This action might not be possible to undo. Are you sure you want to continue?
ONLINE SHOPPING for Department of Computer Applications, CUSAT
Submitted By:MAITREYEE 4th semester,Reg No-95580020 DEPARTMENT OF COMPUTER APPLICATIONS, cusat
This is to certify that the project entitled
--ONLINE-SHOPPING-- submitted to Cochin University of Science and Technology in partial fulfillment of the requirements for the award of the degree of Master of Computer Applications is the bona fide record of the project work
done by ----MAITREYEE-------------------- under our supervision and guidance during ------------------- to -----------------.
Signature of Internal Guide Name and Designation
Signature of External Guide Name and Designation
Head of Department Official Address
The satisfaction and euphoria that accompany the successful completion of any task would be incomplete without mentioning the names of people who made it possible, whose constant guidance and encouragement crowns all efforts with our success. I extend my gratitude to Dr. K.V. Pramod, Head- Department of Computer Applications, Cochin University of Science and Technology, Kochi, Kerala for providing me with excellent infrastructure and awesome environment that laid potentially strong foundation for my professional life. I would like to express my profound thanks to Mr. A. SreeKumar, who guided me through out the project tenure, provided me each and every details, references, and technical helps without which it was impossible to complete this project. I am also thankful to Professor Dr. B. Kannan, and Mrs. S. Malathi for their help and guidance throughout my project future. Finally. I also wish to thank all guest faculties and non-teaching staffs for supporting me during my whole project work.
Title Student’s Name Venue of the Project Duration Platform Application Software Front End Back End : : JSP MYSQL : ONLINE SHOPPING : MAITREYEE : DCA, CUSAT : 4 months : Windows XP/Vista/7
1. Introduction 2. System Study 2.1 2.2 Existing System Drawbacks in the Existing System
3. System Analysis 3.1 Proposed System 3.2 Scope 3.3 Need for the Proposed System 3.4 Feasibility Study 3.4.1 Technical Feasibility 3.4.2 Financial Feasibility 3.4.3 Operational Feasibility 4. Requirement Analysis 4.1 User Class and Characteristics 4.2 Functional Requirements 4.3 Performance Requirements 4.4 Non Functional Requirements 4.5 External Interfaces Requirements 4.6 General Constraints, Assumptions, Dependencies, Guidelines
11.1.1 Architectural Design 5.1. Scope for further development Bibliography 6 .1. Software Quality Assurance Plan 8.3 User Case Diagrams 6.2 Database Tables 5. Conclusion 10. Output Screen Output of Pages 9. Testing 7.5.1 Data Flow Diagrams 5. System Design Specification 5.
Online shopping doesn't permit shoppers to touch products or 7 . she has to drive to the store. They like to touch the merchandise. In fact. For example. software. try on clothing. Books. find a parking place.INTRODUCTION Online shopping is the process whereby consumers directly buy goods. and walk throughout the store until she locates the products she needs. Many people choose to conduct shopping online because of the convenience. Since the emergence of the World Wide Web. household appliances. and health insurance are just some of the hundreds of products consumers can buy from an online store. hardware. and be around other people. Despite the convenience of online shopping. when a person shops at a brick-and-mortar store. Shoppers can visit web stores from the comfort of their homes and shop as they sit in front of the computer. clothing.1. people can purchase just about anything from companies that provide their products online. After finding the items she wants to purchase.Consumers buy a variety of items from online stores. merchants have sought to sell their products to people who surf the Internet. from a seller interactively in real-time without an intermediary service over the internet. services etc. Some people like the idea of physically going to a store and experiencing the shopping process. she may often need to stand in long lines at the cash register. toys. Online shopping is the process of buying goods and services from merchants who sell on the Internet. not everyone chooses to purchase items and services online.
shirts. unlike a store. What's even more useful is the ability to compare items. and waiting some more for a store clerk to finally check out your items. online shopping has friendly customer service representatives available 24 hours a day. you're sure to find what you're looking for on the internet. comparing material quality. and even offers merchandise that's unavailable in stores. Say 'goodbye' to the days when you stood in line waiting.have any social interaction. 7 days a week to assist you with locating. belts and shoes all slung over one arm. online. Online shopping transactions occur instantly-saving you time to get your other errands done! Additionally. If you're searching for a niche product that may not be distributed locally. Online shopping also eliminates the catchy. You can search through multiple stores at the same time. and waiting. purchasing and shipping your merchandise. of other like-minded individuals who seem to have decided to shop on the same day. if not thousands. Shopping via the internet eliminates the need to sift through a store's products with potential buys like pants. yet irritating music. similar or not. It also doesn't allow them to take the merchandise home the same day they buy it. Online shopping allows you to browse through endless possibilities. sizes and pricing simultaneously. 8 . as well as the hundreds.
2. reduced cost and better security. 9 . But It was found to be inefficient in meeting the growing demands of population . begins.1 Existing System: The existing system was an automated system. The sources also vary project proposals originate with department managers. the first systems activity.2. senior executives and systems analysis.SYSTEM STUDY Information systems projects’ originate from many reasons: to achieve greater speed in processing data.1 Drawbacks in the existing systems: Disadvantage of the existing system: Time Consuming Expensive Needed an agent We have to out for that. When the request is made. such as a government agency which stipulates a systems requiremetns the organisattion must meet.1. the preliminary investigation. faster information retrieval. feasibility study and request approval 2. The activity has three parts: request clarification. Sometimes the real origin is an outside source. better accuracy and improved consistency. integration of business areas.
• After buying and making payment the products are send to customers address that he has given. • provide home delivery free of cost. • 3. Depending on the specific setting and locale.1 Purpose: Online shopping tries to enhance access to care and improve the continuity and efficiency of services. • Customer can buy products online after login to the site. • sell at lower rate due to less over head. • Admin can see daily sell and feedback given by customer. 10 . case managers are responsible for a variety of tasks. • Administrator can edit or delete the products from the database.SYSTEM ANALYSIS . • No wait to see the products if someone else is taking that. • Administrator is adding product to database. • Both admin and customer can see the delivery report. • This system is all about the converting the shopping • system from manual to online. • Customer can write feedback for the product or services.without having to step out of the door. • Administrator is adding the delivery report to the database.3. ranging from linking clients to services to actually providing intensive shopping and delivery services themselves Main objective • To shop wile in the comfort of your own home .
and technical expertise in computer field but it will be of good use if the user has the good knowledge of how to operate a computer.4 Feasibility study: A feasibility study is a short. and large shopping complex and shopping malls. which aims to answer a number of questions: 11 . so that any unauthorized users can not use your account. experience. focused study.3 Need for the proposed system: The online shopping (HOME SHOP) is an easy to maintain. ready to run. Features and Benefits: Providing security Low cost Basic computer knowledge required Configurable and extensible application UI design The proposed system can be used even by the naïve users and it does not require any educational level. affordable and reliable cost saving tool from Software Associates suited for small. scalable. medium. Online shopping Internet software developed on and for the Windows and later versions environments and Linux OS.3. 3. The only Authorized that will have proper access authority can access the software. This project also provides security with the use of Login-id and Password.2 Scope: This product has great future scope. 3.
schedule)? 3. 12 . such as problems.3 Operational Feasibility: Define the urgency of the problem and the acceptability of any solution. Does the system contribute to the overall objectives of the organizations? Can the system be implemented using current technology and within given cost and schedule constrains? Can the system be integrated with systems which are already in place? 3.e. if the system is developed.. given resource constraints? Are the benefits that will accrue from the new system worth the costs? What are the savings that will result from the system.4.4. including tangible and intangible ones? What are the development and operational costs? 3. manager resistance. budget. objections. will it be used? Includes people-oriented manpower and social labour issues: internal issues.1 Technical Feasibility: Is the project feasibility within the limits of current technology? Does the technology exist at all? Is it available within given resource constraints (i.2 Financial Feasibility: Is the project possible.4.
It serves as reference tool for system maintainers. It is easy to change. social acceptability. 13 . It should set out what the system should do without specifying how it should be done. The software specification document satisfies the following:1 2 3 4 5 6 It specifies the external system behaviors. It specifies constraints on the implementation. This requirement document includes the requirements definition and the requirement specification. The requirement set out in this document is complete and consistent. The Software requirement specification (SRS) is the official statement of what is required of the system developers. legal also external and issues. It record forethought about the life cycle of the system. SYSTEM REQUIREMENTS SPECIFICATIONS System requirements are expressed in a software requirement document. The software requirement document is not a design document. It characterizes acceptable response to undesired events. conflicts and policies.organizational including regulations. aspects government 4.
4. Administrator can see the daily sell.and provide services to the customer. Administrator maintaining the deliveries. Customer can also write feedbacks for products and services 3. Administrators can add. 14 .General public 2. Customers 3. 4.2 Functional Requirements: The System must provide following functionalities— Keeping records of admission of customers. Customers are using for viewing and buying the products. Can also see the the feedback given by the customer.Administrator 1. General public can use the system to see the product. keeping the records of products. 2. General user can not buy the products.their prices and quantity available.1 User Class and Characteristics: There are 3 types of user of this software- 1.edit & delete products.
3 Performance Requirements: In order to maintain an acceptable speed at maximum number of uploads allowed from a particular customer will be any number of users can access the system at any time. Secure access of confidential data (customer’s details). Also connections to the servers will be based on the criteria of attributes of the user like his location. ii). 15 . keeping details about the product it is delivered or not. Storing the feedback given by the customer. and server will be working whole 24X 7 times. Storing the items selected by the customer in the temporary storage. 4. keeping the daily sell . 4. 24 X 7 availability. etc.4 Non Functional Requirements: Following Non-functional requirements will be there in the Insurance on internet: i).
The user will get 2 pages 1. Various other Non-functional requirements are: 1. Flexible service based architecture will be highly desirable for future extension Non functional requirements constraints It arise through user needs.1 User Interface: User of the system will be provided with the Graphical user interface. there is no command line interface for any functions of the product. iv). 7. 3. privacy registration and so on.5 External Interface Requirements: 4. because of budget constraints or organizational policies. Better component design to get better performance at peak time.5. 2. Security Reliability Maintainability Portability Extensibility Reusability Application Affinity/Compatibility Resource Utilization define system properties and 4. 6. 5. or due to the external factors such as safety regulations.iii). 8. Login page followed by Password 16 . 4.
5. Communication channels Sender Receiver 4. Dependencies. 20 GB or above.5.6. 17 .5. Linux OS which supports networking. Guidelines: 4.6 General Constraints.1 General Constraints The interface will be in English only. Assumptions. JAVA development tool kit 4. RAM: HD: NIC: 128 MB or above. 2.4 Communication Interfaces The two parties should be connected through either by LAN or WAN for the communication. The system is working for single server.4.Pentium I or above. For each party 4.2 Hardware Interface: Hardware requirements for Insurance on internet will be same for both the parties which are follows: Processor: . Operating System: Windows XP/vista/7 or later version.3 Software Interface:Software required to make working of product is:1.
18 . Assumptions: User must be trained for basic computer functionalities.8 kbps in order to support message transfer in reasonable time. at a minimum 28.There is no maintainability or backup so availability will get affected. The speed of the communication channel (if any) must be. User must have the basic knowledge of English The system must be able to respond to database software within reasonable time. 4.2 Assumptions and Dependencies The product does require back-end database server MySQL for storing the username and password for different types of user of the system as well as various databases regarding various insurance information. GUI features available. Front-end (user interaction): The product will require a computer with an application program or with any other application program and an communication channel.6. The system is a single user system.
A DFD is a network that describes the flow of data and the processes that change. information-oriented and process-oriented systems flowcharts. So it is the starting point of the design phase that functionality decomposes the requirement specifications down to the lowest level of detail.5. this lead to modular design. It is also known as ‘bubble chart’. 19 . data throughout a system. or transform. or in association with. It has the purpose of clarifying system requirements and identifying major transformations that will become programs in system design. A DFD describes what data flow (logical) rather than how they are processed. so it does not depend on hardware.1 ARCHITECTURAL DESIGN 5.1 DATA FLOW DIAGRAMS: Data flow diagrams (DFD) was first developed by LARRY CONSTANTINE as way representing system requirements in a graphical form. data structure or file organization. A Data Flow Diagrams is a structured analysis and design tool that can be used for flowcharting in place of. software. This network is constructed by using a set of symbols that do not imply a physical implementation. SYSTEM DESIGN SPECIFICATION 5.1.
The symbols used to prepare DFD do not imply a physical implementation. The principle processes that take place at nodes are: 20 . usually circles. A directed line represents the flow of data that is data stream. The four basic symbols used to construct data flow diagrams are shown below: A rectangle represents a data source or destination. An open-ended rectangle represents data storage. These are symbols that represent data flows. which are called nodes. The points at which data are transformed are represented by enclosed figures. An enclosed figure. represent a process that transforms data streams. data transformations and data storage. usually a circle or an oval bubble. For these reasons DFDs are often referred to as logical data flow diagrams. a DFD can be considered to an abstract of the logic of an information-oriented or a process-oriented system flow-chart. data sources.
1. SERVER DATA BASE REQUESTS DATA ST BASE CAD(CONTEXT ANALYSIS DIAGRAM) ADMIN ONLINE SHOPPING CUSTOMER 21 .user use customer user REQUEST DATA ST BASE ADMIN. combining data streams 2. modifying data streams. splitting data streams 3. Gen.
1 LEVEL DFD FOR ADMIN LOGIN TABLE ADMIN ID &PASSWORD REJECTED IF NOT MACHED LOGIN VIEW CUSTOMER DETAIL CUSTOMER DETAILS ADD PROD UCTS USER TABLE ADD &VIEW DELIVERY REPORT EDIT PROD UCTS VIEW DAILY SELL DELETE PROD UCTS VIEW FEED BACK DELIVERY DETAILS STORE TABLE PRODUCT DETAILS SELL TABLE FEEDBACK 1 LEVEL DFD FOR CUSTOMER LOGIN TABLE CUSTOMER ID &PASSWORD REJECTED IF NOT MACHED LOGIN VIEW DELIVERY REPORT BUY PROD UCTS SEE SELECT ED ITEMS DELIVERY DETAILS MAKE PAYMENT ADD FEED BACK STORE TABLE PRODUCT TABLE TEMP TABLE ACCOUNT TABLE FEEDBACK 22 .
ER DIAGRAM prod_name prod_id price quantity product Buy product phone no user_name user_id dob make payment Sex Customer details email_id Address write feedback account STORE feedback ORDER_NO acc no pin no bank name feedback type coment feedbac k REPORT 23 .
privacy. To design and store data to the needed forms database tables are prepared. Foreign key: . There are also some specific objectives like controlled redundancy from failure. inexpensive and flexible for the user. 2. A collection of relative records make up a table.1.5. The general objective is to make information access easy. Two essential settings for a database are: Primary key: . quick. security and performance.The field that is unique for all the record occurrences. 24 . Normalization is a technique to avoid redundancy in the tables.The field used to set relation between tables. DATABASE DESIGN: A database design is a collection of stored data organized in such a way that the data requirements are satisfied by the database.
DATA BASE TABLE DESIGN: Category table Column name Cat_id Cat_name Data type int Char(20) Key constraint Primary key not null Not null PRODUCT TABLE Column name Prod_id Data type Int Key constraints extra Primary key not null Auto_increment Cat_id Prod_name Prod_descp Price Available Add_date int Char(20) Char(40) double int date Foriegn key Not null Not null null Not null Not null Not null 25 .
Admin Login table Column name User_id password Data type int Char(20) Key constraint Primary key not null Not null Login table Column name User_id password Data type int Char(20) Key constraint Primary key not null Not null 26 .
Store table Column name Order_no report Data type int Char(20) Key constraint Primary key not null null Temp table Column name Prod_id Prod_name Price Items User_id Purchage_date Order_no Data type int Char(20) Double Int Int Date Int Key constraint Foriegn key not null Not null Not null Not null Not null Not null null 27 .
User table Column name User_id Password User_name sex Address Date_of_birth Date_of_registe r Phone_no email Data type int Char(20) Char(20) Char(6) Char(40) date date Char(10) Char(30) Key constraint primary key not null Not null Not null Not null Not null Not null Not null Not null Not null extra Auto_increment Feedback table Column name User_id type feedback comment Feedback_date Data type int Char(10) Char(10) Varchar(40) date Key constraint not null Not null Not null null Not null 28 .
Account table Column name Bank_name Account_no password balance Data type Char(20) Char(20) Char(20) double Key constraint not null not null Not null Not null Sell table Column name Prod_id Prod_name price items User_id Purchage_date Order_no Data type Int Char(20) Double Int Int Date int Key constraint not null not null Not null Not null Not null Not null Not null 29 .
3 USER CASE DIAGRAM: User case diagrams are used to model the functional interaction between users and system.5. Login Validate User Request to the User1 system Perform next task Information Logout User2 (User Case Diagram) 30 .1.
TESTING Software Testing is an empirical investigation conducted to provide stakeholders with information about the quality of the product or service under test. can be implemented at any time in the development process. but are not limited to.6. independent view of the software to allow the business to appreciate and understand the risks at implementation of the software. with respect to the context in which it is intended to operate. however the most test effort is employed after the requirements have been defined and coding process has been completed. Software Testing also provides an objective. depending on the testing method employed. Test techniques include. so that it works as expected and can be implemented with the same characteristics. 31 . It can also be stated as the process of validating and verifying that a software program/application/product meets the business and technical requirements that guided its design and development. Software Testing. the process of executing a program or application with the intent of finding software bugs.
1 Unit Testing: The primary goal of unit testing is to take the smallest piece of testable software in the application. 32 . etc.. and determine whether it behaves exactly as you expect. isolate it from the remainder of the code. A unit is the smallest testable part of an application. Unit tests are typically written and run by software developers to ensure that code meets its design and behaves as intended. each test case is independent from the others: substitutes like method stubs. Its implementation can vary from being very manual (pencil and paper) to being formalized as part of build automation. fakes and test harnesses can be used to assist testing a module in isolation. Unit testing has proven its value in that a large percentage of defects are identified during its use. In procedural programming a unit may be an individual program.6. which may belong to a base/super class. the smallest unit is a class. procedure. Unit testing is a software verification and validation method where the programmer gains confidence that individual units of source code are fit for use. Ideally. while in object-oriented programming. abstract class or derived/child class. mock objects. Each unit is tested separately before integrating them into modules to test the interfaces between modules. function.
Integration testing is a component of Extreme Programming (XP). followed by tests of progressively higher-level combinations of units called modules or builds. In this context. There are two major ways of carrying out an integration test. a pragmatic method of software development that takes a meticulous approach to building a product by means of continual testing and revision. also known as integration and testing (I&T). followed by top-down testing. 33 . Bottom-up integration testing begins with unit testing. the highest-level modules are tested first and progressively lower-level modules are tested after that.6. In top-down integration testing. bottom-up testing is usually done first. a unit is defined as the smallest testable part of an application. Integration testing can expose problems with the interfaces among program components before trouble occurs in real-world program execution.2 Integration Testing Integration testing. In a comprehensive software development environment. called the bottom-up method and the top-down method. is a software development process which program units are combined and tested as groups in multiple ways.
The software is released to groups of people so that further testing can ensure the product has few faults or bugs. known as beta version. testing focuses on user visible actions and user recognizable output from the system. Versions of the software. are released to a limited audience outside of the programming team. Intention of this testing is to find out defects related to bad design or bad implementation of the system. beta versions are made available to the open public to increase the feedback field to a maximal number of future users Gray box testing Grey box testing is the combination of black box and white box testing. Two types of validation testing Alpha testing is simulated or actual operational testing by potential users/customers or an independent test team at the developers' site. before the software goes to beta testing. Validations testing is said to be successful when software functions in a manner that can be reasonably expected by the customer.6. Sometimes.3 Validation testing : At the validation level. Alpha testing is often employed for off-the-shelf software as a form of internal acceptance testing.it is used for web application 34 . Beta testing comes after alpha testing.
Configuration Management 8. the standards against which the development work is to be measured. practices and conventions 6. techniques and methodologies 10.7. Scope and Overview: 35 . Reviews and Audits 7. Documentation 5. and the procedures and organizational structure. Reference documents 3. Problem reporting and corrective action 9.Software Quality Assurance Plan Each development and maintenance project should have a Software Quality Assurance Plan that specifies its goals. 1. Purpose 2.Media Control 12. maintenance and retention. the SQA tasks to be performed. The IEEE Standards for the Software Quality Assurance Plans states that the plan should contain the following sections: 1.Code Control 11. Management 4.Records collection.Supplier Control 13. Purpose. Standards. Tools.
3. It is important that the head of the Software Quality Assurance (SQA) function in the organization has the adequate 36 . The ONLINE SHOPPING Software Quality Assurance plan provides the framework necessary to ensure a consistent approach to software quality assurance throughout the project life cycle. and software related groups that include Software Configuration Management (SCM). and responsibilities required to implement effective quality assurance functions for the ONLINE SHOPPING. the project’s software engineering group. It will show that the SQA group has a reporting channel to senior management that is independent of the project manager. Reference documents: a. Principles and Practice: Nina S Godbole. their hierarchy etc. and Logistics. Management: An IEEE standard lays down three aspects that should be covered in the Software Quality Assurance Plan: Organization: The organization section includes the roles of the team members. System and Software Test. Specifically. processes. this SQA Plan will show that the SQA function is in place for this project. The goal of the SQA program is to verify that all software and documentation to be delivered meet all technical requirements. 2.The purpose of this Software Quality Assurance (SQA) Plan is to establish the goals. This plan establishes the SQA activities performed throughout the life cycle of the ONLINE SHOPPING. Software Quality Assurance.
2. f). e). System Engineering is responsible for: Implementing the engineering practices. Identifying the quality factors to be implemented in the system and software. c). Identifying. Software Design/Development is responsible for:: Identifying. developing and maintaining planning documents Such as the Program Management Plan. and procedures as defined in program/project planning documents. Resolving and following-up on any quality issues raised by SQA. Program Management/Line Management (Sponsor) is responsible for the following items: 1. Software Test is responsible for: Verifying. processes. implementing. b). and evaluating the quality factors to be implemented in the software. Implementing the software test practices. Project Management is responsible for: 1. Identifying an individual or group independent from the Project to audit and report on the project’s SQA function. processes.authority to be able to perform independent verification that the processes are adhered to. a). 2. The following describes the functional groups that influence and control software quality. System Test is responsible for: 37 . and procedures as defined in program/project planning documents. d).
Verifying the quality factors are implemented in the system (software and hardware). Independent Verification and Validation (IV& V) is responsible for: Implementing the practices. processes. processes. 2. Maintaining the SQA Process. Logistics is responsible for: 1. One or more SQA tasks can be performed concurrently until a task is completed. and procedures as defined for IV&V in program/project planning documents. Systems Engineering Process Office (SEPO) is responsible for: 1. j). Implementing the quality program in accord ONLINE SHOPPING assurance with this SQA Plan. Ensuring SQA training availability. The following are the tasks of SQA plan: 38 . Providing assistance in software process engineering and software process improvement. and procedures as defined in reference and other program/project planning documents. Reviewing and commenting on the “” SQA Plan. i). g). 2. a) Tasks: An SQA task is performed in relationship to what software development activities are taking place. Software Configuration Management (SCM) is responsible for: Implementing the SCM practices. 3. h).
Approve the plan of the audits for the project which are to be carried out by quality personnel. The quality manager will: Define the responsibilities of quality personnel in the form of quality assurance procedures applicable to the project. Review the activities performed by project personnel to ensure that the requirements of the quality plan and quality procedures are being satisfied. Agree to the quality plan with the project manager. Evaluate System Requirements Analysis Process Evaluate System Design Process Evaluate Software Requirements Analysis Process Evaluate Software Design Process Evaluate Software Tools Evaluate Software Implementation and Unit Testing Process Evaluate End-item delivery Process Evaluate Configuration Management Process b) Responsiblities: The project manager and design/development teams have primary responsibility for the quality controls applied during the development of the software project. 39 . Resolve any disagreement between the project manager and quality personnel on matters relating to quality.
Documentation: The basic purpose of the documentation section of the Software Quality Assurance Plan is to describe the documentation to be produced and how it is to be reviewed. practices and conventions: 40 . The documentation section normally includes the following: Software Requirements Specification (SRS) Software Design Description Software Verification Plan Software Verification report Reference to Software Standards (ISO. Standards. Evaluate defect trends and take appropriate action. non-conformities found and ensure that corrective action is taken. 5. operators and programmers manual Configuration Management Plan Software Quality Objectives. IEEE etc) and procedures mentioned and defined as in the Quality Manual and Quality Management System User guides. 4. Agree on corrective action with the project manager for any discrepancies.Quality personnel will: Carry out planned internal audits of the project to assess compliance with quality objectives. CMM.
41 . every individual assigned to the project will participate in quality assurance. This section describes the procedures used by SQA to verify that the quality assurance provisions of this SQA Plan and applicable standards. SQA milestone dates (completed) b. The ANSI standard suggests that the following would be a minimum set of reviews: Software Requirements Specification Review: This review is held to approve the document defining the software requirements specifications and it aims to check the adequacy of the requirements. SQA funds expended (planned) 6. SQA effort expended (planned) e. Primary Design Review: The purpose of this review is to approve formally. practices. and metrics are met. high-quality product. SQA effort expended (actual) f. Reviews and Audits: The review and audits sections of Software Quality Assurance Plan will state which technical and managerial reviews will be undertaken and how they will be carried out. The following measurements will be made and used to determine the cost and schedule status of the SQA activities: SQA milestone dates (planned) a.To verify the delivery of a fully conforming. SQA work scheduled (planned) c. the software top-level design document. SQA work completed (actual) d. conventions.
Physical Audit: This is held to verify that the software and its documentation are internally consistent prior to delivery to the user. 7. Software Verification Review: The purpose of this review is to approve the test plan. In-Process Audit: In-Process audits of a sample design are held to verify the consistency of the design. It should be a closed-loop system. 42 . Functional Audit: This is held to verify that all the requirements in the software requirements specification have been met. All the problems should be promptly reported at appropriate level. and configuration auditing. acted upon and resolved. configuration status accounting. It is the evaluation of the adequacy and completeness of the methods described. configuration control. Critical Design Review: The purpose of this review is to approve the software detailed design document as a basis for further development work. Problem reporting and corrective action: This section of the Software Quality Assurance plan describes the system. which ensures that software problems are documented and resolved. Configuration Management: This Configuration Management section of the Software Quality Assurance Plan covers configuration identification. 8. Each problem should be analyzed to determine its significance and causes and classified by category and each problem must have severity level and a priority number.
checklists. 9. performance monitors. statistical analysis packages. requirements and design verification.SQA software tools include. software development folder/files. labeling.For each problem. The corrective action taken will be evaluated to ensure that it solved the problem without introducing any new problems. simulators. operating system utilities. Management should monitor the status of all unresolved problems. documentation aids. 10. reliability measurements and assessments. and cataloging the software to be controlled Identifying the physical location of the software under control Identifying the location. Techniques . file comparators. some corrective action and a target completion date should be identified.methodologies are an integrated set of the above tools and techniques. The appropriate level of management should be made aware of the problems and adverse trends.techniques include review of the use of standards. test case generators. Methodologies . standards auditors. and information engineering CASE tools. structuring preprocessors. Code Control: Code control includes the items listed below: Identifying. structure analyzers. requirements tracing. but are not limited to. debugging aids. and use of backup copies 43 . software traceability matrices. code analyzers. static or dynamic test tools. software inspections. techniques and methodologies: Tools . maintenance. Tools. and rigorous or formal logic analysis. test drivers. The methodologies should be well documented for accomplishing the task or activity and provide a description of the process to be used. execution analyzers.
11. Media Control: The Media Control section of the Software Quality Assurance Plan will describe how the media are to be protected from unauthorized access or damage. 44 . Security threats to a software project come from the following environmental factors: Fire Damage Water Damage Energy Variations Structural Damage Pollution Unauthorized Intrusion Viruses and Worms Misuse of Software. SQA and project members will define and provide complete requirements to the supplier/vendor. Supplier Control: Prior to any purchase of software to support the development effort. The Software Tool Evaluation Process will be followed. and software product upgrades. 12. handling of user questions and problems. Distributing copies of the code Identifying the documentation that is affected by a change Establishing a new version Regulating user access to the code. Data and Services. Part of the evaluation process will require the supplier or vendor to describe their technical support.
maintenance and retention: SQA activities are documented by records and reports that provide a history of product quality throughout the software life cycle.13. SCREEN SHOTS 45 . Measurement data collected will be reviewed for trends and process improvement. All SQA records will be collected and maintained in the SDL or archival storage for the life cycle of the product. 8. Records collection.
HOME PAGE USER PAGE 46 .
LOGIN PAGE 47 .
ADMINSTRATOR PAGE ADMINSTRATOR login 48 .
REGISTRATION PAGE 49 .
CUSTOMER DETAILS PRODUCT PAGE 50 .
delivery report FEEDBACK PAGE 51 .
Currently the system works for limited number of administrators to work. 52 . Most of the have mark and the requirements which have been remaining. FUTURE SCOPE OF PROJECT The project made here is just to ensure that this product could be valid in today real challenging world.9. Here all the facilities are made and tested. can be completed with a 10. CONCLUSION This requirements short extension. In near future it will be extended for many types of insurance policies so that efficiency can be improved. is to been conclude fulfilled that up the to project the that I undertook was worked upon with a sincere effort.
THANK U 54 .
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue reading from where you left off, or restart the preview.