You are on page 1of 66

ABSTRACT

ABSTRACT

E-commerce as anything that involves an online transaction. E-commerce provides multiple


benefits to the consumers in form of availability of goods at lower cost, wider choice and saves
time. The general category of e-commerce can be broken down into two parts: E-merchandise:
E-finance. E commerce involves conducting business using modern communication instruments:
telephone, fax, e-payment, money transfer systems, e-data interchange and the Internet. Online
businesses like financial services, travel, entertainment, and groceries are all likely to grow.
Forces influencing the distribution of global e-commerce and its forms include economic factors,
political factors, cultural factors and supranational institutions. 

It has an impact over the economy of many countries among which India is on the top of that list.
It has named as new gold rush in e-commerce. E-commerce has many reasons that why it is very
crucial in developing the country. E-commerce has an intent to bring some transformation in the
society and that’s the reason its essential for the B2B and B2C commerce.

1
INTRODUCTION:-

INTRODUCTION

E-commerce (electronic commerce or EC) is the buying and selling of goods and services on the
Internet, especially the World Wide Web. In practice, this term and a newer term, e-business, are
often used interchangably. For online retail selling, the term e-tailing is sometimes used

Electronic commerce is generally considered to be the sales aspect of e-business. It also consists
of the exchange of data to facilitate the financing and payment aspects of business transactions.

E-commerce can be divided into

 E-tailing or "virtual storefronts" on Web sites with online catalogs, sometimes gathered
into a "virtual mall"
 The gathering and use of demographic data through Web contacts
 Electronic Data Interchange (EDI), the business-to-business exchange of data
 E-mail and fax and their use as media for reaching prospects and established customers
(for example, with newsletters)
 Business-to-business buying and selling
 The security of business transactions

Today Ecommerce is an integral part of business because of various reasons like:


 Ease of use & Accessibility all across the globe 
 Great variety & easy compassion of products from different vendors 
 Trusted payment channels 
 Shopping can be done sitting in the convenience of home shopping, hence it is
less time consuming.

It is therefore very important for any new entrepreneur to understand the significance of E-
Commerce and should know how to utilize this tool for the growth and development of business.

2
So, whether you have an existing business or launching a brand new business, whether the
volume of your business is large or small, you can always generate profit by demonstrating your
products or services online, thereby acquiring a large amount of viewer exposure. In concise,
buying and selling will result in profits and returns.

There are so many factors which makes e-commerce to come to the fore front in today's world.
Saving precious time involved in business transactions is really a prominent factor. Like for
instance, net banking makes it easy to carry out money and baking transactions in a break neck
speed as compared to the real banking scenario. This asserts the fact that Ecommerce is
beneficial to both business and consumer wise as payment and documentations can be completed
with greater efficiency and reliability. Another important factor determining the flow of whole
business is connectivity. Connectivity is very important for both consumers and business.
Ecommerce provides better connectivity for all the potential candidates all over the globe, thus
helping in enhancing the business without any geographical barriers. From the view point of the
customer, Ecommerce is a good platform for hassle free shopping by sitting in your home. The
customer can browse through all the products and services available and can review and compare
the prices of the similar products available in the online space.

In global market scenario, the emergence of Ecommerce as a forerunner has opened up various
windows of opportunities for a variety of online companies and investors. More and more
resources are being directed into electronic securities, internet facilities, business plans and new
technologies due to the boom in the space of E-commerce. As a result various new markets have
emerged from Ecommerce itself giving a boost to the global market.

DRAWBACKS OF CURRENT MANUAL- SYSTEM

3
1. The current manual system has a lot of paper work and it does not deal with old and new car
purchase and sale.
2. To maintain the records of sale and service manually, is a Time-consuming job.
3. With the increase in database, it will become a massive job to maintain the database.
4. Requires large quantities of file cabinets, which are huge and require quite a bit of space in
the office, which can be used for storing records of previous details.
5. The retrieval of records of previously registered patients will be a tedious job.
6. Lack of security for the records, anyone disarrange the records of your system.
7. If someone want to check the details of the available doctors the previous system does not
provide any necessary detail of this type.
ESTABLISH THE NEED OF NEW SYSTEM

1. Problem of Reliability: Current system is not reliable. It seems to vary in quality from one
month to the, next. Sometimes it gives good output, but some times the output is worst.
2. Problem of Accuracy: There are too many mistakes in reports.
3. Problem of timeliness: In the current system the reports and output produced is mostly late
and in most of the cases it is useless because it is not on time.
4. Problem of Validity: The output and reports mostly contains misleading information. The
customer's information is sometimes not valid.
5. Problem of Economy: The current system is very costly. We have to spend lots of money to
keep the system up and going, but still not get the desired results.
6. Problem of Capacity: The current system is suffering from problem of capacity also. The
staff for organization is very less and the workload is too much. Few peoples cannot handle
all the work.
PROPOSED SYSTEM

l. Employee Details: The new proposed system stores and maintains all the employees details.

2. Calculations: The new proposed system calculates salary and income tax automatically and
it is very fast and accurate.

4
3. Registers: There is no need of keeping and maintaining salary and employee register
manually. It remembers each and every record and we can get any report related to employee
and salary at any time.

4. Speed: The new proposed system is very fast with 100% accuracy and saves time.

5. Manpower: The new proposed system needs less manpower. Less people can do the large
work.

6. Efficiency: The new proposed systems complete the work of many salesperson in less time.

7. Past details: The new proposed system contains the details of every past doctor and patients
for future assistance.

8. Reduces redundancy: The most important benefit of this system is that it reduces the
redundancy of data within the data.

9. Work load: Reduces the work load of the data store by helping in easy updates of the
products and providing them with the necessary details together with financial transactions
management.

10. Easy statements: Month-end and day-end statement easily taken out without getting
headaches on browsing through the day end statements.

OBJECTIVE:-

In today’s fast moving world, the most precious thing is time. Nowadays people don’t have time for
themselves. On one hand they may have the purchasing power but on the other they don’t have the
time to go out to choose their favorite commodities or things from place to place because
transportation time, traffic and distance don’t allow people to take out time from their busy schedule
and go out and buy their favorite things. To solve this problem we have come out with an idea i.e.
Online Shopping.
This project holds the responsibility for shopping of different items on internet within
minutes. The scope of this project starts with the varities of products available, differentiating a
product of one company to another company and also makes it possible to know the prices of the
items. It helps a customer to buy different items without any stress of marketing in shopping malls.

5
The advantages are:-

 Easy shopping
 Wide range of items.
 Value for money of different items.
 Publicity of different companies and their products.
 Easy to purchase.
Need of the application:-

There are large numbers of commercial Online Shopping websites offering large number of
products tailored to meet the shopping interests of large number of customers. These
online marketplaces have thousands of products listed under various categories.

Problem:
 The basic problems with the existing systems are the non-interactive environment they
provide to the users.
 The use of traditional user interfaces which make continuous post backs to the server;
each post back makes a call to the server, gets the response and then refreshes the entire
web form to display the result. This scenario adds an extra trade off causing a delay in
displaying the results.
 Use of traditional and non user friendly interfaces that are hard to use.
 A search engine that would display the results without allowing the users to further
filter the results based on various parameters.

Solution:
 The motive of this Online Shopping Web Application is to allow the user to play with the
search tool and create different combinatorial search criterion to perform exhaustive
search.
 Provide Interactive interface through which a user can interact with different areas of
application easily.
 A search engine that provides an easy and convenient way to search for products specific
to their needs. The search engine would list a set of products based on the search term and
the user can further filter the list based on various parameters.
 Provide a feature thereby allowing the user to add products to or remove products from the
shopping cart.

Scope:
 The current system can be extended to allow the user to create accounts and save products
in to wish list.
 The current system is confined only to the shopping cart process. It can be extended to
have an easy to use check out process.

Platform Specifications:-

6
Hardware Specification:-

Pentium4-2.26Ghz.
40 GB hard disk.
256 MB RAM
Key board.
SVGA Monitor
Mouse
Software Specification:-
Windows XP
Platform .Net Framework & IIS, Visual Studio 2010
SQL Server 2008

Module Description:-

The module description of the project can be divided into two parts i.e the Administrator and the
user.
So this project has two modules

 Administrator Module
 User Module

Administrator Module:-
This module is responsible for maintaining all the administrative part.
User Module:-
This module is responsible for viewing the site, selecting the product, entering user information as
well as doing the transaction.

7
System Analysis

8
What is system?

System Analysis refers to the process of examining a business situation with the intent of
improving it through better procedures and methods Requirement analysis is the first technical
step in this process. It is a process of discovery, refinement, modelling and specification. It is the
systematic use of proven principles, techniques, languages and tools for the cost-effective
analysis, documentation and on-going evolution of user needs and the specification of external
behaviour of a system to satisfy those user needs.
The very first thing is the problem recognition. After the need of the project is identified the
implementation of the project is identified – who is going to use the website, what all are the
points needed in modeling the design of the website.
In the broad sense, a system is simply a set of components that interact to accomplish
some purpose. Systems are all around us. As computers are used more and more by persons
who are not computer professionals, the face of systems development is taking on an additional
dimension. Users themselves are undertaking development of some of the systems they use, as
the executive in the vignette emphasized. These different situations are represented by three
distinct approaches to the development of computer information systems: -

 Systems Development Life Cycle.


 Structured Analysis Development Method.
 Systems Prototype Method.

Systems development, a process consisting of two major steps of systems analysis and design,
starts when management of sometimes systems development personnel realizes that a particular
business system needs improvement. Systems development is classically thought of as the set of
activities that analysts, designers and users carry out to develop and implement an information
system.

9
Identification of Need
The existing system work manually. The existing system has got lot of intricacies within itself
and need lot of human effort and paper works. All above the data need to be maintained on
ledgers and maintaining this is a tedious and risky process. As the transactions increases, so the
data too. So the task of maintaining them increases exponentially. To view a data may need lot of
paper to be searched.
Some of the negative aspects of the existing system are as follows:
1) Course of action is time consuming. Wherever a need for search arises, the process
evolves search through paper records.
2) Readability of records is constrained. All the records may not be handled or written by
the same person. So the format and style of records differ and hence it is difficult to
understand.
3) Paper records are easily damaged in course of time. The life time of paper record is
unreliable less that it easily gets spoiled.
4) Expenditure is high. Manual system needs added man power.
5) Prone to corruption by unauthorized users. Securing of manual system is not fully
guaranteed. Inaccuracy can be expected. Data can get easily scratched.
Techniques used are more complicated. Proper techniques are not exposed, so the functioning is
intricate.

10
Feasibility Report

System Feasibility:-
Feasibility is an important phase in the software development process it enables the developers to
have an assessment of the product being developed. It refers to the feasibility study of the
product in terms of outcomes of the product, operational use and technical support required for
implementing it. Feasibility study should be performed on the basis of various criteria and
parameters. The system feasibility can be divided into the following sections:

 Economic Feasibility
 Operational Feasibility
 Technical Feasibility
 Resource Feasibility

Economic Feasibility:-

It refers to the benefits or outcomes we are deriving from the product as compared to the total
cost we are spending for developing the product. If the benefits are more or less the same as the
older system then it is not feasible to develop the product.

The project is economically feasible as the only cost involved is having a computer with the
minimum requirements mentioned earlier. For the users to access the application, the only cost
involved will be in getting access to the Internet.

Operational Feasibility:-

It refers to the feasibility of the product to be operational. Some products may work very well at
the design and implementation but many fail in the real time environment. It introduces the study
of human resources required and their technical expertise.

This product is operationally feasible as it is designed specifically for Destination Orissa project
name. This provides consistent and integrated data management.

It also provides information at all levels of people.

Technical Feasibility:-

The system is self-explanting and does not need any entire sophisticated training. A system has
been built by concentrating on the graphical uses interface concepts, the application can also be
handled very easily with a novice uses. The overall time that a uses needs to get trained is less
than 15 minutes.

11
The system has been added with features of menu device and button interaction methods, which
makes him the master as he starts working through the environment. As the software that were
used as developing this application are very economical and are readily available is the market
the only time that is lost by the customer is just installation time.

To deploy the application, the only technical aspects needed are mentioned below:

Operating Environment: Win 2000/XP


Platform : .HTML,PHP
Database : SQL lite

For Users:

Internet Browser
Internet Connection

Resource Feasibility:-

This involves questions such as how much time is available to build the new website, when it can
be built, whether it interferes with normal operations, type and amount of resources required,
dependencies, etc. Contingency and mitigation plans should also be stated here so that if the
website does over run the web-browser is ready for this eventuality.

12
Project Planning
I took assignment for developing a website for ‘Online Shopping Mall Management’ to carry
out its business transaction from remote location. The Planning of this project will include
following things:

 Team Structure.
 Topic understanding.
 Modular break-up of the system
 Processor logic for each module
 Database requirements

Team Structure:-

The project team comprises of three members who worked as developers and a project leader
who assigned the whole task and provided the finest details of the problem. The project
coordinator supervises the whole project work and sort out the problems occurred during the
development phase.

Topic Understanding:-

It is vital that the field of application as introduced in the project may be totally a new field. So
as soon as I took this project, I carefully went through the project to identify the requirements of
the project.

Modular break-up of the System:-

It consists of following phases:


 Identify the various modules in the system
 List them in the right hierarchy
 Identify their priority of development

13
14
Software requirement specifications

15
What is SRS?
Software requirement specification (SRS) is the starting point of the software development
activity. Little importance was given to this phase in the early days of software development.
The emphasis was first on coding and then shifted to design.
As systems grew more complex, it became evident that the goals of the entire system
cannot be easily comprehended. Hence the need for the requirement analysis phase arose. Now,
for large software systems, requirements analysis is perhaps the most difficult activity and also
the most error prone.
Some of the difficulty is due to the scope of this phase. The software project is initiated
by the client’s needs. In the beginning these needs are in the minds of various people in the client
organization. The requirement analyst has to identify the requirements by talking to these people
and understanding their needs. In situations where the software is to automate a currently manual
process, most of the needs can be understood by observing the current practice.
The SRS is a means of translating the ideas in the minds of the clients (the input), into
formal document (the output of the requirements phase). Thus, the output of the phase is a set of
formally specified requirements, which hopefully are complete and consistent, while the input
has none of these properties.

Purpose and Scope:-

Purpose: The main purpose for preparing this document is to give a general insight into the
analysis and requirements of the existing system or situation and for determining the operating
characteristics of the system.
Scope: This Document plays a vital role in the development life cycle (SDLC) .As it describes
the complete requirement of the system. It is meant for use by the developers and will be the
basic during testing phase. Any changes made to the requirements in the future will have to go
through formal change approval process.

Developers Responsibilities Overview:-

The developer is responsible for:


1) Developing the system, which meets the SRS and solving all the requirements of the system?
2) Demonstrating the system and installing the system at client's location after the acceptance
testing successful.
3) Submitting the required user manual describing the system interfaces to work on it and also
the documents of the system.
4) Conducting any user training that might be needed for using the system.

16
5) Maintaining the system for a period of one year after installation.

Functional Requirements:-

Output Design:-

Outputs from computer systems are required primarily to communicate the results
of processing to users. They are also used to provide a permanent copy of the results for later
consultation. The various types of outputs in general are:

 External Outputs, whose destination is outside the organization,


 Internal Outputs whose destination is within organization and they are the User’s main
interface with the computer.
 Operational outputs whose use is purely within the computer department.
 Interface outputs, which involve the user in communicating directly with

Output Definition:-

The outputs should be defined in terms of the following points:


 Type of the output
 Content of the output
 Format of the output
 Location of the output
 Frequency of the output
 Volume of the output
 Sequence of the output
It is not always desirable to print or display data as it is held on a computer. It should be
decided as which form of the output is the most suitable.
For Example
 Will decimal points need to be inserted
 Should leading zeros be suppressed.
Output Media:-
In the next stage it is to be decided that which medium is the most appropriate for the output. The
main considerations when deciding about the output media are:

 The suitability for the device to the particular application.


 The need for a hard copy.
 The response time required.
 The location of the users

17
 The software and hardware available.
Keeping in view the above description the project is to have outputs mainly coming under the
category of internal outputs. The main outputs desired according to the requirement specification
are:
The outputs were needed to be generated as a hot copy and as well as queries to be viewed on the
screen. Keeping in view these outputs, the format for the output is taken from the outputs, which
are currently being obtained after manual processing. The standard printer is to be used as
output media for hard copies.
Input Design:-

Input design is a part of overall system design. The main objective during the input designs is as
given below:
To produce a cost-effective method of input.

 To achieve the highest possible level of accuracy.


 To ensure that the input is acceptable and understood by the user.

Input Stages:-

The main input stages can be listed as below:

 Data recording
 Data transcription
 Data conversion
 Data verification
 Data control
 Data transmission
 Data validation
 Data correction

Input Types:-

It is necessary to determine the various types of inputs. Inputs can be categorized as


follows:

 External inputs, which are prime inputs for the system.


 Internal inputs, which are user communications with the system.
 Operational, which are computer department’s communications to the system?
 Interactive, which are inputs entered during a dialogue.

18
Input Media:-

At this stage choice has to be made about the input media. To conclude about the input
media consideration has to be given to;

 Type of input
 Flexibility of format
 Speed
 Accuracy
 Verification methods
 Rejection rates
 Ease of correction
 Storage and handling requirements
 Security
 Easy to use
 Portabilility
Keeping in view the above description of the input types and input media, it can be said that
most of the inputs are of the form of internal and interactive. As Input data is to be the directly
keyed in by the user, the keyboard can be considered to be the most suitable input device.
Error Avoidance:-
At this stage care is to be taken to ensure that input data remains accurate form the stage at which
it is recorded up to the stage in which the data is accepted by the system. This can be achieved
only by means of careful control each time the data is handled.
Error Detection:-
Even though every effort is make to avoid the occurrence of errors, still a small proportion of
errors is always likely to occur, these types of errors can be discovered by using validations to
check the input data.
Data Validation:-
Procedures are designed to detect errors in data at a lower level of detail. Data validations have
been included in the system in almost every area where there is a possibility for the user to
commit errors. The system will not accept invalid data. Whenever an invalid data is keyed in,
the system immediately prompts the user and the user has to again key in the data and the system
will accept the data only if the data is correct. Validations have been included where necessary.
The system is designed to be a user friendly one. In other words the system has been designed to
communicate effectively with the user. The system has been designed with pop-up menus.
User Interface Design:-
It is essential to consult the system users and discuss their needs while designing the user
interface:

19
USER INTERFACE SYSTEMS CAN BE BROADLY CLASIFIED AS:
1. User initiated interface the user is in charge, controlling the progress of the
user/computer dialogue. In the computer-initiated interface, the computer selects the
next stage in the interaction.
2. Computer initiated interfaces

In the computer initiated interfaces the computer guides the progress of the user/computer
dialogue. Information is displayed and the user response of the computer takes action or
displays further information
User Initiated Interfaces:-
User initiated interfaces fall into tow approximate classes:
1. Command driven interfaces: In this type of interface the user inputs
commands or queries which are interpreted by the computer.
2. Forms oriented interface: The user calls up an image of the form to his/her
screen and fills in the form. The forms oriented interface is chosen because it
is the best choice.

Computer-Initiated Interfaces:-
The following computer – initiated interfaces were used:
1. The menu system for the user is presented with a list of alternatives and the
user chooses one; of alternatives.
2. Questions – answer type dialog system where the computer asks question and
takes action based on the basis of the users reply.

Right from the start the system is going to be menu driven, the opening menu displays the
available options. Choosing one option gives another popup menu with more options. In this
way every option leads the users to data entry form where the user can key in the data.

Error Message Design:-


The design of error messages is an important part of the user interface design. As user is bound
to commit some errors or other while designing a system the system should be designed to be
helpful by providing the user with information regarding the error he/she has committed.
This application must be able to produce output at different modules for different inputs.

Performance Requirements:-
Performance is measured in terms of the output provided by the application.

20
Requirement specification plays an important part in the analysis of a system. Only when the
requirement specifications are properly given, it is possible to design a system, which will fit into
required environment. It rests largely in the part of the users of the existing system to give the
requirement specifications because they are the people who finally use the system. This is
because the requirements have to be known during the initial stages so that the system can be
designed according to those requirements. It is very difficult to change the system once it has
been designed and on the other hand designing a system, which does not cater to the
requirements of the user, is of no use.
The requirement specification for any system can be broadly stated as given below:
The system should be able to interface with the existing system

 The system should be accurate


 The system should be better than the existing system

The existing system is completely dependent on the user to perform all the duties.

SPECIFICATIONS:-
The website Requirements Specification is produced at the culmination of the analysis task. The
function and performance allocated to website as part of system engineering are refined by
establishing a complete information description, a detailed functional description, a
representation of system behaviour, an indication of performance requirements and design
constraints, appropriate validation criteria, and other information pertinent to requirements.
The Introduction of the website requirement specification states the goals and objectives of the
website, describing it in the context of the computer-based system. Actually the introduction may
be nothing more than the software scope of the planning document. The information description
provides a detailed description of the problem that the website must solve. Information content,
flow, and structure are documented. Hardware, Software and human interfaces are described for
external system elements and internal software functions. For this project we need some special
type of environment for setup. This is as follows:
Software Interfaces
Following software are required for developing Web based application:

I. Operating System Windows

II. Environment Widowa

III. Frontend Tool HTML,PHP

IV. Technology HTML,PHP

21
V. Versioning Tools IIS 5.0.

VI. Backend Tool MySQL

VII. Data Access Tool MySQL

VIII. Reports Crystal Report.

Hardware Interfaces
It's a web – based project, so a robust hardware configuration is required. The hardware
requirements are:

The Client Machines:

Processor : Intel Pentium IV

Speed : 1.4GHz

RAM : 512 MB

Hard Disk : 40 GB

Key Board (104 keys) : Standard

Screen resolution : 800 x 600 or higher

The Server Machines:

Processor : Intel Pentium IV

Speed : 1.4GHz

RAM : 512MB

Hard Disk : 60 to 80 GB

Screen resolution : 800 x 600 or higher

22
Programming Language & Development Tools

Front End

We have implemented JavaScript for all the Client side validations. Client side JavaScript is
designed to reside inside HTML document & ensure they run properly. It is object based, event
driven, platform independent. These are important parts of any Web application to implement
Client side Validations and the invalid data is not submitted. The form is not submitted until
user fills in correct data. It is extremely useful to restrict mistakes by user.

Hypertext Markup Language (HTML) is the standard markup language for creating web


pages and web applications. With Cascading Style Sheets (CSS) and JavaScript, it forms a triad
of cornerstone technologies for the World Wide Web.

Web browsers receive HTML documents from a web server or from local storage and render the
documents into multimedia web pages. HTML describes the structure of a web
page semantically and originally included cues for the appearance of the document.

HTML elements are the building blocks of HTML pages. With HTML constructs, images and
other objects such as interactive forms may be embedded into the rendered page. HTML
provides a means to create structured documents by denoting structural semantics for text such as
headings, paragraphs, lists, links, quotes and other items. HTML elements are delineated by tags,
written using angle brackets. Tags such as <img /> and <input /> directly introduce content into
the page. Other tags such as <p> surround and provide information about document text and may
include other tags as sub-elements. Browsers do not display the HTML tags, but use them to
interpret the content of the page.

23
Back End

MY SQL:

My SQL is an application used to create computer databases for the Microsoft Windows family
of server operating systems. It provides an environment used to generate databases that can be
accessed from workstations, the web, or other media such as a personal digital assistant (PDA).
MY SQL is probably the most accessible and the most documented enterprise database
environment right now. This also means that you can learn it a little quicker than most other
database environments on the market

To start, you must have a computer that runs an appropriate operating system like Microsoft
Windows >= XP Home Edition: that includes Windows XP Home Edition, Windows XP
Professional, Windows 2000 Professional, or any version of Windows Server 2003. In this case,
you must install MY SQL Yog.

24
DEVELOPMENT

Sources of Data
For having the detailed study about this topic, it is necessary to have some of the
secondary information, which is collected from the following:-Books, Websites
and Newspapers. So in this basically secondary data is used in collecting the
information. The sources of data are:

Websites:

 Wikipedia
 Wikinvest
 India-commerce

Newspapers:

 Hindustan Times

25
The Rise and Rise of Auction Sites

Auction sites such as Ebay and TradeMe have done an enormous amount to get ordinary
people involved in online trading. Today many Ebay merchants are establishing their
own web sites to avoid Ebay and Pay Pal fees. They have learnt about how to present
their product in their Ebay store and what issues are important to their customers in
purchasing their product and now they are ready to start their own web site.

Security

On the Internet, security is handled by passing "keys" between Internet server and client
browser. When entering a secure site your browser is passed a public key by which
transactions between you and the web server are encrypted. The servers key is always
kept private.

On your web site security can be handled two ways - depending on your budget. You can
"piggyback" on someone else's "key" or you can register and pay for your own key or
SSL certificate at Thwate or Verisign.

Generally today businesses who host web sites offer access to a secure server and you
can use their server and secure certificate for less than if you registered and paid for your
own key.

However the person browsing your site will notice the URL change to one they do not
recognise - or trust. This may put your customers off (although there is no evidence of
this). Therefore one of the advantages of buying your own key would be to have a URL
for your secure pages that is consistent with the rest of your site.

Presently, in Australia, Verisign may sell you a key for over $800 while foreign
ecommerce providers like Instant SSL can sell it for $150. Although Verisign will argue

26
that their key comes with a range of value add benefits, the bottom line is the product, i.e.
the key, is the same.

In present scenario E-Commerce is playing very essential role in the online business. Although it
is one of the best & cheapest intermediate for reaching out to new customers in the online
market, if e-commerce implemented effectively, it also offers a smart way of doing online
business & expanding it more.
An online business eCommerce podium is planned & implemented to make the most of its reach
to potential customers and provide them with a convenient, satisfying & protected shopping
experience.
Advantages of E-Commerce to the Online Business
 E-Commerce helps to Increase the sales revenue to the business
 Business people can spend less money and earn high profits with e-commerce
 It is very Easier to scale up online
 Easily we can track the segment of customers who are happy with purchasing goods
through online
 Avoid losing sales to competitors who are online
 Instantaneous global sales presence in quick time
 We can Operate the business in 24 *7 basis
 Easily we can increase our business customers
 We set up shop anywhere in the world, self-governing of geographical locations
 Inexpensive way to turn your Web site into a revenue center
 Reduce Customer Support costs via e-mail marketing & customary newsletters
 We can create customized mailing list
 Easily we can drive free traffic to the website
 Instantly we can develop our business across the internet by using various e-commerce
strategies
 Customers can easily buy their products by using different payment gateways
 Develop more shopping carts by using e-commerce
 We can easily promote our business website by using various promotional activities such as
Search Engine Optimization, Pay Per Click Management, Email Marketing, Social Media

27
Optimization, Online Banner Advertisement, Online Branding and Affiliate Management
etc

PHASES:  
 1.  Initiation Phase

The initiation of a system (or project) begins when a business need or opportunity is identified. A
Project Manager should be appointed to manage the project. This business need is documented in
a Concept Proposal. After the Concept Proposal is approved, the System Concept Development
Phase begins.

2. System Concept Development Phase

Once a business need is approved, the approaches for accomplishing the concept are reviewed
for feasibility and appropriateness. The Systems Boundary Document identifies the scope of the
system and requires Senior Official approval and funding before beginning the Planning Phase.

3. Planning phase

The concept is further developed to describe how the business will operate once the approved
system is implemented, and to assess how the system will impact employee and customer
privacy. To ensure the products and /or services provide the required capability on-time and
within budget, project resources, activities, schedules, tools, and reviews are defined.
Additionally, security certification and accreditation activities begin with the identification of
system security requirements and the completion of a high level vulnerability assessment.

4. Requirements Analysis Phase

Functional user requirements are formally defined and delineate the requirements in terms of
data, system performance, security, and maintainability requirements for the system. All
requirements are defined to a level of detail sufficient for systems design to proceed. All
requirements need to be measurable and testable and relate to the business need or opportunity
identified in the Initiation Phase.

28
5. Design Phase

The physical characteristics of the system are designed during this phase. The operating
environment is established, major subsystems and their inputs and outputs are defined, and
processes are allocated to resources. Everything requiring user input or approval must be
documented and reviewed by the user. The physical characteristics of the system are specified
and a detailed design is prepared. Subsystems identified during design are used to create a
detailed structure of the system. Each subsystem is partitioned into one or more design units or
modules. Detailed logic specifications are prepared for each software module.

6. Development Phase

The detailed specifications produced during the design phase are translated into hardware,
communications, and executable software. Software shall be unit tested, integrated, and retested
in a systematic manner. Hardware is assembled and tested.

7.  Integration and Test Phase

The various components of the system are integrated and systematically tested. The user tests the
system to ensure that the functional requirements, as defined in the functional requirements
document, are satisfied by the developed or modified system. Prior to installing and operating the
system in a production environment, the system must undergo certification and accreditation
activities.

8.  Implementation Phase

The system or system modifications are installed and made operational in a production
environment. The phase is initiated after the system has been tested and accepted by the user.
This phase continues until the system is operating in production in accordance with the defined
user requirements.

9.  Operations and Maintenance Phase

The system operation is ongoing. The system is monitored for continued performance in
accordance with user requirements, and needed system modifications are incorporated. The
operational system is periodically assessed through In-Process Reviews to determine how the
system can be made more efficient and effective. Operations continue as long as the system can
be effectively adapted to respond to an organization’s needs. When modifications or changes are
identified as necessary, the system may reenter the planning phase.

SDLC Objectives:-

This guide was developed to disseminate proven practices to system developers, project
managers, program/account analysts and system owners/users throughout the DOJ. The specific
objectives expected include the following:

29
 To reduce the risk of project failure
 To consider system and data requirements throughout the entire life of the system
 To identify technical and management issues early
 To disclose all life cycle costs to guide business decisions
 To foster realistic expectations of what the systems will and will not provide
 To provide information to better balance programmatic, technical, management, and cost
aspects of proposed system development or modification
 To encourage periodic evaluations to identify systems that are no longer effective
 To measure progress and status for effective corrective action
 To support effective resource management and budget planning
 To consider meeting current and future business requirements

Design Document

PROBLEM STATEMENTS FOR ONLINE SHOPPING MALL


MANAGEMENT

Software has to be developed for automating the manual shopping system. The system should
be distributed in nature. It should be designed to provide functionalities as explained below:
1) Login: - For the security reason Administrator of the system are given a user Id and a
Password. Only If the Id and Password are correct is the administrator allowed entry to the
system and maintain records in the system.
2) Do transaction:-A customer should be able to pay in the eshop. For the traction customer has
so many options such as credit card, debit card, check. Customer has to choose one potion from
given options and pay for his purchased products. If the value of the purchased product is same
as the value of payment then the traction will be valid. Else the traction is invalid.
3) Maintain Record: - Administrator has to maintain records. Before that, Administrator has to
enter by logging in to the system. He has to maintain all company details ,category details and
product details .He has to update stock .so that customer could get current products in a current
value.
4) View shopping:-Here the customer has to visit the site and could see all the products available
in the eshop. He have to choose products .Then he goes to the payment procedure. After the
payment customer has to enter all his information so that the customer could get his product
easily. At last customer gets a control no which is unique. Before customer gets his product, he
may check the status by putting a control no.

30
The general flow of any analysis and design process is to begin with the identification of
the functionalities of the system and the actor associated with the system. I depict the overview
of the system to be developed by a use case diagram. After analyzing the above problem I have
to identify the following use case and actors of the system.

Actors associated with the system are:


1) Administrator
2) Customer
Use cases for the system are:
1) Login
2) Maintain Record
3) Do traction
4) View shopping

USECASE DIAGRAM

31
Login

Do Transaction
T

Transaction Customer

Administrator
Maintain Record

View Product Details

Credit Card

Do Transation
Transaction
Debit Card

Customer
UPI

32
Maintain Record

Administrator

Product Details Purchase details


Company details

Select Product
View Products Details Payment

Customer
View Status

Use Case Name: Login

33
Brief description: this use case is used by the administrator in order to make the eshop secure
from outsiders.
Pre-condition: to hide data from outsiders administrator has to remember username and
password .He should not leak out to outsiders.
Primary Action: Administrator
Secondary Action: None.
Flow of events:
1) As the administrator want to activate the administrator module, steps are started.
2) The administrator has to enter username and password.
3) Click Login button to enter into the administrator module
Alternate flow: None.
Special Requirement:
1) Database has to be available all time
2) Correct data has to be input
3) Network has to be perfect
Post condition: The username and password should be match with the login table when he click
login button.
Business rule: None
Relationship: this use is related to the login until the administrator is entered.
The administrator will be able to enter if and only if he logged in.
Use Case Name: Do Transaction
Brief description: this use case is used by customers to do transaction.
Pre-condition: In order to perform transaction customer has to select item first.
Primary Action: customer.
Secondary Action: None.
Flow of events:
1) As the customer chooses to buy products, steps are started.
2) The customer chooses all type of products randomly.

34
3) After the products selected payment procedure will be started.
4) The customer has to select from type of payment from the given payment options.
5) Customer has to enter the card number and all the required information.
.Alternate flow: None.
Special Requirement:
1) Database has to be available as all times.
2) Correct data has to input.
3) Network has to be perfect.
Post condition: None.
Business rule: this procedure gives correct output to the customer in a few times.
Relationship: This use is related to the accountant until the customer has select items.
The customer has to purchase items if and only if the customer is paid.
Use case Name: Maintain Record.
Brief description: This use case is used by the administrator to maintain the proper sales record
of eshop.
Pre-condition: In order to maintain record the administrator has to login the system.
Primary action: Administrator
Secondary action: None.
Flow of events:
1) As the administrator attained to maintain record, steps are started.
2) Administrator always checks items which is available in eshop and which is not
available in the eshop by company details , category details & product details.
3) Administrator permits the customer to purchase available items in the eshop.
4) Administrator always updates stock after the customer has purchased.
Alternate Flow: None.
Special Requirement:
1) Database has to be available as all times.
2) Correct data has to input.

35
3) Network has to be perfect so that the customer could get perfect information.
Post condition: None.
Relationship: this use is related to the check the eshop after the customer purchase products.
Use case Name: View Product Details.
Brief description: this use case is used by the customer to view all the available objects, shopping
status and purchase their necessary items in a very little amount of time.
Pre-condition: In order to purchase, customer has to view the eshop site.
Primary action: before purchase customer has to enter all the required information correctly
which is suitable for eshop to interact.
Secondary action: The customer has to verify information properly .
Flow of events:
1) As the customer want to visit this site , steps are started.
2) Customer has to enter the URL address and see the available product.
3) Choose items which are available to purchase.
4) Attained the payment procedure.
5) Enter total information correctly which is suitable to get the item in a proper way and
click ok button to save the data in database.
6) Customer may view the status by entering his username and password.
Alternate flow: None.
Special Requirements:1) database has to be available at all time.
2) Correct data has to be input
3) Network has to be perfect.
Post-Condition: The customer has to be remembering his control no. after the information is
stored into the database.
Business Rule: Right information gets right item to the customer with in little time.
Relationship: This use is related to shopping with the customer. The customer will be able to
shopping if and only if he maintains the transaction properly.

E-R Diagram

36
An entity-relationship (ER) diagram is a specialized graphic that illustrates the interrelationships
between entities in a database. ER diagrams often use symbols to represent three different types
of information.
 Boxes are commonly used to represent entities.

 Diamonds are normally used to represent relationships.

 Ovals are used to represent attributes.

37

ProductType

Price
Image

Entity Relation Ship Diagram

38
DATA FLOW DIAGRAM

A data flow diagram is graphical tool used to describe and analyze movement of data through a
system. These are the central tool and the basis from which the other components are developed.
The transformation of data from input to output, through processed, may be described logically
and independently of physical components associated with the system. These are known as the
logical data flow diagrams. The physical data flow diagrams show the actual implements and
movement of data between people, departments and workstations. A full description of a system
actually consists of a set of data flow diagrams. Using two familiar notations Yourdon, Gane
and Sarson notation develops the data flow diagrams. Each component in a DFD is labeled with
a descriptive name. Process is further identified with a number that will be used for
identification purpose. The development of DFD’s is done in several levels. Each process in
lower level diagrams can be broken down into a more detailed DFD in the next level. The lop-
level diagram is often called context diagram. It consists a single process bit, which plays vital
role in studying the current system. The process in the context level diagram is exploded into
other process at the first level DFD.
The idea behind the explosion of a process into more process is that understanding at one level of
detail is exploded into greater detail at the next level. This is done until further explosion is
necessary and an adequate amount of detail is described for analyst to understand the process.
Larry Constantine first developed the DFD as a way of expressing system requirements in a
graphical from, this lead to the modular design.
A DFD is also known as a “bubble Chart” has the purpose of clarifying system requirements and
identifying major transformations that will become programs in system design. So it is the
starting point of the design to the lowest level of detail. A DFD consists of a series of bubbles
joined by data flows in the system.

39
DFD SYMBOLS

In the DFD, there are four symbols


1. A square defines a source(originator) or destination of system data
2. An arrow identifies data flow. It is the pipeline through which the information flows
3. A circle or a bubble represents a process that transforms incoming data flow into outgoing
data flows.
4. An open rectangle is a data store, data at rest or a temporary repository of data

Circle depicts a process.

Arrows depict data flow

Rectangle depicts an external entity

Open rectangle depicts a data store

40
CONSTRUCTING A DFD

Several rules of thumb are used in drawing DFD’s:


1. Process should be named and numbered for an easy reference. Each name should be
representative of the process.
2. The direction of flow is from top to bottom and from left to right. Data Traditionally flow
from source to the destination although they may flow back to the source. One way to
indicate this is to draw long flow line back to a source. An alternative way is to repeat the
source symbol as a destination. Since it is used more than once in the DFD it is marked with
a short diagonal.
3. When a process is exploded into lower level details, they are numbered.
4. The names of data stores and destinations are written in capital letters. Process and dataflow
names have the first letter of each work capitalized

A DFD typically shows the minimum contents of data store. Each data store should contain
all the data elements that flow in and out.
Questionnaires should contain all the data elements that flow in and out. Missing interfaces
redundancies and like is then accounted for often through interviews.

SAILENT FEATURES OF DFD’s


1. The DFD shows flow of data, not of control loops and decision are controlled
considerations do not appear on a DFD.
2. The DFD does not indicate the time factor involved in any process whether the dataflows
take place daily, weekly, monthly or yearly.
3. The sequence of events is not brought out on the DFD.

RULES GOVERNING THE DFD’S

PROCESS
1) No process can have only outputs.
2) No process can have only inputs. If an object has only inputs than it must be a sink.
3) A process has a verb phrase label.

DATA STORE
1) Data cannot move directly from one data store to another data store, a process must
move data.
2) Data cannot move directly from an outside source to a data store, a process, which
receives, must move data from the source and place the data into data store
3) A data store has a noun phrase label.

41
SOURCE OR SINK
The origin and /or destination of data.
1) Data cannot move direly from a source to sink it must be moved by a process
2) A source and /or sink has a noun phrase land

DATA FLOW

1) A Data Flow has only one direction of flow between symbols. It may flow in both
directions between a process and a data store to show a read before an update. The
later is usually indicated however by two separate arrows since these happen at
different type.
2) A join in DFD means that exactly the same data comes from any of two or more
different processes data store or sink to a common location.
3) A data flow cannot go directly back to the same process it leads. There must be at
least one other process that handles the data flow produce some other data flow
returns the original data into the beginning process.
4) A Data flow to a data store means update (delete or change).
5) A data Flow from a data store means retrieve or use.

42
Context Level Diagram

0.0

USER Online Products


Shopping

First Level Diagram

1.0 3.0

Search Add To
USER
Products Cart

2.0

Buy

43
Module Details
The module description of the project can be divided into two parts i.e the Administrator and the
user.
So this project has two modules

 Administrator Module
 User Module

Administrator Module:-
This module is responsible for maintaining all the administrative part and has sub-modules
such as
i) Company:-
This module is responsible for entering the company details where we need to keep the
information of name, location, mission, vision established here as well as type of the company.
ii) Product:-
This module is dependent on the category and a category is under company. So indirectly a
product is dependent on the company. We need to keep the full information of the product because
this has direct dealings with the customer.
iii) Purchase:-
This module is responsible maintain price, type, product code, date etc of a particular product.

User Module:-
This module is responsible for viewing the site, selecting the product, entering user
information as well as doing the transaction and having several sub-modules such as

i)Front Page:-
This is the basic module of each site because every web application has a front page for
giving information about the sites and to motivate the user by which he will have interest to visit
the site.
ii)Viewing details:-
The information entered by the admin such as company details, category details, product
details can be viewed by the user which helps to select any item as per his requirement.

44
iii)Transaction:-
After selecting items of different category of different company the user can submit to the
transaction where he needs to give the personal information and the financial information to
proceed further.
iv) Cart Module:-
This module starts when the user views the shopping cart. All the products that have been
added to the shopping cart by the user are listed along with their price and the quantity.

45
Database Design

Data Integrity:-

It is an important feature in SQL Server. When used properly, it ensures that data is accurate,
correct, and valid. It also acts as a trap for otherwise undetectable bugs within applications. A
constraint is a property assigned to a column or the set of columns in a table that prevents certain
types of inconsistent data values from being placed in the column (s). Constraints are used to
enforce the data integrity. This ensures the accuracy and reliability of the data in the database.
The following categories of the data integrity exist: -
1. Entity Integrity: - Entity Integrity ensures that there are no duplicate rows in a table.
2. Domain Integrity: - Domain Integrity enforces valid entries for a given column by
restricting the type, the format, or the range of possible values.
3. Referential integrity: - Referential integrity ensures that rows cannot be deleted, which
are used by other records (for example, corresponding data values between tables will be
vital).
4. User-Defined Integrity: - User-Defined Integrity enforces some specific business rules
that do not fall into entity, domain, or referential integrity categories.

Each of these categories of the data integrity can be enforced by the appropriate constraints.
Microsoft SQL Server supports the following constraints: -
1. Primary key: - Primary key constraint is a unique identifier for a row within a database
table. Every table should have a primary key constraint to uniquely identify each row and
only one primary key constraint can be created for each table. The primary key
constraints are used to enforce entity integrity.
2. Unique: - Unique constraint enforces the uniqueness of the values in a set of columns, so
no duplicate values are entered. The unique key constraints are used to enforce entity
integrity as the primary key constraints.
3. Foreign key: - Foreign key constraint prevents any actions that would destroy links
between tables with the corresponding data values. A foreign key in one table points to a
primary key in another table. Foreign keys prevent actions that would leave rows with
foreign key values when there are no primary keys with that value. The foreign key
constraints are used to enforce referential integrity.
4. Check: - Check constraint is used to limit the values that can be placed in a column. The
check constraints are used to enforce domain integrity.
5. Not null: - Not null constraint enforces that the column will not accept null values. The
not null constraints are used to enforce domain integrity, as the check constraints.

Data Dictionary:-

46
After carefully understanding the requirements of the client the entire data storage requirements
are divided into tables. The below tables are normalized to avoid any anomalies during the
course of data entry.

47
OUTPUT

B2C - business to consumer

In the Australian context B2C (business to consumer) trading activity has been slow to
take off as at first consumers had doubts about the security of credit card transactions.

Initial B2C trading focused on music CDs, software and books - items which were
compact and easily shipped and where prices could be slashed once the retailer's cut was
taken out of the margin. The Amazon book store would be a good example of this. These
products pushed the perimeters of the market out for goods bought on-line.

Books and CDs are relatively generic products. A CD bought in the US will have the
same music and quality as one bought locally (the exception is the cover art) and so there
is no doubt in the consumers mind exactly what the product is. This is not the case with
clothing, where sizes can confuse the purchase decision... and where tactile senses figure
strongly in the purchasing decision.

Ebay has really transform purchasing behaviour on the web. Many people have made
their first ecommerce transaction on Ebay. Many people sell on Ebay too, given raise to
the work-from-home/drop shipping model of ecommerce.

Interestingly though B2C transactions of previously localised or hard to find products can
be extremely strong. If you have a unique product that is highly relevant to a niche
audience, you are likely to do very well on the web.

Although sales are increasing rapidly on the Internet, the volume of turnover figures
continue to fail short of industry estimates. But as retail web sites become more navigable
and privacy policies are displayed, more people will be drawn to Net-based purchasing
by lower prices and convenience.

B2B - business to business

48
On the Internet, B2B (business to business) is the exchange of products or services
between businesses rather than between businesses and consumers.

Although early interest centered on the growth of retailing on the Internet, forecasts are
that B2B revenue will far exceed B2C revenue in the near future.

According to studies published in early 2000, the money volume of B2B exceeds that of
B2C by 10 to 1. Over the next five years, B2B is expected to have a compound annual
growth of 41%.

Payment Gateways

Both PayPal and Paymate offer credit card to bank account payments. Using one of these


services you can invoice a customer, they can pay on Paymate and the funds will be
deposited in your bank account ... less a transaction fee.

Unlike a credit card merchant facility you will not have ongoing, minimum monthly
fees... and the transaction fee is better than what most card companies offer small
merchants. Additional these service are being backed into other ecommerce sites and
shopping carts. Ebay for example uses Paypal to process some payments.

49
Screen Layout

50
51
52
53
Coding

<?php

include('header.php');

?>

<body>

<?php

include('navtop.php');

?>

<div id="background">

<div id="page">

<?php include ('nav_sidebar.php');?>

<div id="content">

<div class="hero-unit-table"> <!-- image slider -->

<div class="slider-wrapper theme-default">

<div id="slider" class="nivoSlider">

54
<img src="admin/images/wine.png" data-thumb="images/toystory.jpg"
alt="" />

<img src="admin/images/instrument.jpg" data-thumb="images/toystory.jpg"


alt="" />

<img src="admin/images/instrument2.jpg" data-thumb="images/wineries.jpg"


alt="" />

<img src="admin/images/large.jpg" alt="" data-transition="slideInLeft" />

<img src="admin/images/guitar.jpg" data-thumb="images/nemo.jpg" alt="" />

</div>

</div>

<!-- end slider -->

<hr/>

<center><h3 class = "center alert alert-success" style = "width:500px;


font-weight:Bolder;">Latest Item</h3></center>

<div id="body">

<div class="body">

<ul>

<li>

<a class="figure"
href="Decorative_Light.php"><img class = "image-rounded"src="images/wineries.jpg"
alt=""></a>

<!-- <a class="figure" href="Decorative_Light.php" data-toggle =


"modal"><img class = "image-rounded"src="images/wineries.jpg" alt=""></a>-->

</li>

<li>

55
<a class="figure" href="Commercial_Light.php"><img class = "image-
rounded"src="images/wineries.jpg" alt=""></a>

<!--<a class="figure"
href="Commercial_Light.php" data-toggle = "modal" ><img class = "image-
rounded"src="images/wineries.jpg" alt=""></a>-->

</li>

<li>

<a class="figure" href="Outdoor_Light.php"><img class = "image-


rounded"src="images/wineries.jpg" alt=""></a>

<!--<a class="figure"
href="Outdoor_Light.php" data-toggle = "modal" ><img class = "image-rounded"
src="images/wineries.jpg" alt=""></a>-->

</li>

<li>

<a class="figure"
href="Home_Lights.php"><img class = "image-rounded"src="images/wineries.jpg" alt=""></a>

<!--<a class="figure" href="Home_Lights.php" data-toggle = "modal"


><img class="img-rounded" src="images/wineries.jpg" alt=""></a> -->

</li>

</ul>

<?php include ('modal_latest.php');?>

</div>

</div>

56
<div id="footer">

<?php include('footer.php'); ?>

</div>

</div>

</div>

</div>

</div>

<?php include('footer_bottom.php') ?>

</body>

</html>

57
Testing
Testing is the process of detecting errors. Testing performs a very critical role for quality
assurance and for ensuring the reliability of software. The results of testing are used later on
during maintenance also.
Thus a software product goes through three level of testing:
 Unit Testing
 Integration Testing
 System Testing

Testing Objectives
The main objective of testing is to uncover a host of errors, systematically and with minimum
effort and time. Stating formally, we can say,
 Testing is a process of executing a program with the intent of finding an error.
 A successful test is one that uncovers an as yet undiscovered error.
 A good test case is one that has a high probability of finding error, if it exists.
 The tests are inadequate to detect possibly present errors.

Levels of Testing
In order to uncover the errors present in different phases we have the concept of levels of
testing. The basic levels of testing are as shown below…

Acceptance
Testing
Client Needs

System Testing
Requirements

Integration Testing
Design

Unit Testing
Code

58
Type of Testing

There are following type of testing:

Unit testing

Unit testing focuses verification effort on the smallest unit of software i.e. the module. Using the
detailed design and the process specifications, testing is done to uncover errors within the
boundary of the module. All modules must be successful in the unit test before the start of the
integration testing begins

 The purpose of the coding and unit testing phase of software development is to translate
the software design into source code. Each component of the design is implemented as
a program module. The end-product of this phase is a set of program modules that have
been individually tested. To enable the engineers to write good quality programs, every
software development organization normally formulates its own coding.

 A coding standard addresses issues such as the standard ways of laying out the program
codes, the template for laying out the function and module headers, commenting
guidelines, variable and function naming conventions, the maximum no of source lines
permitted in each module, and so forth.

 During this phase, each module is unit tested to determine the correct working of all the
individual modules. It involves testing each module in isolation as this is the most
efficient way to debug the errors identified at this stage. Another reason behind testing
a module in isolation is that the other modules, with which this module has to be
interfaced, may not be ready.

Integration Testing

After unit testing, we have to perform integration testing. The primary objective of this is to test
the module interface in order to ensure that there are no errors in the parameter passing when one
module invokes another module. During this testing different modules of a system are
integrated in a planned manner using an integration plan. The integration plan specifies the steps
and the order in which modules are combined to realize the full system. After each integration
step, the partially integrated system is tested.
Here we followed up bottom-up integration testing. In bottom –up integration testing,
each subsystem is tested separately and then the full system is tested. A subsystem might consist
of many module which communicate among each other through well-defined interfaces among
various modules making up the subsystem.

59
System testing

Finally, when all the modules have been successfully integrated and tested, system testing is
carried out. The goal of system testing is to ensure that the developed system conforms to its
requirements laid out in the SRS document. System testing is the overall testing of the system in
the laboratory with its whole environment. System testing types are:

 ALPHA TESTING :- The first test of newly developed hardware or software in a


laboratory setting. When the first round of bugs has been fixed, the product goes into beta
test with actual users. For custom software, the customer may be invited into the vendor’s
facilities for an alpha test to ensure the client’s vision has been interpreted properly by
the developer.

 BETA TESTING:- Test new or revised hardware or software that is performed by users
at their facilities under normal operating conditions. Beta testing follows alpha testing.
Vendors of packaged software often offer their customers the opportunity of beta testing
new release or versions, and the beta testing of elaborate products such as operating
systems can take months.

 USER ACCEPTANCE TESTING:- Final testing cycle usually performed by end users
to make sure that the developed system will support their business need and will be as per
the agreed upon requirements.

There are two types of testing based on the output:

 WHITE BOX:- Testing software with a complete knowledge of its logic and code.
I tested step wise every piece of code, taking care that every statement in the code is
executed at least once. The white box testing is also called Glass Box Testing.
I have generated a list of test cases, sample data, which is used to check all possible
combinations of execution paths through the code at every module level.

 BLACK BOX :- Testing software based on output only without any knowledge of its
code and logic. This testing method considers a module as a single unit and checks the unit
at interface and communication with other modules rather getting into details at statement
level. Here the module will be treated as a block that will take some input and generate
output. Output for a given set of input combinations are forwarded to other modules.

60
Black-box test are designed to uncover errors functional requirement without
regard to the internal workings of a program. Black-box testing techniques focus on
the information domain of the software, deriving test cases by partitioning the input
and output domain of a program in manner that provides through test coverage. The
black-box test is used to demonstrate that software functions are operational, that input
is properly produced, and that the integrity of external information are maintained. A
black-box test examines some fundamental aspect of a system with little or no regard
for the integral logical structure of the software.

Acceptance Testing
Acceptance Test is performed with realistic data of the client to demonstrate that the software is
working satisfactorily. Testing here is focused on external behavior of the system; the internal
logic of program is not emphasized.
In this project ‘Online Shopping Mall Management’ I have collected some data and tested
whether project is working correctly or not.
Test cases should be selected so that the largest number of attributes of an equivalence class is
exercised at once. The testing phase is an important part of software development. It is the
process of finding errors and missing operations and also a complete verification to determine
whether the objectives are met and the user requirements are satisfied.

61
Conclusion

62
Conclusion

 The ‘Online Shopping Mall Management’ is designed to provide a web based application
that There is a wide acceptance of e-commerce in world due to the internet facilities
available.
 The countries such as India, Brazil, and China etc which are on the path of development
are using e-commerce for carry out various transactions.
 The e-commerce can surpass geographical limits and can prove to be worthy by reaching
to customers. It caters to the demands of both the national and the international market.
 The e-commerce can help in providing an edge to your rivals in the market as one can
better serve them globally.
 The Countries such as USA, Australia, Canada , UK etc are trying to come up with
something innovative which will change the current scenario.
 The countries are well aware of its benefits and are becoming more innovative in this
field as customers can easily select products from different providers without moving
around physically and it also help business to handle its resources well.

The advantages are:-

 Easy shopping
 Wide range of items.
 Value for money of different items.
 Publicity of different companies and their products.
 Easy to purchase.

63
Project Summary
This application has been computed successfully and was also tested successfully by taking “test
cases”. It is user friendly, and has required options, which can be utilized by the user to perform
the desired operations.
The software is developed using HTML,PHP environment. The goals that are achieved
by the software are:
 Optimum utilization of resources.
 Efficient management of records.
 Simplification of the operations.
 Less processing time and getting required information.
 User friendly.

Scope for Future Work


The following things can be done in future.

 The current system can be extended to allow the users to create accounts and save
products in to wish list.
 The users could subscribe for price alerts which would enable them to receive messages
when price for products fall below a particular level.
 The current system is confined only to the shopping cart process. It can be extended to
have an easy to use check out process.
 Users can have multiple shipping and billing information saved. During checkout they can
use the drag and drop feature to select shipping and billing information.

BIBLIOGRAPHY

1.  "General HTML,PHP FAQ — HTML,PHP 3.9.2 documentation". docs.HTML,PHP.org.


Retrieved 28 March 2021.
2. ^ Jump up to:a b Guttag, John V. (12 August 2016). Introduction to Computation and
Programming Using HTML,PHP: With Application to Understanding Data. MIT
Press. ISBN 978-0-262-52962-4.
3. ^ "HTML,PHP 3.9.4 hotfix is now available". 4 April 2021. Retrieved 5 April 2021.
4. ^ "HTML,PHP 3.10.0a7 is now available for testing". 6 April 2021. Retrieved 6
April 2021.

64
5. ^ "Why is HTML,PHP a dynamic language and also a strongly typed language -
HTML,PHP Wiki". wiki.HTML,PHP.org. Retrieved 27 January2021.
6. ^ "PEP 483 -- The Theory of Type Hints". HTML,PHP.org.
7. ^ File extension .pyo was removed in HTML,PHP 3.5. See PEP 0488
8. ^ Holth, Moore (30 March 2014). "PEP 0441 -- Improving HTML,PHP ZIP Application
Support". Retrieved 12 November 2015.
9. ^ "Starlark Language". Retrieved 25 May 2019.
10.^ Jump up to:a b "Why was HTML,PHP created in the first place?". General HTML,PHP
FAQ. HTML,PHP Software Foundation. Retrieved 22 March2007.
11.^ "Ada 83 Reference Manual (raise statement)".
12.^ Kuchling, Andrew M. (22 December 2006). "Interview with Guido van Rossum (July
1998)". amk.ca. Archived from the original on 1 May 2007. Retrieved 12 March 2012.
13.^ Jump up to:a b "itertools — Functions creating iterators for efficient looping —
HTML,PHP 3.7.1 documentation". docs.HTML,PHP.org.
14.^ van Rossum, Guido (1993). "An Introduction to HTML,PHP for UNIX/C
Programmers". Proceedings of the NLUUG Najaarsconferentie (Dutch UNIX Users
Group). CiteSeerX 10.1.1.38.2023. even though the design of C is far from ideal, its
influence on HTML,PHP is considerable.
15.^ Jump up to:a b "Classes". The HTML,PHP Tutorial. HTML,PHP Software Foundation.
Retrieved 20 February 2012. It is a mixture of the class mechanisms found in C++ and
Modula-3
16.^ Lundh, Fredrik. "Call By Object". effbot.org. Retrieved 21 November 2017. replace
"CLU" with "HTML,PHP", "record" with "instance", and "procedure" with "function or
method", and you get a pretty accurate description of HTML,PHP's object model.
17.^ Simionato, Michele. "The HTML,PHP 2.3 Method Resolution Order". HTML,PHP
Software Foundation. The C3 method itself has nothing to do with HTML,PHP, since it
was invented by people working on Dylan and it is described in a paper intended for
lispers
18.^ Kuchling, A. M. "Functional Programming HOWTO". HTML,PHP v2.7.2
documentation. HTML,PHP Software Foundation. Retrieved 9 February 2012.
19.^ Schemenauer, Neil; Peters, Tim; Hetland, Magnus Lie (18 May 2001). "PEP 255 –
Simple Generators". HTML,PHP Enhancement Proposals. HTML,PHP Software
Foundation. Retrieved 9 February 2012.
20.^ Smith, Kevin D.; Jewett, Jim J.; Montanaro, Skip; Baxter, Anthony (2 September
2004). "PEP 318 – Decorators for Functions and Methods". HTML,PHP Enhancement
Proposals. HTML,PHP Software Foundation. Retrieved 24 February 2012.
21.^ "More Control Flow Tools". HTML,PHP 3 documentation. HTML,PHP Software
Foundation. Retrieved 24 July 2015.
22.^ "CoffeeScript". coffeescript.org.
23.^ "The Genie Programming Language Tutorial". Retrieved 28 February 2020.
24.^ "Perl and HTML,PHP influences in JavaScript". www.2ality.com. 24 February 2013.
Retrieved 15 May 2015.
25.^ Rauschmayer, Axel. "Chapter 3: The Nature of JavaScript; Influences". O'Reilly,
Speaking JavaScript. Retrieved 15 May2015.

65
26.^ Jump up to:a b "Why We Created Julia". Julia website. February 2012. Retrieved 5
June 2014. We want something as usable for general programming as HTML,PHP [...]
27.^ Ring Team (4 December 2017). "Ring and other languages". ring-lang.net. ring-lang.
28.^ Bini, Ola (2007). Practical JRuby on Rails Web 2.0 Projects: bringing Ruby on Rails to
the Java platform. Berkeley: APress. p. 3. ISBN 978-1-59059-881-8.
29.^ Lattner, Chris (3 June 2014). "Chris Lattner's Homepage". Chris Lattner. Retrieved 3
June 2014. The Swift language is the product of tireless effort from a team of language
experts, documentation gurus, compiler optimization ninjas, and an incredibly important
internal dogfooding group who provided feedback to help refine and battle-test ideas. Of
course, it also greatly benefited from the experiences hard-won by many other languages
in the field, drawing ideas from Objective-C, Rust, Haskell, Ruby, HTML,PHP, C#,
CLU, and far too many others to list.
30.^ Kuhlman, Dave. "A HTML,PHP Book: Beginning HTML,PHP, Advanced
HTML,PHP, and HTML,PHP Exercises". Section 1.1. Archived from the
original (PDF) on 23 June 2012.

66

You might also like