0% found this document useful (0 votes)
26 views

Confirm Docs

The document discusses online shopping and provides details about its history and processes. It describes how online shopping allows consumers to directly purchase goods or services over the internet. It also explains that early forms of online transactions developed in the 1960s, but online shopping really emerged with the growth of the internet in the 1990s. The document then covers objectives of online shopping websites and requirements and technologies used to develop such websites.

Uploaded by

vishal90301
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views

Confirm Docs

The document discusses online shopping and provides details about its history and processes. It describes how online shopping allows consumers to directly purchase goods or services over the internet. It also explains that early forms of online transactions developed in the 1960s, but online shopping really emerged with the growth of the internet in the 1990s. The document then covers objectives of online shopping websites and requirements and technologies used to develop such websites.

Uploaded by

vishal90301
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

TITLE OF

THE
PROJECT
ONLINE
SHOPPING
Introduction
Online shopping is a form of electronic commerce which allows consumers to
directly buy goods or services from a seller over the Internet using a web browser.
Consumers find a product of interest by visiting the website of the retailer directly or
by searching among alternative vendors using a shopping search engine, which
displays the same product's availability and pricing at different e-retailers. As of
2016, customers can shop online using a range of different computers and devices,
including desktop computers, laptops, tablet computers and smartphones.

An online shopping evokes the physical analogy of buying products or services at a


regular "bricks-and-mortar" retailer or shopping center; the process is called
business-to-consumer (B2C) online shopping. When an online store is set up to
enable businesses to buy from another businesses, the process is called business-to-
business (B2B) online shopping. A typical online store enables the customer to
browse the firm's range of products and services, view photos or images of the
products, along with information about the product specifications, features and
prices.

Online stores typically enable shoppers to use "search" features to find specific
models, brands or items. Online customers must have access to the Internet and a
valid method of payment in order to complete a transaction, such as a credit card,
an Interac-enabled debit card, or a service such as PayPal. For physical products
(e.g., paperback books or clothes), the e-tailer ships the products to the customer; for
digital products, such as digital audio files of songs or software, the e-tailer typically
sends the file to the customer over the Internet. The largest of these online retailing
corporations are Alibaba, Amazon.com, and eBay.

One of the earliest forms of trade conducted online was IBM's online transaction
processing (OLTP) developed in the 1960s and it allowed the processing of financial
transactions in real-time.[2] The computerized ticket reservation system developed
for American Airlines called Semi-Automatic Business Research
Environment (SABRE) was one of its applications. Here, computer terminals located
in different travel agencies were linked to a large IBM mainframe computer, which
processed transactions simultaneously and coordinated them so that all travel agents
had access to the same information at the same time.[2]
The emergence of online shopping as we know today developed with the emergence
of the Internet.[3] Initially, this platform only functioned as an advertising tool for
companies, providing information about its products. It quickly moved on from this
simple utility to actual online shopping transaction due to the development of
interactive Web pages and secure transmissions.[4] Specifically, the growth of the
internet as a secure shopping channel has developed since 1994, with the first sales
of Sting album 'Ten Summoner's Tales'.[5] Wine, chocolates, and flowers soon
followed and were among the pioneering retail categories which fueled the growth of
online shopping. Researchers found that having products that are appropriate for e-
commerce was a key indicator of Internet success.[6] Many of these products did well
as they are generic products which shoppers did not need to touch and feel in order
to buy. But also importantly, in the early days, there were few shoppers online and
they were from a narrow segment: affluent, male, 30+. Online shopping has come
along way since these early days and -in the UK- accounts for significant percents
(depending on product category as percentages can vary).
Objectives

 Promoting a service or product online.


 Selling a service or product.
 Providing product support or customer service.
 Providing corporate information.
 Establishing brand awareness and corporate identity.
 Today the internet and its boom have created a new economicscenario that not only
stresses on the classical concept of the“
 product
 but also on the modern concept of “
 It is this levelof service that dictates whether a commercial venture will succeed ornot in the
market. To provide a high accessibility of service we willdesign the online shopping website, so that
potential customers neednot go to a physical shop to buy products or services. There are several
objective of this websites are following givenbellows.
 This site is gives all the information about the e-shopping toprovide better service for the
customer.
 It provides the facility to the customers who want to shop on-linedue to lock of time.
 It provides facility to the customer to payment by the cash andcheque and DD also.
 It’s providing the full details about the product and relatedinformation about the product like cost,
size etc.
 With the help of it we can save the time and money also.
 It provides the remote shopping by the cash, or DD, or Debit cardalso.
PROJECT-CATEGORY

 Web-Based Application Software with RDBMS:


 This System i.e. “
 On-Line Shopping”
 i s a w e b b a s e d a p p l i c a t i o n software which perform the activities li
ke Administering, providinginformation to the shopping by the remote
system or through internet. The nature of this software to handle
a particular task that’s why it isthe category of application software.This project
falls under The Category of
 Internet Technologies with RDBMS,
 since the project is mainly for providingo n -
line shopping of the different items. This project is uti
l i z i n g Relational Databases as back-end. Having on-
line services for thei n t e r e s t e d u s e r i t h a s g r e a t d e m a n d i
n m a r k e t . A s w e k n o w t h a t Internet is huge client-server
architecture. The client is a web browser it is requesting a web based
data, a file, or whatever, from the server staying anywhere in the world.
Server is nothing the service provider which provides services to the client. It holds
almost all the information that client side wants. I have uses .Net framework to
develop the software.Asp.Net is rich
set programming framework for building web-
baseda p p l i c a t i o n . I t o f f e r s a m a z i n g s u p p o r t t o b o t h
d e v e l o p e r a n d administrator.
REQUIREMENTS AND ANALYSIS

The basic function of requirement analysis is that it translates the ideas in the mind
of the clients into a formal document. Thus, the output of this phase is a set of
precisely requirements which are complete and consistent. This document is called
software requirement specification.
In order to provide the user with a feeling of community. The following requirement
should be taken care:
Each user will have their own profile through which they can log into each time they
visit the site.
If the user does not log into an account they will only be able to browse information
on the site, they will not be able to use any of the site‟s functionalities.
Once they create an account the user will be able to log in and out of the system.
Upload information about themselves (name, college, etc.)
Select a college and area of study.
View and send private messages to other users through a custom messaging client
question and answer functionality: user will be able to post a new question, able to
answer questions and post sources for their answers, search for question containing
key words, thumb up and thumbs down question and responses Users can bookmark
question, send questions to friends.
PROBLEM DEFINITION

The online election system is the system implemented to make the voting
system easy for both polling and also for the administrator to view and
check the result for each nominee individually.
The voters or the administrator can login only if they already have a user
id and password. New user can be only created by the administrator. The
voter can login with his user id only if he has not casted the vote already.
If he has already casted the vote, the voter status is changed to voted and
he cannot login with that user id unless the administrator refreshes the
voting system.
The administrator controls all parts of the online voting system except
the vote casting part which is restricted to the voters only. The
administrator is the only one who can register new voter. Administrator
can create new nominees for the election and he can view the individual
election status for each nominee. The graphs are enabled to show the
election status easily.
The voter when logs in he can view his personal details which cannot be
edited by him he can only report the changes to the administrator who
can edit the details. The voter while voting is provided with two options,
one he can vote to any one of the nominees in the ballot page and
another he can register his vote as not willing to vote.
Software Requirement Specification

Front-Ends to be used:
PHP: PHP (recursive acronym for PHP: Hypertext Preprocessor) is a widely-used
open source general-purpose scripting language that is especially suited for web
development and can be embedded into HTML.
HTML: HTML is used to refer to content in specific languages, such as a MIME type
text/html, or even more broadly as a generic term for HTML, whether in its XML-
descended form (such as XHTML 1.0 and later) or its form descended directly from
SGML (such as HTML 4.01 and earlier).

Back-End to be used:
MY SQL: The security model in MY SQL separate users from objects, provides fine-
grain access and enables greater control of data access. Additionally, all system tables
are implemented as views, providing more control over database system objects.

Documentation tools:
Microsoft Word XP: Create and save a document; open an existing document; editing
techniques, collect and paste multiple items anywhere in the documents, auto detect
and replace corrupt or missing components, detect and repair corrupted files, save
any document directly to a web server and provide web page previews.

Hardware Requirement Specification


Minimum requirements of the hardware system used to build the web application are
as follows:

dows 7
Professional/Windows 10

space: 750 MB of free disk space


Project Planning

The planning, design, and installation of a system termed a project and is directed by
a project leader who uses the available to resources to produce a new or better
system for the organization.

In large companies, the installation of a computer system may take years and
involves thousands of people, planning for smaller projects also requires effective
management control to realize the desired results. Thus, project planning for any
company has the following four main steps:

Organization the resources available for the project.

Scheduling the events of the project.

Evaluating the progress.

Establishing standards for the project.

An effective manager is essential for successful project planning. The techniques of


project planning are not a substitute for good management, but merely a tool to be
used by managers to achieve better results. Only effective management can complete
the project on time, within budget, and with satisfactory results.

To achieve a goal, there should be strong determination and it should always be in


one’s mind. Consequently, defining the objective is the first action taken in any
project. Along with defining objectives, corporate management must assign priorities
to various project that are underway and clarify the relationship between system
projects and existing system. A system project requires extensive interaction between
developers and users. Users are of courses, preoccupied with day to day operations,
and it cannot be assumed that they will be enthusiastic about participating in a
system study. However, only when management clearly defines the importance of
users participation in systems development, then the necessary co-operation can be
expected from users.

Many system are designed and implemented through project teams headed by a
project leader. The team may be relatively small during the feasibility stage,
consisting of a few highly qualified systems people, users and manager. During the
design phase, when more detailed work is required, the size of the team normally
increases, supported by junior analysts, programmers. When the project has been

Page | 10
completed, the team is disbanded and each member is reassigned to another project.

To organize a project, the project leader must determine who all are required for the
project, when they are available, and for how their services can be expected. The key
people required in a systems project are often the key people in the day to day
operation of an organization, and they probably will have to continue their efforts,
the project leader must avoid scheduling important project activities when the users
are very busy with normal duties. For users who are “always busy”, plan must be
made to utilize overtime or/and shift personnel, to free the key systems users for
participation in the project.

It is important when organization a project to ensure that every person knows his
or her role in the project and is aware of corporate objectives. This is accomplished
through formal training as well as informal conversation.

The project leader is responsible for the completion of a project, but obviously cannot
do it alone. Responsibilities must be defined precisely, and overlapping
responsibilities avoided. When the phase of a project breaks down, is behind
schedule, or is over budget, the leader of a well- organized project will be able to
identify the person who can provide information and, perhaps, the solution to the
problem.

Besides organizing people, the project leader must budget money and order
equipment. Acquainting people with their responsibilities and enabling them to
discharge these responsibilities is the essence of leadership.
Gantt chart
A Gantt chart helps in scheduling of activities of a project, but it does not help in
identifying them. activities identified in the work breakdown structure. During the
may be identified that were not envisioned during the initial planning.
Gantt chart can take different forms depending on their intended use. They are best
of the bars to show how much time we expect each engineer to spend on each
activity. Gantt charts are useful for resource planning and scheduling. While they
show the tasks and their durations clearly, however, they do not show intertask
dependencies plainly.

TASKS JUN JUL AUG AUG SEP OCT OCT- NOV


E Y -SEP NOV
THEME OF THE
PROJECT
DEFINED
INFORMATION
GATHERING FOR
THE PROJECT
REQUIREMENT
OF THE PROJECT
FEASIBILITY
STUDY
DESIGN

CODING

TESTING OF
DEVELPOED
CODES
DOCUMENTATIO
N
Scope of the solution

Online retail online shopping is nothing but a way of buying and selling of
products online i.e. via internet. This has emerged in recent years as a very popular
way of shopping. Online retailing has also gone through so many changes that have
changed its face completely. People around the world have become habitual of
enquiring and buying each and every thing online, whether it be footwears, apparels,
groceries, books, electronics and even household items. Reason being, the online e-
commerce stores are available for 24×7, choices are more, it is easy to go through
everything without any time boundation and home delivery service is available.That’s
why one online shopping have become the critical needs to retail companies t o
survive in the growing online market.

In the retail sector, the growth of has been phenomenal. Noare a fundamental part
of the online retail industry. With the help of e commerce, an enterprise can develop
a complete web shop (online web store) with diverse features and functionalities for
handling each and every facet of the shop, and to go updated with the changing
market conditions. Not only this, e-Commerce has gifted the retail sector with
something called customer satisfaction. For any business, success comes once your
customer is happy. With a great there is tremendous scope in reaching customer
requirements with new coming up time and again having better features.

Online shoppingsolutions are user friendly as they provide full customization, easy
purchase, simpler UI and simple integration with different kinds of payment
gateways. Ecommerce solutions has provision for modifying the websites, adding
new items, changing the information related to existing items and complete control
over the website functioning. There is very less scope for mistakes or negligence as
everything is taken care of by the software itself.

Not only handling the website, through customers can also be attracted, grabbed and
held to the store with the help of discount coupons and advertising. Some specific
items can also be put forward by generating promo codes.

There are so many features other than these that make to expand at a fast pace
making profit to the retailers and to the customers as well. The business has
expanded and is growing rapidly because of which traditional retailers are
DFD

data flow diagram is a graphical representation that depicts information flow and
transforms that are applied as data move from input from output. The basic form of a
data flow diagram is also known as data flow graph or bubble graph.

The data flow diagram may be used to represent a system or software at any level of
abstraction. It may be partitions into levels that represent increasing information
flow and functional details. Therefore the DFD’s provide a mechanism for functional
modeling as well as information flow modeling.
Data flow diagram is portioned into levels like 0,1,2,3……. And so on. O level DFD’s
also called a functional system model or a context model that represent the entire
software elements as a single bubble with input and outputs data indicated by
incoming and outgoing arrows respectively some guide line for creating DFD’s.
A few simple guidelines can add immeasurably during derivation of dat5a flow
diagram.
1. The level 0 DFD’s should depict the software system as a single bubble.
2. Primary inputs and output should be carefully noted.
3. Refinement should be beginning by isolating candidate process data object
and stores to be represented at the next level.
4. All arrows and bubbles should be labeled with meaningful names.
5. Information flow continuity must be maintained from level to level.
6. One bubble at a time should be refined.
All symbols and their indication

External Entity

Process

Data store
Data flow
REGISTRATION

USER
ACCOUNT STATUS

Online
ADMINISTRATOR BILL SEARCHING
shopping

CREDIT READING
VISITOR

BILL PAYMENT

DATABASE
SECURITY

DFD AT “O” LEVEL


ADMINISTRATION CUSTOMER EMPLOYEE

AUTH.DB

REGISTR
ATION
PROCESS

AUTHENTI
VALIDATIO CATION
N CHECK PROCESS

FOR NEW
USER OR
VISITOR
DATABASE ADMIN
PROCESS

USER STATUS
AND TOTAL
BILL

DAILY
PAYMENT
UPDATE
MODE
PROCESS ORDER
FOR THE
PRODUCT

CHECK
1ST LEVEL DFD DELIVERY
STATUS DATABASE
EMPLOYEE

USER

REGISTRA
TION
PROCESS
INTERACTION
TO ACCOUNT

USER
ACTIVITY
LISTNING LOGIN
OF ORDER PROCESS
CATEGORY
ADMIN
PROCESS

ADMINISTRATI ADD NEW AUTHORIZ


ON PRODUCT E WORK
TO SALE

PRODUCT
SELECTIO
LISTINING N
USER

PRODUCT
OUTSIDE
SOURCE
PAYMENT
PROCESS

2ND LEVEL DFD


NAME
CATEGORY

ER DIAGRAM

NATIONAL ADDRESS
E.ID# NAME CUSTOME
ITY R.ID#

SERV CUSTOMER
EMPLOYEE
ICES

E.ID
PH.NO
ADDRES
PH.NO
S
S.NO#
CATEGORY
SHOP
ING

ORDE
JOB R FOR
TYPE

SALARY LOCATION
ES.ID P.NA P.ID
ME

E-SHOPPING CENTER
PRODUCT

TYPE
PH.NO NAME

QTY PRICE
COL
C.ORDER L. B.ID AUTHPRSN

PAY
BILLING COUNTER
COLLECTION ME
SLIP NO NT

LOCATION PH.NO

C.CODE
MODULE DESCRIPTION
We know that it is quite difficult to do anything of its whole part at a time.
So it is the task of the programmer to break/split the whole set of task into various
small module so that one can handle them effectively. Butt depends upon the
software system that in which Extent it will be broken so that there is no inter-
dependency among them. This project developed for “
On-Line Shopping

1. Admin Module

2. User Module

3. Customer Service Module

4. Advertisement Module

5. Employee Module

6. Payment Module

7. Pu rchase Modu le

8. Product Tracking Module

9. Searching Modu le

10.Report Module

11.Security
DATA STRUCTURE
LOGIN TABLE

S.NO FIELD NAME DATA TYPE SIZE VALIDATION


2 User_name Varchar 25 Primary key
3 Password Varchar 40

EMPLOYEE DETAILS TABLE

S.NO FIELD NAME DATA TYPE SIZE VALIDATION


1 E_id Varchar 20 Pimary key
2 E_name Varchar 50
3 J_date Date
4 Sex Varchar 55
5 Address Varchar 60
6 Ph_no integer 88
7 Dob date 44
8 Salary Varchar 65
9 Specialization Varchar 45

CUSTOMER SERVICE TABLE

S.NO FIELD NAME DATA TYPE SIZE VALIDATION


1 User_name Varchar 20 Pimary key
2 Password Varchar 10
3 Name Varchar 300
4 Address Varchar 200
5 Contact_no Varchar 25
6 Email Varchar 50
PURCHASE TABLE

S.NO FIELD NAME DATA TYPE SIZE VALIDATION


1 Pro_id Varchar 10 Pimary key
2 Item_name Varchar 300
3 Rate Varchar 200
4 Item_category Varchar 250
5 Quantity integer 40
6 Date Date _time

ADVERTISEMENT TABLE

S.NO FIELD NAME DATA TYPE SIZE VALIDATION


1 Ad_id Varchar 10 Pimary key
2 Ad_name Varchar 30
3 Image Varchar 79
4 Ad_strt_date Date _time 85
5 Ad_end_date Date _time 65
6 Comp_name Varchar 52
7 Address Varchar 78
8 Contact _no Varchar 12
9 E_mail Varchar 18
PAYMENT TABLE

S.NO FIELD NAME DATA TYPE SIZE VALIDATION


1 P_id Varchar 20 Primary key
2 P_name Varchar 50
3 P_date Date
4 Cust_name Varchar 64
5 Pay_mode Varchar 50
6 Cash Varchar 150
7 dd Varchar 50

PRODUCT TRACKING TABLE

S.NO FIELD NAME DATA TYPE SIZE VALIDATION


1 P_id Varchar 20 Primary key
2 cust_name Varchar 50
3 delvr_date Date
4 amount_date Varchar 64
5 Contact_no Varchar 50
6 Address Varchar 150
7 e-mail Varchar 50
PROCESS LOGIC
P r o c e s s l o g i c i s c o n c e r n e d w i t h h o w t h e s y s t e m i n t e r a c t w i t h users
and fulfill there requirements? Being a web based system;
usero f t h i s s y s t e m c a n e a s i l y a c c e s s t h i s s y s t e m t h r o u g h I n t e
r n e t . I t provides various functionalities, attracts the user to use it, and makesthe
user comfortable to work on it.Before providing access to the manipulating authorities, it
firstdemands for user name and password based on user type. If the nameand
password entered are correct then one can enter the admin menuand can change
any contents from this place. Note that it also worksas a public website
where one can see the information based on thepurpose to access this
website. There is no need for authenticationhere, because they has to only
access the site not change or updatea n y c o n t e n t a n d t h e y a l s o c a n n o t
c h a n g e i t b e c a u s e t h e y h a v e n o authority to change. Here user finds
various menus and sub menusand can select any one of them as there requirement.Let I
explain the process logic of admin module thathow one can perform the task of
administrator. First one has to giveuser name and password which should
be checked by the system onthe basis of information stored in the database.
SECURITY MECHANISM

Every system must be kept secured against several threats. These threats may be
unauthorized access, destruction and manipulation of data. To prevent these threats
security may be physical and strategic. In physical security the system is placed in a
secured place to prevent physical access of the computer. In strategic threats we
follow different methods and rules to prevent infiltration.

In my project I am using user authentication as a security mechanism. Ours is a


community of client where any client can register himself/herself to avail the features
of our website.

Every user has to register by entering the email_id and password, which will remain
stored in the database. Every time a user visits the site he/she has to enter the
emailed and password which will be matched with that of stored in the database .The
match of two will enable the user to access the site.

As this site is not related with any money transaction or any sensitive data, which
may hamper the integrity of any system, so DAC is not required.

The admin account is also password protected. So unauthorized person will not be
able to change any data.

Only the administrator can insert, alter, delete the data or make any other
modifications.
Future scope and further enhancement

It has been seen that the organizations’ requirements changes after certain interval of
time and the system is required to be upgraded. The top management to cope-up
with the highly competitive market may due to the implementation of new plan,
policy, strategies or new establishment adopt these changes. Therefore any software
must be flexible so that it can be modified easily without much affecting the current
system.
 One year maintenance and software support for the proposed application
software will be provided free of cost (provided change of scope is not raised).
 The proposed software is completely modular and therefore it facilitates for
extendibility i.e. activities for new establishment can be easily added without
affecting the main program with less effort and cost.
 Changes in GUIs based screen can be easily incorporated but it will be treated
as changed request and it will be charged.
 It will be portable can be implemented on most of the available windows
based platform.
 Complete software will be easily upgraded (i.e. versioning of software is
possible) and will show downward compatibility.

Limitations

It requires internet connection.

Requires large database.

System date for the project is like as backbone for the human, i.e. proposed system is
depends on system date so it must be correct
Bibliography

SOFTWARE ENGINEERING

ROGER S. PRESSMAN

AN INTRODUCTION TO DBMS

BIPIN C DESAI

BLACK BOOK OF PHP

Wrox

You might also like