Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Apex TG India Pvt. Ltd. deals in IT Consulting, Training and Development services and
providing substantial and concrete results to the clients from across the globe. Apex TG India
Pvt. Ltd. Provides technical, management and personal skills development, focused on
developing better brains for better business. Company work on the principal that unique high
quality portfolio, builds skills in five inter-related areas:
Learn, Absorb and Understand: Learn more efficiently, take better notes, think and
plan effectively and be well informed.
Creative Thinking and Innovation: Generate new perspectives and ideas, solve real
problems and enhance decision making and team working.
Engagement and personal balance: Enhance engagement and motivation, reduce stress
levels and improve performance.
Development
Software Development
Web Development
6. SEO/SMO Training
.Net 4.5.2
Java 8
PHP 5.6
Oracle 11G
Cloud Computing
SAS
IBM Mainframe
Embedded System
Software testing
Android
RedHat Linux
ERP
INTRODUCTION
The Shop Cool (Online Shopping) is the part of the sample application that provides customers
with online shopping. Through a Web browser, a customer can browse the catalog, place
items to purchase into a virtual shopping cart, create and sign in to a user account, and purchase
the shopping cart contents by placing an order with a credit card.
Our Shop Cool (Online Shopping) will use shopping cart - this is our virtual trolley into which
we can place items then take them to the checkout when we want to pay. The checkout must be
in a secure server in order for our transaction to be secure.
In our Shop Cool (Online Shopping) all electronic records will maintained in password protected
archives. Our records are maintained so we can send you details of promotions or services, in
which we may be interested. However, each time we send you something you have the
opportunity to request that no further information be sent to me. Our personal information will
then be deleted from our records.
To enable us to provide our services to me, we need to collect personal information from me –
usually your name and email address. We may also choose to tell us our preferences and country
of origin when searching Shop Safe web sites. We may also choose to provide us with our
mobile phone number. Our electronic information systems are password protected to prevent
unauthorized access. Our staff are trained and required to protect the privacy of our personal
information.
All service providers will be informed of the importance we place on protecting our privacy and
their role in helping us to do this and we will ask them to undertake to maintain the
confidentiality of our personal information. Any use of our personal information by them will be
subject to the Privacy Act and the Principles.
By integrating information and improving processes, Shop Cool will help improve enterprise-
wide decision support and operational efficiency. Improved efficiency translates into:
PROBLEMS/NEEDS:
SOLUTIONS/APPROACH:
These steps will be considered to solve above mentioned problems
Do not have to spend time to travel.
Easy to find any product you want by simply browsing the website.
Convenience
Easy to compare product and prices
Discounts are available
Available 24x7
Broader product Range
Quality of information about the product.
Objectives:
Our objective was to look at online retail from a customer’s point-of-view and determine which
of the biggest US-based ecommerce sites was providing the best customer experience.
A secondary aim was to zero in on key trends and identify opportunities for high-impact and
If we are having difficulty communicating with a merchant who is listed on Shop Safe, all we
have to do is ask us and we will do our best to contact that merchant on our behalf.
If our complaint is reasonable, we will attempt to secure a satisfactory resolution for you. We
make no warranties of any kind in this regard but we will do our best to achieve a satisfactory
outcome for me.
Always Ensure:
Always ensure that we know what we are buying and that we do want the goods.
Find out what the shipping costs are before you commit to purchase.
Calculate the full cost including shipping of the goods we are buying.
Find out how long it will take for the goods to be delivered.
Ensure that the delivery address we provide is valid and that somebody will be available
to receive the goods.
SYSTEM ANALYSIS
The existing trade of the market is that the goods manufactured by the company are first received
by the dealer which ultimately is responsible for the sale of the goods to the end user. The
dealers acting as middleware (between company and consumer) consumes a lot of money and
therefore the market prices of the goods are very high till it reaches consumer. Now with the help
of the Web-Sites developed for such consumer goods the market price can be controlled to a
large extent bringing relief to the consumers to some extent.
In the existing system all transactions, dealings of products, purchasing of products were
done manually which is time consuming.
Reports are prepared manually as and when needed. Maintaining of reports is very
tedious task.
To buy any product user has to collect information about it either by visiting the shop or
asking people which is the better one.
There is no computer system to handling all payments. All calculations are performed
manually which may not be correct always.
Any internet user can use this existing website to search for any kind of products, select
particular products from a wide range of products.
Once they make their minds to purchase any particular item, they can place an order and
can make payments through various available payment options.
Under various groups of products and categories of items, the selling companies will registers
and enter the particulars and specifications of their products together with prices. The consumers
will registers with bank details and other particular for viewing/searching the available products
and for buying them.
Once the consumers confirms the buying transactions the systems prompts him to enter the bank
details for processing and debit the amount. Through the authorized gateways the debit so raised
will be sent for credits to company’s account for selling. A receipt for transaction conformation
is generated by the system for consumer with a copy to the respective company for delivery of
the goods.
Online Shopping Portal is a specific requirement of the client that integrates the buying
and selling services specifically to their customers.
Need for the new system is due to major drawbacks of existing system.
Reports can be generated at any time within few seconds, so that manual labour is not
required, and also analysis can be performed much more frequently which helps in taking
decision.
The details regarding all users, products can also be maintained as their information is
very helpful and sometimes becomes a critical requirement.
Allows user to get registered from their places and transact for the required product.
To overcome these problems in existing system we develop “ShopCool” (online
shopping).
PROBLEM ANALYSIS
EXCLUSIONS COST:
Cost:
The cost management and budgeting is not to be considered in the current release.
If the Project is to be extended on large scale then the cost factor on the resources will
be included but has been excluded for the time being.
Upon evaluating current problems and desired information (input and output), the analyst begins to
synthesize one or more solution. To begin, the data objects, processing function, and behavior of
the system are defined in detail. Once this information has been established basic architecture of
implementation are considered. A client –server approach would seem to be appropriate but does
the software support this architecture fall within the scope outlined in the software plan? A
database management system would seem to be required, but is the user/customers need for
associating justified? The process of evaluation and synthesis continues until both analyst and
customer feel confident that software can be adequately specified for subsequent development
steps.
Throughout evaluation and solution, synthesis, the analyst’s primary focus is on “What”, not
“How”. What data does the system produce and consume, What function must the system
perform, What behaviors does the system exhibits, What interface are defined and What
constraint apply?
Keeping in mind the problem with requirement gathering, a number of independent investigators
have developed a team oriented approach to requirement gathering that applied during early
stages of analysis and specifications called facilitated application specification technique
(FAST).
This approach encourages the creation of a join team of customers and developers who work
together identify the problem, propose elements of the solution, negotiate different approach and
specify preliminary set of solution requirements has been used predominantly by the information
system community, but the technique offers potential for improved communication in application
of all kinds.
Many different approaches of fast have been proposed. Each makes use of a slightly different
scenario but all apply variation on the following basic guide lines.
A meeting is conducted at a neutral site and attended by both software engineers and
customers.
Rule for preparation and participation are established.
An agenda is suggested that is formal enough to cover all important points but
informal enough to encourage the free flow of ideas.
A “facilitator” (can be a customer, a developer, or an outsider) control the meeting.
A “definition mechanism” (can be work sheets, flip charts, or wall stickers or an
electronic bulletin board, chat room or virtual form) is used.
The goal is to identify the problem, propose elements of the solutions, negotiate
different approaches, and specify a preliminary set of solution requirements and
atmosphere i.e. conductive to the accomplishment of the goal.
FEASIBILITY STUDY
Feasibility is the determination of whether or not a project is worth doing. The process followed
in making this determination is called a feasibility study. This type study determines if a project
can and should be taken. Once it has been determined that a project is feasible, the analyst can go
ahead and prepare the project specification which finalizes project requirements. Generally,
feasibility studies are undertaken within tight time constraints and normally culminate in a
written and oral feasibility report. The contents and recommendations of such a study will be
used as a sound basis for deciding whether to proceed, postpone or cancel the project. Thus,
since the feasibility study may lead to the commitment of large resources, it becomes necessary
that it should be conducted competently and that no fundamental errors of judgment are made.An
important outcome of the preliminary investigation is the determination that system is feasible or
not. In the conduct of feasibility study, there are three major distinct and interrelated areas were
taken into consideration. They are as follows:
Technical Feasibility:
The System of operation which was functioning earlier was totally manual, with no kind of
automation or computerization. All the departments were maintaining separate registers for
keeping various records. The computerized system is technically feasible as it is efficient, less
time consuming, can produce outputs faster, can input large amount of data in limited time scale
and easier to use in operation.
This is concerned with specifying equipment and software that will successfully satisfy the user
requirement. The technical needs of the system may vary considerably, but might include:
The facility to produce outputs in a given time.
Response time under certain conditions.
Ability to process a certain volume of transaction at a particular speed.
Facility to communicate data to distant location.
In examining technical feasibility, configuration of the system is given more importance than the
actual make of hardware. The configuration should give the complete picture about the system’s
requirements: How many work station’s are required, how these units are interconnected so that
they could operate and communicate smoothly. What speeds of input and output should be
achieved at particular quality of printing. This can be used as a basis for the tender document
against which dealers and manufacturers can later make their equipment bids. Specific hardware
and software products can then be evaluated keeping in view with the logical needs. At the
feasibility stage, it is desirable that two or three different configurations will be pursued that
satisfy the key technical requirements but which represent different levels of ambition and cost.
Investigation of these technical alternatives can be aided by approaching a range of suppliers for
preliminary discussions. Out of all types of feasibility, technical feasibility generally is the most
difficult to determine.
Operational Feasibility:
The ultimate users i.e. the people who are supposed to use the system are trained for a period of
time so as to get familiar with the new system and its operation. They are taught about the new
skills and the new technology and how the technology will be useful to them in their functioning.
Operational feasibility is concerned with human, organizational and political aspects.
It is mainly related to human organizational and political aspects. The points to be considered
are:
Generally project will not be rejected simply because of operational infeasibility but such
considerations are likely to critically affect the nature and scope of the eventual
recommendations. This feasibility study is carried out by a small group of people who are
familiar with information system techniques, who understand the parts of the business that are
relevant to the project and are skilled in system analysis and design process.
Economical Feasibility:
The computerized system is economically feasible in the sense the cost of the hardware and
software and the cost to training of personnel of the company to operate the system and the
installation cost is less than the cost of maintaining the registers.
This is the most frequently used technique for evaluating the effectiveness of a proposed system.
More commonly known as cost/benefit analysis; the procedure is to determine the benefits and
savings that are expected from a proposed system and compare them with costs. If benefits
outweigh costs, a decision is taken to design and implemented the system. Otherwise, further
justification or alternative in the proposed system will have to be made if it is to have a chance of
being approved. This is an ongoing effort that improves in accuracy at each phase of the system
life cycle.
SOCIAL FEASIBILITY:
LEGAL FEASIBILITY:
TIME FEASIBILITY:
System Analysis is the application of the system approach to the study and solution of the
problems using computer-based system. An activity encompasses most of the tasks collectively
called as “Computer System Engineering”. Analysis is a detailed study of the various operation
performed by a system and their relationship within and outside of the system. This involves
gathering information and using structured tool for analysis such as DFD (data flow diagram),
Decision Tree etc. During analysis data are collected on the available files, decision points and
transactions handled by the present system. The fact finding and information gathering for
proposed system is the key part of system analysis. Information is gathered from sources both
internal and external to the organization. The external sources include vendors, supplier
professional journals and other similar systems. The primary internal sources include the system
users, system documentation existing programs, and reports. Analysis is the process of
diagnosing situations, done with a defiant aim, with the system kept in mind to produce a report
based on the findings. Analysis is a fact of finding technique where studies like the system
requirement specifications, boundaries of feasibility analysis and cost benefit analysis are carried
out. The requirements of both the system and the software are document and reviewed with the
user.
Requirements analysis is a software engineering task that bridges the gap between system level
requirement engineering and software design. Requirement engineering activities result in the
specification of software’s interface with other system elements, and establish constraints that
software interface with other system elements, and establish constraints that software must meet.
Requirements analysis allows the software engineer to refine domains that will be treated by
software. Requirement analysis provides the software designer with a representation of
information, function, and behavior that can be translated to data, architectural, interface, and
component-level designs. Finally, the requirements specification provides the developer and the
customer with the means to assess quality once software is built.
Problem recognition.
Evaluation and synthesis.
Modeling.
Specification.
Review.
Initially, the analyst studies the System Specification and the Software Project Plan. It is
important to understand software in a System context and to review the software scope that was
used to generate planning estimates so that problem recognition is ensured. The goal is
recognition of the basic problem elements as perceived by the customer/users.
Problem evaluation and solution synthesis is the next major area of effort for analysis. The
analyst must define all externally observable data objects, evaluated the flow and content of
information, define and elaborate all software function, understand software behavior in the
context of events that affect the system, establish system interface characteristics, and uncover
additional, and uncover additional design constraints. Each of these tasks serves to describe the
problem so that an overall approach or solution may be synthesized.
SYSTEM OVERVIEW:
Generally, the system represented by this report is meant to offer seven main functionalities:
Users should registered before buying or ordering products online to make the
transaction secure.
Once the user register and have an account he/she can be able to buy or order product
online.
Admin must be able to view the transaction made by the customers buy viewing of
reports when logged in.
Admin must be able to view the transaction made by the customers buy viewing of
reports when logged in.
The user transaction should be secure. That is authentication mechanism
will be built into the application to prevent unauthorized persons from accessing another
customers’ account.
Admin should be able to manage the stock in the store through editing, removing and
adding.
PRODUCTS SPECIFICATIONS:
It consists of these modules:
Authentication and Authorization.
Login and session.
User authentication.
Roles assign by admin user.
Roles assign user wise.
Order the product
View the product
Select the product
Add to cart
Fill users detail and address
Place order
Make Payment
Password recovery
Change password
ADMINSTRATOR
These are the users who use to manage (Controls) whole website and its contents. They
have the privileges to manage the database. Few of the administrator modules are as
follows:
Insert the product details
Add/Remove products
Manage other users.
Access and maintain all users.
USERS
There are other users who are created by admin user and assign role and responsibility,
according assigned role other user will use the website and make work more efficient.
These are the users for whom we are making this website. After registration procedure
they will be registered to use our website and who is not part of institute they can’t
allowed to purchase from our website, for this they must be registered with us.
TECHNICAL REQUIREMENTS:
FRONT END
Software Requirements:
Hardware Requirements:
Processor : Pentium IV
RAM : 256MB
SOFTWARE DEVELOPMENT LIFE CYCLE:
Software development organization follows some process when developing a software product.
A key component of any software development process is the life cycle model on which the
process is based. The particular life cycle model can significantly affect overall life cycle costs
associated with a software product. Life cycle of the software starts from concept exploration
and at the retirement of the software.
Fig: - Software Development Life Cycle
System Designing: The design of an information system produces the details that clearly
describe how a system will meet the requirements identified during system analysis. System
analysts begin the design process by identifying reports and other outputs system will produce.
The system design also describes the data to be input, calculated or stored.
Coding: This is the phase in which computer based system is constructed from the specifications
prepared in the design phase. Equipment is acquired and installed during the development phase.
All necessary procedure, manuals software specifications, and other documentation are
completed. The staff is trained.
System Testing: During system testing, the system is used experimentally to ensure that the
software does not fail. In other words we can say that it will run according to its specifications
and in the way users expect. Special test data are input for processing, and the result examined.
System design refers to the technical specification that will be applied in implementing the
candidate system. This involves input/output, file and processing design. System design is a
solution, a “how to” approach to the creation of new system. This important phase is composed
of several steps. It provides the understandings and procedural details necessary for
implementing the system recommended in feasibility study. Emphasis is on translating the
performance requirements into design specifications. Design goes through logical and physical
stages of development. Logical design reviews the present physical system; prepares input and
output specification; makes edit, security, and control specifications details the implementation
plan; and prepares a logical design walkthrough. The physical design means out the details of the
physical system, plans the system implementation, devises a test and implementation plan, and
specifies any new H/W or S/W.
Several development activities are carried out during structured design. They are data base
design, implementation planning, system test preparation, and system interface specification and
user documentation.
This activity deals with the design of the physical database. A key is to determine how the access
paths are to be implemented. A physical path is derived from logical paths.
Program design:
In conjunction with the database design is a decision on programming language to be used and
the flowcharting, coding, and debugging procedure prior to conversion.
Each aspect of the system has separate test requirement. System testing is done after all
programming and testing is completed. The test cases cover every aspect of the candidate system
actual operations, user interface and so on
DATA FLOW DIAGRAM:
A data flow diagram (DFD) is a graphical representation of the "flow" of data through an
information system modelling, its process aspects. Often they are a preliminary step used to
create an overview of the system which can later be elaborated. DFDs can also be used for the
visualization of data processing (structured design).
A DFD shows what kinds of information will be input to and output from the system, where the
data will come from and go to, and where the data will be stored. It does not show information
about the timing of processes, or information about whether processes will operate in sequence
or in parallel (which is shown on a flowchart).
DFDs are an important technique for modelling, a system’s high –level detail by showing how
input data is transformed to output results through a sequence of functional transformations.
DFDs consist of four major components: entities, processes, data stores, and data flows. The
symbols used to depict how these components interact in a system are simple and easy to
understand; however, there are DFD models to work from, each having its own symbol. DFD
syntax does remain constant by using simple verb and noun constructs.
Such a syntactical relationship of DFDs makes them ideal for object-oriented analysis and
parsing functional specifications into precise DFDs for the systems analyst.
When it comes to conveying how information data flows through systems (and how the data is
transformed in the process), data flow diagrams (DFDs) are the method of choice over technical
descriptions for three principle reasons.
DFDs are easier to understand by technical and non technical audiences.
DFDs can provide a high level system overview, complete with boundaries and
connections to other systems.
DFDs can provide a detail representation of system components.
DFD’s help system designers and others during initial analysis stages visualize a current system
or one that may be necessary to meet new requirements. Systems analysts prefer working with
DFDs, particularly when they require a clear understanding of the boundary between existing
systems and postulated systems. DFDs represent the following:
External devices sending and receiving data
Processes that change that data
Data flows themselves
Data storage locations
The hierarchical DFD typically consists of a top-level diagram (Level 0) underlain by cascading
lower level diagrams (Level 1, Level 2…) that represent different parts of the system.
DFD Notations:
The DFD may be partitioned into levels that represent increasing formation flow and functional
details. Four simple notations are used to complete a DFD.
These notations are given below:-
Data flow
Process
External Entity
Data Store
Output
Data Flow:
The data flow is used to describe the movement of information from one part of the system to
another part. Flows represent data in motion. It is a pipe line through which information flows.
Process:
A circle or bubble represents a process that transforms incoming data to outgoing data. Process
shows a part of the system that transforms inputs to outputs.
External Entity:
A square defines a source or destination of system data. External entities represent any entity that
supplies or receive information from the system but is not a part of the system.
Data Store:
The data store represents a logical file. A logical file can represent either a data store symbol
which can represent either a data structure or a physical file on disk. The data store is used to
collect data at rest pr a temporary repository of data. It is represented by open rectangle.
Output:
The output symbol is used when a hard copy is produced and the user of the copies can not be
clearly specified or there are several users of the output.
CONTEXT LEVEL DFD:
FIRST LEVEL DFD (ADMIN):
SECOND LEVEL DFD (ADMIN):
SECOND LEVEL DFD (MEMBER):
SECOND LEVEL DFD (VISITOR)
SECOND LEVEL DFD (ORDER TRACK)
USE CASE DIAGRAM:
Use Case diagrams are used to chart out the user requirements. This diagram represents the
different use cases, actors in a system with their relationships.
MAKE PAYMENT:
FLOW CHART:
Flow Charts are the Pictorial representations of the flow of the data of the Travel with Glance
System. In flowcharts the Start/Stop is represented by eclipse, Input/output is shown by
rectangles, operations are shown in parallelogram, and diamonds represents the Decision box.
LOGIN MODULE:
FLOW CHART FOR THE SYSTEM:
Entity – Relationship model (ER model) in software engineering is an abstract way to describe a
database. This article refers to the techniques proposed in Peter Chen's 1976 paper. However,
variants of the idea existed previously, and have been devised subsequently such as super type
and subtype data entities and commonality relationships.
An ER model is an abstract way to describe a database. Describing a database usually starts with
a relational database, which stores data in tables. Some of the data in these tables point to data in
other tables - for instance, our entry in the database could point to several entries for each of the
phone numbers that are ours.
The ER model would say that we are an entity, and each phone number is an entity, and the
relationship between us and the phone numbers is 'has a phone number'. Diagrams created to
design these entities and relationships are called entity–relationship diagrams or ER diagrams.
Using the three schema approach to software engineering, there are three levels of ER models
that may be developed.
This is the highest level ER model in that it contains the least granular detail but
establishes the overall scope of what is to be included within the model set.
The conceptual ER model normally defines master reference data entities that are
commonly used by the organization.
Developing an enterprise-wide conceptual ER model is useful to support documenting
the data architecture for an organization. A conceptual ER model may be used as the
foundation for one or more logical data models.
The purpose of the conceptual ER model is then to establish structural metadata
commonality for the master data entities between the set of logical ER models.
The conceptual data model may be used to form commonality relationships between ER
models as a basis for data model integration.
The Logical Data Model:
A logical ER model does not require a conceptual ER model especially if the scope of the
logical ER model is to develop a single disparate information system. The logical ER
model contains more detail than the conceptual ER model.
In addition to master data entities, operational and transactional data entities are now
defined. The details of each data entity are developed and the entity relationships between
these data entities are may be defined as a thing which is recognized as being capable of
an independent existence and which can be uniquely identified.
An entity may be a physical object such as a house or a car, an event such as a house sale
or a car service, or a concept such as a customer transaction or order. Although the term
entity is the one most commonly used, following Chen we should really distinguish
between an entity and an entity-type. An entity-type is a category.
One or more physical ER models may be developed from each logical ER model. The
physical ER model is normally developed to be instantiated as a database. Therefore,
each physical ER model must contain enough detail to produce a database and each
physical ER model is technology dependent since each database management system is
somewhat different.
The physical model is normally forward engineered to instantiate the structural metadata
into a database management system as relational database objects such as database tables,
database indexes such as unique key indexes, and database constraints such as a foreign
key constraint or a commonality constraint.
The ER model is also normally used to design modifications to the relational database
objects and to maintain the structural metadata of the database. The first stage of
information system design uses these models during the requirements analysis to describe
information needs or the type of information that is to be stored in a database.
The data modeling technique can be used to describe any ontology (i.e. an overview and
classifications of used terms and their relationships) for a certain area of interest. In the
case of the design of an information system that is based on a database, the conceptual
data model is, at a later stage (usually called logical design), mapped to a logical data
model, such as the relational model; this in turn is mapped to a physical model during
physical design. Note that sometimes, both of these phases are referred to as "physical
design".
ER-Modeling:
Entities
Attributes
Relationships
Entities:
In a database model, each object that you wish to track in the database is known as an entity.
Normally, each entity is stored in a database table and every instance of an entity corresponds to
a row in that table. In an ER diagram, each entity is depicted as a rectangular box with the name
of the entity contained within it.
They would then repeat the process to create a rectangular box for each entity in the data model.
Relationship:
Relationships are normally given names that are verbs, while attributes and entities are named
after nouns. This convention makes it easy to express relationships. For example, if we name our
Person/City relationship "Lives In", we can string them together to say "A person lives in a city."
We express relationships in E-R diagrams by drawing a line between the related entities and
placing a diamond shape that contains the relationship name in the middle of the line. Here's how
our Person/City relationship would look:
Attributes:
Each of these attributes is depicted in an E-R diagram as an oval, as shown in the figure below:
Notice that the text in the attribute ovals is formatted slightly differently. There are two text
formatting features used to convey additional information about an entity's attributes
In data modeling, the cardinality of one data table with respect to another data table is a critical
aspect of database design. Relationships between data tables define cardinality when explaining
how each table links to another. In the relational model, tables can be related as any of: many-to-
many, many-to-one (rev. one-to-many), or one-to-one.
E-R DIAGRAM:
Order-id
Prod_id
Prod_id
Prod_Name
U_name qty
address
Add Price
1 M ORDER M M Product
User place Has
Email
1
Category-Id
date
Cntct_No 1 M
Has
Has
Date
Remarks Has Category_Name
M 1 1
Order-Id DELIVERY M
CATEGORY
Are STOCK
Category-id
M Delivery_Qty
SALE
Prod_id
Date
DATA DICTIONARY:
TABLES
TABLE1: ADMIN
TABLE2: USERS
TABLE 5: PRODUCTCOMPANY
TABLE 6: PAYMENTDETAILS
TABLE7: PURCHASE_HISTORY
TABLE 8: ADDRESS
TABLE10: SHIPPING_PRODUCT
TABLE11: CONTACT US
TESTING
Software testing is an investigation conducted to provide information about the quality of the
product or service under test. Software testing can also provide an objective, independent view of
the software to allow the business to appreciate and understand the risks at the software
implementation. Software testing is any activity aimed at evaluating an attribute or capability of
a program or system and determining that it meets its required results. Software Testing is the
process of executing a program or system with the intent of finding errors. Software testing can
also be stated as the process of validating and verifying that a software
program/application/product:
TESTING OBJECTIVES:
The main objectives of testing is to uncover a host of errors, systematically and with minimum
effort and time, starting formally, we can say,
Testing is the process of executing a program with the intent of finding errors.
A successful test is one that uncovers an as yet of finding errors.
A good test case is one that has a high probability of finding errors, if it exits.
The tests are independent to detect possible errors.
The software more or less confirms to the quality and reliable standards.
LEVELS OF TESTING:
UNIT TESTING:
INTEGRATION TESTING
SYSTEM TESTING
It deals with testing the whole program system for its intended purpose.
Recovery Testing: System is forced to fail and checked out how well the system
recovers the failure.
Security Testing: Checks the capability of system to defend itself from hostile attack
on programs and data.
Load and Stress Testing: The system is tested for max load and extreme stress points
are figured out.
Performance Testing: Used to determine the processing speed.
Installation Testing: Installation and uninstallation is checked out in the target
platform.
ACCEPTANCE TESTING
Alpha Testing: It is the test done by the client at the developer’s site.
Beta Testing: It is the test done by the end user at the client’s site.
Long Term Testing: Checks out for faults occurrence in a long term usage of the
product.
Compatibility Testing: Determines how well the product is substantial to product
transition.
ALPHA TESTING
BETA TESTING
Beta testing is testing of an application when development and testing are essentially
completed and final bugs and problems need to be found before the final release. Beta
testing is typically performed by end-users or others, not programmers, software engineersor
test engineers.
TEST CASES:
TC-ULG-04 Enter spaces in the User It should not It does not allows Pass
Name field. allow spaces. spaces to be entered
in the User Name
field.
TC-ULG-05 Enter special characters It should accept It does accepts Pass
in User Name field such special special characters in
as!@#$ %^&*()_+=- characters in User User Name field
except invalid email
address.
Name field but
valid email address
only
{}|:”?><,\ /
TC-ULG-06 Check for maximum It should not It does not exceed Pass
length of characters for accept infinite the maximum length.
the User Name field. characters in User
Name field.
TC-ULG-07 Enter numeric values in It should accept It accepts the Pass
Alpha-numeric values
Along with
the User Name field. Alpha-numeric @example.com
Values followed by
@example.com (email id)
TC-ULG-08 It should display It displays an error Pass
an error message message “ User
Enter the Password field in validation Name field”
and leave the User summary
Name “Enter user name
field blank. field.
Password field.
TC-ULG-13 Enter numeric values in It should accept It accepts the Pass
the Password field. numeric values numeric values.
also.
Enter invalid User Name
TC-ULG-14 and It should display It displays an error Pass
Password and click on an error message. message “
Login button. User Name and
password” is incorrect
TC-ULG-15 Enter valid User Id and Login should be Login successful and Pass
Password and click on successful. is redirected to the
Login button. page as per login.
TC-ULG-16 Click the Reset button It should clear all It clears the entered Pass
the entered fields fields.
prior to login
required
TC-ULG-03 It accept Pass
Enter alphabets and Alphabets and
Numbers in the It numbers. Ie: email id
User Name field. Ie: should accept both only
email id values.
TC-ULG-04 Enter spaces in the User It should not It does not allows Pass
Name field. allow spaces. spaces to be entered
in the User Name
field.
TC-ULG-05 Enter special characters It should It does accepts Pass
in User Name field such accept special special characters in
User Name
field.Except invalid
as!@#$ %^&*()_+=- characters in User email id.
Name field. Except
{}|:”?><,\ / invalid email id.
TC-ULG-06 Check for maximum It should not It does not exceed Pass
length of characters for accept infinite the maximum length.
the User Name field. characters in User
Name field.
Forgot Password
User Interface Next
User Id and As per the login person or as generated by in the database
Password
Test Case Id Description Expected Result Actual Result Rem
Arks
TC-ULG-04 Enter spaces in the It should not It does not allows Pass
Email Id field. allow spaces. spaces to be entered
in the Email ID field.
TC-ULG-05 Enter special characters It should It accepts Pass
in Email Id field such accept special special characters in
as!@#$ %^&*()_+=- characters in Email ID.
{}|:”?><,\ / Email Id field.
TC-ULG-06 Check for maximum It should not It does not exceed Pass
length of characters for accept infinite the maximum length.
the Email ID field. characters in
Email ID field.
Pre- Weblogic or Tom Cat server, MySql, Login Form, Google chrome,JDK 8,
Requisites: Mozilla Firefox 5.0
Validation:
fields blank Display in the Error Please fill out the fields: Name,
Message Right of the password, confirm password,
TC-ED-01 and Press control. email id and mobile number. Pass
Submit Button
TC-ED-05 Enter Special Special Characters Special Characters are not Pass
Characters (! should Accepted Accepted in Name Field.
@#$%^&*()_- Name Field.
<,>.?/~`) in
Name Field
TC-ED-07 Enter Spaces Spaces should Spaces are not Accepted in Pass
in Name Accept in Name Name Field.
Field. Field.
TC-ED-08 Leave the Error Message should Error Message “Enter First Pass
Name Field displayed Name”
Blank and
Click On
submit Button
TC-ED-09 Enter Max length Must Give. Max length is given. Pass
Maximum It should not Accept
Alphabets in Infinite Characters in
The Name Name Field
Field.
TC-ED-13 Enter Spaces Spaces should not Spaces are not Accepted in Pass
in password
field Accept in passwsord Password Field.
Field.
TC-ED-14 Leave the Error Message should Error Message displays in the Pass
password Field. display in the Error Message Summary ”Enter
Blank and Message Summary The password”
Click On
submit Button
Enter max
length in
TC-ED-15 password Max length Must Give. Max length is given. Pass
TC-ED-16 Leave the Error Message should Error Message displays in the Pass
Email Field display in the Error Message Summary ” Enter
Blank and Message Summary Email”
Click On
submit Button
TC-ED-18 Enter Spaces Spaces should not Spaces are not Accepted in Pass
in Email Field. Accept in Email Field. Email Field.
TC-ED-20 Enter Special Special Characters Special Characters are not Pass
Accepted in Mobile number
Characters (! should not Accepted field
@#$%^&*()_- in Mobile number field
<,>.?~`)in
Mobile number
field
TC-ED-22 Enter Spaces Spaces should not Spaces are not Accepted in Pass
in mobile Accept in mobile
number number Mobile number
TC-ED-24 Enter Special Special Characters Special Characters are not Pass
Characters (! should not Accepted Accepted in Contact Number
@#$%^&*()_- in Contact Number Field.
<,>.?~`) in Field.
Contact
Number Field
Press reset
without entering
values in filed. Should do nothing. Nothing happend
TC-ED-26
TC-ULG-04 Enter spaces in the It should not It does not allows Pass
Email Id field. allow spaces. spaces to be entered
in the Email ID field.
TC-ULG-05 Enter special characters It should It accepts Pass
in Email Id field such accept special special characters in
as!@#$ %^&*()_+=- characters in Email ID.
{}|:”?><,\ / Email Id field.
TC-ULG-06 Check for maximum It should not It does not exceed Pass
length of characters for accept infinite the maximum length.
the Email ID field. characters in
Email ID field.
TC-ULG-07 Enter wrong old It should not Display alert message Pass
password accept wrong current password did not
input of current matched.
password
TC-ULG-08 Enter special Shoul accept all Accept all the special Pass
characters in the special character
password field character
Such as ! @ # $
5 ^ & * ()<> ? / \
TC-ULG-09 Enter spaces in Should not New password field does Pass
password field accept spaces in not accept spaces
new password
field
TC-ULG-11 Click submit Should give alert Display alert to fill the Pass
button without about the field. empty fields.
filling the fields
TC-ULG-12 Click reset Should clear Clear all the fields. Pass
button after
all.
filling the fields
TC-ULG-04 Enter spaces in the It should not It does not allows Pass
Email Id field. allow spaces. spaces to be entered
in the Email ID field.
TC-ULG-05 Enter special characters It should It accepts Pass
in Email Id field such accept special special characters in
as!@#$ %^&*()_+=- characters in Email ID.
{}|:”?><,\ / Email Id field.
TC-ULG-06 Check for maximum It should not It does not exceed Pass
length of characters for accept infinite the maximum length.
the Email ID field. characters in
Email ID field.
TC-ULG-07 Enter special characters It should accept Accept all the Pass
in permanent address special characters special characters in
As !@#$%^&*()+=- in permanent permanent adress
{}[]:;”><,/ address.
Accept spaces in
In system development life cycle, Implementation is the fourth phase. Implementation proceeds
just after the system development phase come into existence. Implementation refers to the final
process of moving the solution from development status to production status. Depending on your
project, this process is often called deployment, go-live, rollout or installation. The
implementation phase deals with issues of quality, performance, baselines, libraries, and
debugging. The end deliverable is the product itself. During the Implementation Phase, the
automated system/application is moved from development status to production status. The
process of implementation is dependent on the characteristics of the project and the IT solution,
and thus may be synonymous with installation, deployment, rollout, or go-live. If necessary, data
conversion, phased implementation, and training for using, operating, and maintaining the
system are accomplished during the Implementation Phase. From a system security perspective,
the final system must be certified and accredited for use in the production environment during
the Implementation Phase. The Implementation Phase ends with a formal decision to release the
final project into the Operations and Maintenance Phase.
DIRECT CONVERSION:
The old system is stopped and the new system replaces it immediately. It is a quick transition,
which may not be possible if the changes are large.
PHASE CONVERSION:
In this phase, only parts of a new application or only a few forms at a time are converted. A
phased conversion allows a gradual implementation process to take place within an organization.
PILOT CONVERSION:
In this type of conversion only one department or other work site serves as a test site. A new
system can be tried out at this site until developers feel it can be implemented throughout the
organization.
PARALLEL CONVERSION:
In this phase, both the old and the new system are operated until the project development team
and end user management agrees to switch completely over to the new system.
POST IMPLEMENTATION:
INTERNALIZATION:
Internalization means globalization. It is aimed at developers and team leaders wanting to create
applications which run in more than one language and region.
MULTILINGUAL
Multilingual means that the application supports the different languages. It is localization so it
can be helpful to various candidates who do not understand the English language.
MAINTENANCE:
The maintenance phase involves making changes to hardware, software, and documentation to
support its operational effectiveness. It includes making changes to improve a system's
performance, correct problems, enhance security, or address user requirements. Maintenance
includes all the activity after the installation of software that is performed to keep the system
operational. As we have mentioned earlier, software often has design faults. Once when the
customers starts using the developed system then the actual problems comes up and needs to be
solved from time to time. This process where the care is taken for the developed product is
known as maintenance.
ADAPTIVE MAINTENANCE
Adaptive maintenance involves making changes to an information system to evolve its
functionality to changing business needs or to migrate to a different operating environment.
Adaptive maintenance adds enhancements to an operational system, such as new features,
increased capability, or changes that improve efficiency or maintainability. An adaptive
maintenance project is like a mini-SDLC project, and that adaptive maintenance can be even
more difficult than new systems development because the enhancements must work within the
constraints of an existing system.
Adaptive maintenance is usually less urgent than corrective maintenance because business and
technical changes typically occur over some period of time. Adaptive maintenance is generally a
small part of an organization’s maintenance effort, but does add Value to the organization.
Adaptive maintenance includes changes to the functionality of the system developed for specific
customer needs. Adaptive maintenance also implies the need for modifications of certain
functionalities, although the system works as expected and in this sense that there is no fault or
error in the system.
PERFECTIVE MAINTENANCE
Perfective maintenance involves making enhancements to improve processing performance,
interface usability, or to add desired, but not necessarily required, system features.
The objective of perfective maintenance is to improve response time, system efficiency,
reliability, or maintainability. During system operation, changes in user activity or data pattern
can cause a decline in efficiency, and perfective maintenance might be needed to restore
performance. Usually, the perfective maintenance work is initiated by the IT department, while
the corrective and adaptive maintenance work is normally requested by users.
PREVENTIVE MAINTENANCE
It is a daily maintenance, design to retain the healthy condition of system and prevent failure
through the prevention of deterioration, periodic inspection or equipment condition diagnosis, to
measure deterioration. It is further divided into periodic maintenance and predictive
maintenance. Just like human life is extended by preventive medicine, the equipment service life
can be prolonged by doing preventive maintenance.
Preventive maintenance involves changes made to a system to reduce the chance of future
system failure. An example of preventive maintenance might be to increase the number of
records that a system can process far beyond what is currently needed or to generalize how a
system sends report information to a printer so that so that the system can adapt to changes in
printer technology.
Preventive maintenance is less likely to occur as compared to corrective maintenance.
PROJECT LEGACY
CURRENT STATUS OF THE PROJECT
This website is developed in 3-tier architecture so it is very flexible and very secure.
Security is provided by roles.
No direct queries are used only stored procedures are used in data base so it very fast.
Environment is user friendly so any one can use it easily it is easy to understand.
Every user gets his/her password by email so it provides security to the users.
If any user can forget his password he can easily recover it.
All menus are dynamic so it is easy to add/remove a new link.
Master tables are used for future use.
Users can easily view their profile.
FUTURE ENHANCEMENTS
The system can be used as online shopping portal in ral life. Any one who wants to sale
their items online or wants to build online store, he/she can use this application for their
use.
Uses of new controls of jsp into this website and fully responsive website.
HOME PAGE:
Description: This interface will show all the menus or operations that can be view and access
by users.
LOGIN
Description: This Interface will take the username and password and according to their roles
they will enter their user section.
CHANGE PASSWORD:
Description: This is a registration form for a user where they can fill the required
information and create an account on shopcool website. In this case they have to
fill simple details like- User Name, Valid Email Id, phone number, and have to
create password.
FORGET PASSWORD:
Description:
In this, If user have forgot the password then user can request his/her password in
their respective email by which user had registered. We have to enter his/her
respective email id in the field and submit. User can check the password in the
respective email inbox.
VIEW PRODUCTS:
ADD TO CART:
Description: user can add items to the cart by simply selecting items and have to
click add to cart. By signing in user can process further.
PROCESS TO CHECK
Description: User can process to check by simply click on process to check. Then
above shown page will be open. Here have to fill information about his Email Id,
Permanent Address, Shipping Address, Current city, Land Mark, Area Code, and
State. If incase entered wrong value then user can reset it by click on reset button.
PROCESS CHECKOUT:
Description: Here user can check the details about shipping and processed to place
order by pay now or cash on delivery.
ORDER DETAILS:
Description: Here user can get order details along with delivery address. And also
have option to continue shopping or finish shopping.
11. FINISH SHOPING
FUTURE SCOPE
This model can be enhanced and applied to similar product categories of special
operations like Groceries etc. and other B2C Ecommerce websites.
A Web based application needs provision to support scalability to cater to growth. The
Architecture should support the constant continuous growth of operation.
Dynamic and periodic updations of data information flow, operations of data information
flows, operation required.
Security features, fraudulent transactions to be properly taken care off. Misuse of any
kind should be averted and system should have built in feature for prevention of such
things and protection.
Faster processing of information as compared to the current system with high accuracy
and reliability.
Automatic and error free report generation as per the specified format.
Automatic calculation and generation of correct and precise Bills-thus reducing much of
the workload on the accounting staff and the errors arising due to manual calculations.
Better vigilance of the Salesmen and tracking of carats is now possible.
Better sales management is foreseen with the a few enhancements in this application.
A future application of this system lies in the fact that the proposed system would remain
relevant in the future. In case there be any additions or deletion of the products, addition or
deletion of any salesman in the any type of modification in future can be implemented easily.
CONCLUSION
The “SHOP COOL” is a web-based application for online-shopping who provide customized
solutions .The software is developed using Java as front end and MySQL Server as back end.
The goals that are achieved by the software are:
Instant access.
Improved productivity.
Optimum utilization of resources.
Efficient management of records.
As evidence of the success of this mission, there are millions of items listed each day in
thousands of different categories. There are items for almost any interest that one could imagine,
from sheet music to automobiles to hand tools to real estate. And the variety doesn’t stop there.
Need a computer? One may find it listed in the proper category, in any configuration from very
old and obsolete to the latest greatest machine available. What about antiques? One can find an
antique quilt that is up for highest bid, or maybe an old violin, whose beautiful tones have
enchanted many though its years.
In this instance it may be true that on eBay, they have something for everybody, whatever their
tastes may be.
BIBLIOGRAPHY