Online Shopping: A Project Report
Online Shopping: A Project Report
Online Shopping: A Project Report
A PROJECT REPORT
Submitted by
PRAGNYA DASH
CO-ORDINATOR
DEPARTMENT OF CSE AND IT PROJECT GUIDE
IIIT BHUBANESWAR DATE-2-12-2014
DATE-2-12-2014
ACKNOWLEDGEMENT
2-12-2014
Pragnya Dash
IIIT Bhubaneswar
CONTENTS:
1) INTRODUCTION
1.1. Introduction
1.2. Project Objective
1.3. Project Scope
2) PROJECT ANALYSIS
2.1. Hardware & Software Specifications
2.2. Project Instructions
3) FEASIBILITY REPORT
3.1. Economic Feasibility
3.2. Operational Feasibility
3.3. Technical Feasibility
5) SELECTED SOFTWARE
5.1. Microsoft Visual Studio
5.2. Microsoft.NET Framework
5.3 Features of the Common Language Runtime
5.4. C#.NET, ADO.NET Overview
5.5.ASP.NET
6) PROJECT DESIGN
6.1. SOFTWARE ENGINEERING PARADIGM APPLIED
6.2. Reliable System
6.3. Maintenance:
6.4. Output Design:
6.5. Data Dictionary
6.6. ER Diagram
6.7. Data Flow Diagram (DFD)
6.8. Use case Diagram
6.9. Class Diagram
6.10. Sequence Diagram
6.11. Activity Diagram
7) SCREEN SHOTS
8) PROJECT TESTING
8.1. COMPILING TEST
8.2. EXECUTION TEST
8.3. OUTPUT TEST
8.4. ACCEPTANCE TEST
8.5. VALIDATION CHECK
9) IMPLEMENTATION
10) FUTURE IMPROVEMENT
11) CONCLUSION
12) BIBILOGRAPHY
CHAPTER-1
INTRODUCTION
1.1.INTRODUCTION:
Online shopping is the process whereby consumers directly buy goods, services etc.
from a seller interactively in real-time without an intermediary service over the
internet. Online shopping is the process of buying goods and services from
merchants who sell on the Internet. Since the emergence of the World Wide Web,
merchants have sought to sell their products to people who surf the Internet.
Shoppers can visit web stores from the comfort of their homes and shop as they sit
in front of the computer. Consumers buy a variety of items from online stores.
1.2.OBJECTIVE:
To shop wile in the comfort of your own home ,without having to step out
of the door.
Sell at lower rate due to less over head.
Provide home delivery free of cost.
Secured Transaction.
1.3.SCOPE:
This product has great future scope. Online shopping Internet software developed on
and for the Windows and later versions environments and Linux OS. This project also
provides security with the use of Login-id and Password, so that any unauthorized
users can not use your account. The only Authorized that will have proper access
authority can access the software.
CHAPTER-2
PROJECT ANALYSIS:
2.1.SOFTWARE REQUIREMENT:
Operating system :- Windows XP SP-3 / 7/8
Database :- MYSQL
Web Browser:- Internet Explorer 6.0/7.0,Google Chrome,Mozilla Firefox
Web Page Style sheet: - Html, Java Script, and Ajax, WebServer6.0
Program Code:-C#
2.2.HARDWARE REQUIREMENT:
Minimum 512MB Main Memory.
CPU speed: 2.6GHz.
Monitor: EGA / SVGA (display), 800X600 24 bits True Color.
Standard Keyboard: 106 Keys with Separate Function Keys & Numeric
Pad.
Mouse: PS /2 Optical mouse.
CD-RO : Required
2.3.Project Instructions:
OUTPUT DEFINATION
The outputs should be defined in terms of the following points:
Type of the output
Content of the output
Format of the output
Location of the output
Frequency of the output
Volume of the output
Sequence of the output
It is not always desirable to print or display data as it is held on a computer.
It should be decided as which form of the output is the most suitable.
For Example
The decimal points need to be inserted.
It should leading zeros be suppressed.
Outputs Media:
In the next stage it is to be decided that which medium is the most
appropriate for the output. The main considerations when deciding about the
output media are:
The suitability for the device to the particular application.
The need for a hard copy.
The response time required.
The location of the users.
The software and hardware available.
Keeping in view the above description the project is to have outputs mainly
coming under the category of internal outputs.
The main outputs desired according to the requirements specification are:
The outputs were needed to be generated as a hot copy and as well as quires to be
viewed on the screen. Keeping in view these outputs, the format for the output is
taken from the outputs, which are currently being obtained after manual
processing. The standard printer is to be used as output media for hard copies.
INPUT DESIGN
Input design is a part of overall system design. The main objective during the
input design is as given below:
To produce a cost-effective method of input.
To archive the highest possible level of accuracy.
To ensure that the input is acceptable and understood by the user.
INPUT STAGES
The main input stages can be listed as below
Data Recording
Data transcription
Data conversion
Data verification
Data control
Data transmission
Data validation
Data correction
INPUT TYPES:
It is necessary to determine the various types of inputs. Inputs can be
categorized as follows
External inputs, which are prime inputs for the system.
Internal inputs, which are user communications with the system.
Operational, which are computer department’s communications to the
system
Interactive, which are inputs entered during a dialogue.
INPUT MEDIA:
At this stage choice has to be made about the input media. To conclude
about the input media consideration has to be given to
Type of input
Flexibility of format
Speed
Accuracy
Verification methods
Rejection rates
Easy of correction
Storage and handling requirements
Security
Easy to use
Portability
Keeping in view the above description of the input types and input media, it
can be said that most of the inputs are of the form of internal and nteractive. As
input data is to be the directly keyed in by the user, the keyboard can be considered
to be most suitable input device.
ERROR AVIDANCE
At this stage care is to be taken to ensure that input data remains accurate
from the stage at which it is recorded unto the stage in which the data is accepted
by the system. This can be achieved only by means of careful control each time the
data is handled.
ERROR DECTION
Even though every effort is make to avoid the occurrence of errors, still a small
proportion of errors are always likely to occur these types of errors can be
discovered by using validations to check the input data.
DATA VALIDATION
Procedures are designed to detect errors in data at a lower level of detail.
Data validations have been included in the system in almost every area where there
is a possibility for the user to commit errors. The system will not accept invalid data.
Whenever an invalid data is keyed in the system immediately prompts the user and
the user has to again key in the data and the system will accept the data only if the
data is correct. Validations have been including where necessary.
The system is designed to be a user friendly one. In other words the system
has been designed to communicate effectively with the user. The system has been
designed with pop up menus.
USERINTERFACE DESIGN
It is essential to consult the system users and discuss their needs while
designing the user interface.
The .NET framework has two main components: the common language runtime
and the .Net framework class library. The common language runtime is the
foundation of the .NET framework. You can think of the runtime as an agent that
manages code at execution time, and remote while also enforcing strict type safely
and other forms of code accuracy that ensure security and robustness in fact the
concept of code management is a fundamental principle of the runtime.
Code that targets the runtime is known as managed code, while code that does not
target the runtime is known as unmanaged code. The class library, the other main
component of the .NET frameworks is a comprehensive, object-oriented collection
reusable types that you can use to develop applications ranging from traditional
command line or graphical user interface (FGUI) applications to application base d
on the latest innovations provided by ASP.NET, such as web forms and XML web
services.
The .NET framework can be hosted by unmanaged component that load the
common language runtime into their processes and initiate the execution of
managed code. ASP.NET works directly with the runtime to enable ASP.NET
application and XML web services, both of which are discussed later in this topic,
Internet explorer is an example of unmanaged application that hosts the runtime
(in the form of a MIME type extension). Using internet explorer to the host runtime
enables you to embed managed components or windows forms controls in HTML
documents. Hosting the runtime in this way makes mobile code 9similar to
Microsoft Active Xr controls) possible, but with significant improvement that only
managed code can offer, such as semi-trusted execution and secure isolated file
storage.
5.4. ADO.NET
ADO.NET provides consistent access to data sources such as Microsoft SQL Server
and XML, as well as to data sources exposed through OLE DB and ODBC. Data
sharing consumer applications can use ADO.NET to connect to these data sources
and retrieve, manipulate and update the data that they contain.
ADO.NET separates data access from data manipulation into discrete components
that can be used separately or in tandem. ADO.NET includes .NET Frame work data
providers for connecting to a database, executing commands and retrieving results.
Those results are either processed directly, placed in and ADO.NET Dataset objects
in order to be exposed to the used in an ad hoc manner, combined with data from
multiple sources or remoted between tiers. The ADO.NET Dataset object can also
be used independently of a .NET Framework data provider to manage data local to
the application or sourced from XML.
The ADO.NET classes are found in System.Data.dll and are integrated with the XML
classes found in System.Xml.dll. When compiling code that uses the System. Data,
namespace reference both System.Data.dll and System.Xml.dll.
ADO.NET provided functionality to developers writing managed code similar to the
functionality provided to native component object model (COM) developers by
ActiveX Data Objects (ADO).
5.5 ASP.NET
ASP.NET is a set of Microsoft.NET framework technologies used for building web
applications and XML Web services. ASP.NET page execute on the server and
generate markup such as HTML, WML or XML that is sent to a desktop or mobile
browser. ASP.NET pages use a compiled, event-driven programming model that
improves performance and enables the separation of application logic and user
interface. Both ASP.NET pages and ASP.NET web services files contain server-side
(as opposed to client side logic) written in Visual basic .NET, C#.NET or any .NET
compatible language, Web applications and XML Web Services take advantage of
the features of the common language runtime, such as type safety, inheritance,
language, interoperability, versioning, and integrated security.
CHAPTER-6
PROJECT DESIGN
SOFTWARE ENGINEERING PARADIGM APPLIED
Reliable System
There are two levels of reliability. The first is meeting the right requirement. A
carefully and through systems study is needed to satisfy this aspect of reliability.
The second level of systems reliability involves the actual working delivered to the
user. At this level, the systems reliability is interwoven with software engineering
and development. There are three approaches to reliability.
1. ENTITY: This specifies the real life objects & is represented as:
Customer
Gives
Onlineshop ping
Order
Product
Category_Id
Order Id
Has
Custome_ Id
Order Date
Category
Has Product
price
discount
P_Image
P_ Name Cat_Feature P_id
P_Name
Cat_Description
6.4 DATA FLOW DIAGRAM
A Data Flow Diagram (DFD) is a diagram that describes the flow of data and the
processes that change data throughout a system. It’s a structured analysis and
design tool that can be used for flowcharting in place of or in association with
information. Oriented and process oriented system flowcharts. When analysts
prepare the Data Flow Diagram, they specify the user needs at a level of detail that
virtually determines the information flow into and out of the system and the
required data resources. This network is constructed by using a set of symbols that
do not imply physical implementations. The Data Flow Diagram reviews the current
physical system, prepares input and output specification, specifies the
implementation plan etc.
Four basic symbols are used to construct data flow diagrams. They are symbols
that represent data source, data flows, and data transformations and data
storage. The points at which data are transformed are represented by enclosed
figures, usually circles, which are called nodes.
- Data Flow
- Process
- Storage
Steps to Construct Data Flow Diagrams:-
o Four steps are commonly used to construct a DFD
o Process should be named and numbered for easy reference. Each name
should be representative of the process.
o The destination of flow is from top to bottom and from left to right.
o When a process is exploded in to lower level details they are numbered.
o The names of data stores, sources and destinations are written in capital
letters.
Rules for constructing a Data Flow Diagram
o Arrows should not cross each other.
o Squares, circles and files must bear names.
o Decomposed data flow squares and circles can have same names.
o Draw all data flow around the outside of the diagram.
DATA FLOW DIAGRAM
Product
Product_id
Product_Name
Online Product_Image
Admin_login Product_Feature
User_name Shopping
Password Product_Price
Category
EmailId
Name
Password Sub_Category
ContactNumber
Address
User
LEVEL 1.0 DFD FOR ADMINISTRATOR
Admin_login
ADMIN
ADD NEW
PRODUCT
USERNAME
AND
Product_Category
PASSWORD
MODIFY PRODUCT
LEVEL 1.1 DFD FOR ADMINISTRATOR
Admin_login
ADMIN
AND
PASSWORD
USER
Customer
Raise FeedBack
LOGIN WITH
AND
PASSWORD
FeedBack
Change
Feedback
Register1
User
Booking Prduct
LOGIN WITH
AND
PASSWORD
billing
Sell Product
category
sub
ONLINE SHOPPING ACTIVITY DIAGRAM
CHAPTER-7
SNAP SHOTS
default.aspx
Contactus.aspx
registeraspx
login.aspx
nonveg.aspx
addproduct.aspx
manageproduct.aspx
vegetable.aspx
showuser.aspx
viewfeedback.aspx
TABLES:-
USERS
ADMIN
ADDPTODUCT
USERFEEDBACK
CHAPTER-8
TESTING
Testing is the process of executing the program with the intention of finding out
errors. During testing, the program to be tested is executed with a set of test cases
and the output of the programs for the test case is evaluated to determine if the
program is performing as it is expected to be.
The success of testing in revealing errors in program depends critically on the test
cases. In software system the use of testing is not limited to the testing phase. The
results of testing are used later on during maintenance also. During testing a test
suite can be used to see that modification doesn’t have any undesirable effect
The basic levels of testing are:
Unit testing
Integration testing
System testing
Acceptance testing
These different levels of testing attempt to detect different types of faults. The
relation of faults introduced in different phases and the different levels of testing
are as shown in fig;
Levels of Testing
1. Unit Testing:
The level of testing is called unit testing. In this, different modules are tested
against the specifications produced during design for the modules. Unit testing is
essential for verification of the code produced during the coding phase, and hence
the goal is set to test the internal logic of the modules.
2. Integration Testing:
The next level of testing is often called the integration testing. In this, many tested
modules are combined into subsystems, which are then tested. The goal here is to
see if the modules can be integrated properly, the emphasis being on testing
interface between modules. This testing activity can be considered as testing
design, and hence the emphasis on testing modules interactions.
3. System Testing:
During system testing, the system is used experimentally to ensure that the
software doesn’t fail, i.e. it will run according to its specifications and in the way
users expect, special test data input for processing, and the results examined. A
limited number of users may be allowed to use the system can see whether they
try to use it in unforeseen ways.
4. Acceptance Testing:
It is sometimes performed with realistic data of the client to demonstrate that the
software is working properly. Testing here focuses on the external behavior of the
system. The internal logic of the program is not emphasized.
5. Validation Check:
During testing section validations checks are made. Appropriate actions are taken
after testing.
CHAPTER-9
IMPLEMENTATION
Implementation is the stage of the project when the theoretical design turned
into a working system. At this stage the main workload, the up heal and the major
impact on the existing practices shift to user department. If the implementation
stage is not carefully planned and controlled, it can cause chaos. Thus it can be
considered to be the most crucial stage in achieving a new successful system and
in giving the users confidence that the users confidence that the new system will
work and be effective.
The implementation view of software requirements presents the real worlds
manifestation of processing functions and information structures. In some cases a
physical representation is developed as the first step in software design. However
most computer based systems are specified in a manner that dictates
accommodation of certain implementation details.
Implementation involves careful planning, investigation of current system and
constraints on implementation, design of methods to achieve the changeover,
training of staff in the changeover procedures and evaluation of changeover
methods. The first task is the implementation planning i.e. deciding the methods
and time scale to be adopted.
Once the planning has been completed, the major effort in the computer
department is to ensure that the programs in the system are working properly. At
the same time the user department must concentrate on training user staff. What
the staffs have been trained, a full system test can be carried out, involving both
the computer and clerical procedures.
The main step of implementation includes:
1. Installing client machine.
2. Installing the software in the client machine.
3. Training the operational staff.
CHAPTER-10
FUTURE IMPROVEMENT
As the system is scalable, more modules can be added as and when required
The database that is used in the system can be connected to the any online
examination system.
It can be browser independent so that the site can be opened in any browser.
The system contents can be modified to accept new attributes for any
criterion.
CHAPTER-11
CONCLUSION
The project has been appreciated by all the users in the organization.
It is easy to use, since it uses the GUI provided in the user dialog.
User friendly screens are provided.
The usage of software increases the efficiency, decreases the effort.
It has been efficiently employed as a Site management mechanism.
It has been thoroughly tested and implemented.
CHAPTER-12
BIBILIOGRAPHY
1.SOFTWARE ENGINEERING By Roger.s.pressman.
2.SQL FOR PROFESSIONALS BY Jain.
3.VISUAL BASIC.NET Black Book By Evangeleous Petereous.
4.ASP.NET Professional By Wrox Publications.
5.MSDN 2002 By Microsoft