This action might not be possible to undo. Are you sure you want to continue?
SL N0 PAGE NO
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. TITLE OF THE PROJECT INTRODUCTION & OBJECTIVES DFD’S MODULES OF PROJECTS DATA STRUCTURE(TABLES) PROCESS LOGIC TOOLS PALTEFORM USED REQUIREMENT SPECIFICATION SECURITY MECHANISM CONCLUSION FUTURE SCOPE & ENHANCEMENT
TITLE OF PROJECT Customer relationship management .
there was no automated process to organize the series of activities that take place. the company faced decline in sales and profits. There was no procedure to monitor the efficiency of the workers. The customer has to wait for a long time to be entertained by an executive. Product to customer’s satisfaction. PROJECT CATEGORY CRM (customer support) is being made as web-application . and win new customers.Introduction of C. automate. There was no process which could recheck the work that has been done for a particular Product (when required. This was error-prone and time consuming). just for getting the invoice.M. attract. An executive could not differentiate which customer to entertain first. the official would browse through all the slips and related documents. and reduce the costs of marketing and customer service. Customer relationship management is a broadly recognized. The overall goals are to find. involves technology to organize. widelyimplemented interactions strategy with for managing and sales and nurturing It a company’s using customers prospects. but also those for marketing. and synchronize business processes— principally sales related activities. entice former customers back into the fold. nurture and retain those the company already has. Despite of heavy investment and all modern facilities. Earlier. Long queue used to exist.R. customer service. and technical support.
The first level DFD show more detail. The 0 level DFD states the flow of data in the system as seen from the outward in each module. The DFD can be up to several levels. A Circle shows the Process An open Ended Rectangle shows the data store. It is generally made of symbols given below:A square shows the Entity.DFD The Data flow Diagram shows the flow of data. about the single process of 0 levels DFD . An arrow shows the data flow.
Table Structures of CRM .
ER-Diagram of CRM .
.MODULES AND THEIR DESCRIPTION • Customer Module .Function of this module is to firstly registered the customer and send customer Query. • Operational Module – This module View the customer query. The access rights to specific tables must be altered in a controlled way by the process that updates these tables and re-set to read only at the end of the process. This module will also View the customer query. Add. The reason is that with open database connectivity employees can access the database using spreadsheets. Mail to the Customer. • Administrator and Security Module—Security shall be implemented to control access to functions and processes within the sub-systems as well as by assigning individual table access rights to each employees. internet tools etc. When a employees runs a specific process the tables updated by that process shall be “opened” for the duration of the session only. The default access for all employees at all times will be “read only”. Delete The schema. This would ensure full control over the updating or extraction of information within the customer care web application. • Employee Module -The function of the Employee Module is to show all kinds of information related to the employee. Update. which may lead to inadvertent change of the data.
. • Admin control all actions in this customer care web application and responsible for the service of customer products . This module will also View the customer query. Then this process firstly creates a registration account in a web application and then all officially employees of service center provide service in a proper way. • Employee is to show all kinds of information related to the employee.Process Logic • In a Web Application Customer can use it in a two ways firstly if customer want to use to find out the some customer care service center in a particular location and the other if customer send the query.
This is achieved by using three different types of objects that interact with each other in loosely coupled manner with their discreet set of tasks. tables etc. It simply gets final row-data from the model and puts some cosmetics and formatting before displaying it in browser. sorting etc. Model View Controller is a design approach to separate the application object model from GUI. query. online product catalog view is completely separated from database connection. The main objective behind this pattern is to decouple the view of the data (presentation layer) from the actual data processing so that the same model can be used for various views. Then later on it has become a widely accepted common design pattern. View and Controller. some custom formatting. The beauty of MVC approach is that it supports any kind of view. View provides interface to interact with the system. originally invented around 80s.Design Pattern: This software based on concept of the Model View Controller (MVC) design pattern. VIEW: View is the graphical data presentation (outputting) irrespective of the real data processing. View is completely isolated from actual complex data operations. These three objects are known as Model. which is challenging in today’s distributed and . View renders the data from the Model in response to the request made to the model by controlled events made by user interaction. For example. View is the responsible for look and feel.
HTML. this eases your code maintenance and reduces bugs and allows code -reuse at good extent. and WML or can be Windows forms etc. View interface can be of WEB-FORMS. implementing business rules etc. . A MVC model can have multiple views. XML/XSLT. which are controlled by controller. querying database. Data provided by Model is display-neutral so it can be interfaced with as many views without code redundancy. It feeds data to the view without worrying about the actual formatting and look and feel. XTML.Multi-platform environment. like database connection. MODEL: Model is responsible for actual data processing. Model responds to the request made by controllers and notifies the registered views to update their display with new data.
User interaction triggers the events to change the model. test and upgrade the multiple system. Controllers are associated with views. Controller responds to the mouse or keyboard input to command model and view to change. . • • • It is possible to have development process in parallel for model. view and controller. • Since MVC handles the multiple views using the same enterprise model it is easier to maintain. Benefits: Following are the few of the benefits of MVC design pattern..CONTROLLER: Controller is responsible for Notice of action. Since the Model is completely decoupled from view it allows lot of flexibilities to design and implement the model considering reusability and modularity. It will be easier to add new clients just by adding their views and controllers. This model also can be extended for further distributed application. which in turn calls some methods of model to update its state to notify other registered views to refresh their display.
In order to avail the services of software employees have to provide a valid id and password and only after entering correct id and password employee will get entry otherwise they will be blocked from accessing any services of this site. FRONT END SECURITY:This security level is developed or designed by the s/w developer or designer. Information is vital to success.SECURITY MECHANISM In the software security there are two levels of security. by considering many factors regarding to the particular s/w. it can threaten . but when damaged or in the wrong hands. BACK END SECURITY:In this particular software our back end used is SQL server 2000. So all the inbuilt security aspects provided by the SQL server 2000 database is used as it is. The 1st level of security. LOGIN CHECKING: There are two login’s are provided in this software one for employees and one for applicants. S/he provides her/his s/w the security for the system. modify any personal or university data. There is also provision to change the password in case password is known by other. In order to enter recruitment zone user have to enter id and password which they got after registration . in this way security have been provided for both employee section and applicant section. Similarly a login check is provided for user applying for job. which is provided by the FRONT END and 2nd level of security provided by the database which is being used. It will provide the strong feature of security so that it will be difficult to change. In this software following are used to provide security.
DELETE USER . There are six ways by which security regarding to the database can be provided.by.person and privilege-by-privilege basis. This security is provided by granting or revoking privileges on a person. MODIFY USER . SQL server 2000 provides extensive security features to safe guard your information from both unauthorized viewing and intentional or inadvertent damage.success. They are as followsCREATE USER .
. It serves as the foundation for hardware engineering. Once requirements have been gathered explore each requirements in relationship to others.TOOLS/PLATFORM USED: Front End • • User friendly GUI • Active Server Pages (ASP. omissions and ambiguity. software engineering.Net APIs Back End • • • • • Security Performance Scalability Reliability Support RDMS concepts Sql-Server The system specification is the final work produced by the system and requirements engineer. database engineering and human engineering.Net) Separation of work Written once run anywhere (designing & coding) • Middle-Tier • Asp. examine requirements for consistency.
Hardware Specification It is recommended that the minimum configuration for clients is as appended below:Suggested Configuration of Windows clients:Microprocessor Ram Hard Disk : Pentium-2 class processor. which Includes 500 MB on system drive.5 gigabytes (GB) on installation drive. CD ROM Drive : 52 X CD ROM Drive Software Specifications Operating System RDBMS Front End : Windows 2000XP/Windows 2000 NT : Sql Server 2000 : Microsoft Visual Studio.NET . 450 megahertz MHz) : 128 MB of RAM : 2.
not and further tools require for the supports of this web application. and using the work flow of this web application very secure and properly maintain the customer products warranty periods details in database application and it can be easily upload in local IIS Server or any space service provider server. .CONCLUSION This is the best online customer care web application for providing the warranty period products and customer can reuse their damage product after using the service center supports.
Net Framework for execution environment and Ado. if the bandwidth is not sufficient the transaction will take more time then expected. .e. IIS server is required for the application.Net Provides for database connectivity. any IBM compatible PC or any other workstation with mouse support and relevant software . Although this software is architecturally independent but following hardware resources are required.DEPENDENCIES It doesn’t matter how efficiently the application works. For i.
by Apress publication Java Script Programming .5 in C# 2008 .by Wrox publication • . REFERENCES • • Pro C# with . • This system developed only one language (en-us) English and not support different language.LIMITATIONS • This system can’t provide on line product replacement process facility for their customers.NET 3.5 (Andrew Troelsen) .by Apress publication Pro ASP. • This system not providing facility for online credit cards payment for the help of customers.NET 3.
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue listening from where you left off, or restart the preview.