Investigatory project(1)
Investigatory project(1)
Investigatory project(1)
ON
“SALES AND INVENTORY MANAGEMENT
SYSTEM”
SUBMITTED BY
Name: KARAN KUMAR GOND
Enroll No.:
Class : XII
Group Members : KARAN KUMAR GOND
PIYUSH RAJ
This is to certify that the Project Report entitled “SALES AND INVENTORY
MANAGEMENT SYSTEM” which is submitted to the Department of
Computer Science, PM SHRI Kendriya Vidyalaya Ara , Patna region is
prepared by me. All the coding is the result of my personal effort and due
acknowledgement has been made in the text to all other material used.
Date: 13/01/2025
APPROVED BY-
1
TABLE OF CONTENT
PAGE
SER DESCRIPTION
NO
01 CERTIFICATE
02 ACKNOWLEDGEMENT
03 INTRODUCTION
05 PROPOSED SYSTEM
08 FLOW CHART
09 SOURCE CODE
10 OUTPUT
11 TESTING
13 REFERENCES
2
CERTIFICATE
This is to certify that the Project Report entitled “SALES AND INVENTORY
MANAGEMENT SYSTEM” which is submitted by KARAN KUMAR
GOND and group in partial fulfillment of the requirement for the award of
practical marks for Computer Science, CBSE board Examination is a record of
the candidate’s own work carried out by our under my supervision.
3
ACKNOWLEDGEMENT
I pay my gratitude and sincere regards toDr. Anu Aujla,my project guide for
giving me the cream of his knowledge. I am thankful to her as she has been a
constant source of advice, motivation and inspiration. I am also thankful to her
for giving her suggestions and encouragement throughout the project work.
4
PROJECT ON SALES AND INVENTORY
MANAGEMENT SYSTEM
INTRODUCTION
The system leverages Python for its user-friendly interface and logic
implementation, while SQL is used for robust and secure data storage
and retrieval. By integrating these technologies, the project
demonstrates the practical application of programming and database
management skills, making it a valuable learning experience for Class
12 students
5
PROPOSED SYSTEM
6
SYSTEM DEVELOPMENT LIFE CYCLE (SDLC)
7
PHASES OF SYSTEM DEVELOPMENT LIFE CYCLE
INITIATION PHASE
8
enterprise architecture. The initiation phase begins when an opportunity to add,
improve, or correct a system is identified and formally requested through the
presentation of a business case. The business case should, at a minimum,
describe a proposal’s purpose, identify expected benefits, and explain how the
proposed system supports one of the organization’s business strategies. The
business case should also identify alternative solutions and detail as many
informational, functional, and network requirements as possible.
9
operations. This phase explores potential technical solutions within the
context of the business need.
• It may include several trade-off decisions such as the decision to use
COTS software products as opposed to developing custom software or
reusing software components, or the decision to use an incremental
delivery versus a complete, onetime deployment.
• Construction of executable prototypes is encouraged to evaluate
technology to support the business process. The System Boundary
Document serves as an important reference document to support the
Information Technology Project Request (ITPR) process.
• The ITPR must be approved by the State CIO before the project can
move forward.
10
PLANNING PHASE
This phase formally defines the detailed functional user requirements using
high-level requirements identified in the Initiation, System Concept, and
Planning phases. It also delineates the requirements in terms of data, system
performance, security, and maintainability requirements for the system. The
requirements are defined in this phase to a level of detail sufficient for systems
11
design to proceed. They need to be measurable, testable, and relate to the
business need or opportunity identified in the Initiation Phase. The requirements
that will be used to determine acceptance of the system are captured in the Test
and Evaluation Master Plan.
• Further define and refine the functional and data requirements and
document them in the Requirements Document,
• Complete business process reengineering of the functions to be supported
(i.e., verify what information drives the business process, what
information is generated, who generates it, where does the information
go, and who processes it),
• Develop detailed data and process models (system inputs, outputs, and
the process.
• Develop the test and evaluation requirements that will be used to
determine acceptable system performance.
DESIGN PHASE
12
design techniques often use prototyping tools that build mock-up designs of
items such as application screens, database layouts, and system architectures.
End users, designers, developers, database managers, and network
administrators should review and refine the prototyped designs in an iterative
process until they agree on an acceptable design. Audit, security, and quality
assurance personnel should be involved in the review and approval process.
During this phase, the system is designed to satisfy the functional requirements
identified in the previous phase. Since problems in the design phase could be
very expensive to solve in the later stage of the software development, a variety
of elements are considered in the design to mitigate risk. These include:
13
DEVELOPMENT PHASE
14
Multiple levels of testing are performed, including:
IMPLEMENTATION PHASE
This phase is initiated after the system has been tested and accepted by the user.
In this phase, the system is installed to support the intended business functions.
System performance is compared to performance objectives established during
the planning phase. Implementation includes user notification, user training,
installation of hardware, installation of software onto production computers, and
integration of the system into daily work processes. This phase continues until
the system is operating in production in accordance with the defined user
requirements.
15
modifications or changes are identified, the system may re enter the planning
phase.
The purpose of this phase is to:
16
SOURCE CODE
================================================================
CODING
17
OUTPUT
================================================================
SCREENSHOTS
18
TESTING
It can also be stated as the process of validating and verifying that a software
program/application/product meets the business and technical requirements that
guided its design and development, so that it works as expected and can be
implemented with the same characteristics. Software Testing, depending on the
testing method employed, can be implemented at any time in the development
process, however the most test effort is employed after the requirements have
been defined and coding process has been completed.
TESTING METHODS
Software testing methods are traditionally divided into black box testing and
white box testing. These two approaches are used to describe the point of view
that a test engineer takes when designing test cases.
Black box testing treats the software as a "black box," without any knowledge
of internal implementation. Black box testing methods include: equivalence
partitioning, boundary value analysis, all-pairs testing, fuzz testing, model-
19
based testing, traceability matrix, exploratory testing and specification-based
testing.
SPECIFICATION-BASED TESTING
The black box tester has no "bonds" with the code, and a tester's perception is
very simple: a code must have bugs. Using the principle, "Ask and you shall
receive," black box testers find bugs where programmers don't. But, on the other
hand, black box testing has been said to be "like a walk in a dark labyrinth
without a flashlight," because the tester doesn't know how the software being
tested was actually constructed.
That's why there are situations when (1) a black box tester writes many test
cases to check something that can be tested by only one test case, and/or (2)
some parts of the back end are not tested at all. Therefore, black box testing has
the advantage of "an unaffiliated opinion," on the one hand, and the
disadvantage of "blind exploring," on the other.
20
WHITE BOX TESTING
White box testing, by contrast to black box testing, is when the tester has access
to the internal data structures and algorithms (and the code that implement
these)
For example, the test designer can create tests to cause all statements in the
program to be executed at least once.
• fault injection methods.
• mutation testing methods.
• static testing - White box testingincludes all static testing.
White box testing methods can also be used to evaluate the completeness of a
test suite that was created with black box testing methods. This allows the
software team to examine parts of a system that are rarely tested and ensures
that the most important function points have been tested.
21
HARDWARE AND SOFTWARE REQUIREMENTS
X. Printer : required
22
SOFTWARE REQUIREMENTS:
• Windows OS
• Python--
• MySQL
REFERECES
23