You are on page 1of 85

DAYANAND SARASWATI P.G.

COLLEGE

SHAJAPUR , (M.P.)

A MAJOR PROJECT REPORT

ON

ONLINE VISITING CARD


SUBMITTED TOWARDS THE PARTIAL FULFILLMENT

FOR THE REQUIREMENT OF THE DEGREE OF

BACHELOR of COMPUTER APPLICATION

(2021 – 2022)

GUIDED BY: SUBMITTED BY:

Prof. Megha Oltikar Mohit Chouhan


DAYANAND SARASWATI P.G. COLLEGE

CERTIFICATE

This is to certify that the project report entitled ONLINE VISITIN CARD
submitted to Vikram University , in partial fulfillment of the requirement
for the award of the degree of BACHELOR OF COMPUTER
APPLICATIONS (BCA), is carried out by myself Mr. MOHIT CHOUHAN
with enrolment no. V19R065110007

Under the Supervision and Guidance Prof. Megha Oltikar

Date:

Name & Signature of the Student


Mohit Chouhan

Verified by the Supervisor

Name & Signature of the Guide

Prof. Megha Oltikar

Date: ………………..

Internal Examiner External Examiner


Acknowledgement

This Major Project is the result of contribution of many mind. I would


like to acknowledge and thank my project guide Mrs. Megha Oltikar for her
valuable support and guidance. She guided me through the process from
conception and till the completion of this project. I would also like to thank
Mr.Vikas Pandya sir and Mrs. Renuka Udasi Madam. I thank to lab staff
members and other non-teaching members.

I am very thankful for the open-handed support extended by many


people. While no list would be complete, it is my pleasure to acknowledge the
assistance of my friends who provided encouragement, knowledge and
constructive suggestions. Lastly, we also record our sincere thanks to all who
have been helpful directly and indirectly in our project work.

Signature of Student

Mohit Chouhan

Roll No :- 19329343
Enrollment No :- V19R065110007
Self certificate

This is to certify that the Major Project report entitled ONLINE


VISTING CARD is done by me, and it is authentic work carried out for the
partial fulfillment of the requirements for the award of the degree of Bachelor of
Computer Application (BCA) under the guidance of Prof. Megha Oltikar. The
matter and software embodies in this project has not been submitted earlier for
award of any degree or diploma to the best of my knowledge and believes.

Signature of Student
Mohit Chouhan

Roll No :- 19329343
Enrollment No :- V19R065110007

Certificate from Project Guide


This is certify that this Major Project entitled ONLINE VISITING
CARD submitted in partial fulfillment of the requirements for the award of the
degree of Bachelor of Computer Application (BCA) in session (years 2021 to
2022) to the Vikram University, UJJAIN, done by MOHIT CHOUHAN is
an authentic work carried out by them at “DAYANAND SARASWATI
P.G.COLLEGE SHAJAPUR ” under my guidance. The matter and software
embodied in this project work has not been submitted earlier for the award of
any degree or diploma to the best of my knowledge and belief.

Prof.Megha Oltikar

(Project Guide )

INDEX

1. INTRODUCTION 1-5
1.1 BACKGROUND 3
1.2 OBJECTIVES 4
1.3 PURPOSE AND SCOPE 5

2. SURVEY OF TECHNOLOGIES 6-16


 FRONT END 7
 BACK END 12
2.1 SOFTWARE AND HARDWARE SPECIFICATION
2.1.1 SOFTWARE SPECIFICATION 15
2.1.2 HARDWARE SPECIFICATION 16

3. SYSTEM ANALYSIS 17-24


3.1 PRELIMINARY INVESTIGATION 18
3.1.1 IDENTIFICATION OF NEED 19
3.1.2 FEASIBILITY STUDY 21

4. REQUIREMENT ANALYSIS 25-33


4.1 EXISTING SYSTEM 26
4.2 PROPOSED SYSTEM 28
4.3 DATA FLOW DIAGRAM (DFD) 30

5. SOFTWARE DESIGN 34-56


5.1 DESIGN OBJECTIVE AND CONSTRAINTS 35
5.2 DESIGN TECHNIQUE 36
5.3 DATABASE DESIGN 37
5.3.1 E-R DIAGRAM 37
5.3.2 TABLE STRUCTURE 40
5.3.3 INPUT SCREEN 41
5.3.4 CODING 45
6. TESTING 57-59
6.1 TESTING OBJECTIVES 58
6.2 TESTING METHODOLOGIES 58
6.3 QUALITY ATTRIBUTES 59

7. IMPLEMENTATION 60-71
7.1 CHARACTERISTICS OF LANGUAGE USED 61
7.2 VALIDATION CHECKS 70
7.3 INSTALLATION 71

8. CONCLUSION 72-76
8.1 LIMITATION OF PROJECT 74
8.2 DIFFICULTIES ENCOUNTERED 75
8.3 FUTURE ENHANCEMENT 76

9. BIBLIOGRAPHY & REFERENCES 77-78


9.1 BOOKS REFERENCES 78
9.2 OTHER REFERENCES 78
1.INTRODUCTION

(1)
INTRODUCTION

Bussiness cards are a staple of the corporate and professional world. The
usefulness of a business card is showing all your contact details in a convenient
location. Hand one to someone you meet, and you’re more likely to continue the
conversation later.

In the digital era, its essential to also use digital bussiness cards to share
all your contact details in one convenient view. Digital business cards are easy
to share an perfect to gather all your account and contact details in a single
view.

The purpose of a digital business card is simple : to help you connect


with more potential clients, partners and co-workers. I’m sure you are already
familier with traditional business cards , the printed product you might hand to a
potential client or colleague. It’s a perfect way of networking an leaving your
contact details to connect later on.

Digital business cards primarily serve the same purpose. Most of us are
on so many platforms ( LinkedIn, Twitter, Instagram and more) that it can be
overwhelming to share all those details at once . That’s where virtual business
cards shine. The point of an e-bussiness card is to create a single, simple,
shareable file with all your contact details. That way , the recipient has no
friction to follow your account on social media or contact you using the details.

A virtual business card is often shared via email in your contact signature.
Instead of mentioning social details in the body of the email, it’s easier to have
them all in a an e business card at the bottom in the form of a signature. Most
virtual business cards tools helps you generate a card to add as a signature to
your email.

(2)
Many digital business cards builders are free tools that help you to launch
the finished product as a website. Some virtual bussiness cards tools will create
Shareable URL’s that you can send. Instead of making the recipient remember
all your social handles, use the e business cards site as a launchpad.

Printed bussiness cards are still usefull an important but its important to
create digital versions as well. Luckily, you don’t have to choose whether you
wnat to create only a traditional or electronic business card.

Application development are one such sector where designers must


depend on their gifted creative side and hope that their solutions are still
triumphant. In this report, we will explain an exciting journey down the road of
Android application development. From needs to use cases, to flutter to user
interface , we will cover each and every detail of system design required to buil
an Android application by using Flutter. The reason why we choose Digital
Bussiness card Application is everybody who is professional has an idea of
Bussine cards.

1.1 BACKGROUND

The program offers to the user a template to create bussines cards and a method
to exchange business cards. User can use the system to book meetings or
appointments with their contacts.

The idea for this project came from Anders Nilsson and Henrik
Abrahamson who are business students at Halmstad University. Anders and
Henrik want to provide to business people an easy and innovative way for
creating and exchanging business cards, as well as booking meetings using
mobile phones.

(3)
For this purpose Anders and Henrik interview some business people from
different areas to check which is the most popular mobile phone that they are
using and how business people feel about the design of mobile application.

According to their results, the most and widely used mobile phones are
from Nokia and Sony Ericson,however, another brands are ued too, such as
Blackberry and Motorola. As they want to provide an software application
which will run in a mobile phone, this application must be developed using
platform commonly supported by Nokia, Sony Ericson, Blackberry,
Motorola,Seimens, Samsung and others. Java Micro Edition (Java Me) is a
platform supported by all of these mobile telephone manufacturers an
development of rich user interface, robust and security applications, networked
and offline applications that can be downloaded dynamically. The main
advantage is that Java Me based applications are portable across many devices.

1.2 OBJECTIVE

The objective of this project is to build a digital business card where fellow
employees an other bussines man don’t need to maintain the physical business
card always an we can save trees by this manner. A Digital Bussiness Card
Application is a platform where he/she would have their business card stored
virtually where don’t always need to hold one physical car. The owner of this
business card can only access their Bussiness card as it has a login page at the
beginning where he/she needs to enter the username and password where after a
successful login they can view their business card this is the safest way possible
as this bussines car can’t be changed it is only possible when he/she owner of
the business card want to change it through our team members so there is very
limited issue as a text, image on this application can’t be changed.

(4)
1.3 PURPOSE AND SCOPE

With all the technologies there are some constraining factors. Although we feel
that we have come up with a good solution for gradually transferring physical
cards to a digital format, our application still has its limits. Our application
requires the user to own a smartphone which supports NFC technology as well
as running on one of the major platforms. To reach our goal of eventually
replacing the old, physical card with the digital card, we need the application to
be standard for business card transactions.

Qualitative research allows us to examine issues an needs in detail and depth;


however there are also some limitations to the qualitative data gathering.
Research quality is heavily dependent on the individual skills of the researcher,
and can easily be influenced by the researcher’s personal blases. The
researcher’s presence during data gatheringcan also often affect the subject’s
response. These issues and blases might affect our research.

(5)
2.SURVEY OF TECHNOLOGIES

(6)
SURVEY OF TECHNOLOGIES

 FRONT END :

I recently had a chance to investigate the options to use C++ to build


mobile/modern apps applications in a platform independent way. It was sad to
find (confirm) that the potential options are very much limited, and it feels that
the language is being left behind in a whole lot of modern development
scenarios. Most of portable libraries are being used in managed/scripted or
"new" languages, while C++ (c) is left for native platform specific code. It's
funny how a lot of platforms are actually written in C++ (browsers, OS's,
frameworks etc) but then prefer other languages to do the actual "front-end"
programming. (web browsers, flutter, qml, etc...)

C++ is a cross-platform language that can be used to create high-performance


applications. C++ was developed by Bjarne Stroustrup, as an extension to the C
language. C++ gives programmers a high level of control over system resources
and memory. C++ is one of the world's most popular programming languages.
C++ can be found in today's operating systems, Graphical User Interfaces, and
embedded systems. C++ is an object-oriented programming language which
gives a clear structure to programs and allows code to be reused, lowering
development costs. C++ is portable and can be used to develop applications that
can be adapted to multiple platforms.

(7)
Features of C++

Here are some of the remarkable features of C++ language:

1. OOP (Object-Oriented Programming)

C++ is an object-oriented language, unlike C which is a procedural language.


This is one of the most important features of C++. It employs the use of objects
while programming. These objects help you implement real-time problems
based on data abstraction, data encapsulation, data hiding, and polymorphism.
We have briefly discussed all the 5 main concepts of object-oriented
programming.

The OOP concepts are :

 Data abstraction : Data abstraction is an act of representing the important


features of data without including the background details or the method
applied to obtain it.
 Data encapsulation : Data encapsulation is nothing but a process to
implement data abstraction by wrapping up the data and functions into an
exclusive block.
 Inheritance : The term inheritance refers to transferring the properties of
the parent class to the child class. We can implement the basic idea of
inheritance by creating more than one class, which we formally refer to as
derived classes by linking them with what we call the base class. This
concept reduces the redundancy of the program and makes it easy to
transfer/copy the properties of one class to another
 Data hiding : Data hiding refers to protecting data from unauthorized
access. It is basically responsible for securing the data. It is important to note
that data encapsulation is different from data hiding as encapsulation mainly
focuses on shifting the focus on important data than explaining its complex
nature.
(8)
 Polymorphism : The word poly means ‘many’ and morphism means
‘forms’. Clearly, polymorphism refers to displaying that data in more than
one form.

2. Platform or Machine Independent/ Portable :

Although C++ is not platform-independent as compiled programs on one


operating system won’t run on another operating system

But in another term, portability refers to using the same piece of code in varied
environments.

Let us understand this C++ feature with the help of an example. Suppose you
write a piece of code to find the name, age, and salary of an employee in
Microsoft Windows and for some apparent reason you want to switch your
operating system to LINUX. This code will work in a similar fashion as it did in
Windows.

3. Simple

When we start off with a new language, we expect to understand in-depth. The
simple context of C++ gives an appeal to programmers, who are eager to learn a
new programming language.

If you are already familiar with C, then you don’t need to worry about facing
any trouble while working in C++. The syntax of C++ is almost similar to that
of C. After all C++ is referred to as “C with classes”.

(9)
4. High-level programming language

It is important to note that C++ is a high-level programming language, unlike C


which is a mid-level programming language. It makes it easier for the user to
work

in C++ as a high-level language as we can closely associate it with the human-


comprehensible language, that is, English.

5. Popular

After learning C, it is the base language for many other popular programming
languages which supports the feature of object-oriented programming. Bjarne
Stroustrup found Simula 67, the first object-oriented language ever, lacking
simulations and decided to develop C++.

6. Case sensitive

Just like C, it is pretty clear that the C++ programming language treats the
uppercase and lowercase characters in a different manner. For instance, the
meaning of the keyword ‘cout’ changes if we write it as ‘Cout’ or “COUT”.
Other programming languages like HTML and MySQL are not case sensitive.

7. Compiler-Based

Unlike Java and Python that are interpreter-based, C++ is a compiler-based


language and hence it a relatively much faster than Python and Java.

8. DMA (Dynamic Memory Allocation)

Since C++ supports the use of pointers, it allows us to allocate memory


dynamically. We may even use constructors and destructors while working with
classes and objects in C++.

(10)
9. Existence of Libraries

The C++ programming language offers a library full of in-built functions that
make things easy for the programmer. These functions can be accessed by
including suitable header files.

10. Speed

As discussed earlier, C++ is compiler-based hence it is much faster than other


programming languages like Python and Java that are interpreter-based.

(11)
 BACK END :

MY SQL – MySQL, pronounced either "My S-Q-L" or "My Sequel," is an open


source relational database management system. It is based on the structure
query language (SQL), which is used for adding, removing, and modifying
information in the database. Standard SQL commands, such as ADD, DROP,
INSERT, and UPDATE can be used with MySQL.

MySQL can be used for a variety of applications, but is most commonly found
on Web servers. A website that uses MySQL may include Web pages that
access information from a database. These pages are often referred to as
"dynamic," meaning the content of each page is generated from a database as
the page loads. Websites that use dynamic Web pages are often referred to as
database-driven websites.

Many database-driven websites that use MySQL also use a Web scripting
language like PHP to access information from the database. MySQL commands
can be incorporated into the PHP code, allowing part or all of a Web page to be
generated from database information. Because both MySQL and PHP are both
open source (meaning they are free to download and use), the PHP/MySQL
combination has become a popular choice for database-driven websites.

The main reasons for using MySQL

 MySQL is released under an open-source license. So you have nothing to


pay to use it.
 MySQL is a very powerful program in its own right. It handles a large
subset of the functionality of the most expensive and powerful database
packages.
 MySQL uses a standard form of the well-known SQL data language.

(12)
 MySQL works on many operating systems and with many languages
including PHP, PERL, C, C++, JAVA, etc.
 MySQL works very quickly and works well even with large data sets.
 MySQL is very friendly to PHP, the most appreciated language for web
development.
 MySQL supports large databases, up to 50 million rows or more in a table.
The default file size limit for a table is 4GB, but you can increase this (if
your operating system can handle it) to a theoretical limit of 8 million
terabytes (TB).
 MySQL is customizable. The open-source GPL license allows
programmers to modify the MySQL software to fit their own specific
environments.

Some of the main features associated with MySQL :

1. Open-Source

MySQL is open-source, which means this software can be downloaded, used


and modified by anyone. It is free-to-use and easy-to-understand. The source
code of MySQL can be studied, and changed based on the requirements.  It uses
GPL, i.e. GNU General Public license which defines rules and regulations
regarding what can and can’t be done using the application.

2. Quick and Reliable

MySQL stores data efficiently in the memory ensuring that data is consistent,
and not redundant. Hence, data access and manipulation using MySQL is quick.

(13)
3. Scalable

Scalability refers to the ability of systems to work easily with small amounts of
data, large amounts of data, clusters of machines, and so on. MySQL server was
developed to work with large databases. 

4. Data Types

It contains multiple data types such as unsigned integers, signed integers, float
(FLOAT), double (DOUBLE), character (CHAR), variable character
(VARCHAR), text, blob, date, time, datetime, timestamp, year, and so on.

5. Character Sets

It supports different character sets, and this includes latin1 (cp1252 character
encoding), German, Ujis, other Unicode character sets and so on.

6. Secure

It provides a secure interface since it has a password system which is flexible,


and ensures that it is verified based on the host before accessing the database.
The password is encrypted while connecting to the server.

7. Support for large databases

It comes with support for large databases, which could contain about 40 to 50
million records, 150,000 to 200,000 tables and up to 5,000,000,000 rows.

8. Client and Utility Programs

MySQL server also comes with many client and utility programs. This
includes Command line programs such as ‘mysqladmin’ and graphical
programs such as ‘MySQL Workbench’. MySQL client programs are written
in a variety of languages. Client library (code encapsulated in a module) can
be written in C or C++ and would be available for clients that have C binding

(14)
2.1 SOFTWARE AND HARDWARE SPECIFICATION :

2.1.1 SOFTWARE SPECIFICATION :

A Software requirements specification


(SRS) of Functional Specification Document (FSD) is a description of features
and functionalities of a software system to be developed. It lays out functional
and non-functional requirements instructions describing what function the
software is supposed to provide, what characteristics the software is supposed to
have, and what goals the software is supposed to meet or to enable users to
meet.

 User requirements are expressed in natural language.


 Technical requirements are expressed in structured language, which is
used inside the organisation.
 Design description should be written in pseudo code.
 Format of forms and GUI screen prints.

Software requirements specification defines various functional and non-


functional aspects the software to be developed, like user interactions, hardware
requirements, performance and security, accessibility, usability, required
functionalities etc. to derive the requirements a business analyst need to have
clear and through understanding of the product to be developed. This is
achieved and refined with detailed and continuous communication with the
project team and customers till the completion of the software.

 Establishers the basis for an agreement between customers and contractors


on what the software product is to do well as what it is not expected to do.
 Provides a realistic basis for estimating product costs risks and schedules.
 Foundation to software development and subsequent testing.

(15)
 Platform for ongoing feedback and refinement via open questions & issues.
 Tool for evaluating the quality of a project, because a final review should
examine whether each requirements has been met.

2.1.2 HARDWARE SPECIFICATION:

 Intel core i3 7th generation is used as a processor because it is fast than


other processors an provide reliable and stable and we can run our pc
for long time. By using this processor, we can keep on developing our
project without any worries.
 RAM 4 GB is used as it will provide fast reading and writing
capabilities and will in turn support in processing.

(16)
3.SYSTEM ANALYSIS

(17)
SYSTEM ANALYSIS

3.1 PRELIMINARY INVESTIGATION :

System analysis is a process of gathering and interpreting facts, Diagnosing


problems and the information about the Payroll Management System to
recommend improvements on the system. It is a problem-solving activity that
requires intensive communication between the system users and system
developers. System analysis or study is an important phase of any system
development process. The system is studied to the minutes detail and analysed.
The system analyst plays the role of the interrogator and dwells deep into the
working of the present system. The system is viewed as a whole and the input to
the system are identified. The outputs from the organisation are traced to the
various processes. System analysis is considered with becoming aware of the
problem, identifying the relevant and decisional variables, analysing and
synthesizing the various factors and determining an optimal or at least a
satisfactory solution or program of action. A detailed study of the process must
be made by various techniques like interviews, questionnaires etc. the data
collected by these sources must be scrutinized to arrive to a conclusion. The
conclusion is an understanding of how the system functions. This system is
called the existing system. Now the existing system is subjected to close study
and problem areas are identified. The designer now functions as a problem
solver and tries to sort out the difficulties that the enterprise faces. The solutions
are given as proposals. The proposal is then weighed with the existing system
analytical and the best one is selected. The proposal is presented to the user fir
an endorsement by the user. The proposal is reviewed on user request and
suitable changes are made. This is loop that ends as soon as the user is satisfied
with proposal. Preliminary study is the

(18)
process of gathering and interpreting facts, using the information for further
studies on the system. Preliminary study is problem solving activity that
requires intensive

communication between the system users and system developers. It does


various feasibility studies. In these studied a rough figure of the system
activities can be obtained, from which the decision about the strategies to be
followed for effective system study and analysis can be taken.

3.1.1 IDENTIFICATION OF NEED:

Digital Bussiness Cards are the best way to move your brand forward. In
this digital era, your virtual business card will enhance your networking
interactions and demonstrate that you are willing to adapt to changing times.

 They are convenient

You’ll always have your business cards on hand as long as you have your phone
or computer within reach. Since everything is electronic, you don’t need to
worry about a low card supply or leaving them at home.

Digital cards also have the convenience of bein extremely editable, meaning
they are always up-to-date with your latest contact information. If you switch
jobs, chane your phone number, or want to add more information , you can do
that with a few keystrokes.

 They are Cost-Effective

Because you can easily find free digital business card templates an create them
yourself, there is no need to pay hundreds of dollars on paper cards that will
probably get thrown away or lost by the recipient. This allows you to redirect
this budget to another part of your business. If you are looking for more

(19)
premium virtual busine cards,some apps allow you to upgrade your design to
include custom URLs, QR codes,unique colours and more.

 They offer Seamless Folloe-Ups

We know that most of the paper business cards we hand out are tossed into a
drawer or vessel, never to be revisited. Even if the person has a Bussiness card
scanner , it may cause your contact information to get lost in the shuffle.

When you share a digital business card it goes directly to the reciever’s inbox,
making it easy to integrate into their workflow. Virtual business cards make
following up simple and more efficient, which leads to the development of more
robust connections. They also integrate well with a CRM system.

 They allow for Contactless Sharing

Because online meetups and virtual events are part of our everyday life,virtual
business cards are staple for professional online networking. You can share
electronic business cards with anyone over Email,text, or social media. You can
even hold up a QR code during a video call, and anyone in attendance can scan
with a mobile device an access your contact information.

As we regain a sense of normalcy, digital business cards will retain


functionality because they are germ-free an require no physical contact to
exchange.

 They make a Statement

When you share a digital business card, you are making a statement about
yourself an your brand. You are communicating that you are up-to-date with the
latest technological advancements, and you care about making the recipients
lives a little easier. By having a virtual card at the read, you will stand out from

(20)
the crowd and inspire a new trend in your industry, especially if you are the first
to pioneer them!

3.1.2 FEASIBILITY STUDY :

The objective of feasibility study is to determine whether or not the proposed


system is feasible. A feasibility study is a preliminary investigation of a
proposed system to decide whether the system can run smoothly with the
organization, will the organization realize the benefits that are expected and to
decide will the organization go for it. Feasibility is defined as the practical
extent to which a project can be performed successfully. To evaluate feasibility,
a feasibility study is performed, which determines whether the solution
considered to accomplish the requirements is practical and workable in the
software. Information such as resource availability, cost estimation for software
development, benefits of the software to the organization after it is developed
and cost to be incurred on its maintenance are considered during the feasibility
study. The objective of the feasibility study is to establish the reasons for
developing the software that is acceptable to users, adaptable tochange and
conformable to established standards. Various other objectives of feasibility
study are listed below :

 To analyze whether the software will meet organizational requirements


Feasibility is defined as the practical extent to which a project can be
performed successfully. To evaluate feasibility, a feasibility study is
performed.
 To determine whether the software can be implemented using the current
technology and within the specified budget and schedule A feasibility study
is a preliminary investigation of a proposed system to decide whether the
system can run smoothly with the organization.

(21)
 To determine whether the software can be integrated with other existing
software. benefits that are expected and to decide will the organization go for
it.

Three Types of feasibility study :

1. Technical Feasibility.
2. Operational Feasibility.
3. Economical Feasibility

Here are the detailes of three types :

1. ECONOMICAL FEASIBILITY :

Economic feasibility is a measure of the cost-effectiveness of a project or


solution. As a part of this, the costs and benefits associated with the proposed
system are compared and the project is economically feasible only if tangible
and intangible benefits outweigh the cost. The cost for proposed online shopping
system is outweighing the cost and efforts involved in maintaining the registers,
books, files and generation of various reports. The system also reduces the
administrative and technical staff to do various jobs that single software can do.
So, this system is economically feasible. Economical feasibility also performs
following tasks

i. Cost incurred on software development to produce long-term gains for an


organization. Economic feasibility is a measure of the cost-effectiveness of a
project or solution. As a part of this, the costs and benefits associated.
ii. Cost required to conduct full software investigation (such as requirements
elicitation and requirements analysis). The system also reduces the
administrative and technical staff to do various jobs that single software can
do.

(22)
iii. Cost of hardware, software, development team, and training. Feasible only if
tangible and intangible benefits outweigh the cost. The cost for proposed
online shopping system is outweighing the cost and efforts involved in
iv. Cost involves in purchase or rental of equipment the cost for proposed online
shopping system is outweighing the cost and efforts involved.
v. Cost of phones & mobile communication equipment
vi. Cost of Salaries of Employees.
vii. Cost of maintenance of equipment

2. TECHNICAL FEASIBILITY :

In this, one has to test whether the system can be developed using existing
technology or not. It is evident that necessary hardware and software are
available for development and implementation of proposed system. We
acquired the technical knowledge of working in languages, and then only we
have started designing our project. The system is self-explanting and does not
need any entire sophisticated training. A system has been built by concentrating
on the graphical user interface concepts, the application can also be handled
very easily with a novice uses. The overall time that a user needs to get trained
is less than 15 minutes.The system has been added with features of menu device
and button interaction methods, which makes him the master as he starts
working through the environment. As the software that were used as developing
this application are very economical and are readily available is themarket the
only time that is lost by the customer is just installation time. Technical
feasibility performs following tasks.

1. Analyzes the technical skills and capabilities of the software


development team members. In this, one has to test whether the system

(23)
can be developed using existing technology or not. It is evident that
necessary hardware and software.
2. Determines whether the relevant technology is stable and established.
The system has been added with features of menu device and button
interaction methods, which makes him the master as he starts working
through the environment.
3. Ascertains that the technology chosen for software development has a
large number of users so that they can be consulted when problems arise
or improvements are required. It mentions computer with new
configuration requirements of proposed system. It mentions new
software requirements of the proposed system.

3. OPERATIONAL FEASIBILTY :

Operational feasibility means how much the system is user interactive. In this
project, the management will know the details of each project where he may be
presented and the data will be maintained as decentralized and if any inquires
for that particular contract can be known as per their requirements and
necessaries. Operational feasibility also performs following tasks.

1. Determines whether the problems anticipated in user requirements are of


high priority.
2. Determines whether the solution suggested by the software development
team is acceptable.
3. Analyzes whether users will adapt to a new software
4. Determines whether the organization is satisfied by the alternative
solutions proposed by the software development team.
5. It finds if any job reconstruction is required or not?

(24)
4.REQUIREMENT ANALYSIS

(25)
REQUIREMENT ANALYSIS

4.1 EXISTING SYSTEM :

When you’re ready to build a digital business card, it helps to have a tool that
makes it more accessible. Using an app or service to develop and maintain your
digital card saves your time and helps to keep it up-to-date.

If you’re wondering “how do you make an electronic business card ?” the


answer lies in this section. Its easier to do that whenyou use apps built to design
virtual business cards.

Haystack is targeted at creating digital bussines cards for your teams with
consistent style. You can use it to set up a style that everyone within your
organization can easily tap into. All they’ve got to do is add their user-specific
contact details and they’ll quickely create an e business card. Another great
feature is the analytics data built into Haystack. That type of data helps your
team see how many users are visiting your contact cards. This helps you
understand how your marketing efforts are working.

Switchit : Like many of the tools you’ll see in this round-up . Switchit focuses
on simplicity. The pre-built templates and designs have already taken care of
most of the work for you. All thats left to customise is the contact placeholders
with your details. Most of the core features are available as part of a “forever
free” plan to help you create a virtual business card on a budget. Switchit is also
a great option because the recipients don’t even need the app to view your card.
You get an easily shareable link or template that you can drop into a variety of
outlets.

(26)
L-Card has all the best features that you nee in an electronic business card
tool. There’s a great selection of pre-built templates. Those help you launch
your e business card much more quickly than designing one on a blank slate.
This app is focused on the mobile experience, prioritising the Apple iOS and
Android apps. Digital business cards on L-cards are designed to replace the
replace the physical copies thanks to easy scanning an sharing features. You
can build a deep and easy to browse library with the organization tools as well.

About.me is another tool that helps you put together your contact informations
quickly in the form of a virtual business card. The twist on this site is that the
finished products saves as an easy-to-share website. If you’re active on many
social platforms , this is one of my favorite tools. It makes it very easy to click
on the social apps you use and ad your username to the card. One of my
favourite feature is that about.me can help you launch the virtual business card
on a custom domain.

Clinck : The Clinck app is available on iOS and Android devices. It allows you
to create, store and send a digital business card to all interested parties. This
makes it easy to follow up with potential partners, employers, and leads. What’s
cool about this app is that the other person doesn’t need the app to view your
business card. If you’re a company, you can use Clinck to set up a branded
business cards for your employees.

OneCard is another igital business card creater that works in your browser.
Ther’s no need to download the app on your phone. As far as digital business
cards o, you can add all the important contacts information and even include a
video.When you’re done simply share your business card with a unique URL,
through email or social media or with a QR code. Recipients can choose to save
your business cards to their phones home screen as an easy accessible app.

(27)
4.2 PROPOSED SYSTEM :

There is somewhere a charm in physical business card so that the customer


remembers it better than a diital business card. They don’t have various designs
to choose with as once printe can’t be changed. The web application is
built/developed using Flutter with Dart language an Andriod studio. Propose
system is accessed by two entities namely,Admin and Employee. Admin need
to login with their valid login credentials first in order to access the application.
After successful login, admin can access all the modules and perform each task
accurately. User need to register with their basic registration details alon with
their valid login id and password details. Once a user is registered, he or she
need to login using valid credentials an access the application. User can view
the card after login. In order to change the name or logo or details user needs to
consult an android developer. System allows user to only view thw business
card. User can change unlimited times the details on the business card without
any waste of money.

FEATURES :

 Analytics
 Eco- Friendly
 Easy Customization
 Easy update
 Unlimited Space
 Attach Media

(28)
ADVANTAGES :

 Digital vising cards allow you to attach media files with your card so that

you can give more information and story about your brand to your

costumers.

 In case of traditional visiting cards, you have to consider pace, texts,

information, design and you have to put up everything in a limited space.

But in Digital Cards, you have enormous space to include your website

address, social media accounts, phone numbers and a lot more.

 In traditional paper cards, if you want to update an information, you have

to reprint the cards. But Digital Cards allow you to do it within minutes.

 Digital business cards are easy to customize. You just have to choose the

bran color, typeface an include contact details, etc.

 You can see how many people clicked and visited your business card.

 As you don’t print your business cards, you don’t have to use papers. This

eliminates the need of cutting trees for papers.

(29)
4.3 DATA FLOW DIAGRAM (DFD) :

A Data Flow Diagram (DFD) is a structured analysis and design tool that can be
used for flowcharting. A DFD is a network that describes the flow of data and
the processes that change or transform the data throughout a system. This
network is constructed by using a set of symbols that do not imply any physical
implementation. It has the purpose of clarifying system requirements and
identifying major transformations. So it is the starting point of the design phase
that functionally decomposes the requirements specifications down to the
lowest level of detail. DFD can be considered to an abstraction of the logic of an
information oriented or a processoriented system flow-chart. For these reasons
DFD’s are often referred to as logical data flow diagrams

Components of DFD :

DFDs only involve four symbols. They are:

1.Processes : Processes are the essential activities, carried out within the system
boundary, that use information. A process is represented in the model only
where the information which provides the input into the activity is manipulated
or transformed in some way, so that the data flowing out of the process is
changed compared to that which flowed in. The activity may involve capturing
information about something that the organization is interested in, such as a
customer or a customer's maintenance call. It may be concerned with recording
changes to this information, a change in a customer's address for example. It
may require calculations to be carried out, such as the quantity left in stock
following the allocation of stock items to a customer's job; or it may involve
validating information, such as checking that faulty equipment is covered by a
maintenance contract.

(30)
Fig 1.Diagram of the process

2.Data-flows : A data-flow represents a package of information flowing


between two objects in the data-flow diagram. Data-flows are used to model the
flow of information into the system, out of the system, and between elements
within the system. Occasionally, a data-flow is used to illustrate information
flows between two external entities, which is, strictly speaking, outside of the
system boundaries. However, knowledge of the transfer of information between
external entities can sometimes aid understanding of the system under
investigation, in which case it should be depicted on the diagram.

Fig 2.Diagram of data flows

3.Data stores : A data store is a place where data is stored and retrieved within
the system. This may be a file, Customer Contracts file for example, a catalogue
or reference list, Options Lists for example, a log book such as the Job Book,
and so on.

Fig 3.Diagram of data stores

(31)
4.External Entities : External entities are entities outside of the system
boundary which interact with the system, in that they send information into the
system or receive information from it. External entities may be external to the
whole organization as in Customer and Supplier in our running example; or just
external to the application area where users' activities are not directly supported
by the system under investigation. Accounts and Engineering are shown as
external entities as they are recipients of information from the system. Sales
also provide input to the system. External entities are often referred to as
sources and sinks. All information represented within the system is sourced
initially from an external entity. Data can leave the system only via an external
entity.

Fig 4. Diagram of external entities

(32)
DFD OF ONLINE VISITING CARD

(33)
5.SOFTWARE DESIGN

(34)
SOFTWARE DESIGN

System design is the solution for the creation of a new system. This phase
focuses on the detailed implementation of the feasible system. It emphasis on
translating design. Specifications to performance specification. System design
has two phases of development. They are logical design and physical design.
During logical design phase the analyst describes inputs (sources), outputs
(destinations), databases (data stores) and procedures (data flows) all in a format
that meets the user requirements. The analyst also specifies the needs of the user
at a level that virtually determines the information flow in and out of the system
and the data resources. Here the logical design is done through data flow
diagrams and database design. The physical design is followed by physical
design or coding. Physical design produces the working system by defining the
design specifications which specify exactly what the candidate system must do.
The programmers write the necessary programs that accept input from the user
perform necessary processing on accepted data and produce the required report
on a hard copy or display it on the screen

5.1 DESIGN OBJECTIVE AND CONSTRAINT :

In this phase, a logical system is built which is fulfils the given requirements.
Design phase of software development deals with transforming the client’s
requirements into a logically working system. Normally, design is performed in
the following two steps:

1) PRIMARY DESIGN PHASE :

In this phase, the system is designed at block level. The blocks are created on
the basis of analysis done in the problem identification phase. Different blocks
are created for different functions emphasis is on minimizing information flow

(35)
between blocks. Thus, all activities which require more interaction are kept in
one block.

2) SECONDARY DESIGN PHASE :

In the secondary phase the detailed design of every block is performed.

The general tasks involved in the design process are the following:
1) Design various blocks for overall system processes.
2) Design smaller, compact and workable modules in each block.
3) Design various database structures.
4) Specify details of programs to achieve desired functionality.
5) Design the form of inputs, and outputs of the system.
6) Perform documentation of the design.
7) System reviews.

5.2 DESIGN TECHNIQUE :

The researcher consulted the administration department of the company for


which the system is being developed. This consultation was for the purpose of
studying the system in detail to understand its functionality and requirement in
the new system and probably introduce new features that will establish an
improved system. Various tables were designed showing the data to be
captured, the flow chart system for the program was developed. From this flow
chart, the software program for the data capture of each employee was
developed and test run in order to make sure it performs the function for which
it was so developed. The program was therefore critically analyzed and
recommendations proffered for future research and development.

(36)
5.3 DATABASE DESIGN :

The relational database model was used in the design of the database for the
Payroll Management System application. According to Lit win P., “The basic
idea behind the relational model is that a database consists of a series of un-
ordered tables (or relations) that can be manipulated using non –
procedural operations that return tables”.

The benefits of a database that has been designed according to the relational
model are:

1) Data entry, updates and deletions will be efficient.


2) Data retrieval, summarization and reporting will also be efficient.
3) Since the database follows a well –formulated model, it behaves
predictably.
4) Since much of the information is stored in the database rather than in the
application, the database is somewhat self –documenting.
5) Changes to the database schema are easy to make.

Normalization was used to simplify the design of the database in order to bring
it to optimum structure.

5.3.1 E-R DIAGRAM :

An entity-relationship (ER) diagram is a specialized graphic that illustrates the


relationships between entities in a database. ER diagrams often use symbols to
represent three different types of information. Boxes are commonly used to
represent entities. Diamonds are normally used to represent relationships and
ovals are used to represent attributes. ER-modeling is a data modeling technique
used in software engineering to produce a conceptual data model of a
information system. Diagrams created using this ER-modeling technique are
called Entity-Relationship Diagrams, or ER diagrams or ERDs. So you can say

(37)
that Entity Relationship Diagrams illustrate the logical structure of databases.
Dr. Peter Chen is the originator of the Entity-Relationship Model. His original
paper about ER-modeling is one of the most cited papers in the computer
software field. Currently the ER model serves as the foundation of many system
analysis and design methodologies, computer-aided software engineering
(CASE) tools, and repository systems. In software engineering, an ER model is
commonly formed to represent things that a business needs to remember in
order to perform business processes.

Consequently, the ER model becomes an abstract data model,that defines a data


or information structure which can be implemented in a database, typically a
relational database. In software engineering, an ER model is commonly formed
to represent things that a business needs to remember in order to perform
business processes. Consequently, the ER model becomes an abstract data
model, that defines a data or information structure which can be implemented in
a database, typically a relational database. Entities may be characterized not
only by relationships, but also by additional properties (attributes), which
include identifiers called "primary keys". Diagrams created to represent
attributes as well as entities and relationships may be called entity-attribute
relationship diagrams, rather than entity–relationship models. An ER model is
typically implemented as a database. In a simple relational database
implementation, each row of a table represents one instance of an entity type,
and each field in a table represents an attribute type.

In a relational database a relationship between entities is implemented by


storing the primary key of one entity as a pointer or "foreign key" in the table of
another entity. An entity may be defined as a thing capable of an independent
existence that can be uniquely identified. An entity is an abstraction from the
complexities of a domain.

(38)
When we speak of an entity, we normally speak of some aspect of the real
world that can be distinguished from other aspects of the real world. A
relationship captures how entities are related to one another. Relationships can
be thought of as verbs, linking two or more nouns.

Examples: an owns relationship between a company and a computer, a


supervises relationship between an employee and a department, a performs
relationship between an artist and a song, a proves relationship between a
mathematician and a conjecture, etc.

(39)
5.3.2 TABLE STRUCTURE:

(40)
5.3.3 INPUT SCREEN :

MAIN MENU OF ONLINE VISITING CARD :

NEW VISITING CARD:

(41)
 ALL CARD HOLDER LIST: 

visiting card: all card list

 DELETE CARD:

(42)
list of cards after deleting record

 MODIFY CARD: 

modify option

(43)
 SEARCH DETAIL OF VISITING CARD: 

(44)
5.3.4 CODING :

#include<fstream.h>

#include<ctype.h>

#include<iomanip.h>

#include<conio.h>

#include<stdio.h>

//*****************class used*****************

class account

int id;

char name[50];

char address[100];

char occupation[30];

char contact[18];

char email[50];

public:

void create(); //function to get data from user

void show();//function to show data on screen

void modify(); //function to get new data from user

void report(); //function to show all data

(45)
int retid(); //function to return ID

}; //class ends here

void account::create()

cout<<"\nID. :";

cin>>id;

cout<<"\n\nEnter your Name : ";

gets(name);

cout<<"\nEnter your Occupation : ";

gets(occupation);

cout<<"\nEnter the Address for visiting card : ";

gets(address);

cout<<"\nEnter Contact Number : ";

gets(contact);

cout<<"\nEnter Email ID : ";

gets(email);

cout<<"\n\n\nAccount Created..";

void account::show()

(46)
cout<<"\nID. : "<<id;

cout<<"\nName : ";

cout<<name;

cout<<"\nOccupation : "<<occupation;

cout<<"\nAddress : "<<address;

cout<<"\nContact : "<<contact;

cout<<"\nEmail ID : "<<email;

void account::modify()

cout<<"\nID. :";

cin>>id;

cout<<"\n\nEnter your Name : ";

gets(name);

cout<<"\nEnter your Occupation : ";

gets(occupation);

cout<<"\nEnter the Address for visiting card : ";

gets(address);

cout<<"\nEnter Contact Number : ";

gets(contact);

cout<<"\nEnter Email ID : ";

gets(email);

(47)
cout<<"\n\n\nAccount Modified..";

void account::report()

cout<<id<<setw(7)<<" "<<name<<setw(10)<<" "<<occupation<<endl;

int account::retid()

return id;

//function declaration

void write_file(); //function to write record in binary file

void display(int); //function to display account details given by user

void modify_file(int); //function to modify record of file

void delete_file(int); //function to delete record of file

void display_all(); //function to display all account details

void intro(); //introductory screen function

(48)
// THE MAIN FUNCTION OF PROGRAM

int main()

int ch;

int num;

clrscr();

intro();

do

clrscr();

cout<<"\n\n\n\tMAIN MENU";

cout<<"\n\n\t01. NEW VISITING CARD";

cout<<"\n\n\t02. ALL CARD HOLDER LIST";

cout<<"\n\n\t03. DELETE CARD";

cout<<"\n\n\t04. MODIFY VISITING CARD";

cout<<"\n\n\t05. SHOW DETAIL OF VISITING CARD";

cout<<"\n\n\t06. EXIT";

cout<<"\n\n\tSelect Your Option (1-6) ";

cin>>ch;

clrscr();

switch(ch)

(49)
case 1:

write_file();

cout<<"\nDO REMEBER YOUR VISITING CARD ID!";

break;

case 2:

display_all();

break;

case 3:

cout<<"\n\n\tEnter unique ID. : "; cin>>num;

delete_file(num);

break;

case 4:

cout<<"\n\n\tEnter Unique ID. : "; cin>>num;

modify_file(num);

break;

case 5:

cout<<"\n\n\tEnter The account No. : "; cin>>num;

display(num);

break;

case 6:

cout<<"\n\n\tThanks for using Visting card managemnt


system";

break;

default :cout<<"\a";

(50)
}

getch();

}while(ch!=6);

return 0;

// ***************function to write in file***************

void write_file()

account ac;

ofstream outFile;

outFile.open("visting.txt",ios::binary|ios::app);

ac.create();

outFile.write((char *) &ac, sizeof(account));

outFile.close();

//*************function to read specific record from file********

void display(int n)

account ac;

(51)
int flag=0;

ifstream inFile;

inFile.open("visting.txt",ios::binary);

if(!inFile)

cout<<"File could not be open !! Press any Key...";

return;

cout<<"\n******************VISITING
CARD******************\n";

while(inFile.read((char *) &ac, sizeof(account)))

if(ac.retid()==n)

ac.show();

flag=1;

inFile.close();

if(flag==0)

cout<<"\n\nAccount number does not exist";

//***************************************************************

(52)
// function to modify record of file

//
****************************************************************

void modify_file(int n)

int found=0;

account ac;

fstream File;

File.open("visting.txt",ios::binary|ios::in|ios::out);

if(!File)

cout<<"File could not be open !! Press any Key...";

return;

File.seekg(0,ios::beg);

while(File.read((char *) &ac, sizeof(account)) && found==0)

if(ac.retid()==n)

ac.show();

cout<<"\n\nEnter The New Details of account"<<endl;

ac.modify();

int pos=(-1)*sizeof(account);

File.seekp(pos,ios::cur);

(53)
File.write((char *) &ac, sizeof(account));

cout<<"\n\n\t Record Updated";

found=1;

File.close();

if(found==0)

cout<<"\n\n Record Not Found ";

// function to delete record of file

void delete_file(int n)

account ac;

ifstream inFile;

ofstream outFile;

inFile.open("visting.txt",ios::binary);

if(!inFile)

cout<<"File could not be open !! Press any Key...";

return;

outFile.open("Temp.txt",ios::binary);

inFile.seekg(0,ios::beg);

(54)
while(inFile.read((char *) &ac, sizeof(account)))

if(ac.retid()!=n)

outFile.write((char *) &ac, sizeof(account));

inFile.close();

outFile.close();

remove("visting.txt");

rename("Temp.txt","visting.txt");

cout<<"\n\n\tRecord Deleted ..";

// function to display all accounts deposit list

void display_all()

account ac;

ifstream inFile;

inFile.open("visting.txt",ios::binary);

if(!inFile)

cout<<"File could not be open !! Press any Key...";

(55)
return;

cout<<"\n\n\t\tVISITING CARD LIST\n\n";

cout<<"===================================================
============\n";

cout<<"ID"<<setw(8)<<" "<<"NAME"<<setw(15)<<"
"<<"OCCUPATION"<<endl;

cout<<"===================================================
============\n";

while(inFile.read((char *) &ac, sizeof(account)))

ac.report();

inFile.close();

// INTRODUCTION FUNCTION

void intro()

cout<<"\n\n\n\t\t\t VISITING CARD";

cout<<"\n\n\t\t MANAGEMENT\n";

cout<<" \t\t SYSTEM";

(56)
getch();

6.TESTING

(57)
TESTING

6.1 TESTING OBJECTIVE :

The aim of the system testing process was to determine all defects in our
project. The program was subjected to a set of test inputs and various
observations were made and based on these observations it will be decided
whether the program behaves as expected or not.

Testing is undertaken when a module has been created and successfully


reviewed. In order to test a single modules, we need to provide a complete
environment i.e., besides the module we would require:

 The procedures belonging to other modules that the module under test
calls.
 Non local data structures that module accesses.
 A procedure to call the functions of the module under test with
appropriate parameters.

6.2 TESTING METHODOLOGIES :

During Test Cases that are good at revealing the presence of faults is central to
successful testing. The reason for this is that if there is a faults in the program,
the program can still provide the expected behavior on the certain inputs. Only
for the set of inputs the faults that exercise the fault in the program will the
output of the program devise from the expected behavior. Hence, it is fair to say
that testing is as good as its test case. The number of test cases used to
determine errors in the program should be minimum.

(58)
6.3 QUALITY ATTRIBUTES :

There are two fundamental goals of a practical testing activity:

A. Maximize the number of errors detected .


B. Minimize the number of test cases.

As these two goals are contradictory so the problem of selecting test cases is a
complex one. . While selecting the test cases the primary objective is to ensure
that if there is an error or fault in the program, it is exercised by one of its test
cases. An ideal test case is one which succeeds(meaning that there are no errors,
revealed in its execution) only it there are no errors in the program one possible
set of ideal test cases is one which includes all the possible inputs to the
program. This is often called “exhaustive testing”. However it is impractical
and infeasible as even a small program can have an infinite input domain. So to
avoid this problem we use “test criteria” in selection of the test cases.

There are two aspects of the test case selection:

 Specifying a criteria for evaluating the test cases.


 Generating the set of cases that satisfy a given criteria.

The fully automated process of generating test criteria has not been yet found
rather guidelines are only the automated tool available to us previously.

The two fundamental properties for a testing criterion are -

 Reliability a criterion is reliable if all the sets that satisfy the criteria detect
the same error.
 Validity a criterion is valid if for any error in the program there is some set
satisfying the criteria that will reveal the error. The fundamental theorem of
testing is that if a testing criterion is valid and reliable.

(59)
7.IMPLEMENTATION

(60)
IMPLEMENTATION

7.1 CHARACTERISTICS OF LANGUAGE USED :

In this project we used the language C++ and MySQL.

C++ is an upgraded version of C programming. The main idea behind creating


C++ programming was to add object orientation to the C programming
language. The major upgradations are object-oriented programming
methodology, namespace feature, operator overloading, error & exception
handling. The motivation behind object-oriented programming is to try to see
the whole world in the form of classes & objects. 

There are various features of C++ such as :

 Object Oriented
 Simple
 Platform Dependent
 Mid-level programming language
 Structured programming language
 Rich Library
 Memory Management
 Powerful & Fast 
 Pointers
 Compiler based
 Syntax based language

Let’s discuss each one of them one by one.

(61)
OBJECT ORIENTED PROGRAMMING LANGUAGE

The main upgradation from C to C++ is object-oriented programming. It


follows concept of oops like polymorphism, inheritance, encapsulation,
abstraction. This makes development and maintenance easier. 

Let’s briefly understand the concepts of OBJECT-ORIENTED


PROGRAMMING :

 Class: A class is a user-defined blueprint or prototype from which objects


are created. It represents the set of properties or methods that are common to
all objects of one type.
 Object: It is a basic unit of Object-Oriented Programming and represents the
real-life entities. A C++ program creates many objects which interact by
invoking methods.

 Polymorphism: Polymorphism refers to the ability of OOPs programming


languages to differentiate between entities with the same name efficiently.
 Inheritance: Inheritance is the mechanism in which one class is allowed to
inherit the features (fields and methods) of another class.
 Encapsulation: Encapsulation is defined as the wrapping up of data under a
single unit. It is the mechanism that binds together code and the data it
manipulates.
 Abstraction: Data Abstraction is the property by virtue of which only the
essential details are displayed to the user. The trivial or the non-essentials
units are not displayed to the user.

(62)
FEATURES OF C++

Simple

C++ provides a structured approach wherein you can break the problem into
parts and design the solution modularly. It provides you a rich set of library
functions that you can use while implementing the solution.
If you have worked with C language, then moving to C++ would be a very
smooth transitioning. The syntax is almost similar with minute changes. 

Platform Dependent 

Platform dependent language means the language in which programs can be


executed only on that operating system where it is developed & compiled. It
cannot run or execute it on any other operating system. 

C++ is a platform-dependent language. Having said that, C++ programs can be


executed in many machines with little bit or no change.

Mid-level programming language

C++ has the ability to do both low-level & high-level programming. This is the
reason why C++ is known as a mid-level programming language. When we talk
about low-level programming, C++ is used to develop system applications such
as the kernel, driver, etc. 

Structured programming language

In C++ programming, the code is modular with the help of functions, classes &
objects, and the modules are loosely coupled. Modular code is easy to
understand & modify. This makes C++ a structured programming language. 

(63)
Rich Library

Developers have access to lots of in-built functions provided by C++ language.


This saves time & makes development fast. Let’s look at some of the C++
header files & functionalities provided by it.

 <iostream>:  Contains C++ standard input and output functions.


 <iomanip>: Contains stream manipulators that format streams of data.
 <cmath>: Contains math library functions.
 <cstdlib>: Contains function for conversions of numbers to text and vise
versa, memory allocation, random numbers and various other utility
functions. 
 <ctime>: Contains function for manipulating the time and date.
 <fstream>: Contains function for functions that perform input from files
on disk and output to files on disk.
 <memory>: Contains classes and functions used by the C++ Standard
Library to allocate memory to the C++ Standard Library containers.
 <iterator>: Contains classes for accessing data in the C++ Standard
Library containers.
 <algorithm>: Contains functions for manipulating data in C++ Standard
Library containers.

Memory Management

C++ supports dynamic memory allocation. You can free the allocated memory
at any time. Not only this C++ also provides dynamic memory management
techniques. 

(64)
Powerful & Fast

C++ is a fast language as compilation and execution time is less. Also, it has a
wide variety of data types, functions & operators.

Pointers

Pointers are variables that store the address of another variable. Pointer points to
the memory location of a variable. C++ supports pointer and provides solutions
to lots of problems that demand access to memory location.

Compiler based

C++ is a compiler-based programming language.  Without compilation, no C++


program can be executed. The compiler first compiles the C++ program and
then it is executed.

C++ Features : Syntax based language

C++ is a language that complies strongly with syntax. Language following rules
and regulations very strictly is known as tight syntax-based language. C, C++,
Java, .net are some of the examples.

(65)
My SQL Features

MySQL is a relational database management system (RDBMS) based on the


SQL (Structured Query Language) queries. It is one of the most popular
languages for accessing and managing the records in the table. MySQL is open-
source and free software under the GNU license. Oracle Company supports it.

The following are the most important features of MySQL :

Relational Database Management System (RDBMS)

MySQL is a relational database management system. This database language is

based on the SQL queries to access and manage the records of the table.

Easy to use

MySQL is easy to use. We have to get only the basic knowledge of SQL. We
can build and interact with MySQL by using only a few simple SQL statements.

It is secure

MySQL consists of a solid data security layer that protects sensitive data from
intruders. Also, passwords are encrypted in MySQL.

Client/ Server Architecture

MySQL follows the working of a client/server architecture. There is a database


server (MySQL) and arbitrarily many clients (application programs), which
communicate with the server; that is, they can query data, save changes, etc.

(66)
Free to download

MySQL is free to use so that we can download it from MySQL official website
without any cost.

It is scalable

MySQL supports multi-threading that makes it easily scalable. It can handle


almost any amount of data, up to as much as 50 million rows or more. The
default file size limit is about 4 GB. However, we can increase this number to a
theoretical limit of 8 TB of data.

Speed

MySQL is considered one of the very fast database languages, backed by a large
number of the benchmark test.

High Flexibility

MySQL supports a large number of embedded applications, which makes


MySQL very flexible.

Compatible on many operating systems

MySQL is compatible to run on many operating systems, like Novell NetWare,


Windows* Linux*, many varieties of UNIX* (such as Sun* Solaris*, AIX, and
DEC* UNIX), OS/2, FreeBSD*, and others. MySQL also provides a facility
that the clients can run on the same computer as the server or on another
computer (communication via a local network or the Internet).

(67)
Allows roll-back

MySQL allows transactions to be rolled back, commit, and crash recovery.

Memory efficiency

Its efficiency is high because it has a very low memory leakage problem.

High Performance

MySQL is faster, more reliable, and cheaper because of its unique storage
engine architecture. It provides very high-performance results in comparison to
other databases without losing an essential functionality of the software. It has
fast loading utilities because of the different cache memory.

High Productivity

MySQL uses Triggers, Stored procedures, and views that allow the developer to
give higher productivity.

Platform Independent

It can download, install, and execute on most of the available operating systems.

Partitioning

This feature improves the performance and provides fast management of the
large database.

(68)
GUI Support

MySQL provides a unified visual database graphical user interface tool named
"MySQL Workbench" to work with database architects, developers, and
Database Administrators. MySQL Workbench provides SQL development, data
modeling, data migration, and comprehensive administration tools for server
configuration, user administration, backup, and many more. MySQL has a fully
GUI supports from MySQL Server version 5.6 and higher.

Dual Password Support

MySQL version 8.0 provides support for dual passwords: one is the current
password, and another is a secondary password, which allows us to transition to
the new password.

(69)
7.2 VALIDATION CHECKS :

 In each form , no field which is not nullable must be left blank.

 All numeric fields must be checked for non-numeric values. In addition,

textual content fields like names need to know not contain any numeric

charaters.

 All primary keys should be routinely generated to prevent the user from

getting into any current key.

 Use of error handling for each Save, Edit, Delete and other important

operations.

 Whenever the user Tabs out or Enter from a text box, the data should be

validated and if it is invalid, focus should again be sent to the text box

with proper message.

(70)
7.3 INSTALLATION :

Installation is the process of making hardware and/or software ready for use.
Obviously, different systems require different types of installations. While
certain installations are simple and straightforward and can be performed by
non-professionals, others are more complex and time-consuming and may
require the involvement of specialists.

Installation can be categorized into two broad categories: physical and virtual.
Physical installation pertains to installing physical equipment such as computer
hard drives, cables, modems and so on, while virtual installation refers to
installation of software. Much physical machine installation requires specific
expertise. Similarly, there are software installations that can be done only by
experts, whereas other installations are as simple and straightforward as the
wizard-based installations commonly found with consumer software and
frequently available on websites to be downloaded. Different types of software
installations include Windows Installer installation, web-based software
installation and single exe software installation.

(71)
8.CONCLUSION

(72)
CONCLUSION

This is a special designed business for users who need it. This E-Bussiness Card
is just a sample step to progress ahead instea of wasting lots of money and time
having a physical card. This App development project helped us to gain lots of
knowledge on app development. This is what we wanted to represent you.Hope
you all liked it.

Each paper and virtual business cards are amazing in terms of sharing
your contact info an making an enduring impression. Both the cards have their
own advantages and disadvantages fo business.Their use will depend upon your
branding approach. It will be good to use both types of cards to gain from their
advantages.

In order to develop this application more efficiently, the most important


aspect is to understand the protocols of different APIs of J2ME and then use
them to develop the application. The design of user interface is also quite
important to develop because it shows directly for the users while the users use
Meetia application.

To implement Meetia application, J2ME has been used to develop for the
smart phone application. To implement every function, there are three basic
steps: develop the interface, achieve the function, and improve the interface.
The function of “Creating Bussines Card” has been implemented first, which
links it to the contact list. After finished one function it will be downloaded to
the mobile phone to test and to check whether it should be improved.

Much information about the development of smart phone had been learnt;
many different methods had been used an then compared which is the best one
to be chosen.

(73)
In summary, according to the requirements, we have developed these basic
functions. By this learning process, we mastered the knowledge of how to
develop a mobile application and from the user’s point the design of user
interface is also very important which we neglected at first. The experience for
this project we obtained is very valuable.

8.1 LIMITATIONS OF PROJECT :

Though we have tried our level best to make our system flawless and user
friendly by using the modern technologies, some minor functional and design
inconsistencies exist in our system due to time constraint, design of prototype
and cost constraints. The limitations of our system are:

1. Not Accessible to All :- A significant limitation with digital business cards


is that a larger section of the population is still not equipped well to access
these cards. They are not simply accustomed to etting the cards digitally.
Others do not understand the ways to obtain the cards, and contact
information, and how to save it. So, while you get free business cards, not all
of your clients may be seeing them.

2. Risky App :- In case a digital business card application has bugs, it can
cause some issues when sharing the card with your clients an others. So be
careful. Choose a business card app only if it comes from reputable
company.

3. A Tedious Task :- For some people downloading and installing an app as


well as creating an account for digital business card , is a boring task. As
compared to this, you can quickly hand out paper cards to the client.

(74)
4. Email Not Opened :- What if the client does not open email containing your
digital business card ? In that case , the chances are that the email is buried
down in the inbox and remains unread.

5. Blocked Images :- If may be that the client has blocked images in an email
to save data or due to spam blockage mechanisms activated. That will result
in preventing of your card.

6. Depends on Internet Access :- Both you and your client must have quick
access to the Internet for sharing digital business cards. If the client has no
Internet connection or access, the card becomes useless.

8.2 DIFFICULTIES ENCOUNTERED

1. Lack of Alignment :
Because of several organizational processes being created in isolation this
challenge is the absence of alignment. By various groups of people with
different frameworks being used it developed a link between budgeting,
operational planning and Strategy development. The lacks of alignment has in
performance management system between organizational delivery, individual
performance and departmental performance thus all frameworks default back to
money related estimations.
2. Managing poor performance :
The poor performance management is generally consider as reactive action, yet
much of the time it is deferred and along these lines transforms into an
exchange that is hard to make significant. Another reason for which it cannot
manage the poor performance on time is the lack of collection of required
measurement data and evidence and valid measurements.

(75)
3. Leadership and Management commitment:
To deliver a comprehensive performance management system management and
Leadership challenges has a large effect on aligning and integrating a
management system. For achieving a workable performance system to perform
success the understanding and commitment of management and leadership are
required.
4. Lack of Measurements:
In the organization at much level where poor measures are created and in much
of the time targets are set yet no pertinent measure is set up this challenge can
occur. In different cases no information can be gathered or is kept as proof to
follow performance.

8.3 FUTURE ENHANCEMENTS :

With all the technologies there are some constraining factors. Although we feel
that we have come up with a good solution for gradually transferring physical
cards to a digital format, our application still has its limits. Our application
requires the user to own a smartphone which supports NFC technology as well
as running on one of the major platforms. To reach our goal of eventually
replacing the old, physical card with the digital card, we need the application to
be standard for business card transactions.

Qualitative research allows us to examine issues an needs in detail and depth;


however there are also some limitations to the qualitative data gathering.
Research quality is heavily dependent on the individual skills of the researcher,
and can easily be influenced by the researcher’s personal blases. The
researcher’s presence during data gatheringcan also often affect the subject’s
response. These issues and blases might affect our research.

(76)
9.BIBLIOGRAPHY
&
REFERENCES

(77)
BIBLIOGRAPHY AND REFERENCES

9.1 REFERENCE BOOKS :

 “C++ Primer (5th Edition) 5th Edition” by Stanley B. Lippman, Josée

Lajoie, and Barbara E. Moo.

 “Let us C” by Yashavant P. Kanetkar

 “Query Solutions and Techniques for Database Developers” by

Anthony Molinaro.

 “Advanced SQL Programming” by Joe Celko.

 C++17 — The Complete Guide: First Edition

9.2 OTHER REFERENCES :

 www.1000project.com

 www.geeksforgeeks.com

 www.scribd.com

 www.business.tutsplus.com

 www.graphicsfamily.com

(78)

You might also like