Query
Query
Query
INTRODUCTION
The system has a major problem in finding the product support and service activities that
are undertaken by the employees. Once the products have installed at the client’s site, the cycle
of warranty maintenance starts. To keep the customers in a proper chain of satisfaction the
system needs the data to be organized in a proper relational way. The project is to maintain the
relational communication among the project is to maintain this relational communication among
the data, such that consistency, reliability and integrity can be achieved. The major technicality
within the system lies in managing the coordination among the sales and service departments,
which is the major hold upon the system to gain or achieve profits.
MODULES:
Login
Home
Products
online Purchase
Customer query Booking
Job allocation
Job statas
Contact us/ Suggestions
1
MODULE DESCRIPTION
Home
This module contains the details of the organisation website home page linked with its
contents.
About Us
The about us module contains the details about the organization, Infrastructure and
History.
Products
The Product details can be viewed through this module. In this module the product details
can be shown in the screen.
Job allocation
The contain the module detail of job type, job name, customer name, customer address, phone
number, contact person and job allocation id.
Job Status
This module contain the detail about job status detail. Job type, job name, employee name,
employee id, customer id and etc.,
Contact Us/Suggestion
The contact us Module contains the details to contact with the school through all mode of
communications and it also provides the customer to give suggestions regaring the process or
any details to the concern through online.
2
1.2 ABOUT THE ORGANIZATION
Maruthi Power Supply has grown to be a leader in the field of power conditioning by
manufacturing and exporting products like Domestic Inverters, UPSs, Automatic stabilizers,
Servo Controlled Stabilizers, CVT (constant voltage transformers), Auto Transformers, Isolation
Transformers, Automatic water level controller, Solar PCU, MPPT charger controller, Solar
power plant, Solar lantern, solar garden lights, Solar street lights, solar water pump and solar
Water heater. Our expertise is based on 15 years of experience in developing customized power
solution to meet the specific requirements of various industrial and commercial applications. Our
company is committed to offer unmatched quality products at market leading prices to ensure
client satisfaction across the Coimbatore. For attaining our established quality trademark, we
procure these stabilizers and other UPS from those manufacturers and suppliers who have
established themselves in this sector by offering only reliable and durable Constant Voltage
Transformer and Induction Stoves.
We always try to deliver quality. Hence, before offering these Automatic & Servo
Stabilizers, Home UPSs, Online UPSs, Constant Voltage Transformers (CVT) and Induction
Stoves, we perform quality testing of all procured UPS and Stabilizers. Since our inception, we
have been following ethical business approach such as integrity, dependability and endurance
that help us in maintaining the long term relationship with our existed clients and creating new
clientele with us. Our absolute power backup and power cut solution has enabled us to contribute
considerably in the arena of continuous backup in the power industry.
3
2. SYSTEM ANALYSIS
2.1 EXISTING SYSTEM:
The existing system is used manual. The user has been maintaining their system manually
is a tedious job. All the process must be done manually.The users are interested to speed up the
Operations and all the operations must be done automatically. Existing system is the manual one
which has the following drawbacks.
DRAWBACKS
ADVANTAGES
The required information can be secured easily.
Time will not be wasted in the process.
There is no risk of data mismanagement at any level
Wastage of manpower is reduced.
4
2.3 SYSTEM REQUIREMENTS
2.3.1 Hardware Requirements:
System : Pentium IV 2.4 GHz.
Hard Disk : 40 GB.
Floppy Drive : 1.44 Mb.
Monitor : 15 VGA Colour.
Mouse : Logitech.
Ram : 512 Mb.
HTML stands for Hypertext Markup Language, and it is the language in which, until
recently, virtually all Web pages were written. Now, don’t break out in hives when you hear the
word “language.” You don’t need complex logical or mathematical formulas to work with
HTML, and you don’t need to think like a programmer to use it.
Hypertext refers to the way in which Web pages (HTML documents) are linked together.
When you click a link in a Web page, you are using hypertext. It is this system of linking
documents that has made the World Wide Web the global phenomenon it has become. Markup
Language describes how HTML works. With a markup language, you simply “mark up” a text
document with tags that tell a Web browser how to structure it. HTML originally was developed
with the intent of defining the structure of documents (headings, paragraphs, lists, and so forth)
to facilitate the sharing of scientific information between researchers.
5
FOUR KEY CONCEPTS
The first step toward understanding and working with HTML is learning the basic terms
that describe most of the functions of this language. You will come across these terms repeatedly
as you use HTML and if you understand them, you will have progressed a long way toward
comprehending HTML, not to mention XHTML.
ELEMENTS
All HTML pages are made up of elements. Think of an element as a container in which a
portion of a page is placed. Whatever is contained inside the element will take on the
characteristics of that element. For example, to identify a heading on a page, you would enclose
it in a heading element <h1> </h1>. If you want to create a table, you put the table information
inside the table element <table> </table>. To construct a form, you need the form element
<form> </form>.
TAGS
Often, you’ll find the terms element and tag used interchangeably. It’s fairly common,
but not strictly accurate. An element is made up of two tags: an opening tag and a closing tag.
Although it might seem somewhat picky to make this distinction, when you begin to work with
XHTML (Extensible Hypertext Markup Language), it will be a very important difference to
remember. If you get into the habit of distinguishing elements and tags from the very beginning,
you’ll save yourself some confusion down the line.
All tags are constructed the same way. The tag begins with a “less than” sign (<), then the
element name, followed by a “greater than” sign (>). For example, an opening tag for
the paragraph element would look like this: <p>. The only difference in a closing tag is that the
closing tag includes a slash (/) before the element name: </p>. Your content goes between the
tags. A simple paragraph might look like this:<p>this is an HTML paragraph. </p>
Some elements do not use closing tags because they do not enclose content. These are
called empty elements. For example, the line break element <br> does not require a closing tag.
In the case of empty elements, add a closing slash after the element name, like this: <br />. When
6
a browser sees the slash, it will recognize the element as one that does not need a separate,
closing tag.
Be sure to notice that an equal’s sign and a set of quotation marks follow both the height
and the width attributes. That’s because attributes need values to go with them. values work
together with attributes to complete the definition of an element’s characteristics.
An easy way to think of how attributes and values work together is to compare them with
nouns and adjectives. A noun names something; an adjective describes it. An attribute names a
characteristic; a value describes it. Imagine that you are trying to identify a person’s hair color
with a markup language. Hair would be the element, color the attribute, and red the value. You
might write such a description as follows:<hair color="red">Red-headed Person</hair>.
NESTING
Often you will want to apply more than one element to a portion of your page. An essential
concept to understand is nesting. Nesting simply means that elements must never overlap. Web
browsers displaying an HTML page can be pretty forgiving if your elements are not properly
nested; however, overlapped elements can create garbled results, particularly if you are trying to
construct frames or tables. Also, when you become familiar with XHTML’s stricter standards,
you’ll discover that overlapping elements are an absolute “no-no.”
LISTS
HTML provides three different types of lists to choose from when building a page,
including unordered, ordered, and definition lists. Unordered lists are for lists of items where
order isn’t of important. While ordered lists place strong importance on the order of items. In the
7
case where there is a list of terms and descriptions, perhaps for a glossary, definition lists are
available. Choosing what type of list to use, or to use a list at all, comes down to the content at
hand and what is the most semantic choice for displaying the content in HTML.
With three different types of lists to use within HTML there are multiple ways to stylize
them using CSS? Some of these options include deciding what type of bullet to use on a list.
Maybe the bullet should be square, round, numeral, alphabetical, or perhaps not even exist at all.
Also, deciding if a list should be displayed vertically or horizontally plays a hand in stylization.
UNORDERED LIST
Unordered lists are purely a list of related items, in which their order does not matter nor
do they have a numbered or alphabetical list element. Creating an unordered list in HTML is
accomplished using the unordered list, ul, block level element. Each list item within an
unordered list is individually marked up using the list item, li, block level element. By default
most browsers represent each list item with a solid dot. This solid dot is referred to as the list
item element and can be changed using CSS.
ORDERED LIST
The ordered list element, ol, works just like the unordered list element, including how
each individual list item is created. The main difference between an ordered list and an
unordered list is that with an ordered list the order of which items are represented is important.
Instead of showing a dot as the default list item element, an ordered list uses numbers. Using
CSS, these numbers can then be changed to letters, Roman numerals, and so on.
With the introduction of HTML5 also came the introduction of two new attributes for
ordered lists. These new attributes include start and reversed. The start attribute determines from
where an ordered lists should start. By default, ordered list start at 1. However, there may be a
case where a list should start at 5.
The reversed attribute allows a list to appear in a reversed order. A list of 5 items ordered
1 to 5 may be reversed and ordered from 5 to 1. The reversed attribute is a Boolean attribute so it
doesn’t accept any values. Including it within the opening ol will reverse the list. As part of the
HTML5 specification, not all browsers currently support the start andreversed attributes.
8
Additionally, the value attribute may be used on an individual list item within an ordered list to
change its value within the list. Any list item appearing below an item with an
updated value attribute will then be recalculated accordingly. As an example, if the second item
in a list has a value attribute of 9, the number of that list item will appear as the ninth item. All
other items below this one will be calculated as necessary, starting at ten.
DEFINITION LIST
Another type of list often seen online, yet quite different than that of an unordered or
ordered list, is the definition list. Definition lists are used to outline multiple terms and
descriptions, often in the case of a glossary. Creating a definition list in HTML is accomplished
using the dl element. Instead of using the li element to mark up list items, the definition list
actually requires two elements: the definition term element, dt, and the definition description
element, dd.
A definition list may contain numerous terms and descriptions, one after the other.
Additionally, a definition list may have multiple terms per description as well as multiple
descriptions per term. A single term may have multiple meanings and warrant multiple
definitions. In comparison, a single description may be suitable for multiple terms.
In adding a definition term and description, the term must come before the description.
Subsequently, the term and the following description will correspond to one another. Definition
lists do not have any list item elements; however the default styling of a definition list does
indent any descriptions.
9
NESTED LISTS
One reason lists are extremely powerful within HTML is the ability to nest lists inside
one another. Unordered lists can live within ordered or definition lists, definition lists can live
within unordered and ordered lists, and vice versa. Every list has the ability to be placed within
another list, nesting them continually. The potential to do so doesn’t provide free reign to build
pages completely out of lists. Lists should still be reserved specifically for where they hold the
most semantic value. Building a nested list is fairly simple. Determine where a nested list should
appear, and rather than closing a list item, begin a new list. Once the nested list is complete,
close the wrapping list item and continue on with the original list.
PHP
PHP is a server-side scripting language designed for web development but also used as
a general-purpose programming language. As of January 2013, PHP was installed on more than
240 million websites (39% of those sampled) and 2.1 million web servers. Originally created
by Rasmus Lerdorf in 1995, the reference implementation of PHP is now produced by The PHP
Group. While PHP originally stood for Personal Home Page, it now stands for PHP: Hypertext
Preprocessor, a recursive backronym.
PHP code is interpreted by a web server with a PHP processor module, which generates
the resulting web page: PHP commands can be embedded directly into an HTML source
document rather than calling an external file to process data. It has also evolved to include
a command-line interface capability and can be used in standalone graphical applications.PHP
is free software released under the PHP License. PHP can be deployed on most web servers and
also as a standalone shell on almost every operating and platform, free of charge.
10
ADVANTAGES OF PHP
Easy to learn: PHP has a short learning curve and programmers can quickly become
productive. PHP was designed to appeal to Web designers and HTML coders, and they
appreciate the ability to freely mix HTML and PHP. PHP allows them to easily and
gradually add dynamic page generation features to their Web sites.
Open Source: PHP is distributed under an Apache-style license that allows for both
commercial and non-commercial use and development. This means that you can use it
freely, without paying any licenses fees for machine, CPU, and so on. Also, there is a
worldwide network of talented developers continuously improving and enhancing PHP.
You can fix bugs or customize the software to your specific needs (or pay someone to do
so) because the source code is available. This is not possible with commercial, off-the-
shelf products.
Community: PHP has a large base of users and developers. It is easy to find
programmers fluent in the language. Many online resources are dedicated to PHP (Web
sites, mailing lists, and so on) that provide valuable information and support.
Database support: PHP provides extensive database support. It supports ODBC, open
source databases such as MySQL and PostgreSQL, as well as commercial ones such as
Microsoft SQL Server, Oracle, and Sybase.
Multiplatform support: PHP runs on a variety of platforms and Web servers. PHP runs
in most flavors of Unix and Windows as well as other OS such as Mac OS, OS X, or
OS/2. PHP supports a wide variety of Web servers, ranging from the popular Apache,
Microsoft IIS, and Netscape servers to less-known ones such as http or AOLserver.
11
MYSQL
MySQL is the world's most popular open source database software, with over 100 million
copies of its software downloaded or distributed throughout it's history. With its superior speed,
reliability, and ease of use, MySQL has become the preferred choice for Web, Web 2.0, SaaS,
ISV, Telecom companies and forward-thinking corporate IT Managers because it eliminates the
major problems associated with downtime, maintenance and administration for modern, online
applications.
Many of the world's largest and fastest-growing organizations use MySQL to save time and
money powering their high-volume Web sites, critical business systems, and packaged software
including industry leaders such as Yahoo!, Alcatel-Lucent, Google, Nokia, YouTube, Wikipedia,
and Booking.com.
My SQL is an open source database system. Hence it can be downloaded and used by the
developer for free.
MySQL occupies very less disk space.
MySQL can be easily installed in all major operating systems like Microsoft Windows,
Linux, and UNIX.
MySQL can be easily learnt using the tutorials that are available on internet.
Though MySQL is open source, it offers most of the features provided by Oracle and
other leading databases.
MySQL is best suited for small and medium applications.
12
3. SYSTEM DESIGN
3.1. DESIGN NOTATION
In the second step, this Information level design is transferred into a design for the
specific DABMS that will be used to implement the system in question. This step is called
Physical Level Design, concerned with the characteristics of the specific DBMS that will be
used. A database design runs parallel with the system design.
13
Home
LEVEL: 1 Details
Product details
Suggestion details
Product
Suggestion Suggestion Query Detail
Details Process process
receipts process
Service Details
14
Level 2
Customer qury
booking
Qury booking
process
Job allcation data
Customer qury
Customer qury
booking
booking
15
3.1.2 SYSTEM FLOW DIAGRAM
LOGIN
No
Data
validation
Yes
PROCESS
REPORTS
16
3.2 DESIGN PROCESS
Systems design implies a systematic approach to the design of a system. It may
take a bottom-up or top-down approach, but either way the process is systematic wherein it takes
into account all related variables of the system that needs to be created—from the architecture, to
the required hardware and software, right down to the data and how it travels and transforms
throughout its travel through the system. Systems design then overlaps with systems analysis,
systems engineering and systems architecture. The system design transforms a logical
representation of what a given system is required to be in to the physical specification. Design
starts with the system’s requirement specification and coverts it into a physical reality during the
development. It is the part of the effective and efficient function of the system. Design activities
are
Input Design
Output Design
Database Design
The systems design approach first appeared right before World War II, when engineers
were trying to solve complex control and communications problems. They needed to be able to
standardize their work into a formal discipline with proper methods, especially for new fields
like information theory, operations research and computer science in general.
Screen Design
The Login form has designed as home page to the project. The username and password
fields are place to set the appropriate value. After the validation of username and password the
page redirected to Main form. All the input form contains there are three basic actions performed
namely Add, save, exit and some form contains delete. Add is used to clear the existing entries in
the form and create a space for new entries. Save is used to insert the new details and Delete is
for delete the unwanted records. Exit is for close the current form and it goes to the Main form.
The Grid viewer is also used to show the records at the moment of running.
18
Tabel Name: Product
Primary key: product code
Description: This table is to store the Product Details.
19
Tabel Name: Customer Query Booking_details
Primary key: ccode
Description: This table is to query Details.
20
Tabel Name: Job allocation
Primary key: jcode
Description: This table is to store the Service Details.
21
Table Name: Suggestion
Secandary key: coid
Description: It holds the details of the customer suggestion given to website.
22
4. SYSTEM TESING AND IMPLEMENTATION
System testing is critical aspect of software quality assurance and represents the ultimate
Review of specification, design and coding. Testing is a process of executing a program with the
intent of finding an error. A good testing case is that has the probability of finding as yet
undiscovered error. The purpose of the system testing is to identify and correct bugs in the
developed system. Nothing is complete without testing. Testing is vital to the success of the
system.
After each program passes its own test, it is linkage to the other programs is scrutinized
with a program integration test. This ensures that the program work together as intended. Before
the implementation phase the designed system should be tested with raw data to ensure that all
modules of the system work correctly and satisfactorily. If some bug is found they can be
removed before the implementation phase. The testing has the four kind of testing that is as
follows.
White box testing, sometimes called glass-box testing is a test case design method that
uses the control structure of the procedural design to derive test cases. Using white box testing
methods, the software engineer can derive test cases.
1. Guarantee that all independent paths within a module have exercised at least once.
2. Exercise all logical decisions on their true and false sides.
3. Execute all loops at their boundaries and within their operational bounds.
4. Exercise internal data structures to ensure their validity.
23
BLACK BOX TESTING
Black box testing, also called behavioral testing, focuses on the functional requirements
of the software. That is, black box testing enables the software engineer to derive sets of input
conditions that will fully exercise all functional requirements for a program. Black box testing is
not an alternative to white box techniques. Rather it is a complementary approach that is likely to
uncover a different class of errors than white box methods. Black box testing attempts to find
errors in the following categories.
UNIT TESTING
Unit testing is the basic level of testing where individual components are tested to
ensure that they operate correctly. In a properly designed system, each component should have a
precise specification, and test cases must be defined to check that the component meets its
specification. Unit testing considers each component to be a stand-alone entity, which does not
require other system components to be present during the testing process. The modules purchase,
sales are individually unit tested using the above approach.
ACCEPTANCE TESTING
VALIDATION TESTING
Software validation is achieved through a series of test that demonstrates the conformity
and requirements. Thus the proposed system under consideration has to be tested by validation
and found to be working satisfactorily. For example in customer enters phone number field
should contain number otherwise it produces an error message Similarly in all the forms the
fields are validated.
24
SYSTEM SECURITY
During the maintenance phase, the system is maintained according to the proposed
design. This phase includes coding and debugging. In the phase the programs are coded. The
programs are entered to the computer and checked for any possible errors. After all the errors
have been corrected, the programs are tested using the sample data.
System security refers to the technical innovations and procedure applied to the hardware
and operating system to protect against celebrates or accidental damages from a defined thread.
The maintenance phase of the software cycle is the time in which a Software product
performs useful work. After a system is successfully implemented, it should be maintained in a
proper manner. System maintenance is an important aspect in the software development life
cycle. The need for system maintenance is for it to make adaptable to the changes in the system
environment. There may be social, technical and other environmental changes, which affect a
system, which is being implemented. Software product enhancements may involve providing
new functional capabilities, improving user displays and mode of interaction, upgrading the
performance characteristics of the system. So only through proper system maintenance
procedures, the system can be adapted to cope up with these changes.
The backup of the system is stored in on another directory and duplication is created. The
execution error in the system or if the system failed backup system is executed temporarily. The
first maintenance activity occurs because it is unreasonable to assume that software testing will
uncover all latent errors in a large software system. During the use of any large program, errors
will occur and be reported to the developer. The process that includes the diagnosis and
correction of one or more errors is called corrective maintenance.
The third activity that may be applied to a definition of maintenance occurs when a
software package is successful. As the software is used, recommendations for new capabilities,
modifications to existing functions, and general enhancements are received from users. To
satisfy requests in this category, perfective maintenance is performed.
25
4.3 IMPLEMENTATION
System implementation is loss creative than design but it is a crucial phase in the system
life cycle. It is primarily concerned with ordering of the items. Implementation is the process of
concerning a new system design into an operational one. Implementation is the stage in the
project where the theoretical design is turned into a working system. The most crucial stage is
achieving a new successful system and in giving confidence is in getting the approval for the
system manager.
The data entry, the various menus and most important reports that the system is capable
of producing are shown to the staff. This is done in view of any last minute changes that will be
necessary in the formats.When everyone is satisfied, the new system is finally handled over to
the data entry operators. The more complex the system is being implemented, the more involved
will be the systems analysis and design effect required for the implementation.
26
5. CONCLUSION AND FEATURE ENHANCEMENT
5.1 CONCLUSION
It is concluded that the application works well and satisfy the company and Cutomer. The
application is tested very well and errors are properly debugged. The application is
simultaneously accessed from more than one system. Simultaneous login from more than one
place is tested.
The application works according to the restrictions provided in their respective browsers.
Further enhancements can be made to the application, so that the application functions very
interactive and useful to existing application .The application satisfies both the company and
Customer by eliminating more input. The speed of the transactions become more enough now.
27
BIBLIOGRAPHY
Reference books
1) Jesus Castagnetto, Sascha Schumann, “Proffesional Php Programming”, Addison
wosley Publication, Fifth Edition.
2) Jay Greenspan, Brad Bulgar, “Mysql/Php Database Applications”,Tata McGraw-Hill
Publishing Company, Third Edition.
3) William Stallings, “Cryptography And Network Security”,Tata McGraw-Hill
Publishing Company, Third Edition.
4) Bruce Schneier, “Applied Cryptography”,Pearson Education, Second Edition.
5) Rogers Pressman, “Software Engineering And Applications”, Galgotie Publication,
Sixth Edition.
Reference Websites:
1. www.onlinetutorial.com
2. www.cryptography.com
3. www.Tenders.com
28