Barielly
*IFTM Moradabad
*Kamla National Institute Of Technology, Sultanpur
*Bundelkhand University, Jhansi
*Moradabad Institute of Technology, Moradabad
*College of Engineering & Technology, Moradabad
*Ideal Institute of Technology, Ghaziabad
*Indian Institute of Management & Technology, Meerut
Scope of the Project
Since the development of the Internet many things that were pretty
hard to obtain or to do, like information on a large variety of topics
or communication with distant friends have become so simple that
anyone can have access to them just by using a computer.

The main advantage of online shopping is that it allows people to


browse through many items and categories without leaving their
house, to compare the prices of as many shops as they want, and
also to order as many items as they can afford without having to
worry about how they will transport them, because the online
shopping websites also deliver the things to the buyer's home.
Furthermore, the Internet is open 24 hours a day, 365 days a year,
so you don't have to hurry or worry about finding a parking spot.

If you plan on shopping from the Internet then first use a search
engine to find online shops. If you want fast deliveries and low
shipping fees then try to search for the shops that are in your
country. You can use a shopping directory that contains
categorized links to stores from a specific region or from all over
the world, together with reviews from other customers. If you live
in a big country you'll be surprised to find out that there are
thousands of online shops available where you live, and these
shops sell everything that can be sold, from baby products to dog
houses and motor oil.

Remember to always compare the prices, check for discounts,


search for the lowest shipping taxes and make sure that what
you've found can't be found cheaper anywhere else.

After you've done some online shopping you'll see how easy it is
and you'll quickly get used to it. Soon you will know what the best
shopping websites are and you will be able to buy the things you
need very easy and fast, saving a lot of time and trouble. Online
shopping is the most practical, economical and fun method of
shopping, that is perfect for everyone.

About the Project


The online shopping cart project is useful for the customers who
want to purchase various computer parts or branded computers .the
real benefit for the user is that a new customer can get full details
about the individual product or fully complete branded computer,
which he wants to purchase. The advantage of this project is that
the user can perform online shopping easily. The whole process of
purchasing and money transaction is very easy. The main
advantage of this project is that it is very much user friendly.

Seven reasons it makes sense to shop online:

• Lower prices.
• More savings with online coupons.
• Research capabilities
• Increased selection.
• Convenience
• Saves time
• Environmental Benefits
TECHNOLOGY USED
The strength of any project depends upon the technology on which the project is based.
Today we are living in a world where technologies related to computer science are
evolving every day new technologies are taking an edge over the older ones. Every new
technology is provides some new benefits, but only small part of them remains in the
competitive world. NET is the latest technology, which is in use nowadays and has
proved to be the most reliable development framework. The technologies we have used in
the development of the project are:

* ASP.NET

* SQL Server

Why to use .NET?


The .NET Framework is a new computing platform that simplifies application
development in the highly distributed environment of the Internet. The .NET Framework
is designed to fulfill the following objectives:

* To provide a consistent object-oriented programming environment whether


objects code is stored and executed locally, executed locally but Internet-distributed, or
executed remotely.

* To provide a code-execution environment that minimizes software deployment and


versioning conflicts.

* To provide a code-execution environment that guarantees safe execution of code,


including by an unknown or semi-trusted third party.

* To provide a code-execution environment that the performance problems of scripted or


interpreted environments

* To make the developer experience consistent across widely varying types of


applications, such as windows-based applications and Web-based applications.

* To build all communication on industry standards to ensure that code based on the
.NET Framework can integrate with any other code.
OTHER TECHNOLOGIES
SQL SERVER:

Microsoft SQL Server 2000 is a family of products that meet the data storage
requirements of the largest processing systems and commercial Web sites, yet at the same
time can provide easy-to-data storage services to an individual or small business.

Microsoft SQL Server TM 2000 features include:

Internet Integration.

The SQL Server 2000 database engine includes integrated XML support. It also has the
scalability, availability, and security features required to operate as the data storage
component of the largest Web sites.

Scalability and Availability.

The same database engine can be used across platforms ranging from laptop computers
running Microsoft Windows98 through large, multiprocessor servers running Microsoft
Windows 2000 Data Center Edition. SQL Server 2000 Enterprise Edition supports
features such as federated servers, indexed views, and large memory support that allows
it to scale to the levels required by the largest Web sites.

Enterprise-Level Database Features.

The SQL Server 2000 relational database engine supports the features required to support
demanding data processing environments. The database engine protects data integrity
while minimizing the overhead of managing thousands of users concurrently modifying
the database. SQL Server 2000 distributed queries allow you to reference data from
multiple sources as if it were a part of a SQL Server 2000 database, while at the same
time, the distributed transaction support protects the integrity of any updates of the
distributed data. Replication allows you to also maintain multiple copies of data, while
ensuring that the separate copies remain synchronized.

Advantages

Advantages of .NET
ASP.NET is the latest Microsoft programming framework that allows for the rapid
development of powerful web applications:

Faster web applications

Two aspects of ASP.NET make it fast – compiled code and caching. In the past, the code
was interpreted into” machine language” when your website visitor viewed your page.
Now with ASP.NET, the code is compiled into “machine language” before your visitor
ever comes to your site.

Memory leaks and crashes protection

ASP.NET automatically recovers from memory leaks and errors to make sure that your
website is always available to your visitors.

Multiple language support

Programmers can actually write their code in more than 25 .NET languages (including
VB.NET, C#, and Jscript.NET). This allows programmers to develop your site in the
language.

VB Executable Code Runtime

Executable
Code

Executable Code Runtime


C++
VB

Code
C Executed
IL L
C+ R
+

Advantages of SQL Server

SQL is widely used and accepted in the high-performance database industry. Its current
version has recently been compared to Oracle, the database leader, in terms of overall
market acceptance. Incorporating SQL means many clients’ IT staff will already have
experience installing, configuring, and managing the database, and their staff will often
already have already used. SQL was tested and used in the in the field for several years.
Now in version 8, with millions of people having used it, bug fixing, tweaking, and
performance testing has been completed in almost every environment. Clients can be sure
data will not be lost, connections will not drop, and data will be secure.

Microsoft supports SQL. Clients can expect world-class technical support and the largest
single collection of product literature and support documentation on the Internet. SQL is
extendible, expandable and multiprocessor compliant. An SQL server can be installed on
RAID-5 or Windows extended volume to allow a redundant copy of the database to be

available at all times, in case one of them fails. As well, two identical servers can be
identical and redundant, allowing for instant fail-over should one of them fail. On top of
all that, the database has been designed to take advantage up to 32 processors per server.
With SQL Server, the client can expect greater acceptance and satisfaction from staff,
and will be able to use the valuable data they collect in other software programs and
systems now and well into the future.

Software and Hardware Requirements


Software requirements:

* Operating System:

Windows 2000 and above

* Development Environment:

Software and Hardware Requirements


Software requirements:

* Operating System:

Windows 2000 and above

* Development Environment:

Microsoft Development Environment -2002 version 7.0.9466

Microsoft .NET Framework 1.0 version 1.0.3705

*Database Server:

Microsoft SQL Server Service Manager Version 8.00.194

SQL Analyzer

* Languages Used:

C#.NET

ASP.NE

* Word Processor:

Microsoft Word 2007

* Image Processing Tool:


Microsoft Paint

*Web Browser

Microsoft Internet Explorer

Hardware Requirements

* Microprocessor

X86 Family 6 Models 8 Stepping 6 GenuineIntel~930 MHZ

* RAM

512 MB

* Hard Disk Space Required

100 MB

* Hard Disk Drive

40 GB

* Visual Display Unit

HCL-56V

* CD ROM

Samsung CD ROM sc-152c

SDLC
INTRODUCTION:

Human is dealing with the data and information since a long time, perhaps since the
beginning of civilization man is manipulating data. Since then, give and take of
information is in practice, but this has been considered as an important discipline for the
last few decades. Today’s data manipulation and information processing have become the
major tasks of any organization small or big, whether it is educational institution,
government concern, scientific, commercial or any other.
Information is the requirement of every organization. Infect, large organizations have
started having information systems whose work is together the necessary data and to
process those data into meaningful information. System is a buzzword today. Everybody
talks of the system such as an educational system, transportation system, accounting
system, financial system, computer system, and information system. A system is a set of
interrelated elements that operate together to achieve an objective. The general model of
system has an inputs, process and output. A system can have many inputs and many
outputs. Most talk about system is information system. It receives the data and collects
the information and instructions, process the data according to the instructions and
outputs the result which itself has some information. An information system in which
storage methods are also added, the information processing function means not only the
transformation of the data into information but also the storage of the data for later use.
The information system receives data as input and converts them into information.

An information system is to an organization, what a nervous system is to the body. They


do not operate independently, but exists in organization to support the organization
process at different levels. Timely information is required at every level of any
organization to take the important decision. To cater the needs of organization,
information systems in any organization, are available at different levels.

Requirement Analysis:

A systematic investigation of a real or planned system to determine the function of the


system and how they relate to each other and to any other system is known as system
analysis.

System analysis is conducted with the following objectives in mind:

• Identify the customer’s need,

• Perform economic and technical analysis,

• Evaluate the system concept for feasibility,


• Allocate functions to hardware, software, people, database and other system
elements,

• Establish cost and schedule constraints,

Create a system definition that forms the foundation for all subsequent
• engineering work.

System Analysis Overview:

Problem recognition means detailed study of the current system being used by the user. A
detailed study of system being currently used must be carried out of sessions with
customer and end user. It can be termed as a process of recognizing problems and
opportunities.

A complete understanding of software requirement is essential to the success of a


software development effort. The problem evaluation and solution synthesis is the next
major area of effort for analysis. It enables the system, engine to redefine the software
allocation and build model of process followed

Identification of need

Preliminary investigation

Identification of need:

The first step of the System Analysis process involves the identification of need. The
analyst meets the customer and the end user (if different from the user). The intent is to
understand the products objective and to define the goals required to meet the objectives.
Timely Customer-Analyst communication is an important ingredient of a system
analyst’s work. The specific objectives are:

• Reducing the Duplication during manual Processing

• Designing and Developing User friendly interfaces through which user will
interact with the package
• Interaction of these GUI with the Database

• Managing the Database

• Improve efficiency and quality of services

Preliminary investigation:

During the analysis phase of the project, first we decided to sit/talk /and understand the
current workflow. And found that the basic functionality is divided into 12 major
modules, which deals with registration management, searching for tender management,
supplying and purchasing of tender management, generation of reports for each
requirement and searching for many other facilities etc.

Feasibility study:

All the projects are feasible given the unlimited resources and infinite time.
Unfortunately, the development of a computer-based system or product is more likely to
be plagued by the scarcity of resources and difficult delivery dates. It is both necessary
and prudent to evaluate the feasibility of a project at the earliest possible time. Months or
years of effort, thousand or millions of rupees, and untold professional embarrassment
can be averted if an ill-conceived system is recognized early in the definition phase.

However, we confine our attention to:

• Technical Feasibility.

• Economical Feasibility.

• Operational feasibility.

Technical Feasibility:

A study of function, performance, and constraints that may affect the ability to achieve an
acceptable system. It is the most difficult area to assess because objectives, functions, and
performance are somewhat hazy; anything seems possible if me right assumptions are

made.
A clinical attitude should prevail during an evaluation of technical feasibility. The
considerations normally attached with the technical feasibility:

Development Risk:

• Can the system element be designed so that necessary function and performance are
achieved within the constraints uncovered during analysis?

Resource availability:

• Are skilled staffs available to develop the system element in Question? Are any other
necessary resources (hardware and software) available to build the system?

Technology:

• Has the relevant technology progressed to a state that will support the system?

• All of the above consideration also applies to the work I have done. As far as
developments risks are concerned, yes necessary functions and the constraints under
which they have to perform have been identified and divided into modules so that
each module perform its own assigned task.

• As for skilled staff for development is concerned, I am the only person performing
this task and I have fully understood the problem. I am sufficiently equipped with the
use of programming and can perform this tasks in the given time constraints.

The use of programming language enables the programmer to develop software that can
help end-user to operate the system more easily. The use of GUI tool VB.NET and
Oracle 8i can be really helpful in case of developing an information system. The tool
comprises of all the components required to solve me problem system.

Economical Feasibility:
An evaluation of development cost weighed against the ultimate income or benefit
derived from the development system or product. It includes a broad range of concerns
such as:
• Cost-benefit Analysis

• Long-term m corporate income strategies


• Impact on other profits/products

• Cost of resources needed for development

• Potential market growth

• The work being done is economically feasible since the work is not being done at
very large scale, although it might be a bit complex. The cost of resources needed to
do the work was not big. I did receive the necessary monetary help required to
develop this software.

Operational Feasibility:
This study helps us in finding whether the work to be done will be operational with the
available staff and with in the given time. The staff is fully capable of handling
information system. The IT literacy is of good order and the software has been made in
such a way that it becomes easier for the user to answer queries being asked. This will
facilitate easy use and adoptability of the system. Based on this, it was felt that the
proposed system would be operationally feasible. With the use of menus, simple
command buttons and proper validation required it become fully understandable to the
common user and operational with the user.

SOFTWARE REQUIREMENT SPECIFICATION

A document describing the requirements of a computer system from the user’s point of
view. An SRS document specifies the required behavior the system in terms of input data,
required processing, output data, operational scenarios and interfaces and the attributes of
a system including performance, security, maintainability, reliability, audit ability,
availability and safety requirements and design constraints. Alias: user requirement
specification, functional specification.

The software requirement specifications produced at the culmination of the analysis task.
The function and the performance allocated to software as part of the system engineering
are refined by establishing a complete information description, a detailed functional and
behavioral description, an indication of performance requirements and design constraints,
appropriate validation criteria, and other data pertinent to requirements. [Pressman Roger
S.] SRS was evolved based on brain storming sessions and active interactions with the
following set of stakeholders:

Assistant registrar (PGS)

Superintendent (PGS)

Assistant

Chairman, grades and registrations.

The main area of the I.T. dept, which had to be automated, was described in module
description.

Input/output design

Design is the first step in the development phase for any engineered product or system. It
may be denned as “the process of applying various techniques and principles for the
purpose of defining a device, a process or a system in sufficient detail to permit its
physical realization”. The design of a system is a blueprint, or a plain for a solution for a
system. The design a solution a “how to” approach compared to analysis, a “what is”
orientation. It translates the system requirements into ways of operating them. Software
design sits at the technical kernel of the software process model that is used. Design is the
phase where the quality is fostered in software development.
Design provides us with a representation of software that can be assessed for quality
Risk Analysis:

These steps are performed in risk analysis for designing the system because:
• The future of the system is our concern. We identifying what risks might create
problem in the life of the system.
• We also identified that what change in the user requirements, technologies,
hardware and all other entries connected to the system will effects the system.

Risk Identification:

We were able to identifying the risk under the following categories: -


• Project risk
• Technical risk
• Business risk
• Following list was identifying under the categories mentioned above:
• Enough number of people was available, as estimated, to complete the system.
• All staff involved in the system was not folly trained on the platform to be used
for die development. We also had to study various things about the platform and
the system.
The staff involved in the system was committed for the entire decision of the project. The
entire member worked fulltime on the system

Probability of risk:

The probability for the project risks such as schedule, resources, customer, requirement
problems and their impact on the system was negligible. There was a risk on the technical
grounds because the system was developed with a new technology hence the experience
on the tools was taking which faced the management to think whether the choice made
was right or wrong. But a survey done on the use of new platform gave us the confidence
of continuing on this decision. As we know system design is a solution a “how to”
approach to the creation of a new system. This important phase is composed of several
steps. It provides the understanding and procedural details necessary for implementing
the system recommended in the feasibility study.

Several activities were carried out during Design. They were:

• Database design
• Program design

Data base design:

Databases:

Database is an organized logical grouping of related files. In a database, data are


integrated and related so that one set of software programs provide access to all the data,
alleviating many of the problems associated with data file environments. Therefore, data
redundancy, data isolation, and data inconsistency are minimized, and data can be shared
among all users of the data.

Database Management System:


The program (or group of programs) that provides access to a database is known as a
database management system (DBMS). A DBMS contains three major components:

Logical Data Organization:

There are three basic models for logically structuring database: hierarchical, network, and
relational. Each has its own advantages and disadvantages.

The Hierarchical Database Model:

The hierarchical model relates data be rigid structuring data into an inverted “tree” in
which records contains two elements:

• A single root or master field often called a key, which identifies the type location,
or ordering of the records.
• A variable number of subordinate fields that defines the rest of the data within the
record.

The Network Database Model:

The network model creates relationship amongst data through a linked-list structure in
which subordinate records (called members) can be linked to more than one parent
(called owner).

The Relational Database Model:

While organization have been organized in a hierarchical fashion, most business


data have traditionally been organized into tables of tables of columns and rows,
especially accounting and financial data. Hierarchical and network structures have
several disadvantages. All the access paths, directories, and indices must be specified in
advance. Once specified, they are not easily changed without a major programming
effort. Therefore, these designs have low flexibility.

Relational database designs have flexibility in regard to


• Ad hoc queries,
• Power to combine information from different sources,
• Simplicity of design and maintenance,
Logical Data Organization:

There are three basic models for logically structuring database: hierarchical, network, and
relational. Each has its own advantages and disadvantages.

The Hierarchical Database Model:

The hierarchical model relates data be rigid structuring data into an inverted “tree” in
which records contains two elements:

• A single root or master field often called a key, which identifies the type location,
or ordering of the records.
• A variable number of subordinate fields that defines the rest of the data within the
record.

The Network Database Model:

The network model creates relationship amongst data through a linked-list structure in
which subordinate records (called members) can be linked to more than one parent
(called owner).

The Relational Database Model:

While organization have been organized in a hierarchical fashion, most business


data have traditionally been organized into tables of tables of columns and rows,
especially accounting and financial data. Hierarchical and network structures have
several disadvantages. All the access paths, directories, and indices must be specified in
advance. Once specified, they are not easily changed without a major programming
effort. Therefore, these designs have low flexibility.

Relational database designs have flexibility in regard to


• Ad hoc queries,
• Power to combine information from different sources,
Simplicity of design and maintenance

• Ability to add new records without disturbing existing applications.

Logical Database Design:

It is necessary to develop a conceptual model of data, which specifies the relationships


between data. This is used to group data into a number of tables. The tables are organized
to:

Reduce duplication of data,

Simplify functions like adding, deleting and updating data,

Retrieving data

The method of organizing or structuring data into tables is known as Normalization. The
collection of tables of data is called a Database. This analysis is then used to organized
data as relations, normalizing relations, and obtaining a relational database. This
approach we used is based on the one described by Turban.
Data Diagram
WEB FORMS
System Testing
System Testing is very important issue in system development. During system testing the
system is used experimentally to ensure that the system does not fail and will run
according to its specification producing desired outputs as per the user expected from it.

In many organization persons other than those who have written it perform testing, so
that the software will be more reliable. Following tests can carry out the testing of
system:

• White Box Testing.

• Black Box Testing.

White Box Testing


White Box Testing, sometimes called glass box testing is a test case design method that
uses the control structure of the procedural design to derive test cases. White Box Testing
considers system to be like a White box, which means that every thing about the system
is known to me. The different programs used in the system, Procedures used, inputs
supplied and I know the outputs produced by it in advance. Person who has developed it
generally carries out White Box testing and he/she tests the system against all odd
conditions for extreme values. I tested all the modules independently. In the testing of
each module I tested all the functionality. Right from ‘New or Add’ to ‘Exit or Close’
and from ‘Move-first’ to ‘Move-last’ all were tested. All the if-else structures with
various values supplied at various times were checked. I checked all the loops used in the
system and checked at their boundaries too.

White Box Testing in the application is carried out in two parts:

• Alpha Test

• Beta Test
Alpha Test:

Alpha test of the application involves testing (checking) the system by testing each and
every part of the system separately. In this test the experts or those who have made the
system test each module of the system for different types of inputs.

Beta Test:

Beta test involves testing of the system treating the system as a whole and the complete
system is tested for extreme values for finding the output generated by it are as desired or
not. I have tested my application by inputting the sample data and found that my
application passed Beta test.

Black Box Testing:

Black Box Testing focuses on the functional requirements of the software. It uncovers a
different class of errors than white box testing methods. The end users or the ultimate
user carries out Black Box testing for whom the system is made or some one who not
knows how the system is being made. Selecting some persons of the organizations who
have to operate on the system can perform this testing so that they know what inputs to
be given to the system for different options and what should the output generated by the
system for those values. To perform this test I selected some persons from the
organization including one senior person also and tested the application. They then
evaluated that whether the system is working properly or not. They all found the system
working according to specification. Some one who neither knows about the work carried
out by the system nor about how it is developed can even perform this test. Thus testing
of the system by this method can even be done for absurd values, which are unknowingly
entered by the user.

The testing of this project is also done accordingly to these above methods so that it can
fulfill the needs, produce all desired output even in the worst possible condition and can
prove to be a reliable software. I started the testing of the system right from the Alpha test
to Beta test and then Black box test. Initially it was tested for each and every input give to
it and how it responds to those inputs.
System Implementation And Maintenance
Implementation:

After the system has been coded and tested the next my next aim and phase was to
successfully implement it at the organization. Special care has to be taken for
implementation for the software. To implement the Project “ONLINE SHOPPING
CART” first it only requires software’s installed on system mentions in software
requirement specification. Implementation means install the software to the destination
and make it to work there. Implementation is an ongoing process and can be achieved by
one of the following methods:

Total Conversion:

Here the system is completely replaced by the new system from the date when the new
system software is implemented all the work of old manual system is directly switched to
the new system

Demonstration & Training for people:

In order to make my development successful and have successful implementation I


organized a short training program for a few hours. Here in this training I have even the
users some instructions about how to operate the given system and also provided some
manuals to them regarding the software’s working and the topics covered in the training
programmed. I also demonstrated that they could also use powerful help provided with
the system

Maintenance:

Maintenance is the process of eliminating errors in the working system during its
working life and to tune the system to any variation in working environment. By proper
maintenance I can continue to bring the system to new standards. As my project is error
free and produce no bugs for valid data, but I use feature to detect the errors and produce
error messages understand by the experienced user and nonprogrammer user.

BIBLOGRAPHY
This section gives you the name of the books required for the
development of the project.

NAME OF THE BOOK AUTHOR NAME

1. Visual Studio complete reference 6.0 Noel Jecke

2. Programming in Visual C# Julie Case Bradley

3. ASP.NET 3.5 Stephen Walther

You might also like