Practical Training Report ON: BY Roll No-Submitted To Mca Department College Name
Practical Training Report ON: BY Roll No-Submitted To Mca Department College Name
Practical Training Report ON: BY Roll No-Submitted To Mca Department College Name
ON
E-Shopping
SUBMITTED IN PARTIAL FULFILLMENT OF
THE REQUIREMENT FOR
COMPLETION OF DEGREE
BY
Name
Roll No-
SUBMITTED TO
MCA DEPARTMENT
Keep away from people who try to belittle your ambitions. Small people always do that,
but the really great make you feel that you too, can become great.
I take this opportunity to express my sincere thanks and deep gratitude to all those people
who extended their wholehearted co-operation and have helped me in completing this project
successfully.
First of all, I would like to thank Mr. __, Director (UM INFONEXUS) for creating
opportunities to undertake me in the esteemed organization.
Special thanks to Mr. ___ Project Manager for all the help and guidance extended to me by
him in every stage during my training. His inspiring suggestions and timely guidance enabled me to
perceive the various aspects of the project in a new light.
I am highly indebted and graceful to Mr. __(Project Leader) and Mr.___ (Team Leader)
for Their strict supervision, constant encouragement, inspiration and guidance, which ensure the
worthiness of my work. Working under them was an enrich experience. I express my sincere thanks
to my senior of software development department for their encouragement and valuable suggestion
I would also thank to my Mr. ------, HOD (MCA Dept.) & my internal project guide Mr.
------- who guided me a lot in completing this project. I would also like to thank my project mate for
guiding and encouraging me throughout the duration of the project.
In all I found a congenial work environment in UM INFONEXUS and this completion of
the project will mark a new beginning for me in the coming days.
Name
MCA -th Sem
Roll No. :
DECLARATION
I, Name--, hereby declare that the report of the project entitled “E SHOPPING” has not
presented as a part of any other academic work to get my degree or certificate except College
name for the fulfillment of the requirements for the degree of Master of Computer
Application.
Name
CERTIFICATE OF ORIGINALITY
This is to certify that the project entitled E-SHOPPING being submitted for the
partial fulfillment of degree of MCA, session 2008-2009, is a record of work carried out by
Name under my guidance and supervision.
Date:
Place:
CERTIFICATE
This is to certify that Name, a benefited student of MCA of batch 2009-2010 has
completed the Project titled “E SHOPPING” being submitted for the partial fulfillment of
degree of MCA.
This is to further certify that the student has attended the College name. And
UM InfoNexus, Noida for the 6 months after the fifth semester theory exams. His work has
been satisfactory and commendable.
Date:
Mr. -----------
HOD MCA Department
Place: College name
CONTENTS
1. Introduction
1.1 Company Profile
2. Project Detail
2.2 Introduction
2.3 Project description
2.4 Objective
3. System Development methodologies
8. Quality Assurance
• Company
COMPANY PROFILE
Overview
UM InfoNexus is a subsidiary of U S Tech India Inc. which was established in April
1999 with view to provide single point solutions to the entire computer related needs
to not only big organizations but to individuals as well. The sole aim of the company
is to increase the awareness of computers and their versatile use by eliminating the
common and recurring problems. In addition to providing hardware and software
solutions
we are also engaged in activities such as handling turnkey projects to implement
complete solutions at the user’s place. We offer you an amazing diversity with
everything you could ever want, to be it software designing, bulk data handling and
research,
customer relationship management solutions (CRM), web based applications, ERP
solutions, E-Commerce solutions, Corporate & Institutional Training and many more
options besides your hardware related needs and networking solutions into a fresh
perspective. We are staffed with a team of bright, creative, dedicated people who
work in pursuit of professional objectives. Our team works on a disciplined plan,
agreed upon and followed through. We work together efficiently, economically, and
constantly.
We respect, admire and love the talents of our co-workers, and draw on them in our
pursuits.We challenge one another in efforts to serve our clients, always seeking
and encouraging the next great idea. Talking about our presence in the Software
Product industry,
one of our very renowned and flagship software is - Pay Bill Reporter. It’s a complete
ERP suite for the Government segment that automates the internal working of a
department i.e. it connects all the branches of a Government department into a
unified, intelligent working environment. This product has given U S Tech good
name and fame in the government segment having about 75% departments of Delhi
Government, Government of India and many more of other states on our client list.
Another very renowned software product of our company dedicated to the corporate
and SME (small and mid sized companies) is USTECH CRM. This software solution
takes care of Sales, Support, Client Management, Lead Management, Sales
process flow, Campaigns management and office process automation for a
company. But this is just a start, which is a part of the targeted comprehensive ERP
package.
We also have to our credits, the experience to serve Intelligence agencies in
developing software tools to fight the technical threats in secret and secure manner.
The solutions include Mobile Tracking System developed for Anti terrorist cell, Delhi
Police and same for Daman police also. We had also designed and developed
solutions to monitor the registration and movement of the Pak Nationals coming to
India and many more.
On the pretext of Corporate and Institutional Training, we are equipped with the work
force having skill set on the latest and ongoing technologies in the current IT
scenario.
Web Development
Following are the tools and technologies that we use as building blocks in
Application Development:
Web Technologies
· VB.Net,
C#.Net,
ASP.Net,
XML.net
· J2EE,
Cold Fusion,
ASP,
Java (JSP, Servelet, EJB & Applet),
JavaScript,
PHP,
XML,
VoiceXML,
WAP
.
Web Servers
· All popular web servers.
Database
· Oracle, MS SQL & Access, Cache
Platforms
· NT, Linux, UNIX.
Tools
· Cold Fusion Studio, Visual Interdev, Jbuilder, Visual Age for Java.
Web Application Server
· Cold Fusion Application Server, Jrun. · HTML, Editors
· Macromedia Dreamweaver, 'Microsoft FrontPage. Multimedia / Animation
· Flash, Director, 3DX Player, 3D Studio Max, Illustrator, Sound Forge, Adobe
Premier, ULead MediaStudio & More.
E-Commerce
To set-up and undertake e-commerce through Internet using computer
telecommunications.
To establish develop and maintain online databases and services and e-mailing,
ecommunications,
e-shopping and other similar databases and service.
This is the fastest moving development on the Internet, which makes selling your
products over the web easy.
We can set up a database of your products and allow the customers to purchase
your
products online quickly, easily and above securely.
Multimedia Presentation
A multimedia production combines different media types into a cohesive
presentation.These media types include the latest packages in animation and
graphics alone each of these types is a factor but when combined it dramatically
improves the effectiveness of the presentation A multimedia presentation can be
utilized for any application viz. company profile, product demos, sales, training,
medical presentation to name a few.
Corp Presentation
Breathe new life into your corporate presentations!
UM InfoNexus can create introduction, animations and special effects for your
corporate presentations that will clearly communicate your message and is sure to
keep your audience's eyes open. We can add value to your presentations with
animations of your corporate logo, 3D animated charts and graphs and by making
your idea or concept a reality through 3D simulation.
UM InfoNexus’s team of animators is skilled in developing productions for
presentations, commercials, and other corporate promotional purposes that will
impress and dazzle your audience. Utilizing the latest animation tools and special in-
house technologies, we can bring broadcast quality animation and special effects to
the corporate market at a fraction of broadcast prices.
CD Authoring
UM InfoNexus is able to offer your business or organization fun production of
CDROMs. For use in advertising campaigns, employee education programs and
public relations efforts Employee Education - Training manuals, company policies
and explanations of benefit programs can be published on CD at a fraction of the
cost of printing.
Business card-sized CDs - UM InfoNexus can assist you in making an
unforgettable first impression with a unique and informative custom production.
How can our CD-ROMs give your company a competitive edge in the marketplace?
Let's take an example of a software company. UM InfoNexus can create CD-ROMs
for software companies who are looking for a way to actually demonstrate their
software
Once again, paper based marketing materials by themselves often fail to convey the
excitement of high tech products and services, in this case a software product. In
paper based material, a software company describes their software and shows the
customer a couple of screenshots to give them a vague sense of the functionality
and the interface. But with a CD-ROM, UM InfoNexus can show your clients live
demonstrations of your programs and can package those demonstrations with sleek,
elegant graphics and interactivity. It really is important to show, not tell. We look
forward to creating a CDROM for your organization. We can also web enable the
complete CD-ROM presentation and incorporate it within your corporate web site.
“Dedication of our core team of professionals to deliver our services before the set
deadline of our esteemed clients." This is the thrust to satisfy the client with the
quality, punctuality and accuracy. UM InfoNexus is entering the field of Back
Processing
operations with the motto. Data Entry Services, Call Center Services are the key
places to work on.
PRODUCTS
PBR
Preparation of Pay bill Inner Sheet
Preparation of Pay bill Outer Sheet
Preparation of All Schedules:
Acquaintance Rolls
Pay Slips
Last pay Certificate
History Vision (Privilege to see and to take printouts of the past records).
ITAX
Preparation of Tax Calculation Sheets Preparation of Form 16.
Preparation of Form 24.
Penal interest calculation
Tax planning
Arrear
Long term Arrears of Pay and Allowances IV Pay Commission (i.e. 1986) Onwards.
Reports available are: -
Due drawn statement month wise Inner Sheet
Outer Sheet
Dearness Allowance Arrear
Reports available are: -
Due drawn statement individually Inner Sheet
Outer Sheet
Acquaintance roll
Pension
Preparation of Death Pension
Preparation of Family Pension
Calculation of last ten months working service. Commutation
GPF
Preparation of GPF Ledger
Preparation of GPF Broad Sheet
Preparation of GPF Annual Card
Preparation of GPF statement
GPF Interest calculation
Budget
Preparation of Budget statements, which includes all 11 statements Budgetary
Control
Preparation of Bill register
Forms
G.A.R. Forms
Pension Forms
G.F.R Forms
G.P.F. Forms
HBA Forms
Advances Forms
Inventory
Vendor Masters
Item Masters
Receipt &. Issue
Department Masters
Reports
Goa: -
- Office of Resident Commissioner
Chandigarh: -
- I. G. Of Police
Daman: -
- I. G. Of Police
• INTROD
Before Starting the project we should fully know about the meaning of project. There are
seven letters in the word “PROJECT” each character has its own technical meaning.
Planning
• DESCRI
This deal with the idea at thinking and which are required for the project
Resource
The money problem will be solved and resources from which collected
Operating
The procedure from which the getting job is prepared in a systematic way is known as
operation.
Joint effort
This is directly proper to a operation output is made of several person working sincerely is
known as JOINT EFFORT
Engineering
A well-educated engineer can do this work in a better way to find out better result. Hence the
project is as engineering function.
Co-operation
To make the project successfully, it is necessary for its success and completion of project
Technique
It must as it gives a better shape. It is not possible to complete the project without technique.
The project is a system that gives the systematic way of planning and working.
INTRODUCTION
The e-shopping Web site is the application that provides customers with online shopping.
Through a Web browser, a customer can browse the catalog, place items to purchase into a
virtual shopping cart, create and sign in to a user account, and purchase the shopping cart
contents by placing an order with a credit card
Description
The analysis audience of this document includes the customer, i.e. The staff of the company
and members of the software development team. All significant requirements related to the
functionality, performance and othere factors are covered by this document. Before
requirements can be analyses modeled and specific they are gathered through an elicitation
process. Context free questions were asked to the management people belonging to different
large organizations/institutes regarding how they would characterize a good output that
would generate a successful solution, what kind of problems will this solution address How
they describe the environment in which the solution will be used, and will special
performance issues or constraints affect the way the solution is approached.
Objective of E-SHOPPING
• WEB PA
HOME PAGE:
LOGIN PAGE:
PRODUCT PAGE:
CONTACT US PAGE:
COMPANY POLICY:
• S
SYSTEM DEVELOPMENT
LIFE CYCLE
The initiation of a system (or project) begins when a business need or opportunity is
identified. A Project Manager should be appointed to manage the project. This business
need is documented in a Concept Proposal. After the Concept Proposal is approved, the
System Concept Development Phase begins.
Once a business need is approved, the approaches for accomplishing the concept are
reviewed for feasibility and appropriateness. The Systems Boundary Document identifies
the scope of the system and requires Senior Official approval and funding before
beginning the Planning Phase.
The concept is further developed to describe how the business will operate once the
approved system is implemented, and to assess how the system will impact employee and
customer privacy. To ensure the products and /or services provide the required capability
on-time and within budget, project resources, activities, schedules, tools, and reviews are
defined. Additionally, security certification and accreditation activities begin with the
identification of system security requirements and the completion of a high level
vulnerability assessment.
Functional user requirements are formally defined and delineate the requirements in
terms of data, system performance, security, and maintainability requirements for the
system. All requirements are defined to a level of detail sufficient for systems design to
proceed. All requirements need to be measurable and testable and relate to the business
need or opportunity identified in the Initiation Phase.
The physical characteristics of the system are designed during this phase. The operating
environment is established, major subsystems and their inputs and outputs are defined,
and processes are allocated to resources. Everything requiring user input or approval
must be documented and reviewed by the user. The physical characteristics of the system
are specified and a detailed design is prepared. Subsystems identified during design are
used to create a detailed structure of the system. Each subsystem is partitioned into one or
more design units or modules. Detailed logic specifications are prepared for each
software module.
The detailed specifications produced during the design phase are translated into
hardware, communications, and executable software. Software shall be unit tested,
integrated, and retested in a systematic manner. Hardware is assembled and tested.
The various components of the system are integrated and systematically tested. The user
tests the system to ensure that the functional requirements, as defined in the functional
requirements document, are satisfied by the developed or modified system. Prior to
installing and operating the system in a production environment, the system must
undergo certification and accreditation activities.
1.2.8 Implementation Phase
The system or system modifications are installed and made operational in a production
environment. The phase is initiated after the system has been tested and accepted by the
user. This phase continues until the system is operating in production in accordance with
the defined user requirements.
The system operation is ongoing. The system is monitored for continued performance in
accordance with user requirements, and needed system modifications are incorporated.
The operational system is periodically assessed through In-Process Reviews to determine
how the system can be made more efficient and effective. Operations continue as long as
the system can be effectively adapted to respond to an organization’s needs. When
modifications or changes are identified as necessary, the system may reenter the planning
phase.
The disposition activities ensure the orderly termination of the system and preserve the
vital information about the system so that some or all of the information may be
reactivated in the future if necessary. Particular emphasis is given to proper preservation
of the data processed by the system, so that the data is effectively migrated to another
system or archived in accordance with applicable records management regulations and
policies, for potential future access.
SDLC Objectives:
This guide was developed to disseminate proven practices to system developers, project
managers, program/account analysts and system owners/users throughout the DOJ. The
specific objectives expected include the following:
Key Principles
This guidance document refines traditional information system life cycle management
approaches to reflect the principles outlined in the following subsections. These are the
foundations for life cycle management.
The establishment of an Integrated Product Team (IPT) can aid in the success of a
project. An IPT is a multidisciplinary group of people who support the Project Manager
in the planning, execution, delivery and implementation of life cycle decisions for the
project. The IPT is composed of qualified empowered individuals from all appropriate
functional disciplines that have a stake in the success of the project. Working together in
a proactive, open communication, team oriented environment can aid in building a
successful project and providing decision makers with the necessary information to make
the right decisions at the right time.
The Project Manager has responsibility for the success of the project and works
through a project team and other supporting organization structures, such as working
groups or user groups, to accomplish the objectives of the project. Regardless of
organizational affiliation, the Project Manager is accountable and responsible for
ensuring that project activities and decisions consider the needs of all organizations that
will be affected by the system. The Project Manager develops a project charter to define
and clearly identify the lines of authority between and within the agency’s executive
management, program sponsor, (user/customer), and developer for purposes of
management and oversight.
Certain roles are considered vital to a successful system project and at least one
individual must be designated as responsible for each key role. Assignments may be
made on a full- or part-time basis as appropriate. Key roles include program/functional
management, quality assurance, security, telecommunications management, data
administration, database administration, logistics, financial, systems engineering, test and
evaluation, contracts management, and configuration management. For most projects,
more than one individual should represent the actual or potential users of the system (that
is, program staff) and should be designated by the Program Manager of the program and
organization
• PROBLEM
• PROJECT
• PLATEFOR
• SOFTWAR
HARDWAR
SYSTEM STUDY AND
PROBLEM FORMULATION
REQUIRMENTS ANALYSYS
Interview
Questionnaires
Record inspection
On-site observation
IDENTIFICATION OF NEED
In the world we are growing for globalization day by day with the development in IT
resources and advancement, by using latest technologies every organization wants to beat
its competitors and want to grow. Enterprise Resourceful Planning is the need of today’s
organization. Survival on manual system is difficult so, that’s why organization of the
corporate world wants to computerize their departments. The modules should be
complete database driven and interactive that should provide the proper information
about the Placement and Training Organization.
Success of any system depends up to a large extent on how accurately a
problem is defined, thoroughly investigated and properly carried out to the choice of
solution. Analysis is the only phase in which the requirements for the new system are
identified. System analysis is a detailed study of the various operations performed by a
system and their relationship within and outside of the system. The question is: what
must be done to solve the problem? One aspect of analysis is defining the boundaries of
the system and determining whether or not a candidate system should consider other
related system. During analysis data are collected on the available files, decision points
and transactions handled by the parent system. Data flow diagram, interviews, onsite
observations, questionnaires are used as a logical system model and tools to perform the
analysis.
Gathered all facts about the present system from the employees.
In order to reduce the time, there is a need for computerized system that cans retrieve
data, insert data, update existing data or delete existing data. These modules are
developed wit the aim of reducing time, reducing manpower, reducing cost so that the
records can be easily maintained. The volume of work and complexity are increasing year
by year. This system reduces complexity and workload.
PRELIMINARY INVESTIGATION
A request to take assistance from information system can be made for many reasons, but
in each case some one in the organization initiate the request. When the request is made,
the first system activity the preliminary investigation begins. This activity has three parts:
Request clarification
Feasible Study
Request approval
Many requests from employees and users in the organization are not clearly defined.
Therefore, it becomes necessary that project request must be examined and clarified
properly before considering systems investigation.
The feasibility study is carried out by a small group of people who are familiar with
information system techniques, understand the parts of the business or organization that
will be involved or affected by the project, and are skilled in the system analysis and
design process.
• Request Approval:
It is not necessary that all request projects are desirable or feasible. Some organizations
receive so many projects request from employees that only a few of them can be
purchased. However, those projects that are feasible and desirable should be put into a
schedule.
In some cases, development can start immediately, although usually system staff
members are busy on other ongoing projects. When such situation arises, management
decides which projects are more urgent and schedule them accordingly. After a project
request is approved, its cost, priority, completion time and personal requirements are
estimated and used to determine where to add it to any existing project list. Later on,
when the other projects have been completed, the proposed application development can
be initiated.
Analysis is a process of studying a problem and to find the best solution to that
problem. System analysis gives us the target for the design and the implementation.
Analysis is one phase, which is important phase for system development lie cycle.
System development is a problem solving techniques. Analysis involves interviewing the
client and the user. Three people and the existing documents about the current mode of
operation are the basic source of information for the analyst.
Analysis is the process of studying a problem to find the best solution to that problem.
System analysis gives us the target for the design and the implementation. Analysis is one
phase of the very important phase of the system development life cycle. System
development is a problem solving techniques. Analyses involve interviewing the client
and the user. These people and the existing document about the current mode of
operation are the basic source of information for the analyst.
Human Resource Department of the organization controls the manpower planning by
recording manpower requirements, grade, job specifications and presently vacancies and
strength. It maintains the candidate’s databank for the respective post.
Computer Aided Software Engineering can be as simple as a single tool that support a
specific software engineering activity or as complex as a complete “environment “ that
encompasses tools, a database, people, hardware, a network, operating system, standards,
and myriad other components. Each building block forms a foundation for the next, with
tools sitting as the top of the heap. It is interesting to note that the foundation for effective
CASE environment has relatively little to do for software engineering tools themselves.
Rather, successful environments appropriate hardware and systems software. In addition,
the environment architecture must consider the human work patterns that are applied
during the software engineering process.
The environment composed of the hardware platform and system support (including
networking software, software management, and object management services), the
groundwork for CASE. But the CASE environment itself demands other building blocks.
A set of portability services provides a bridge between CASE tools and their integration
framework and the environment architecture. The integration framework is a collection of
specialized programs that enables individual’s CASE tools to communicate one another,
to create a project database, and to exhibit the same look and feel to the end user (the
software engineer). Portability services allow CASE tools and their integration
framework to migrate across different hardware platforms and operating system with out
significant adaptive maintenance.
The building blocks represent a comprehensive foundation for the integration of CASE
tools. However, most CASE tools in use today have been: constructed using all these
building blocks.
In fact some CASE tools remain “point solution:” That is, a tool is used to assist in a
particular software engineering activity (e.g. analysis modeling) but does not directly
communicate with other tools, is not tied into a project database, is not part of an
integrated CASE environment (l-CASE). Although this situation is not ideal, a CASE
tool can be used quite effectively, even if it is a point solution.
At the low end of the integration spectrum is the individual (point solution) tool. When
individual tools can provide tools provide facilities for data exchange, the integration
level is improved slightly. Such tools produce output in a standard format that should be
compatible with other tools that can read the format. In some cases, the builder of
complementary CASE tools work together to form a bridge between the tools (e.g. an
analysis and design tool that is coupled with a code generator). Using this approach, the
team developed, synergy between the tools separately. Single source integration occurs
when a single CASE tools vendor integrates a number of different tools and sells them as
a package.
Although this approach is quite effective, the closed architecture of most single source
environments precludes easy addition from other vendors.
• TECHNICAL
• ECONOMICA
• OPERATION
Feasibility Study
A feasibility study is conducted to select the best system that meets performance
requirement. This entails an identification description, an evaluation of candidate system
and the selection of best system for the job. The system required performance is defined
by a statement of constraints, the identification of specific system objective and a
description of outputs.
1. Economic Feasibility :
2. Technical Feasibility :
3. Operational Feasibility:
Economical feasibility
• Software Cost :
• Manpower Cost :
• The proposed system uses c# as front-end and Sql server 2005 as back-end tool.
• The above tools are readily available, easy to work with and widely used for
developing commercial application.
Duration of Project:-
Time Duration
The system will be used if it is developed well then be resistance for users that
undetermined
• No major training and new skills are required as it is based on DBMS model.
• It will help in the time saving and fast processing and dispersal of user request and
applications.
• New product will provide all the benefits of present system with better
performance.
• User support.
• User involvement in the building of present system is sought to keep in mind the
user specific requirement and needs.
• User will have control over there own information. Important information such as
pay-slip can be generated at the click of a button.
Behavioral Feasibility
SYSTEM DESIGN
Introduction
System design provides the understandings and procedural details necessary for
implementing the system recommended in the system study. Emphasis is on the
translating the performance requirements into design specifications. The design phase is a
transition from a user-oriented document (System proposal) to a document oriented to the
programmers or database personnel.
1) Logical Design
2) Physical Design
A data flow diagram shows the logical flow of the system. For a system it
describes the input (source), output (destination), database (data stores) and procedures
(data flows) all in a format that meets the user’s requirement. When analysis prepare the
logical system design, they specify the user needs at a level of detail that virtually
determines the information flow into an out of the system and the required data resources.
The logical design also specifies input forms and screen layouts.
The activities following logical design are the procedure followed in the physical
design e.g., producing programs, software, file and a working system. Design
specifications instruct the user about what the system should do.
Output design is one of the most important features of the information system.
When the outputs is not of good quality the users will be averse to use the newly
designed system and may not use the system. There are many types of output, all of
which can be either highly useful or can be critical to the users, depending on the manner
and degree to which they are used.
• Operational outputs, whose use is purely with in the computer department e.g.,
program-listing etc.
• Interactive outputs, which involve the user is communicating directly with the
computer, It is particularly important to consider human factor when designing computer
outputs. End user must find outputs easy to use and useful to their jobs, Without quality
output, user may find the entire system unnecessary and avoid using it. The term
“Output” in any information system may apply to either printer or displayed information.
During the designing the output for this system, it was taken into consideration, whether
the information to be presented in the form of query of report or to create documents etc.
• When and how often output and their format is needed. While designing output
for project based Attendance Compilation System, the following aspects of outputs
designing were taken into consideration.
• The outputs (i.e., well formatted table outputs in the screen itself) designed are
simple to read and interpret.
• Format of each output was another important point taken into consideration.
Output media, for each output appropriate media is decided whether it will be displayed
on screen or will be taken to printer or both.
• Other output design related specifications, i.e., how frequently the outputs will
be generated, how many pages or sheets approximately it will keep up, what is its
planned use and output distribution to users are also taken into account.
These were a few major designing issues, which were taken into consideration,
while deciding the output specifications for the system. As direct beneficiary of reports is
the user community, they were consulted constantly at every level. Formats and screen
design for various reports were identified, taking into account the user requirements.
Before finalising these were given to users for any improvement and suggestions. End
users issues taken into consideration were Readability, Relevance and Acceptability.
Once all the output reports to be generated by ACS system were identified, they were
given to users for their acceptance. For prototyping various outputs, final outputs models
were created with dummy data, before they were finalised.
Output Sources:
• Tabular contents
• Graphic format
• Using Icons
Output Definition:
The output should be defined in terms of:
Types of outputs
Data items
The name given to each data item should be recorded and its characteristics described
clearly in a standard form:
• Number of characters
• Positions of decimal point, arithmetic design, etc.,
Input Design:
The input design is the link that ties the information system into the user’s world.
Input specifications describe the manner in which data enters the system for processing.
Input design features can ensure the reliability of the system and produce results from
accurate data, or they can result in the production of erroneous information.
• Data entry, the activity of putting data into the computer processing.
• Avoid delay
Input stages several activities have to be carried out as part of te overall input process.
They include some or all of the following.
Input Performa were designed, after a careful discussion with users. It was attempted to
cover all user requirements. Designed Performa were given to user for any suggestion and final
approval.
Various data items were identified and wherever necessary were recorded.
Input designs are aimed at reducing the chances of mistakes of errors. As the human beings are
prone to errors there is always a possibility of occurrence of chance of errors. Adequate
validation checks are incorporated to ensure error free data storage. Some of the data validation
checks applied are as following:
Redundancy of data is checked. It means the records of primary key do not occur twice.
Wherever items are coded, input code is checked for it’s validly with respect to several checks.
Utmost care has been taken to incorporate the validation at each stage of the system. E.g. when entering
records into employee information table for employee, it is checked that whether the corresponding
employee exists in the employee information table etc.,
Enough messages and dialogue boxes are provided while design screen, which does
guide user at the time of any errors, or at time of entry. This feature provides a user-friendly
interface to native users. It can be emphasized that input deigns of E-SHOPPING is so designed
that it ensures easy and error free data entry mechanism. Once one is sure of input data the output
formatting becomes an routine work.
SOFTWARE DESIGN
The purpose of this phase is to plan a solution for the problem specified by the
requirement document. This is first step in moving from the problem domain to solution domain.
Designing activity is divided into two parts.
a) System Design It aims to identify the modules that should be in the system, the specification
of these modules and how they interact with each other to produce the desired result.
b) Detailed Design The internal goal of each of the modules specified in the system design is
decided
DATABASE DESIGN
A database is a collection of inter-related data stored with a minimum of redundancy
to serve many applications. It minimizes the artificiality embedded in using separate files.
The primary objectives are fast response time to enquires, more information at low cost,
control of redundancy, clarity and ease of use, accuracy and fast recovery. The
organization of data in a database aims to achieve three major objectives, they are data
integration, data integrity and data independence. During the design of the database at
most care has been taken to keep up the objectives of the database design.
CODE DESIGN
For the code to be designed effectively, the following characteristics were also considered
while designing the code.
• Uniqueness
• Versatility
• Stability
• Simplicity
• Consciousness
The code should be adequate for present and anticipated data processing for machine and
human use. Care was taken to minimize the clerical effort and computer time required to continue
operation.
PROCESS DESIGN
The process can be conceptualized in such a way to keep the methodology of main
module process along with some auxiliary task, which will run concurrently with the main
program.
Data Flow Diagramming is a means of representing a system at any level of detail with a
graphic network of symbols showing data flows, data stores, data processes, and data
sources/destination.
The data flow diagram is analogous to a road map. It is a network model of all possibilities
with different detail shown on different hierarchical levels. This processes of representing
different details level is called “leveling” or “partitioning” by some data flow diagram
advocates. Like a road map, there is no start point or stop point, no time or timing, or steps to
get somewhere. We just know that the data path must exist because at some point it will be
needed. A road map shows all existing or planned roads because the road is needed.
Details that is not shown on the different levels of the data flow diagram such as volumes,
timing, frequency, etc. is shown on supplementary diagrams or in the data dictionary. For
Data Flow Diagram (DFD) uses a number of symbols to represent the systems. Data Flow
Diagram also known as ‘Bubble Chart’ is used to clarify system requirements and identifying
the major transformations that will become programs in system design. So it is the starting
point of the design phase that functionally decomposes the requirements specifications down
The first level DFD show more detail, about the single process of the 0 level DFD
The second level DFD can show even more details and so on.
Symbols of DFD:-
The Data flow Diagram shows the flow of data. It is generally made of symbols given below
Square
Arrow
flows.
Circle
A circle or a bubble represents is a process that transforms incoming data flow into outgoing
Open Rectangle
An open Rectangle is data store-data at rest, or temporary repository of data. Open rectangle
User
LOGIN
ORDER PURCHASE
GENERATE
CREDIT
CARD
Verification
Information Flow of Data for Testing
Software
Test Results Evaluatio
Configuration
n
Testing Error
Rate Debu
Data g
Expected
Test Results
Reliabilit
Configuration y
Model
Correction
Predicted Reliability
:
MODULAR DESIGN
• Each E-shopping module has different requirements from the others. This section
describes the requirements, design, and implementation of each module.
• Control module—the control module dispatches requests to business logic, controls
screen flow, coordinates component interactions, and activates user sign on and
registration. The control module is implemented by the WAF and application-specific
WAF extensions.
• Shopping cart module—the shopping cart tracks the items a user has selected for
purchase
• Sign on module—the sign on module requires a user to sign on before accessing certain
screens, and manages the sign on process
• Messaging module—the messaging module asynchronously transmits purchase orders
from the pet store to the OPC
• Catalog module—the catalog module provides a page-based view of the catalog based on
user search criteria
The control module forms the framework underlying the application, so it naturally has the
most high-level requirements. Extensibility and maintainability are prime considerations in
this module. The control module must be extensible because all real-world enterprise
applications change constantly. Because the control module plays a role in virtually every
interaction, its code must be well-structured to avoid complexity-related maintenance
problems. The requirements of the control module are:
• The module must handle all HTTP requests for the application. This module controls
a Web application, and interacts with a user who sends HTTP service requests. The
control module is responsible for classifying and dispatching each of these requests to
the other modules.
• HTTP responses may be of any content type. Web application developers do not want
to be limited to just textual content types. The control module must also be able to
produce binary responses.
• Business logic must be easily extensible. Enterprise applications are always changing
and growing as business rules and conditions change. A developer familiar with the
control module should be able easily to add new functionality with minimal impact
on existing functions.
• New views must be easy to add. Most business logic changes imply new user views,
so developers must be able to create new views easily.
• Module must provide application-wide control of look and feel. Manually editing
hundreds or dozens of user views is not a practical way to manage application look
and feel. The control module must provide a way for application screen layout and
style to be controlled globally.
• Application must be maintainable even as it grows. The control module must be
structured so that new functions added over time do not result in a thicket of
unmentionable “spaghetti” code. It should be possible to easily understand the control
of even an application with several hundred business classes.
• Application-wide functionality must be easy to add. New application requirements
occasionally apply to every operation or view in an application. The control module
must be structured so that such requirements can be easily met.
ENTITY RELATIONSHIP DIAGRAM
Data Flow Diagramming is a means of representing a system at any level of detail with a
graphic network of symbols showing data flows, data stores, data processes, and data
sources/destination.
The data flow diagram is analogous to a road map. It is a network model of all
possibilities with different detail shown on different hierarchical levels. This processes of
representing different details level is called “leveling” or “partitioning” by some data flow
diagram advocates. Like a road map, there is no starting point or stop point, no time or timing, or
steps to get somewhere. We just know that the data path must exist because at some point it will
be needed. A road map shows all existing or planned roads because the road is needed.
Details that is not shown on the different levels of the data flow diagram such as
volumes, timing, frequency, etc. is shown on supplementary diagrams or in the data dictionary.
For example, data store contents may be shown in the data dictionary.
Data Flow Diagram (DFD) uses a number of symbols to represent the systems. Data
Flow Diagram also known as ‘Bubble Chart’ is used to clarify system requirements and
identifying the major transformations that will become programs in system design. So it is the
starting point of the design phase that functionally decomposes the requirements specifications
down to the level of details.
Password
First_Nam Last_Nam
e e
User_Type
User_Id
User_I Address
d
Email
Mobile_N
o
Contact_No
User to
Purchase
Product_Type
Product_Id Name Id
Price
Product_Master Categor
y Product_type_Master
Product_Typ
Quantity e
Name Desc
Product_Desc
STRUCTURE OF TABLES USED
TABLE 1- User Detail TABLE
TABLE 4-PRODUCT_TYPE_MASTER
Field Name Data Type Description
Product_Type_Id Number
Name Varchar Name of product
type
Details Varchar Details of the
product type
TABLE 5- ORDER
Here the System testing involved is the most widely used testing process
consisting of five stages as shown in the figure. In general, the sequence of testing
activities is component testing, integration testing, and then user testing. However, as
defects are discovered at any one stage, they require program modifications to correct
them and this may require other stages in the testing process to be repeated.
Unit testing
Module
testing
Sub-system
testing
System
testing
Acceptance
testing
Testing is the process of detecting errors. Testing performs a very critical role for
quality assurance and for ensuring the reliability of the software. The results of testing are
used later on during maintenance also.
Testing is vital to the success of the system. System testing makes a logical assumption
that if the parts of the system are correct, the goal will be successfully achieved. In
adequate testing or non-testing leads to errors that may not appear until months or even
years later (Remember the New York three day power failure due to a misplaced ‘Break’
statement).
A small error can conceivably explode into a much larger problem. Effective testing early
in the process translates directly into long term cost savings from a reduced number of
errors.
Another reason for system testing is it’s utility as a user oriented vehicle before
implementation. The best program is worthless if it does not meet the user requirements.
Unfortunately, the user’s demands are often compromised by efforts to facilitate program
or design efficiency in terms of processing time or design efficiency.
Thus in this phase we went to test the code we wrote. We needed to know if the code
compiled with the design or not? Whether the code gave the desired outputs on given
inputs? Whether it was ready to be installed on the user’s computer or some more
modifications were needed?
Through the web applications are characteristically different from there software
counterparts but the basic approach for testing these web applications is quite similar.
These basic steps of testing have been picked from software engineering practices. The
following are the steps, we undertook:
2. The design model of the web application is reviewed to uncover the navigation errors.
Use cases, derived as a part of the analysis activity allows a web designer to exercise
each usage scenario against the architectural and navigational design. In essence these
non-executable tests help to uncover the errors in navigation.
3. When web applications are considered the concept of unit changes. Each web page
encapsulate content navigation links, content and processing elements(Forms, Scripts,
JSP’s as in our case). It is not always possible to test each of these individually. Thus is
the base of the web applications the unit to be considered is the web page. Unlike the
testing of the algorithmic details of a module the data that flows across the module
interface, page level testing for web applications is driven by content, processing and
links encapsulating the web page.
4. The Assembled web application is tested for overall functionality and content
delivery. the various user cases are used that test the system for errors and mistakes.
5. The Web application is tested for a variety of environmental settings and is tested for
various configurations and upon various platforms.
The modules are integrated and integration test are conducted.
6. Thread based testing is done to monitor the regression tests so that the site does not
become very slow is a lot of users are simultaneously logged on.
7. A controlled and monitored population of end users tests Intranet application , this all
comprises of the User Acceptance Testing .
The aim of testing is often to demonstrate that a program works by showing that it
has no errors. The basic purpose of testing phase is to detect the errors that may be
present in the program. Hence one should not start testing with the intent of showing that
a program works, but the intent should be to show that a program doesn’t work. Testing
is the process of executing a program with the intent of finding errors.
TESTING OBJECTIVES:
LEVELS OF TESTING
In order to uncover the errors present in different phases, we have the concept of levels
of testing. The basic levels of testing are
Testing
Design Integration
Testing
Code Unit
Testing
Unit testing
Unit testing focuses verification effort on the smallest unit of software i.e. the
module. Using the detailed design and the process specifications, testing is done to
uncover errors within the boundary of the module. All modules must be successful in the
unit test before the start of the integration testing begins.
In this project each service can be thought of a module. There are so many
modules like Login, HR Department, Interviewer Section, etc. Each module has been
tested by giving different sets of inputs. When developing the module as well as finishing
the development, the module works without any error. The inputs are validated when
accepting them from the user.
Integration Testing
After unit testing, we have to perform integration testing. The goal here is to see if
modules can be integrated properly, the emphasis being on testing interfaces between
modules. This testing activity can be considered as testing the design and hence the
emphasis on testing module interactions.
In this project the main system is formed by integrating all the modules. When
integrating all the modules I have checked whether the integration effects working of any
of the services by giving different combinations of inputs with which the two services run
perfectly before Integration.
SYSTEM TESTING
Here the entire software system is tested. The reference document for this process
is the requirements document, and the goal is to see if software meets its requirements.
Here entire ‘E-SHOPPING’ has been tested against requirements of project and it
is checked whether all requirements of project have been satisfied or not.
ACCEPTANCE TESTING
Acceptance Testing is performed with realistic data of the client to demonstrate
that the software is working satisfactorily. Testing here is focused on external behavior of
the system; the internal logic of program is not emphasized.
This is a unit testing method, where a unit will be taken at a time and tested
thoroughly at a statement level to find the maximum possible errors.
I tested step wise every piece of code, taking care that every statement in the
code is executed at least once. The white box testing is also called Glass Box Testing.
I have generated a list of test cases, sample data, which is used to check all
possible combinations of execution paths through the code at every module level.
White-box test focuses on the program control structure. Test cases are derived to
ensure that all statement in the program control structure. Test cases are derived to ensure
that all statement in the program control structure. Test cases are derived to ensure that all
statement in the program has been executed at least once during testing and that all
logical conditions have been exercised. Basis path testing, a white box technique, makes
use of program graphs (or graph matrices) to derive the set of linearly independent test
that will ensure coverage. Condition and data flow testing further exercising degrees of
complexity.
Graph based testing methods explore the relationship between and behavior of
program objects. Equivalence partitioning divides the input classes of data are likely to
exercise specific software function. Boundary values analysis probes the program’s
ability to handle data at the limits of acceptability.
A strategy for software testing may also be viewed in the context of the spiral. Unit
testing begins at the vortex of the spiral and, concentrates on each unit, component of the
software as implemented in source code. Testing progresses moving outward along the
spiral to integration testing, where the focus is on designed the construction of the
software architecture. Taking another turn outward on spiral, we encounter validation
testing, where requirements established as part of software requirements analysis are
validated against the software that has been constructed. Finally, we arrive at system
testing, where the software and other system elements are tested as a whole. To test
computer software, we spiral out along stream lines that broaden the scope of testing with
each turn.
Considering the process from a procedural point of view, testing within the context
of software engineering is actually a series of four steps that are implemented
sequentially. The steps are shown in Figure. Initially, tests focus on each component
individually, ensuring that it functions properly as unit. Hence, the name unit testing.
Unit testing makes heavy use of white-box testing techniques, exercising specific paths in
module’s control structure to ensure complete coverage and maximum error detection.
System Testing
Validation Testing
Integration Testing
Validation testing
Code
Design
Evaluatio
n
Software
Configuration
Test Results
Error
Error
Rate Data
Expected Results
Testing
Debug
Reliability
Model
Test Configuration
Predicated Reliability
Correction
QUALITY ASSURANCE
QUALITY ASSURANCE
INTRODUCTION
The key factor to the success in software quality program is its implementation.
While definition of process can be evolving phenomenon, implementation of processes
makes the difference between success & failure.
A quality product can be defined as:
• One that is fit for use.
• One that is produced as per the predefined standards.
So, Software Quality Assurance is the process of ensuring that the product
confirms to its standards.
IMPLEMENTATION
IMPLEMENTATION
Introduction
System implementation is the stage when the user has thoroughly tested the system and
approves all the features provided by the system. The various tests are performed and the system
is approved only after all the requirements are met and the user is satisfied.
The new system may be totally new, replacing an existing manual or automated
system, or it may be a major modification to an existing system. In either case, proper
implementation is essential to provide a reliable system to meet organizational requirements.
Successful implementation may not guarantee improvement in the organization using the new
system (that is a design question), but improper will prevent it.
Implementation is the process of having systems personnel check out and put new
equipment into use, train users, install the new application and construct any files of data needed
to use it. This phase is less creative than system design. Depending on the size of the organization
that will be involved in using the application and the risk involved in its use, systems developers
may choose to test the operation in only one area of the firm with only one or two persons.
Sometimes, they will run both old and new system in parallel way to com-pare the results. In still
other situations, system developers stop using the old system one day and start using the new one
the next.
The implementation of the web based or lan based networked project has some extra steps
at the time of implementation. We need to configure the system according the requirement of the
software.
For the project we need to install and configure Weblogic server 8.1 , database server, and
the deployment directory for the project.
Aspects of Implementation
• Training Personnel
• Conversion Procedures
TRAINING
Even well designed and technically elegant systems can succeed or fail because of the
way they are used. Therefore the quality of the training received by the personnel involved with
the system in various ways helps or hinders, and may even prevent, the successful
implementation of an information system.
Since, E-Shopping Systemis web-based and user friendly, not much effort was required
in training process.
CONVERSION:
Conversion is the process of changing from the old system to the new system. There are
two methods of handling systems conversion:
• Parallel Run
• Immediate cut-off
Parallel Run
In this approach, the old system and the new system are used simultaneously for some
period of time so that the performance of the new system can be monitored and compared with
that of the old system. Also in case of failure of the new system, the user can fall back on the old
system. The risk of this approach is that the user may never want to shift to new system.
In this method, the use of the old system ceases as soon as the
new system is implemented and bought in to palace. The old system becomes redundant from the
day of implementation of the new system. There is the high risk involved in this approach if the
new system is not tested rigorously. This is because of the fact that if the new system fails, then
there will not be anything to fall back upon. The advantage of this approach is that both the
systems need not be used simultaneously.
Implementation Tools
The project was implemented using Java server pages,HTML,Java beans.The implementation
work was carried out in Windows XP/2003 server platform.
1) .Net Framework
2) IIs
3) Sql Server 2003
Coding
This means program construction with procedural specifications has finished and the coding for
the program begins:
• Main emphasis while coding was on style so that the end result was an optimized code.
Coding Style
The structured programming method was used in all the modules the project.It incorporated the
following features
• The code has been written so that the definition and implementation of each function is
contained in one file.
• A group of related function was clubbed together in one file to include it when needed and
save us from the labour of writing it again and again.
Naming Convention:-
• As the project size grows,so does the com[plexity of recognizing the purpose of the
variables.Thus the variables were given meaningful names,whihch would hellp in understanding
the context and the purposse of the variable.
• The function names are also given meaningful names that can be easily understood by the
user.
Indentation
Judicious use of indentation can make the task of reading and understanding a program
much simpler.Indentation is an essential part of a goog program.If code id intended
without thought itv will seriously affect the readability of the program.
• Blank line is also left between each function definition to make the code look neat.
• Indentation for each source file stating he purpose of the file is also done.
MAINTENANCE
MAINTENANCE
• Corrective
• Adaptive
• Perfective.
In E-Shopping, care has been taken towards maintenance; Loop Holes can
be eradicated from the system from time to time according to changing requirements with
lesser cost.
EVALUATION
EVALUATION
The evaluation phase ranks vendor proposals and determines the one best suited, Evaluation of
the system is performed to identify its strengths and weaknesses. The actual evaluation can occur
along any of the following dimensions:
Operational Evaluation: Assessment of the manner in which the system functions, including
case of use, response time, overall reliability and level of utilization.
User Manager Assessment Evaluation of the attitudes of senior and user manager within the
organization, as well as end-users.
Once a business need is approved, the approaches for accomplishing the concept are reviewed
for feasibility and appropriateness. The Systems Boundary Document identifies the scope of the
system and requires Senior Official approval and funding before beginning the Planning Phase.
The concept is further developed to describe how the business will operate once the approved system
is implemented, and to assess how the system will impact employee and customer privacy. To ensure
the products and /or services provide the required capability on-time and within budget, project
resources, activities, schedules, tools, and reviews are defined. Additionally, security certification and
accreditation activities begin with the identification of system security requirements and the
completion of a high level vulnerability assessment.
Functional user requirements are formally defined and delineate the requirements in terms of data,
system performance, security, and maintainability requirements for the system. All requirements are
defined to a level of detail sufficient for systems design to proceed. All requirements need to be
measurable and testable and relate to the business need or opportunity identified in the Initiation
Phase.
1.2.5 Design Phase
The physical characteristics of the system are designed during this phase. The operating environment
is established, major subsystems and their inputs and outputs are defined, and processes are allocated
to resources. Everything requiring user input or approval must be documented and reviewed by the
user. The physical characteristics of the system are specified and a detailed design is prepared.
Subsystems identified during design are used to create a detailed structure of the system. Each
subsystem is partitioned into one or more design units or modules. Detailed logic specifications are
prepared for each software module.
The detailed specifications produced during the design phase are translated into hardware,
communications, and executable software. Software shall be unit tested, integrated, and retested in a
systematic manner. Hardware is assembled and tested.
The various components of the system are integrated and systematically tested. The user tests the
system to ensure that the functional requirements, as defined in the functional requirements
document, are satisfied by the developed or modified system. Prior to installing and operating the
system in a production environment, the system must undergo certification and accreditation
activities.
The system or system modifications are installed and made operational in a production environment.
The phase is initiated after the system has been tested and accepted by the user. This phase continues
until the system is operating in production in accordance with the defined user requirements.
The system operation is ongoing. The system is monitored for continued performance in accordance
with user requirements, and needed system modifications are incorporated. The operational system is
periodically assessed through In-Process Reviews to determine how the system can be made more
efficient and effective. Operations continue as long as the system can be effectively adapted to
respond to an organization’s needs. When modifications or changes are identified as necessary, the
system may reenter the planning phase.
The disposition activities ensure the orderly termination of the system and preserve the vital
information about the system so that some or all of the information may be reactivated in the future if
necessary. Particular emphasis is given to proper preservation of the data processed by the system, so
that the data is effectively migrated to another system or archived in accordance with applicable
records management regulations and policies, for potential future access.
SDLC Objectives
This guide was developed to disseminate proven practices to system developers, project managers,
program/account analysts and system owners/users throughout the DOJ. The specific objectives
expected include the following:
Key Principles
This guidance document refines traditional information system life cycle management approaches to
reflect the principles outlined in the following subsections. These are the foundations for life cycle
management.
Life Cycle Management Should be used to Ensure a Structured Approach to Information
Systems Development, Maintenance, and Operation
The establishment of an Integrated Product Team (IPT) can aid in the success of a project. An IPT is
a multidisciplinary group of people who support the Project Manager in the planning, execution,
delivery and implementation of life cycle decisions for the project. The IPT is composed of qualified
empowered individuals from all appropriate functional disciplines that have a stake in the success of
the project. Working together in a proactive, open communication, team oriented environment can aid
in building a successful project and providing decision makers with the necessary information to
make the right decisions at the right time.
To help ensure effective planning, management, and commitment to information systems, each
project must have a clearly identified program sponsor. The program sponsor serves in a leadership
role, providing guidance to the project team and securing, from senior management, the required
reviews and approvals at specific points in the life cycle. An approval from senior management is
required after the completion of the first seven of the SDLC phases, annually during Operations and
Maintenance Phase and six-months after the Disposition Phase. Senior management approval
authority may be varied based on dollar value, visibility level, congressional interests or a
combination of these.
The program sponsor is responsible for identifying who will be responsible for formally
accepting the delivered system at the end of the Implementation Phase.
The Project Manager has responsibility for the success of the project and works through a
project team and other supporting organization structures, such as working groups or user groups, to
accomplish the objectives of the project. Regardless of organizational affiliation, the Project Manager
is accountable and responsible for ensuring that project activities and decisions consider the needs of
all organizations that will be affected by the system. The Project Manager develops a project charter
to define and clearly identify the lines of authority between and within the agency’s executive
management, program sponsor, (user/customer), and developer for purposes of management and
oversight.
The project management plan is a pivotal element in the successful solution of an information
management requirement. The project management plan must describe how each life cycle phase will
be accomplished to suit the specific characteristics of the project. The project management plan is a
vehicle for documenting the project scope, tasks, schedule, allocated resources, and interrelationships
with other projects. The plan is used to provide direction to the many activities of the life cycle and
must be refined and expanded throughout the life cycle.
Specific Individuals Must be Assigned to Perform Key Roles Throughout the Life Cycle
Certain roles are considered vital to a successful system project and at least one individual must
be designated as responsible for each key role. Assignments may be made on a full- or part-time basis
as appropriate. Key roles include program/functional management, quality assurance, security,
telecommunications management, data administration, database administration, logistics, financial,
systems engineering, test and evaluation, contracts management, and configuration management. For
most projects, more than one individual should represent the actual or potential users of the system
(that is, program staff) and should be designated by the Program Manager of the program and
organization
1.0 SYSTEM ANALYSIS
System Requirements
Software Requirements
Software Requirements
Review & Validation
Preliminary Design
Review & Validation
Detailed Functional Specifications
Testing
Testing
Review & Validation
Maintenance
Since the world is growing for globalization, every organization wants to beat its
competitors and want to grow. Enterprise Resourceful Planning (ERP) is the need of today’s
organization. Survival on manual system is difficult so, that’s why organization of the
corporate world wants to computerize their departments. The modules should be complete
database driven and interactive that should provide the proper information about the
Gathered all facts about the present system from the employees.
In order to reduce the time, there is a need for computerized system that cans retrieve data, insert data, update existing data or delete
existing data. These modules are developed wit the aim of reducing time, reducing manpower, reducing cost so that the records can be
easily maintained. The volume of work and complexity are increasing year by year. This system reduces complexity and workload.
1.2 Preliminary Investigation:
A request to take assistance from information system can be made for many reasons, but in each case some one in the organization
initiate the request. When the request is made, the first system activity the preliminary investigation begins. This activity has three
parts:
Request clarification
Feasible Study
Request approval
Many requests from employees and users in the organization are not clearly defined. Therefore, it becomes necessary that project
request must be examined and clarified properly before considering systems investigation.
The feasibility study is carried out by a small group of people who are familiar with
information system techniques, understand the parts of the business or organization that will
be involved or affected by the project, and are skilled in the system analysis and design
process.
Request Approval: It is not necessary that all request projects are desirable or feasible. Some
organizations receive so many projects request from employees that only a few of them can
be purchased. However, those projects that are feasible and desirable should be put into a
schedule. In some cases, development can start immediately, although usually system staff
members are busy on other ongoing projects. When such situation arises, management
decides which projects are more urgent and schedule them accordingly. After a project
request is approved, its cost, priority, completion time and personal requirements are
estimated and used to determine where to add it to any existing project list. Later on, when
the other projects have been completed, the proposed application development can be
initiated.
Analysis is a process of studying a problem and to find the best solution to that problem.
System analysis gives us the target for the design and the implementation. Analysis is one
phase, which is important phase for system development lie cycle. System development is a
problem solving techniques. Analysis involves interviewing the client and the user. Thee
people and the existing documents about the current mode of operation are the basic source
Analysis is the process of studying a problem to find the best solution to that problem.
System analysis gives us the target for the design and the implementation. Analysis is one
phase of the very important phase of the system development life cycle. System development
is a problem solving techniques. Analyses involve interviewing the client and the user. These
people and the existing document about the current mode of operation are the basic source of
.
2.0 SOFTWARE ENGINEERING PARADIGM APPLIED
Computer Aided Software Engineering can be as simple as a single tool that support a
encompasses tools, a database, people, hardware, a network, operating system, standards, and
myriad other components. Each building block forms a foundation for the next, with tools
sitting as the top of the heap. It is interesting to note that the foundation for effective CASE
environment has relatively little to do for software engineering tools themselves. Rather,
environment architecture must consider the human work patterns that are applied during the
The environment composed of the hardware platform and system support (including
groundwork for CASE. But the CASE environment itself demands other building blocks. A
set of portability services provides a bridge between CASE tools and their integration
specialized programs that enables individual’s CASE tools to communicate one another, to
create a project database, and to exhibit the same look and feel to the end user (the software
engineer). Portability services allow CASE tools and their integration framework to migrate
across different hardware platforms and operating system with out significant adaptive
maintenance.
The building blocks represent a comprehensive foundation for the integration of CASE tools.
However, most CASE tools in use today have been: constructed using all these building
blocks. In fact some CASE tools remain “point solution:” That is, a tool is used to assist in a
particular software engineering activity (e.g. analysis modeling) but does not directly
communicate with other tools, is not tied into a project database, is not part of an integrated
CASE environment (l-CASE). Although this situation is not ideal, a CASE tool can be used
At the low end of the integration spectrum is the individual (point solution) tool. When
individual tools can provide tools provide facilities for data exchange, the integration level is
improved slightly. Such tools produce output in a standard format that should be compatible
with other tools that can read the format. In some cases, the builder of complementary CASE
tools work together to form a bridge between the tools (e.g. an analysis and design tool that is
coupled with a code generator). Using this approach, the team develops, synergy between the
tools separately. Single source integration occurs when a single CASE tools vendor
Although this approach is quite effective, the closed architecture of most single source
SYSTEM REQUIREMENTS
Hardware Specification:-
Software Specifications:-
This system was developed under window 2000XP/Windows 2000 NT. It is complete
with all 32-bit versions of windows operating system. Windows is a popular and largest
used operating system in the world because it is easy to understand and provides an easy
interface to users.
activities in the system scheduling application programs, waiting files to disk, sending data
Windows 98 makes your computer easier to use, with new and enhanced feature.
Improved Reliability
Window 98 improves computer reliability by introducing new wizards, utilities and resources
Windows 98 includes tools that help your computer run faster than Windows 95 with out
adding new hardware. Window 98 includes a suite of programs designed to optimized you’re
web.
Integration
Windows 98 Explorer and Internet Explorer integrate local and Web-based resources in a
single viewer computer’s efficiency, especially when used together. Window 98 makes your
computer more entertaining by new hardware. These enhancements provide you with hours
of fun.
Multitasking Concepts
Multitasking in general refers to an operating system’s capability to load and execute several
one if it successful shields concurrent applications from each other, making them believe that
applications to yield control by regularly calling a specific set of operating system functions.
Context switching takes place at well-defined point during the execution of a program.
In a preemptive multitasking environment, the operating system can interrupt the execution
of an application at any time. This usually happens when the operating system responds to
hardware events, such as a interrupt from a timer circuit. An application’s flow of execution
can be interrupted at any point, not only at predefined spots. This realizes the complexity of
the system.
5.0 DESIGN
The most creative and challenging phase of the system life cycle is system design. The term
design describes a final system and the process by which it is developed. It refers to the
The first step is to determine how the output is to be produced and in what format.
The second step is input data and master files (data base) have to be designed to meet
the requirements of the proposed output. The operational (processing) phases are handled
through program construction and testing including a list of the programs needed to meet the
system’s objective and complete documentation. Finally, details related to justification of the
system on the user and the organization are documented and evaluated by management as a
step toward implementation. To design the system we must note the following points:
In this component the software components and relevant interfaces such as, interactions
with existing internal and external systems, network connections, standard input an output
Network Connections.
Program Specification
Function called.
Program Security.
Field Details.
Program Functions.
1
From Analysis
Detailed
Cost
Output System
Justification
Design Documentation
and
Candidate
design
Input
Design Design
submitted to
management
for approval
File
Design
Processing No
Design Design Abandon project
accepted
Yes
Test
Programs
S T E PS I N S Y S T E M D E S I G N
computers. It is fair to say that databases will play critical role: in almost all areas where
computers are used. Including business, engineering, medicine, law, education and library,
science to name a few. A database is a collection of related data. By data we mean known
facts that can be recorded and that have implicit meaning for example, consider, the names,
telephone numbers and addresses of the people you know. You may have recorded this data
in an indexed address, book, or you may have stored it on a diskette. Using a personal
ACCESS. This is a collection of related data with an implicit meaning and hence is a
database.
A database represents some aspects of the real world. Sometimes called the mini-world or the
universe of discourse (UOD). Changes to the mini-world are reflected in the database.
A database is designed, built and populated with data for the specific people. It has an
intended group of users and some preconceived applications in which the users are interested.
A database can be of any size and of varying complexity. For example, the list of names and
addresses referred to earlier may consist of only a few hundred records, each with simple
structure. On the other hand the card catalog of a large library may contain half a million
cards stored under different categories by primary author’s last name, by subject, by book
A database may be generated and maintained or by machine. The library card catalog is an
example of a database that may be created and maintained either by a group of application
create and maintained a database. The DBMS is hence a general-purpose software system
that facilities tile processed of defining, constructing and manipulating database for various
applications. Defining a database involves specifying the data types, structures and
constraints for the data to be stored in the database. Constructing the database is the process
of storing the data itself on some storage medium that is controlled by the DBMS.
Manipulating a database includes such functions as querying the database to reflect changes
With the advent of the graphical operating system like windows, the world of imputing went
through a dramatic change. It opened up a whole new world of graphics. Interfaces that use
graphics came to known so graphical user interface (GUI). These became very popular
because the users could identify with images than words. Mention tile word print to a person
and it invokes the image of a printer. The primary requirements for an interface are that it is
easy to use. We must be able react intuitively to an interface presented to us. This is possible
1. All the procedure in this project is automatic accept the entry of data from the user.
2. The project gives the user-friendly environment, which gives the way of working in more
efficient manner.
LIMITATIONS: -
1. This project does not cancel the order once placed, due to using third party
tool(Web Services).
2. System date for the project is like as backbone for the human, i.e. proposed
system is depends on system date so it must be correct.
FUTURE SCOPE
This software can be easily upgraded in the future. And also include many more
features for existing system.
All the information can be easily accessed the Customer like their details, order status, stock,
Transaction. It can be modify and the others details can be easily provided to customer.
Introducing .NET
WROX publications.
Websites:
http://www.vbnetdesign.com
http://www.google.com
http://www.microsoft.com/vb.net
http://www.databasejournal.com
20 GLOSSARY
individual study.
Cost/Benefit Analysis The purpose of the comparing projected savings and benefits to
changed is justified.
the system.
destruction.
Data structure A logically related set of data that can be decomposed into
as a unit.
File Collection of related records organized for a particular purpose also called a dataset.
Flow Chart A graphic picture of the logical steps and sequence involved in
a procedure or a program.
Gantt Chart A static system model used for scheduling; portrays output
system.
system or procedure.
PERT (Project Evaluation & Review Technique) A flow system model used to manipulate
unit.
Source Code A Procedure or format that allow enhancements on a software
package.
SDLC (System Development Life Cycle) A structured sequence of phases for implementing
an information system
System Testing Testing the whole system by the user after major programs and