This action might not be possible to undo. Are you sure you want to continue?
Mr. Rajpal Singh
(Vice-President of USA Tech)
REPORT DEVELOPED BY: VIJAY PATHAK
B.Tech (IVth year)
COMPUTER SCIENCE& ENGINEERING NIEC(LUCKNOW) Roll no.0705610116
First and foremost we would like to express our deep gratitude to Mr.Rajpal Singh This project was not doable in the absence of strong guidance of our instructor. His valuable guidance and many constructive suggestions were very necessary for the improvement of this project. We are really indebted to him for kind helps. We are also grateful to Mr.Rajpal Singh who had provided us infrastructural and logistical support along with ideas and suggestions to enhance our project with various features. He had also provided us an environment that was conducive for out project.
This Is To Certify That The ONLINE SHOPPING has Been Developed By VIJAY PATHAKl Of Pre-Final Year (2009-10) Computer Science & Engineering, Northern India Engineering College,Lucknow. In The Summer Training Programme Conducted In The USA Tech Attended From 21/06/10 To 05/08/10 as a Partial Fulfillment Of Award To The Degree Of Bachelor Of Technology In Computer Science & Engineering Of Uttar Pradesh Technical University ,Lucknow.
Vijay Pathak B.tech(final year) (0705610116)
A Project Report On Online Shopping & Management
INDUSTRIAL PROJECT Session: 2009-10
Whatever applicable o Performance Requirements o o o o 5 .Index S No. Requirement Analysis o Introduction o Present Scenario o Problem Definition o Proposed system Requirements specification o o o o o o o Introduction Overall Description Product Perspective Product Functions User Characteristics Operation Environment Constraints 3 Specific Requirements External Interface Requirements System Features Data Flow Diagrams. 1 Introduction o o o o 2 Overview of the project Literature survey Objectives & Scope Organization of the report Title Page No. Entity Relationship Diagrams or UML Diagrams.
o Software Quality Attributes Feasibility Study 4 o Hardware and Software Specification o Technical Feasibility o Economical Feasibility o Operational Feasibility 5 System Design o o o o o Database Design Component Level Design User Interface Design Data Dictionary Reports 6 7 8 Technologies Used Coding Testing o Introduction o Test Criteria o Test Cases Implementation o Installation o User Manual Cost Estimation of the Project PERT Chart/Network Diagram. Gantt Chart Conclusion and Future work o Summary o Future Work Annexure(if any) Glossary 9 10 11 12 6 .
This can be accomplished by passing the information quickly. This can be achieved by this project. In the fast growing world the information is needed as quick as possible. So the organizations shift there business online due to this they can done their business globally and 7 days in a week.. The following figure depicts an abstract level diagram of the project: Computer 2 e-shopping e-shopping e-shopping Computer 1 Computer 3 e-shopping Server or shopping site e-shopping Figure1: An abstract level diagram of the online shopping 7 . So we need a system which is both quick and accurate. Now days the organizations are growing fast and are increasing in size also.Sometimes information is passed manually between departments. This causes loss of buyer time also.Introduction Overview of the project: Online shopping is the one of the easiest way of shopping because in today scenario time is the main factor and with the help of online shopping you can easily shop 24*7. This manual system will take time to pass the information and sometimes it causes loss of information also.
correctly and consistently. Doing there business effectively and globally with the help of online shopping. communicating with people has been a difficult task.Literature survey The main aim of this project is sell there product where no requirement of the location. 8 . In manual system. • This software provides a user-friendly interface for the user and it reduces the data redundancy. Centralized information is available which can be accessed by number of users. For organizations with more than hundred or thousands of customers. with which computers process information is one reason why organization seeks the development of the system projects. Better Security: Safeguarding sensitive and important information in form that is accessible only to authorized person. including arithmetic. contact with each customers is impossible without an efficient system. • Improved Processing speed: The inherent speed. • • • • Greater accuracy and consistency: Carrying out computing steps. Objectives & Scope: • The main aim of this project is sell there product where no requirement of the location and 24*7. Enhanced Communication: Speeding the flow of information and messages between remote locations. It is much cheaper than the manual system.
Organization of the report: The report consists of twelve (12) chapters each consisting of subsections. The fourth chapter Feasibility Study expresses the level with which the project is feasible. The next chapter PERT Chart/Network Diagram. its purpose and overview. operating environment. technical feasibility. its scope. The first chapter Introduction reveals the basic idea of the project. The next chapter Testing specifies the mode of testing done in the project. user characteristics. The second chapter Requirement Analysis takes into account the problem. test criteria followed and the test cases prepared. the present scenario. economical feasibility. operational feasibility. entity relationship diagrams etc. The Requirement Analysis is one of the most important stages of project life cycle. the schedule followed in the project development phase. and brief description of the user manual. The next chapter Cost Estimation of the Project specifies the cost involved in the project. the user interfaces. The next chapter Technologies Used gives the description of the technologies used in the project. The Design is followed by coding in the project life cycle hierarchy. dataflow diagrams. economic feasibility. The following chapter Implementation specifies the installation process. and the proposed system. it includes hardware & software feasibility. The next chapter System Design describes tables and database used. data dictionary. 9 . The chapter Coding gives the view of codes and logic being implemented. The third chapter Requirements specification describes the overall description of the project. reports. Gantt Chart gives the view if the project plan. Each chapter conveys an insight to the project. components involved. constraints. its characteristics.
The last chapter Conclusion and Future work summarizes the work done in the project and the future enhancement which can be done. 10 .
2) So many products in the market so user is much confused. To view a data may need lot of paper to be searched. 5) Prone to corruption by unauthorized users. All above the data need to be maintained on ledgers and maintaining this is a tedious and risky process. the process evolves search through paper records. Much paper work was involved. The existing system has got lot of intricacies within itself and need lot of human effort and paper works. Inaccuracy can be expected. Main challenges are effectively sync internal and external operations in such a manner that job can be finished within time limit. reducing time in activities. Problem Definition There was bulk amount of data from different institutions each having its Own data no centralization candidate has limited time period and limited Options handling of this large data was a major problem faced single view Was available for everyone. Wherever a need for search arises. The life time of paper record is unreliable less that it easily gets spoiled. 3) Paper records are easily damaged in course of time.Requirement Analysis Introduction The aim of online shopping & management System is to computerize shopping process for people present geographically. Some of the negative aspects of the existing system are as follows: 1) Action is time consuming. Data can get easily scratched. Present Scenario Existing system work manually. Securing of manual system is not fully guaranteed. Its basic objectives are to extend their reach to geographically scattered customers. centralized data handling and paperless shopping with reduced manpower. 4) Manual system needs added man power. Hence a Centralization of information was required to reduce paper work and 11 . present system was not transparent much paper work was evolved there was no interface for public viewing there was not enough time for purchasing or compare price so buyer not have enough time to best deal.
They will be given a unique user. how serious is it? If a problem exists. In the college employees are large. It guides the buyer through appropriate choices. The proposed system can be used to maintain efficiently the Administrator Department. what is the underlying cause? Proposed system The proposed system is a computerized one. Now visitors has to logon to website and are required to signup after that only he/she purchase. working closely with the employees and managers. 12 . must study the Counseling process to answer These key questions: What is being done? How is it being done? How frequent does it occur? How great is the volume of decisions? How well is the task being performed? Does a problem exist? If problems exist. At that time also the proposed system is useful and helpful. The procedure of exercising choices is menu driven. This takes only limited time for calculation.Simplify operating procedures. Analyst. 1) Administrator 2) buyer 3) customer 4) visitors The buyer gets into the system using user name and a unique password. This has greater accuracy and efficiency. The system includes three users. Each buyer has his own accessibility permission to accomplish his task flawlessly.
So the organizations shift there business online due to this they can done their business globally and 7 days in a week. This can be achieved by this project. reducing time in activities. So we need a system which is both quick and accurate. The following figure depicts an abstract level diagram of the project. Product Perspective: The product perspective can be understood under following sub headings: Product Functions: The main aim of this project is sell there product where no requirement of the location and 24*7. This can be accomplished by passing the information quickly. centralized data handling and paperless shopping with reduced manpower.Sometimes information is passed manually between departments..Requirements Specification Introduction: The aim of online shopping & management System is to computerize shopping process for people present geographically. Overall Description: Online shopping is the one of the easiest way of shopping because in today scenario time is the main factor and with the help of online shopping you can easily shop 24*7. Main challenges are effectively sync internal and external operations in such a manner that job can be finished within time limit. 13 . Its basic objectives are to extend their reach to geographically scattered customers. This causes loss of buyer time also. This manual system will take time to pass the information and sometimes it causes loss of information also. In the fast growing world the information is needed as quick as possible. Now days the organizations are growing fast and are increasing in size also.
The administrator can specify news and events. System Features The various features or functional requirements of Intranet Mailing And Chatting are: • • • • • The administrator can verify registrations of the new users. The user can also send there billing details. Client on Internet • • Web Browser Operating System(windows) Database Server • • SQL Server 2005 Operating System Development End • • • • • • ASP. The buyer can purchase product. 16 .NET HTML Java Script SQL Server 2005 Operating System Web Server Communications Interfaces The system requires a SMTP server and a web connection with the direct connection to the internet. It assumed that database connection established. • • Client on Internet will be using HTTP/HTTPS protocol.add product request give there feedback after successful logging in to the project. Client on Internet will be using TCP/IP protocol. The administrator can also block or activate users account.Software Interfaces Software will depend on the security features provided by the operating system and the language C#.
ENTITY RELATIONSHIP DIAGRAM • • • • • ERD can express the overall logical structure of a database graphically. A particular entity will have a value for each of its attributes. ERD are simple and clear qualities that may well account in large part for the widespread use of the ER-Model. The attribute values that describe each entity become a major part of the data stored in the database. which is a “Thing” in the real world with an independent existence. (The E-R Diagram is shown at next page) 17 . The basic object that the ER model represents is an entity.
catid catname P_id Discount Category Product id Bill can Purchase id Product Price Produc t name Purchase Purchase date Qty Sub cat id Sub cat name Passwor d Login Total Bill id Date Bill Detail Sub category Login id U name DOB log Address User id User Password User name Bill no Payment Card validity User name amount Card type 18 .
There are several level of DFD are used to describe the flow of information 19 . • A DFD does not represent procedural information. • DFD is a logical design of the flow of information between the modules.DATA FLOW DIAGRAM (DFD) • • • DFD are commonly used during problem analysis. A DFD shows the flow of data through a system. The DFD aims to capture the transformation that take place within the System to the input data so that eventually the out put data is produced. • The DFD shows the interaction of one module with the other module.
Context Level ‘DFD’ Normal Visitor Come To view product list Get information Normal Visitor User / Client Purchase Order Items Manage Information Online shopping & management Delivered To User / Client View All information Administrator Administrator ‘1st’Level’ DFD Query Content User DB Query DB Client User ID & Password Reject Validate-ID & Password Valid ID Save The Contents Confirmation Client 20 .
2nd Level DFD User DB Client ID & Password Rejected Validate ID & Password Valid ID Shopping Mart ID ID Shopping Bag Generate Category DB Select Items To Purchas e ID & Items Generate Pay Slip For Items ID and Category Selected Select Categories For Items ID View Category Available Shopping Bag ID Tax Calculation Detail ID Generate Overall Pay Slip ID & Slip Client Payment Modes Pay Price DB Tax Details DB Client Message To Delivered Payment Accounts Department 21 .
SHOPPING DFD User DB Category DB New Client User ID & Password Message To Validate ID & Password Valid ID Shopping Mart Valid ID View Categories Available ID Select Categories For Items Be Delivered Payment Range Client ID & Item Selected Select Items To Purchase ID & Category Item DB New Client Shopping Bag Necessary information User DB New Client Sign Up Registration Form Valid ID Save Necessary Information Optional Information Save Optional Information Client Reject Submit Confirmation User DB 22 .
so it can stay open for 24 hours a day. Better component design to get better performance. If is being designed for robustness and is written as a complete package so it can be inserted into another application. Security • • Database access permissions for end users read permission only. The PC on which the online shopping & management resides will have its own safety by controlling the physical access. staying open 24 hours a day becomes critical. The server on which the online shopping & management resides will have its own security to prevent unauthorized write/delete access. Password protection provided for every user by generating an automated password. Most of the business data in the world today exists in enterprise servers that can be connected to the Web servers to make this process far more effective.Performance Requirements There are following performance requirements: • • 24x7 availability. The Web Application Server should provide these services. Reliability Any existing Web site that relies on the manual duplication of data from another system is one that can be improved. Availability Because system can be automated process. Secure access of confidential data. System will require to be available 24X7 so UPS support must be on server site for at least 8 hours in case the power failure. while constrained by previous operation. If the base is now the entire world. Web application developers should not spend valuable time worrying about how to maintain sessions within the application. There is no restriction on read access for the legitimate user • • • • Software Quality Attributes The main attribute is ease of use. 23 .
Maintainability Many early Web implementations consisted of static HTML pages. Application should serve dynamic user based customized web pages to its clients from server 24 . An effective system should be largely dynamic taking advantage of technology that automates this process rather than relying on manual processes. This becomes very difficult to manage if the number of pages gets too large.
8 Hz 1. Steps in feasibility analysis. What resources are available for given buyer system? 3. • Prepare and report final project directive to management. It focuses on these major questions: 1.A 25 . Enumerate potential proposed system. Whether it is worth to solve the problem? During feasibility analysis for this project. ability to meet needs and effective use of the resources.G.44MB 104 Key V. Define and identify characteristics of proposed system. “FEASIBILITY STUDY” is a test of system proposal according to its workability. • • • • • Hardware and Software Specification Hardware Requirement Main Processor Hard-disk Capacity RAM Clock Speed Floppy Drive Keyboard Monitor Pentium IV 8 G. following primary areas of interest are to be considered. • Select the best-proposed system.Feasibility Study Depending on the results of the initial investigation the survey is now expanded to a more detailed feasibility study. What are the user’s demonstrable needs and how does a system meet them? 2. Prepare system flowcharts. Determine and evaluate performance and cost effective of each proposed system. • Weight system performance and cost data.B 512 MB 2. Investigation and generating ideas about a new system does this. Eight steps involved in the feasibility analysis are: Form a project team and appoint a project leader. What are the likely impacts of the buyer system on the organization? 4. impact of the organization.
• New product will provide all the benefits of present system with better performance. so that there is no additional cost to be incurred for adding this system to its computers. The backend required for storing other details is also the same database that is Sql Server 2005. It also determines whether it is worth while to invest the money in the proposed project. It will help in the time saving and fast processing and dispersal of user request and applications.Economical Feasibility It looks at the financial aspects of the project. The operating-environment costs are marginal. It determines whether the management has enough resources and budget to invest in the proposed system and the estimated time for the recovery of cost incurred. Hence the organization can implement the new system without any additional expenditure. Operational Feasibility The system will be used if it is developed well then be resistance for users that undetermined • • No major training and new skills are required as it is based on DBMS model. The proposed system is economically feasible because the cost involved in purchasing the hardware and the software are within approachable. The less time involved also helped in its economical feasibility. Economic feasibility is determines by the means of cost benefit analysis. The computers in the organization are highly sophisticated and don’t needs extra components to load the software. Hence. The personal cost like salaries of employees hired are also nominal. it is economically feasible. It was observed that the organization has already using computers for other purpose. 27 . because working in this system need not required a highly qualified professional.
28 . • Faster and systematic processing of buyer application approval. better management and collection of the reports.• • • • Improved information. purchasing. User involvement in the building of present system is sought to keep in mind the user specific requirement and needs. Important information such as pay-slip can be generated at the click of a button. etc. User will have control over there own information. payments. User support. used had greater chances of error due to wrong information entered by mistake.
System Design Database Design Tables Name adminname adminpassword Name dloginname cardnumber cardvalidity cardnumber vccnumber amount Name cart_id productid qty total Type varchar(50) varchar(50) Type varchar(50) varchar(50) varchar(50) varchar(50) varchar(50) varchar(50) Type varchar(50) varchar(50) Numeric(9.2) Null? Allow nulls Allow nulls Null? Allow nulls Allow nulls Allow nulls Allow nulls Allow nulls Allow nulls Null Allow nulls Allow nulls Allow nulls Allow nulls Name cart_id qty loginname date total Name catid catname Type varchar(50) Numeric(9.2) Numeric(9.2) varchar(50) datetime Numeric(9.2) Type varchar(20) varchar(30) Null Primary key Allow nulls Allow nulls Allow nulls Allow nulls Null Primary key Allow nulls 29 .
Name Name Address contactnumber email feedback status Type varchar(50) varchar(50) varchar(50) varchar(50) Varchar(MAX) varchar(MAX) varchar(50) Null Allow nulls Allow nulls Allow nulls Allow nulls Allow nulls Allow nulls Name fname lname dob sex address location dloginname password retypepassword email squestion yanswer Type varchar(50) varchar(50) datetime varchar(50) varchar(50) varchar(50) varchar(50) varchar(50) varchar(50) varchar(50) varchar(50) varchar(50) Null Allow nulls Allow nulls Allow nulls Allow nulls Allow nulls Allow nulls Allow nulls Allow nulls Allow nulls Allow nulls Allow nulls Allow nulls Name imgid imgname imgpath productid Type int varchar(200) varchar(300) varchar(20) Null primary key allow nulls allow nulls foreign key Name product id name price discount subid catid Type varchar(20) varchar(30) varchar(20) varchar(20) varchar(20) varchar(20) Null primary key allow nulls allow nulls allow nulls foreign key foreign key 30 .
2) varchar(50) numerc(9.2) Null allow nulls allow nulls allow nulls 31 .Name name contactno emailed whatproductyouwant Type varchar(50) varchar(50) varchar(50) varchar(50) Null allow nulls allow nulls allow nulls allow nulls Name subid subname catid Type varchar(20) varchar(30) varchar(20) Null Primary key allow nulls Foreign key Name cat_id qty productid price Type int numerc(9.
Module 3: advertise management In the advertise management registered customer are put their brand advertisement to promote their brand so regarding their like payment details and the status of their advertisement are to be managed .Component Level Design There are following modules involved in the Online shopping & management: Module 1: Registration and profile management In this module all the user are required to get registered yourself before purchase anything and profile of The users are saved so in the future company promote their brands. Reports: This module is handled by the admin section. purchasing/carting details about promotions of brands Module 5: feedback In the feedback module feedback are to be stored and viewed by the customer while purchasing so that it is beneficial for customer choose the best among them. Report for new events and news. He can generate the reports such as List of Employees in an Organization. Module 4: administrator management In this module administrator level activities are performed like profiling. . Module 2: cart/bill management In this module customer purchase anything then all the details regarding bill are to be maintained in this module. Module 6: news & events In this module all the current news regarding brands there promotion are displayed. 32 .
C++ and Java. similar o Java programs. C# directly related to C. IIS (Internet Information Services) is Microsoft’s Internet Server. it is compiled into byte code(intermediate language). Enterprise Manager. On the Server. 34 . Programming Language : C# • • C# is purely Object Oriented Language. ASP. Net is a program that runs inside IIS.aspx”. Back End Tool SQL Server 2005 Microsoft Server-2005 is a full featured Relational Database Online Transaction Processing (OLTP) system must be capable of MSSQL Server-2005 has verity of Tools.NET ASP Stands for Active Server Pages.embedded into an HTML page. Query Analyzer SQL Profile Management System (RDBMS). Net file has the file extension “. Net is a technology that allows Programmer to create Dynamic Web Application. Net file can contain HTML. ASP. The Common Language Runtime (CLR) provides a set of services for all ASP. Microsoft ASP. ASP. ASP. Net Languages. XML and scripts. handling thousands of order placed at the same time.NET Framework is an architecture that’s makes it easier to design. The .
and then user testing. These defects have to be identified by testing. Here the System testing involved is the most widely used testing process consisting of five stages as shown in the figure. integration testing.Service Manager Data Transformation Service Books Online Testing Introduction Reviews are human processes . Unit testing Module testing Sub-system testing System testing Acceptance testing 35 . as defects are discovered at any one stage. Hence there will be requirement defects. design defects and coding defects in code. However. the sequence of testing activities is component testing.can not catch all defects. In general. Therefore testing plays a critical role in ensuring quality. All defects remaining from before as well as new ones introduced have to be identified by testing. they require program modifications to correct them and this may require other stages in the testing process to be repeated.
Testing performs a very critical role for quality assurance and for ensuring the reliability of the software. This creates two problems: 1. In adequate testing or non-testing leads to errors that may not appear until months or even years later (Remember the New York three day power failure due to a misplaced ‘Break’ statement). sample data. 36 . The white box testing is also called Glass Box Testing. where a unit will be taken at a time and tested thoroughly at a statement level to find the maximum possible errors. Testing is vital to the success of the system. which is used to check all possible combinations of execution paths through the code at every module level.(Component testing) (Integration testing) (User testing) Testing is the process of detecting errors. 2. I have generated a list of test cases. taking care that every statement in the code is executed at least once. The results of testing are used later on during maintenance also. The time interval effect of the system errors on files and the records on the system. the goal will be successfully achieved. The time lag between the cause and the appearance of the problem. Test Criteria WHITE BOX TESTING This is a unit testing method. I tested step wise every piece of code. System testing makes a logical assumption that if the parts of the system are correct.
A black-box test examines some fundamental aspect of a system with little or no regard for the integral logical structure of the software. Test cases are derived to ensure that all statement in the program control structure.White-box test focuses on the program control structure. Here the module will be treated as a block that will take some input and generate output. Black-box testing techniques focus on the information domain of the software. Test cases are derived to ensure that all statement in the program has been executed at least once during testing and that all logical conditions have been exercised. Test cases are derived to ensure that all statement in the program control structure. makes use of program graphs (or graph matrices) to derive the set of linearly independent test that will ensure coverage. Basis path testing. a white box technique. deriving test cases by partitioning the input and output domain of a program in manner that provides through test coverage. that input is properly produced. Output for a given set of input combinations are forwarded to other modules. Equivalence partitioning divides the input classes of data are likely to exercise specific software function. The black-box test is used to demonstrate that software functions are operational. Black-box test are designed to uncover errors functional requirement without regard to the internal workings of a program. Boundary values analysis probes the program’s ability to handle data at the limits of acceptability. and that the integrity of external information are maintained. Graph based testing methods explore the relationship between and behavior of program objects. 37 . BLACK BOX TESTING This testing method considers a module as a single unit and checks the unit at interface and communication with other modules rather getting into details at statement level. Condition and data flow testing further exercising degrees of complexity.
where the software and other system elements are tested as a whole. Taking another turn outward on spiral. To test computer software. we arrive at system testing. exercising specific paths in module’s control structure to ensure complete coverage and maximum error detection. Initially. 38 . The steps are shown in Figure. concentrates on each unit. we encounter validation testing. component of the software as implemented in source code. Finally. we spiral out along stream lines that broaden the scope of testing with each turn. Testing progresses moving outward along the spiral to integration testing. the name unit testing. where the focus is on designed the construction of the software architecture. Hence.TEST INFORMATION FLOW A strategy for software testing may also be viewed in the context of the spiral. Considering the process from a procedural point of view. Unit testing begins at the vortex of the spiral and. testing within the context of software engineering is actually a series of four steps that are implemented sequentially. Unit testing makes heavy use of white-box testing techniques. ensuring that it functions properly as unit. tests focus on each component individually. where requirements established as part of software requirements analysis are validated against the software that has been constructed.
System Testing Validation Testing Integration Testing Validation testing Code System Security INFORMATION FLOW OF DATA FOR TESTING Design System Engineering Evaluatio n Test Results Error Error Rate Data Software Configuration Testing Expected Results Debug Reliability Model Test Configuration 39 .
Expected Output: The legitimate account should not be logged in Observed Output: Test case passed 4: Submitting the signup form without entering the data Expected Output: The form should not be posted Observed Output: Test case passed 5: After successful signup. the URL (address) is copied and pasted in a new browser. the user trying to login to the system. Expected Output: The user should not be purchased Observed Output: Test case passed 2: Logging in to the system with incorrect username/password. Expected Output: An error should be generated Observed Output: Test case passed 3: After successfully logging in as a legitimate user. the admin ahs not approved the user as yet Expected Output: An error should be generated Observed Output: Test case passed 40 .Predicated Reliability Correction Test Cases: 1: Logging in to the system without entering the username/password.
Expected Output: The legitimate account should not be logged in Observed Output: Test case passed 8: Submitting the signup form without entering the data Expected Output: The form should not be posted Observed Output: Test case passed 41 .6: If incorrect username is entered Expected Output: An error should be generated Observed Output: Test case passed 7: After successfully logging in as a admin. the URL (address) is copied and pasted in a new browser.
The implementation of the web based or LAN based networked project has some extra steps at the time of implementation. Implementation is the process of having systems personnel check out and put new equipment into use. This phase is less creative than system design. Sometimes. or it may be a major modification to an existing system. install the new application and construct any files of data needed to use it. In either case. but improper will prevent it. Installation To install the Offline Counselling Admission System. In still other situations.Implementation System implementation is the stage when the user has thoroughly tested the system and approves all the features provided by the system. systems developers may choose to test the operation in only one area of the firm with only one or two persons. proper implementation is essential to provide a reliable system to meet organizational requirements. Successful implementation may not guarantee improvement in the organization using the new system (that is a design question). We need to configure the system according the requirement of the software. Depending on the size of the organization that will be involved in using the application and the risk involved in its use. The various tests are performed and the system is approved only after all the requirements are met and the user is satisfied. train users. The new system may be totally new. they will run both old and new system in parallel way to com-pare the results. you have to follow following steps: 42 . replacing an existing manual or automated system. system developers stop using the old system one day and start using the new one the next.
These are located at adminlogin. Database Deployment: First create a database “eshop”. login id & password to suit your database. • Modify the resource reference in the deployment descriptor of the project. 2. Now Database is ready to work. Visual Studio 2008 1. Modify the constraints located at product by admin. Import data provided for different tables into tables.NET and C# application client deployment: Modify the connection string.Operating System: Windows XP Software requirements: IIS. ASP. SQL Server 2005. 3. buyer_login. Web Application Deployment: • Add the database as a data source in the IIS application developer. 43 .
The admin just need to type his new id and click Change button. new password. retype new password. View Feedback & Feedback: The admin uses this option to view news and events.User Manual There are following users who can perform the following tasks from the graphical user interphase in a very friendly way: Administrator: The administrator can perform following function in very easy manner: Login: The administrator can login in to the project using the home. Then he can click the Change button. the admin just need to check the checkbox. following the name of the user and click Register button. without it the new users would not be able to login. Change Password: The admin can change his password by clicking Change Password link in the left pane of the my account page. View News & Events: The admin uses this option to view news and events. The admin can view details of user by clicking at the name of the user. In this. The admin can also choose to select all users by clicking the header checkbox. In this. He is just supposed to enter id & password.aspx page. 44 . Change Id: The admin can change his login id using this option. Create News & Events: The admin can use this option to create new news and events. the admin is just supposed to enter his old password. New Users: The admin can use this option to register new users who have just signed in.
there are many chances of reusability of the codes in other environment even in different platforms. The site is made in all possible way to meet the user requirements using latest version of available software and hardware.Choice of Product can be added which will increase the efficiency of the system. this system can handle different databases also other than SQL Server 2005. Future Enhances a) By making some minor changes the system can be put in front of new system. Also its present features can be enhanced by some simple modification in the codes so as to reuse it in the changing scenario. c) By making little modification. will perform better in future. 46 .Future scope and further enhancement of the Project Since this system has been generated by using Object Oriented programming. b) The buyer information like buyer ID. But as user requirements and operating environment keep changing further extensions can be made on this. Mean it can be full information management system.
asp.amazon. Visual Studio 3.com 6. www.naaptol.Bibliography 1. 5.5 Black Book .w3schools 4. Complete Reference C#.com 47 .com 3. www. www. www.Steven Holzner 2.net.
This action might not be possible to undo. Are you sure you want to continue?