Table of Contents Abstract E-Classified is a web application which is dealing with various advertisement submitted by the admin of the

website or by the customers. There are two types of customers here one who is the owner and the second who wants the details or the guest. The owner has to register the information into the site and after becoming a member he/she can post the advertisements in the site. The advertisement can also be posted by the admin of the website. The advertisement has various category such as Rental, Used Vehicle, News Paper, Hotels, Tourism, Books, Entertainment, Movies, Shopping, Electronics etc. All the item information has to register, the guest can open the site and view all the ads and can also request for each item. The guest can also send a feedback to the admin of the site and also send feedback to the owner of the item. If any item he/she wants to purchase guest can also purchase online or can order. Customer can also search for the job and apply online. They can choose any course and send a request to the institutions for learning or can apply for online examination. All can be done by browsing from a single website and staying in one room.

Introduction(Requirements Gathering) 1.1. Purpose E-Classified is a web application which is dealing with various

advertisement submitted by the admin of the website or by the customers. There are two types of customers here one who is the owner and the second who wants the details or the guest. The owner has to register the information into the site and after becoming a member he/she can post the advertisements in the site. The advertisement can also be posted by the admin of the website. The advertisement has various category such as Rental, Used Vehicle, News Paper, Hotels, Tourism, Books, Entertainment, Movies, Shopping, Electronics etc. All the item information has to register, the guest can open the site and view all the ads and can also request for each item. The guest can also send a feedback to the admin of the site and also send feedback to the owner of the item. If any item he/she wants to purchase guest can also purchase online or can order. Customer can also search for the job and apply online. They can choose any course and send a request to the institutions for learning or can apply for online examination.

2.2 Scope It is very difficult to the user to find out the details of the item at what time they require in the city. This classified contains all details regarding all types of advertisement from real estate to matrimony and from news paper to news channels. With a short period of time we can fulfill all our requirements and can buy or purchase the products.

We can also post our ads and can purchase the existing or we can search for any item. This site also includes the coaching classes, jobs, loan/finance.

2.3 Goals The main aim of this project was to make online business and to make customers easy puschase or buy. This project is useful to customers when he was busy and want to purchase any classifieds though online. This project is benefit to owner so that his project is advertised globally. The Admin can have Benefit so that he can earn easily without strain.

2.4 Features of ur project ( Advantages)


y y y y y

y y y

Retain more visitors ,Interest, traffic and adds more interaction to the website Creates new potential revenue streams Provides automated way to allow users to develop content for your site Allows quicker time to market Delivers advanced technical capabilities Delivers cost savings associated with end-to-end automated web-based processes Requires no commissions or ad revenue sharing fees Scales to millions of classified ads Provides immediate access to products with years of research and development experience.


3.1. Existing system y The classification is made with news paper. So, in different news paper different ads are coming. The owners getting confuse where to give their ads. So, the customers loose the opportunity. y Coming to website also various website are there to display the classified but all are having separate category. y Owners/Organisation can·t register their self to the site and post their advertisement. y Owners/Organisation can·t get the response from the customers

3.2. Proposed system y A single website used for customer, admin and the

Organisation or Owner of the item. y A healthy relationship between all the different users y Customer can select any product and purchase online. y Customer can search for the job vacancy and apply for job. y Customer can select any course and apply for online examination.

y A single website contain all different category so, by staying in a single room we ¶ll get all information.

3.3Overall description 3.3.1Product Perspective: E-Classified is a web application which is dealing with various advertisement submitted by the admin of the website or by the customers. There are two types of customers here one who is the owner and the second who wants the details or the guest. The owner has to register the information into the site and after becoming a member he/she can post the advertisements in the site. The advertisement can also be posted by the admin of the website. 3.3.2 Product Features: o Add Classified o Buy/Purchase o Search for Item o Post Ads o Make Payment 3.3.3 User Classes and Characteristics: E-Classified makes it possible that all the customer of the site can search for any ad and can get the information with in a short period of time without wasting the time on different websites. The website has many users such as admin, owner and customers.

Also I¶ll be learning clearly about Software Development Life Cycle. 3.3. JSP and Servlets are used as Scripting languages. Tomcat 6. Oracle and Web for all which I need to fetch knowledge on all of them in order to code for the project.4 Operating Environment: Software Requirements are Windows as Operating System. Javascript. Administrator should have all the rights to remove or add anything. Every member should have their user id and password. admin and users can get the information of accounts. HTML. 3.3. 128MB+ of main memory (RAM) and 100MB hard disk and data base memory. HTML. Orale is used as Database Sever. JSP. 3.6 Assumptions and Dependencies: This software is to be used in a server so that the all members. Low End users should not be able to access the accounts of other users. Java. CSS. Servlets. Each user should be visible to the Administrator.5 Design and Implementation Constraints: This project will be developed using the technologies like Java.0 server is the Web server. Hardware Requirements are P2 or a better processor.3.3. Cascading Style Sheets and JavaScript as Front-End designing tools.4 Modules & Functionalities Admin y Add the New Ads .

y Modify the Ads y Delete the Ads y Register Owner Owner y Register Ads y Modify the Ads y Delete the Ads y View Customer Request y Collect Payment Customer y Search Ads y Request an Item y Edit Profile Transaction y Buy/Purchase Product y Book Ticket y Reservation Admin In this module the admin will response for the request from owner for adding classifieds and post Ads to the Customers. Owner . Delete the classifieds which are bought. Payment from the customer will be taken from customer and gives to the owner on percentage discussed.

5. Transaction In this module customer buy or purchase the classifieds.5.1 TECHNICAL FEASIBILITY: To determine whether the proposed system is technically feasible. This places a constant are approval of any project.In this module the owner keeps request to the admin for account and for post Ads for classifieds. Feasibility Study The next step in analysis is to verify the feasibility of the proposed system. Feasibility has applied to E.books the ticket. . 3. But in reality both resources and time are scarce. Project should confirm to time bounce and should be optimal in there consumption of resources. All projects are feasible given unlimited resources and infinite time . Customer In this module customer will select the Classifieds and put request for admin to buy and pays money in online.For reservation will be available here.Takes the Percentage discussed from Admin.Classified pertains to the following areas: y Technical feasibility y Operational feasibility y Economical feasibility 3. we should take into consideration the technical issues involved behind the system.

which are very basic requirements and can be afforded by any organization hence it doesn t incur additional economic overheads.3 ECONOMIC FEASIBILITY To decide whether a project is economically feasible. The worldwithout the web is incomprehensible today. .Classified is computer based.2 OPERATIONAL FEASIBILITY: To determine the operational feasibility of the system we should take into consideration the awareness level of the users. 3. we have to consider various factors as: y Cost benefit analysis y Long-term returns y Maintenance costs The proposed E. This system is operational feasible since the users are familiar with the technologies and hence there is no need to gear up the personnel to use system. That goes to proposed system is technically feasible.E. It requires average computing capabilities and access to internet. 3.5. which renders the system economically feasible. which is rampantly employed these days worldwide.5. Also the system is very friendly and to use.Classified uses theweb technologies.

HTML for creating the web pages. SOFTWARE REQUIREMENT SPECIFICATIONS 4. using GUI for login screens and interacting with database.2 Hardware interfaces Server: 1GB RAM 40GB Hard disk 3GHz Processor Client: 128MB RAM 2GHz Processor 20GB Hard disk 4. JSP¶s and servlets for coding the project. We need a good operating environment such as Windows XP.0. 4.4.3 Communications interfaces An Internet connection with a minimum bandwidth of 128 kbps is preferable so that the communication is performed at ease between the user and the mail server . Linux etc. MSAccess is used for creating the local and global database (server).1 Software interfaces We use JAVA. Net Beans IDE for writing the programs.

y Remote Method Invocation. However. which provides a new way for your programs to interface with code libraries written in other languages. a server could dynamically construct a page by creating a separate process to handle each client request.CGI allowed the separate process to read data from HTTP request and write data to the HTTP response. Here is a list of the important features added by 1.1. y Serialization.1. 1. objects to invoke the methods of another Java object that located on a different machine. .5. y The Java Native Interface (JNI).1. which allows you to save and restore the state of an object.1 Features added by Java 1.1. The process would open connection to one or more databases in order to obtain the necessary information.1 added some important elements to Java.1.1. It communicated with the web server via an interface known as the Common Gateway Interface (CGI) . A variety of different languages were used to build CGI programs including C.1. a few new language features were also included. databases from many different vendors. Languages of implementation. y Java Database Connectivity (JDBC).1: y Java Beans. which allows programs to access SQL.0. This is an important facility for building distributed applications. which allows a Java. INTRODUCTION TO JAVA: In the early days of the web. which are software components that are written in Java. Most of the addition occurred in the Java library.1 Version1. C++ and Perl.

which is a process of determining the fields. messages digests.1. y Swing is a set of user interface components that is implemented entirely in java You can use a look and feel that is either specific to a particular operating system or uniform across operating systems. java 2.0 adds many important new features.1.1.1. y Significant changes to event handling that improve the way in which events generated by graphical user interface (GUI) components are handled.1. y Built in support for 16-bit character streams that handle Unicode characters. 1. such as digital signatures.1.1. You can also design your own look and feel. which allow one class to be defined within another.1. Here is a partial list.0 Building upon 1. y Various security features.2 Features added by java 2. y Inner classes. and access control lists and key generation. .y Reflection. constructors and methods of a java object at run time.

Java 2. y Many browsers include a Java Virtual Machine that is used to execute applets. Unfortunately.0 provides several types of collection. y Text components can now receive Japanese. y Digital certificates provide mechanism to establish the identity of a user. dynamic arrays and hash tables for use. Collections offer a new way to solve several common-programming problems. A Just-InTime (JIT) compiler is included in JDK. You may think of them as electronic passports.0 includes an ORB and an IDL to java compiler. such as linked lists. y The Common Object request Broker Architecture (CORBA) defines an Object request Broker (ORB) and an Interface Definition Language (IDL). The latter generates code from an IDL specification. y Performance improvements have been made in several areas.y Collections are group of objects. Java programs can parse and use certificates to enforce security policies. browsers JVM s typically do not include the latest . Chinese and Korean characters from keyboard. Java 2. Using a sequence of keystrokes to represent one character does this.

It directs a browser s JVM . Java s Magic: The Byte Code: The key that allows java to solve both the security and the portability problems just described is that.It is easier to run them in wide variety of environments. Java and Javadoc have been enhanced. The java Plug-in solves this problem. it is Byte Code. However. Only the java runtime system needs to be implemented for each platform. Debugger and Profiler interfaces for the JVM arte available. Byte Code is a highly optimized set of instructions designed to be executed by virtual machine that the java Run-time system features. Various tools such as Javac. Because java programs are interpreted rather than compiled . the output of the java compiler is not an executable code. . the fact that a java program is interpreted helps solve the major problems associated with downloading the program over the Internet.The JRE is a subset of the JDK. Here is why java was designed to be interpreted language. Rather.It does not include the tools and classes that are used in a development environment.

Although the fundamentals that necessitated the invention of java are portability and security. the portability and safety would still apply. because the run time system would still be in change of the execution environment.Once the runtime package exists for a given system any java program can run on it. However. even if dynamic compilation were applied to Byte Code. If java were a compiled language then different versions of the same program will have to exist for each type of CPU connected to the Internet. The java in the following list of buzzwords summed up the key considerations. there are other factors that played an important role on molding the final form of the language. there is technically nothing about java that prevents on the fly compilation of Byte Code into native code. Thus interpretation is the easiest way to create truly portable programs. y Simple y Portable y Object-oriented y Robust y Multithreaded y Architectural-neutral y High performance . The Java Buzz Words: No discussion of the genesis of java is complete without a look at the java buzzwords. Although java was designed to be interpreted.

and the computer carries them out.1. In order appreciate what OOP does.y Distributed y Dynamic 1. A program in a procedural language is a list of instructions.1.1 PROCEDURAL LANGUAGES The procedural languages include Pascal. C. OBJECT ORIENTED PROGRAMMING AND JAVA Object-oriented Programming was developed 1. and some other similar languages. FORTRAN. Each statement in these languages tells the computer to perform some operation.3. we need to understand the limitations present in the traditional programming.3 because of limitations found in earlier approaches of programming. Basic. . 1. The programmer creates the list of instructions.1. For very small programs no other organizing principle (often called a paradigm) is needed.

or a procedure. The idea of breaking a program into functions can be further extended by grouping a number of functions together into a larger entity called a .1.1.1. a subprogram.1.1. Few programmers can comprehend a program of more than a few hundred statements unless it is broken down into smaller units.) A program is divided into functions. (The term function is used in C++ and C.2 Division into Functions When programs become larger. at least) each function has a clearly defined purpose and a clearly defined interface to the other functions in the program.1. In other languages the same concept may be referred to as a subroutine. a single list of instructions becomes unwieldy.3. and (ideally. For this reason the function was adopted as a way to make programs more comprehensible to their human creators.1.

more programmers are added. the schedule slips. and disaster ensues. the somewhat loosely defined discipline that has influenced programming organization for more than a decade. Analyzing the reasons for these failures reveals that there are weaknesses in the procedural paradigm itself. even the structured programming approach begins to show signs of strain. No matter how well the structured programming approach is implemented. but the principle is similar: grouping a number of components that carry out specific tasks.module. The reasons for this failure of procedural languages are mainly because of the role played by data. You may have heard about the problems involved in program development. The project is too complex. complexity increases. . costs skyrocket. large programs become excessively complex. Dividing a program into functions and modules is one of the cornerstones of structured programming. Problems with Structured Programming As programs grow ever larger and more complex. the schedule slips further.

It would be better if windows and menus corresponded more closely to actual program elements. One is the difficulty of creating new data types. Traditional languages are not usually extensible.1. windows. The problem is that their chief components--functions and data structures--don't model the real world very well.3 New Data Types There are other problems with traditional languages. you can extend the capabilities of the language.1.1. what functions will you need? What data structures? The answers are not obvious. or dates quantities the built-in data types don t handle easily.1. Quick now.1. What if you want to invent your own data type? Perhaps you want to work with complex numbers. 1. characters.Relationship to the Real World Procedural programs are often difficult to design. and so on. Being able to create your own types is called extensibility. Without . and so on.1. For example. floating-point numbers. suppose you are writing a program to create the elements of a graphics user interface: menus. or two dimensional coordinates.3. to say the least. Computer languages typically have several built-in data types: integers.

You can t access the data directly. Data and its functions are said to be encapsulated into a single entity. An object s functions. and then add and subtract values of this type. you call a member function in the object. If you want to read the item and return the value to you. A Java program typically consists of a number of objects. typically provide the only way to access its data. which communicate with each other by calling one another s . you can t bundle together both X and Y coordinates into a single variable called Point. The object oriented approach The fundamental idea behind object-oriented languages is to combine into a single unit both data and the functions that operate on that data. The result is that traditional programs are more complex to write and maintain. The data is hidden. It will read the item and return the value to you. called member methods in Java. Data encapsulation and data hiding are key terms in the description of objectoriented languages.unnatural convolutions. Such a unit is called an object. so it is safe from accidental modification.

Calling an object s member function is referred to as sending a message to the object. Also. Int answer. and what functions will be included in objects of that class. Int divisor. Int count.1.1. . data items are referred to as instance variables.1. or template. Almost all computer languages have builtin data types. a data type int. A class serves as a plan.4 Classes In OOP we say that objects are members of classes.3. just as the mere existence of a type int doesn¶t create any variables.1. You can declare as many variables of type int as you need in your program: Int day. For instance.members functions. Defining the class doesn¶t create any objects.1. We should mention that what are called member functions in C++ are called methods in Java. It specifies what data. meaning integer is pre-defined in Java. What does this mean? Let s look at an analogy.1. 1.

.1. 1. you see that the car consists of several subsystems: steering.1. heating. In turn. people do not think of a car as a set of tens of thousands of individual parts.1. seat belts. Instead they are free to utilize the object as a whole.1. There is no person called rock musician but specific people with specific names are members of this class if they possess certain characteristics. This fits our non-technical understanding of the word class. each of these subsystems is made up of more specialized units. are members of the class of rock musicians.. and so on. sting etc.5 Abstraction An essential element of object-oriented programming is abstraction. the car is a single object. A powerful way to manage abstraction is through the use of hierarchical classifications. The point is that you manage the complexity of the car(or any other complex system) through the use of hierarchical abstractions.3. sound system.1. They think of it as a well-defined object with its own unique behavior. breaking them into more manageable pieces. For example.A class is thus a collection of similar objects. Once inside. This abstraction allows people to use a car to drive to the grocery store without being overwhelmed by the complexity of the parts that form the car. From the outside. They can ignore the details of how the engine.1. Humans manage complexity through abstraction. cellular phone. transmission. and braking systems work. Prince. This allows you to layer the semantics of complex systems. brakes.

thus providing security from the outside interface.2 Encapsulation Encapsulation is the process of binding the code and the data. .1.Hierarchical abstractions of complex systems can also be applied to computer programs. It is important that you understand how these concepts translate into programs. including conception. As you will see. The other way of defining encapsulation is by providing the code and data with a protective wrapper.1.1. and aging. Thus. programming. You can treat these objects as concrete entities that respond to messages telling them to do something. The data from a traditional process-oriented program can be transformed by abstraction into its component objects. A sequence of process steps can become a collection of messages between these objects. . growth.1. object-oriented programming is a powerful and natural paradigm for creating programs that survive the inevitable changes accompanying the life cycle of any major software project.3. 1.1. This is the essence of object-oriented Object-oriented concepts form the heart of Java just as they form the basis for human understanding. each of each object describes its own unique behavior.

Thus. Since the purpose of a class is to encapsulate complexity. encapsulation is the class. objects are sometimes referred to as instances of a class. The public interface of a class represents everything that external users of the class need to know. Specifically. the data defined by the class are referred to as member variables or instance variables. an object has physical reality. a class is a logical construct. The code that operates on that data is referred to as member methods or just methods. Each object of a given class contains the structure and behavior defined by the class. Each method or variable in a class may be marked private or public.thus preventing them from being accessed by the code present outside the wrapper. The private methods and data can only be accessed by code that is a member of the class. A class defines the structure and behavior (data and code) that will be shared by a set of objects. For this reason. or may know. there are mechanisms for hiding the complexity of the implementation inside the class. Access to the code and data inside the wrapper is tightly In Java the basis of controlled through a well defined interface. .

an object need only define those qualities that make it unique within its class. you can ensure that no improper actions take place. a Golden Retriever is part of the classification dog.2. Since the private members of a class may only be accessed by other parts of your program through the class public methods. It can inherit its general attributes from its parent.3. it is the inheritance mechanism that makes it possible for one object to be a specific instance of a more general case. this means that the public interface should be carefully designed not to expose too much of the inner workings of a class. most knowledge is made manageable by hierarchical (that is. 1.1 Inheritance Inheritance is the process by which one object acquires the properties of another object. which in turn is part of the mammal class. Of course. by use of inheritance. any other code that is not a member of the class cannot access a private method or variable. each object would need to define all of its characteristics explicitly. Thus.1. top-down) classifications. .Therefore. This is important because it supports the concept of hierarchical classification.1.1. which is under the larger class animal. However.1. As mentioned earlier.1. Without the use of hierarchies. For example.

A deeply inherited subclass inherits all of the attributes from each of its ancestors in the class hierarchy. intelligence. If a given class encapsulates some attributes. breathe.Most people naturally view the world as made up of objects that are related to each other in a hierarchical way. and mammary glands. and dogs. then any subclass will have the same attributes plus any that it adds as part of its specialization. It does not have unpredictable interactions with the majority of the rest of the code in the system. they would have more specific attributes. they hear. If you wanted to describe a more specific class of animals. mammals. and sleep. which lets object-oriented programs grow in complexity linearly rather than geometrically. such as size. This is a key concept. they inherit all of the attributes from animals. This description of attributes and behavior is the class definition for animals. where animals are referred to as mammals super class. . A new subclass inherits all of the attributes of all of its ancestors. such as mammals. This is known as a subclass of animals. Inheritance interacts with encapsulation as well. such as animals. Animals also have certain behavioral aspects. If you wanted to describe animals in an abstract way. such as type of teeth. you would say they have some attributes. Since mammals are simply more precisely specified animals. and type of skeletal system.

even though the data being stored differs. and one for characters. one for floating-point values. In a non-object-oriented language. This helps reduce complexity by allowing the same interface to be used to specify a general class of action.1.3.2 Polymorphism Polymorphism (from the Greek. You might have a program that requires three types of stack. first-out list). More generally. because of polymorphism. in Java you can specify a general set of stack routines that all share the same names. with each set using different names.2. meaning many forms ) is a feature that allows one interface to be used for a general class of actions. the concept of polymorphism is often expressed by the phrase one interface. This means that it is possible to design a generic interface to a group of related activities. The specific action is determined by the exact nature of the situation. multiple methods. you would be required to create three difference sets of stack routines. .1. However. Consider a stack (which is a last-in. One stack is used for integer values. The algorithm that implements each stack is the same. It is the compiler s job to select the specific action (that is. method) as it applies to each situation.

and Inheritance Work Together When properly applied. readable. only fills in the View and Controller layers. and resilient code. Encapsulation. distinctly separating all three levels: o Model: application state o View: presentation of data (JSP. struts-config. It has the following features: Open source y Based on the Model-View-Controller (MVC) design paradigm. The Model layer is left to the developer. encapsulation. A well-designed hierarchy of classes is the basis for reusing the code in which you have invested time and effort developing and testing.xml The Struts Framework. What Is the Struts Framework? The Struts Framework is a standard for developing well-architected Web applications. HTML) o Controller: routing of the application flow y Implements the JSP Model 2 Architecture y Stores application routing information and request mapping in a single core file. Encapsulation allows you to migrate your implementations over time without breaking the code that depends on the public interface of your classes. continue on to the tutorial to create a simple Struts-based Web application. sensible. itself. y . After finishing reading this. and inheritance combine to produce a programming environment that supports the development of far more robust and scaleable programs than does the process-oriented model. Struts Framework This page will give you a short overview of Struts Framework and its main components.Polymorphism. polymorphism. Polymorphism allows you to create clean.

xml is used by the controller to determine the routing of the flow. This flows consists of an alternation between two transitions: From View to Action A user clicks on a link or submits a form on an HTML or JSP page. The action in turn calls a Mo From Action to View After the call to an underlying function or service returns to the action cla layer and a page is displayed in a web browser. and forwards it to an action. The con for this request.Architecture Overview All incoming requests are intercepted by the Struts servlet controller. The Struts Configuration file struts-config. .

8. 6. and routes to an action. User is presented with a new HTML page in a web browser.The diagram below describes the flow in more detail: 1. 3. looks up mapping information in struts-config. . 5. Service returns to the action. User clicks on a link in an HTML page. 4. 9. Action forwards to a View resource (JSP page) 7. Action makes a call to a Model layer service. 2. Service makes a call to the Data layer (database) and the requested data is returned. Servlet looks up the mapping for the requested resource and forwards to the appropriate JSP page.xml. Servlet controller receives the request. JSP file is invoked and sent to the browser as HTML.

Resource bundles. not the Model layer. They act as a "firewall" between forms (Web pages) and the application (actions). Its primary function is the mapping of a request URI to an action class selecting the proper application module. View Resources View resources consist of Java Server Pages. Actions process a request and return an ActionForward object that identifies the next component to invoke. They're part of the Controller layer. This XML file needs to be in the WEB-INF directory of the application. Model Components The Struts Framework has no built-in support for the Model layer. Struts supports any model components: y y y y y JavaBeans EJB CORBA JDO any other . Action Classes It's the developer's responsibility to create these classes. ActionForms These greatly simplify user form validation by capturing user data from the HTTP request. HTML pages. JavaBeans. a page with an error can be displayed. The struts-config. and Struts JSP tags. They act as bridges between user-invoked URIs and business services. If the input is invalid. These components allow the validation of user input before proceeding to an Action.Struts Components The Controller This receives all incoming requests.xml File This file contains all of the routing and configuration information for the Struts application. JavaScript and Stylesheet files. It's provided by the framework.

0. SOFTWARE DESIGN 6.6.2 UML Design .1 Design Overview ( Software arch and Application arch) ADD DELETE OWNERCUSTOMER E C L Owner Admin Post ads and delete posts Take payment and give to customer Login and add posts ads Take payment from admin Select classifieds and buy that A S S I F I transaction Customer Pay the money Buy/Purcha se Product Book Ticket Reservatio n E D S 6.

Class diagram ADMIN Loginid Password OWNER Loginid Password addCategory() addClassfied() viewCustomer() viewOwners() makePayment() collectPayment() feedback() getRequest() getResponse() DATABASE addClassfied() viewCustomer() collectPayment() feedback() CUSTOMER Loginid Password viewProducts() editProfile() changePassword() selectProduct() onlinePurchase() .

Sequence diagram Usecase diagram .

Rentals Home Services E-Classified Business ADMIN Car/Bike Travel Login Computer/Mobiles CUSTOMER Loan/Finance Login Matrimony Coaching OWNER 6.3 Buy/Sell DFD Design. .

Data Flow Diagram: 1) O level: for Admin Admin Add advertise E-Classified View status System Owner/ Customers 1) O level: for Owner Owner Post add view demand E-Classified System Customers/Admin .

2 store add Owner/Customers Admin D1 Advertisement .1) O level: for Customer Customer view add E-Classified purchase System admin Level 1: 1 Advertisement 1.1 ad d advertise 1.

1 Owner post add 2.2 store order Owner/admin D1 Order .2 Advertisement 2.1 send Order 3.2 store post admin D1 Advertisement 3 Order Customer 3.

K.K.6.Check etc] 6.4 DB Design S. Home page Login Validation page . NULL.5) User Interfaces or Output Field Name DataType (Size) Constraints [P. F.

Registration Page Registration info validation .

Admin Home .

New Item Adding page .

Item deletion page .

Adds table .

Admin table User (Owner/Customer)Registration Table .

0 Code [5-7 pages] Pseudo code Explanation And place the code in box EG: .7.

0. Functionality Name: Explanation: The below code prints 10 numbers For(int I =0. All independents path in a module are exercised at least once. . all logical decisions are exercised at once. } 8. Here the customer is given three chances to enter a valid choice out of the given menu. «««.a. i<10..i++) { ««« ««««. After which the control exits the current menu. TESTING White box testing White box testing is a testing case design method that uses the control structure of the procedure design to derive test cases. execute all loops at boundaries and within their operational bounds exercise internal data structure to ensure their validity.

Black Box Testing Black Box Testing attempts to find errors in following areas or categories. The following are the different tests at various levels: Unit Testing: Unit testing is essentially for the verification of the code produced during the coding phase and the goal is test the internal logic of the module/program. In this phase all the drivers are tested they are rightly connected or not. . incorrect or missing functions. interface error. the unit testing is done during coding phase of data entry forms whether the functions are working properly or not. Here all the input data must match the data type to become a valid entry. In the Generic code project. performance error and initialization and termination error. errors in data structures.

and the emphasis being on the testing interfaces between the modules. which are then tested. In the generic code integration testing is done mainly on table creation module and insertion module.Integration Testing: All the tested modules are combined into sub systems. The goal is to see if the modules are properly integrated. Validation Testing This testing concentrates on confirming that the software is error-free in all respects. All the specified validations are verified and the software is subjected to hard-core testing. It also aims at determining the degree of deviation that exists in the software designed from the specification. they are listed out and are corrected. .

y Introducing errors and testing for error handling. .System Testing This testing is a series of different tests whose primary is to fully exercise the computer-based system. This involves: y Implementing the system in a simulated production environment and testing it.

then this result in displaying error message USER ID ALREADY EXISTS . .TEST CASES TEST CASE 1: Test case for Login form: When a user tries to login by submitting an incorrect ID or an incorrect Password then it displays an error message NOT A VALID USER NAME . TEST CASE 2: Test case for User Registration form: When a user enters user id to register and ID already exists. then this results in displaying an error message as OLD PASSWORD DOES NOT MATCH WITH THE NEW PASSWORD . TEST CASE 3 : Test case for Change Password: When the old password does not match with the new password.

ZIP code. If these are matched with the already stored ones then user will get his Original password.Test case for Forget Password: When a user forgets his password he is asked to enter Login name. Eclipse window will be opened . 9 Deploying 9.1 Running Application Click on eclipse icon so that it will be loading. Mobile number.

Now click on work bench so eclipse window with new work space will be opened Click on new tab and then on import so that for importing your whole project in to eclipse IDE .

Click on existing projects into work space and then on next. .

Check the project where is was placed and then click on it and click ok and then on finish Here ur project will be in eclipse IDE .

.Right click on your project and click on run as and then on run on application.

y In this the emergency module is not there so we can add that feature so that if any classified is needed emergengy can be delivered in time. as all future development will be geared toward the on-demand applications y This project not an real time project so we can do it.0 FUTURE ENHANCEMENT y Integration options for sharing various data types.The Admin can have Benefit so that he can earn easily without strain. y In this project the home delivery is not provided so that we can add that feature.9. . CONCLUSION This project is useful to customers when he was busy and want to purchase any classifieds though online. 10. such as a common user registration system across multiple applications on your web site that would provide a single logon for your users for all applications on your web site.This project is benefit to owner so that his project is advertised globally.2 Configuring Data Base 9. instead of forcing them to remember separate usernames and passwords for each section of your site y Reseller programs y IDE/API capabilities that will allow you or third party developers to write add-ons for additional functionality y Many other types of applications in addition to classifieds y Continuous improvement.In this project the Transaction module can be change to live so that the transaction can be done using credit cards debit cards also.0. So that the pay for that emergengy needs will be diff from general.

Vonèche [Eds. 2001 [3] IEEE Std. 829-1998 IEEE Standard for Software Test Documentation [4] IEEE Std. 1008-1997 IEEE Standard for Software Unit Testing [6] IEEE Std.). American Council on .11. Lindquist (Ed.0 BIBLIOGRAPHY References: Follow Harvard References Styling EG: H. IEEE Computer Society. 1977 [2] Computing Curricula 2001. 1012-1998 IEEE Standard for Software Verification and Validation [7] IEEE Std.E. Final Report. The Essential Piaget. Dec 15.]. Educational Measurement. J. 1016-1998 IEEE Recommended Practice for Software Design Descriptions [8] IEEE Std 1058-1998 IEEE Standard for Software Project Management Plans [9] IEEE Std 1540-2001 IEEE Standard for Software Life Cycle Processes Risk Management [10] IEEE 12207. Association for Computing Machinery. 830-1998 IEEE Recommended Practice for Software Requirements Specifications [5] IEEE Std.Implementation Considerations [11] E. Basic Books. Gruber & J.2-1997 Industry Implementation of International Standard ISO/IEC 12207: 1995 (ISO/IEC 12207) Standard for Information Technology Software Life Cycle Processes .F. The Joint Task Force on Computing Curricula.

Mohay. 1998. Pages: 24-31. Morarji. Jackson. IEEE.'94)". 1995 . [13] R. McCauley and U. G. "Teaching Software Engineering Early Experiences and Results".Education. H. 1951 [12] R. G. "Core Software Engineering Subjects: A Case Study ('86 . Semeczko. IEEE. in Proceedings of the 1998 Frontiers in Education Conference (FIE'98). in Proceedings of the Software Education Conference 1994. Thomas.

Sign up to vote on this title
UsefulNot useful