Beruflich Dokumente
Kultur Dokumente
1 Introduction
1.1 Company Profile
1.2 Existing System
1.3 Problems in Existing System
1.4 Needs for computerization
2 Proposed System
2.1 Proposed System
2.2 Hardware and Software Specifications
2.3 Feasibility Study
2.4 Fact finding techniques
3 Analysis
3.1 Nomenclature(ERD,DFD,FDD Symbols)
3.2 Functional Decomposition Diagram
3.3 Context Level Diagram
3.4 Entity relationship Diagram
3.5 Data Flow Diagram
4 System Design
4.1 Data Element Dictionary
4.2 Table Design
4.3 Program Specification
4.4 Menu Design
4.5 Input Screen Design
5 Testing Procedures
6 Output Screens
7 Implementation Procedure
8 User Manual
9 Scope For future Enhancement
10 Conclusion
11 Bibliography
2010-2011
1
1.INTRODUCTION
Online share trading systems are gaining popularity because they support share trading from
any place in the world. They provide convenient trading facility to the buyers and sellers of
stocks. They provide excellent means of transparency to the sellers and buyers of shares.
This black book presents a detailed report of the work done to create an online share trading
system. The title of the project is Online Share Trading System cum Exchange.
1.1 COMPANY PROFILE:
1.1 Company Profile
Jasper Securities Private Ltds.
Established in 1999, our branch is managed by a dynamic
Team of professionals with cumulative experience in trading i.e buying &
selling of shares profession.
Our Motto
At Jasper Securities Private Ltds we create Hope of making profit from 1% to
as much as possible
Features
Time Flexibility
Reasonable price
E-learning
We provide Online Education to our customer so that they need not need to
search for any other hard copy.
2010-2011
2
Information Technology today has grown in leaps and bounds. In the world of computers,
newer technologies hit us every day. Microsofts .Net is one such technology which has
affected us all through Internet, mobile phones, etc.
Website building and running as a whole application remotely at ones terminal has helped
many businesses to run effectively. Online share trading web sites are increasing in number
day by day because of their user friendliness, transparency and flexibility. Electronic
commerce has become a tool for improving the business of any organization. Electronic
commerce has revolutionized the usage of Internet for trading such as online auctions,
online shopping, online share trading and other applications. One such application is trading
of stocks. Since many decades this was done with the help of brokers. The website provides
the client with an effective and simple means to fulfill this purpose. The objective of the
project is to demonstrate online share trading i.e. primarily buying and selling of shares.
Since, trading of shares involve placing the orders with the stock exchange. The project also
consists of the exchange system. The exchange system is not separate but it is integrated
with the website itself as connection to the stock exchange is not economically feasible. It
consists of the business logic that the stock exchange uses for facilitating a trade.
2010-2011
3
The system provides the user to ignore the difficulty to manage the
records manually as the records are stored in the database and also
provides auto updating of the records in the database.
The system ignores the problem which arises while maintaining the
record of various transactions done manually with the system such as
issuing books.
The system looks after the stock of the books so the book seller does not
have to face any problem, when the books in the store gets out of stock
then the system informs the user that the book is not in the stock.
The project we are making will solve the problem of the user that arises
while managing the records. This software will help the user to maintain
the record of all the Books; the book seller is having at particular date or
time.
The website will generate the records for all the requirements.
2010-2011
4
Online share trading mainly deals with selling and buying of shares electronically. Online
share trading is categorized into two types. One deals with the equity trading and the other
deals with the options trading. Our focus is on equity trading. Online trading involves share
broker, stock exchange and users. Share broker is responsible for opening the new account
for the user and providing the interface to the user for trading. Stock exchange maintains a
list of shares along with their prices and facilitates free-and-fair trading of stocks. The shares
of only those companies that have listed their stocks on the stock exchange can be traded.
Most often, this list expands to involve new companies. For online share trading, Internet
will be used along with a web site.
The project consists of a website. It serves as a user interface for the customers of the
company. The project is not live. The user visits the website, register with the company
through the websites new user registration page. The user can now use the online share
trading services provided by the company on its website. Share trading means buying and
selling of shares.
The user has to first login to his account; using the user login page. After successful login,
the user is redirected to his homepage. The homepage provides the link to various other web
pages which the user can use for a comfortable and user friendly online trading experience.
The important link is the link to the Buy/Sell webpage. This web page provides the user to
trade. User can place their trading orders by filling out the required fields and can enjoy the
trading experience from the comfort of their home or office just at the click of a button. The
user may also view the status of their orders by visiting the Order Book webpage. This page
lists all the orders that the user has placed on the present day.
The user has also been provided the facility of viewing her/his trade history. The user may
visit the trade history webpage to do.
Besides, the users can change their passwords are some of the other common features of the
website.
2010-2011
5
2.PROPOSED SYSTEM.
2.1 PROPOSED SYSTEM:
The main objective of the entire activity is to automate the process of day to day
activities of computer hardware shop and also has some more features:
Billing System
Time Efficient
2010-2011
Cost Efficient
No data duplication
Advantages:
Performance:
During past several decades, the records are supposed to be manually handled
for all activities. The manual handling of the record is time consuming and
highly prone to error. To improve the performance of the System, the
computerized system is to be undertaken. This project is fully computerized and
user friendly.
Efficiency:
The basic need of this system is efficiency. The system should be efficient so
that whenever a new detail of his/her is submitted the system is updated
automatically. This record will be useful for other users instantly.
Control:
The complete control of the project is under the hands of authorized person
who has the password to access this project and illegal access is not supposed to
deal with. All the control is under the administrator.
Security:
Security is the main criteria for the proposed system. Since illegal access may
corrupt the database. So security has to be given in this project.
2010-2011
7
2.2.1HARDWARE SPECIFICATION
Hardware that can be specified as minimum configuration for the development as the
running of the project includes the Processor, Primary memory, secondary memory, I/O
devices, etc.
Processor:
Processor with 500 MHz and /or compatible. Since, project revolves around large amount of
processing for precise results and better visualization, such a processor is required. It may be
noted that the application will run even on a lower configuration. This is a primary
advantage offered by our system compared to similar systems.
Primary memory:
64 MB RAM.
Technically speaking the more the primary memory available more efficiently the
application executes. The application being
developed needs a lot of processing intensive activity and due to which it is recommended
that the computer system must possess the primary memory with at least 64 MB RAM for
better execution of the developed application.
Secondary Memory:
50 MB Hard disk space.
The developed software can be used on any system for execution with minimum storage
space. It also features the storing of the images that need to be processed and their
intermediate results In order to facilitate this minimum of 50 MB of hard disk space is
required. The larger amount is required because the software utilizes two major database
systems, viz. the primary or active database and the secondary database or data warehouse.
I/O Devices
Standard keyboard and Mouse:
The user can interact with the application with input devices such as keyboard and the
mouse. It is recommended that the computer system must possess standard keyboard and a
mouse to provide input to the application. SVGA Monitor and Display card capable of
displaying 24 bit color with resolution 800*600 pixels or above.
2010-2011
8
Internet Connectivity:
Internet Connectivity through LAN/Dial-up modem, etc. This is required for accessing the
web site.
The project development and testing requires a computer that has the following softwares
installed:
2010-2011
9
Since, we have the computer with the above softwares, we can develop the project and
hence, the project is technically feasible.
It has so many toolbars such as standard toolbar, edit toolbar, debug toolbar, form
editor toolbar, customizing a toolbar.
It has great features to build the user interface using the toolbox and custom controls
and components.
10
Making decisions (conditionals) like the else, combining conditions in an if-then, the
block if then, the Goto.
It has so many built in functions like string functions, replace function, like and
fuzzy functions etc.
Arrays, handling functions (split, filter functions), sorting and searching, records all
these can be controlled by code.
Control arrays, list and combo box, the flex grid controls.
We can build larger projects easily using multiple forms, code modules, error
trapping.
We can do graphics.
It has a file system controls and file system objects (file list boxes, drive list boxes).
2010-2011
11
2010-2011
12
2.3.1 Operational feasibility: Simply put this test of feasibility asks is the system will work when
it is developed
and performed.
Are
there
major barriers to
implementation? Here are questions that will help for the operational
feasibility of project.
project?
Early
involvement
reduces
the
chances
of
resistance
Will the proposed system cause any harm? Will it affect result
in any area? Will individual performance be poorer after
implementation? Will customer be affected in an undesirable
way?
2010-2011
13
Therefore, all
Cultural feasibility means of how well the end user and management
accept new system.
2010-2011
14
The technical issues usually raised during the feasibility stage of investigation
include following:
2010-2011
15
A system that can be developed technically and that will be used if installed
must still be a good investment for the organization. Financial benefits must
equal or exceed the costs. To assure this one mist estimate following.
o
o The cost of hardware and software for the class of application being
considered.
o
2010-2011
16
Availability of people
2010-2011
17
COST ANALYSIS
The cost encountered throughout the project is as follows:
Number of Programmer: 2
Computer Required
: 2
20 days.
2010-2011
18
GANTT CHART
Graphical symbols used in drawing our Gantt chart:
Particular
Symbol
2010-2011
19
2010-2011
20
2010-2011
21
2010-2011
22
3.ANALYSIS
3.1 Nomenclature
2010-2011
23
PERT CHART
2010-2011
24
1 Jan, 9 Jan
Design & GUI
Part
10 Jan, 15 Jan
Coding Database Part
16 Jan, 15 Mar
Integration
&
Testing
16 Jan, 15 Mar
15 Dec, 31 Dec
Requirement &
Specification
1 Jan, 9 Jan
Design & GUI
Part
Coding
GUI Part
Implementation and Manual Writing
` House_No
UML DIAGRAMS
Cust_Email_ID
Cust_Resi_ID
Register
Cust_Fax_Off_ID
Trade
Cust_Mobile_ID
Tel_No
Mob_No
Cust_Fax_Home Cust_Fax_Off
Cust_Off
View Cust_Resi
Current Price
Cust_Mobile
Cust_Email
Order Book
Portfolio
Cust_ID
F_Name
Submitss
Trade Book
Pass_ID
Password
Customer
Change
my Password
ISIN
Logout
Security_Name
Holds
Status
Passwords
Has
Acc_No
Scrips
Account
Portfolio_ID
Avg_Inv_Price
Broker_Ref_No
for
Price
Portfolio
Listed
Index_ID
Holds
Orders
Places
Index_Name
Index
2010-2011
26
Sequence Diagrams
Registration
Website
Web Browser
Server/Database
Application Submit
Customer ID ACK
Trade
Web Browser
Order Submit
Gets preview
2010-2011
27
Website
Server/Database
Password
Website
Web Browser
Server/Database
New Password
ACK
Portfolio
Web Browser
View Portfolio
Portfolio Details
2010-2011
28
Website
Server/Database
Order Book
Web Browser
Order Details
2010-2011
29
Website
Server/Database
Current Price
2010-2011
30
Website
Server/Database
Logout
Web Browser
ACK
2010-2011
31
Website
Server/Database
4.System Design
Design Approach:
2010-2011
33
Process
There are several phases and processes in the user interface design
some of which are more demand upon than others depending on the
project. (note for the remainder of this section the word system is
used to denote any project whether it is a web site, application, or
device )
User analysis:
Analysis of the potential users of the system either through discussion with
people who work with the users and/or the potential users themselves. Typical
question involve:
o What would the user want the system to do?
o How would the system fit in with the users normal workflow or daily
activities?
o How technically savvy is the user and what similar systems does the user
already use ?
o What interface look & feel styles appeal to the user?
Information architecture:
2010-2011
34
Development of the process and/or information flow of the system (i.e. for phone
tree system, this would be an option tree flowchart and for web sites this would
be a site flow that shows the hierarchy of the pages).
Prototyping:
Development of wireframes, either in the form of paper prototypes or simple
interactive screens. These prototypes are stripped of all looks & feel elements
and most content in order to concentrate on the interface.
Usability testing:
Testing of the prototypes on an actual user often using a technique called talk
aloud protocol where you ask the user to talk about their thoughts during the
experience.
2010-2011
35
Database Design
This logical data model contains all the needed logical and physical
design choices and physical storage parameters needed to generate a
design in a data definition language, which can then be used to create a
database.
A fully attributed data model contains detailed attributes for each entity.
In the relation model these are the table and views. In an object
database the entities and relationships map directly to object
classes and name relationships.
2010-2011
36
Design Process
Superimpose a logical structure upon the data on the basis of these relationships.
Within the relational model the final step can generally be broken down into
two further steps that of determining the grouping of information within the system,
generally determining what are the basic objects about which information is being
stored, and then determining the relationships between these groups of information,
or objects.
This step is not necessary with an object database.
2010-2011
37
Table No
1.
Table Name
Account
Description
All the account details
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
Cust_Add
Cust_Email
Cust_Fax_Home
Cust_Fax_Off
Cust_Mob
Cust_Off
Cust_Res
Customer
Index
Order
Password
Portfolio
Scrips
Customers address
Customers E-Mail
Customers Fax number of Home
Customers Fax number of office
Customers Mobile number
Customers Office landline number
Customers Home Landline number
All customer details
All index details
All order details
Customers Password
Customers electronically held shares
Listed companies shares details
2010-2011
38
Account
Field Name
Acc_No
Data Type
Bigint
Field Size
8
Key
Primary Key
Cust_ID
bigint
Foreign Key
Status
varchar
50
Description
Primary key of
table
Primary key of
cust table
Whether the
account is
active or not
Cust_Resi
Field Name
Cust_Resi_ID
Data Type
int
Field Size
4
Key
Primary Key
Cust_ID
bigint
Foreign Key
Tel_No
bigint
2010-2011
39
Description
Primary key of
table
Primary key of
cust table
Tel no of
customer
Cust_Add
Field Name
Cust_Add_ID
Data Type
Int
Field Size
4
Key
Primary Key
Cust_ID
bigint
Foreign Key
House_No
varchar
50
Home_Name
varchar
50
Area_Name
varchar
50
Landmark
Street
varchar
varchar
50
50
City
varchar
50
Pincode
bigint
State
varchar
50
Description
Primary key of
table
Primary key of
custtable
It gives customer
house no
It gives customer
house name
It gives customer
area name
It gives landmark
It describes
about cust street
It describes
about cust city
It describes
about cust
pincode
It describe about
customers state
Cust_Email
Field Name
Cust_Email_ID
Data Type
Int
Field Size
4
Key
Primary Key
Cust_ID
bigint
Foreign Key
varchar
50
Description
Primary key of
table
Primary key of
cust table
Generates email
address of user
Cust_Off
Field Name
Data Type
Field Size
2010-2011
40
Key
Description
Cust_Off_ID
Int
Primary Key
Cust_ID
bigint
Foreign Key
Tel_No
bigint
Primary key of
table
Primary key of
cust table
Generates
telephone no of
user
Cust_Resi
Field Name
Cust_Resi_ID
Data Type
Int
Field Size
4
Key
Primary Key
Cust_ID
bigint
Foreign Key
Tel_No
bigint
Description
Primary key of
table
Primary key of
cust table
Generates
telephone of user
Index Table
Field Name
Index_ID
Index_Name
Data Type
int
varchar
Field Size
4
50
Key
Primary key
Field Name
Cust_Fax_Off_I
D
Cust_ID
Data Type
int
Field Size
4
Key
Primary Key
Bigint
Foreign Key
Fax_No
Bigint
Description
Index Name
Cust_Fax_Off
Description
Primary key of
table
Primary key of
cust table
Gives fax no of
user
Customer Table
Field Name
Data Type
2010-2011
41
Field
Key
Description
Cust_ID
bigint
Size
8
F_Name
varchar
50
M_Name
varchar
50
L_Name
varchar
50
DOB
Gender
datetime
varchar
50
50
Marital_Status
varchar
50
HEQ
varchar
50
PAN
varchar
50
TradingTurnover
money
AvgSizeofTx
int
ExpectedTx
int
Sourceoffunds
varchar
50
PurposeOpeningAccount
varchar
50
Occupation
varchar
50
Primary
Key
Primary key of
table
Gives first name
of user
Gives middle
name of user
Gives last Name
of user
DOB of user
Gives gender of
user
Gives marital
status of user
Gives edu
qualification of
user
Gives pan no of
user
Gives expected
trading turnover
Gives avg size of
tx
Shows expected
tx
Source of funds
for investment
Gives purpose of
opening acc
Give users
occupation
Cust_Fax_Off
Field Name
Cust_Fax_Off_I
D
Cust_ID
Data Type
int
Field Size
4
Key
Primary Key
Bigint
Foreign Key
Fax_No
Bigint
2010-2011
42
Description
Primary key of
table
Primary key of
cust table
Gives fax no of
user
Cust_Mobile
Field Name
Cust_Mob_ID
Data Type
Int
Field Size
4
Key
Primary Key
Cust_ID
Bigint
Foreign Key
Mob_No
Bigint
Description
Primary key of
table
Primary key of
cust table
Gives mobile no of
user
Cust_Fax_Home
Field Name
CUST_FAX_HOME
Cust_Fax_Home_ID
Cust_ID
CUST_FAX_HOME
Fax_No
8
8
2010-2011
43
Field
Size
4
Key
Description
Primary
Key
Foreign
Key
Primary key of
table
Primary key of
cust table
Gives fax no of
user
Order Table
2010-2011
44
Field Name
Data Type
Field Size
Key
Description
Broker_Ref_No
bigint
Primary
Key
primary key of
order table
ExchOrderNo
bigint
Gives order no
of exchange
ISIN
varchar
50
Primary key of
scrips table
BuySell
varchar
50
Order_Type
varchar
50
Gives type of
order
Quantity
bigint
no of shares
ordered
Price
money
Brokerage
money
Broker charges
STT
money
Gives the
security
transaction tax
Other_Charges
money
Total_Order_Amt
money
Order_Time
datetime
2010-2011
45
time
Order_Date
datetime
Order_Status
varchar
50
Passwords Table
Field Name
Data Type
Field Size
Pass_ID
Int
Primary key of
table
Cust_ID
Bigint
Primary key of
cust table
Password
Varchar
12
Users password
Security_Quest
Varchar
50
Users security
question
Security_A
Varchar
12
Users security
ans
2010-2011
46
Key
Description
Portfolio Table
Field Name
Data Type
Field Size
Portfolio_ID
bigint
Primary key of
table
Acc_No
Bigint
Gives acc no of
user
ISIN
Varchar
50
Primary key of
scrip table
Quantity
bigint
Quantity of
shares user has.
2010-2011
47
Key
Description
Scrips Table
Field Name
Data Type
Field Size
ISIN
varchar
50
Primary key of
table
Index_ID
Int
Primary key of
index table
Security_Name
varchar
50
Gives users
security name
Face_Value
money
Actual value of
shares
Last_Price
money
Record_Date
datetime
Gives record
date of shares
Purpose
varchar
50
Description
2010-2011
48
Key
Descripton
Class Diagram
_registrationack
SqlConnection cn
SqlCommand cmd
SqlDataReader rs
long id
long acc
protected void Page_Load()
welcomelogin
Pro_OSTSE_SelectShares
SqlConnection cn
protected void Page_Load()
protected void
protected
protected
protected
protected
protected
protected
.
.
.
void
void
void
void
void
void
SqlDataReader rs
long custid
protected void
Page_Load()
protected void
btnSubmit_Click()
lnkAxis_Click()
lnkPnb_Click()
lnkSbi_Click()
lnkTatapow_Click()
lnkTatasteel_Click()
lnkTrent_Click()
long id
protected void
Page_Load()
protected void
btnRegister_Click()
protected void
myportfolio
RadioButton1_CheckedC
hanged
protected void
protected void
Page_Load()
protected void
LinkButton1_Click()
RadioButton2_CheckedC
_logout
SqlConnection cn
SqlCommand cmd
SqlDataReader rs
long id
System.Web.Ui.Page
protected void
Page_Load()
protected void
protected void
btnClear_Click()
homepage
SqlCommand cmd
SqlDataReader rs
lnkIcici_Click()
SqlConnection cn
SqlCommand cmd
_Default
currentprice
btnRegister_Click()
protected void
RadioButton1_Checked
Changed
protected void
protected void
Page_Load()
protected void
Button1_Click()
protected void
LinkButton2_Click()
changepassword
lnkCurrentprices_Click()
protected void
RadioButton2_Checked
Trade
SqlConnection cn
SqlCommand cmd
SqlDataReader rs
SqlDataReader rs4lastprice
tradebook
lnkViewmyportfolio_Click(
SqlConnection cn
SqlCommand cmd
SqlDataReader rs 4portidofbuyer
SqlDataReader rs
SqlDataReader rs 4portidofseller
protected
protected void
void Page_Load()
lnkOrderbook_Click()
protected void
SNAPSHOTS
protected
void
LinkButton1_Click()
SqlDataReader rs portidofseller1
static double price
static double pricedb
static double orderprice
static long quantitycase
static long quantitycasesell
protected void
protected void
Button1_Click()
btnConfirmorder_Click()
2010-2011
49
SqlDataReader rs4brokerrefno
Program Speciation
The website consists of the home page which shows up as the
default page when the user enters the domain name of the website.
The user can either sign up with the website or if already sign
in then he/she can directly login and do the shopping.
The login page consists of two text boxes where in the user can
enter the user id and password to complete the login procedure.
If any user wishes to register he/she can select the sign up
link from any location of the website, A form will appear which after
submitting the user can login.
Only the members of the website can shop for books. The
information provided by the user is saved in database, which is
supported by SQL Server which is hence secure which indeed
provides security.
The user can select the shares by adding the shares in the
cart, with quantities of the shares, it will redirect the user to the cart
page from where the user can either complete the payment
procedure by clicking check out button.
The shares for the purchase are available on the categories
page, in which user can select the he/she wants to purchase.
Even a search box is available if the user wishes to find the
shares directly by the name of the shares.
2010-2011
50
2010-2011
51
Categories page:
Description: - This the category page of the website. Here the user
can look into various categories of the book.
Criticality: - On the basis of this page the user can buy the book
which he/she requires.
Sign up page:
Description: - This is the sign up page of the website user can fill the
registration form.
Criticality: - On the basis of this sign up page the user can fill the
registration form and then the user will get the login_id and
password.
2010-2011
52
Login page:
Description: - This is the login page of the website where user will
login to buy the particular book.
Criticality: - On the basis of this login page the user can login to buy
the particular book with the help of the login_id and password.
My Account page:
Description: - My account page consists of the following details first
name, last name, email id, password, conform password, date of
birth, occupation, address and contact no.
Criticality: - This page will helps to keep the track of the customer
information and the customer will get their user id and password to
further login.
Contact me page:
Description: - This is the contact me page of the website.
Criticality: - It will help the user to contact the owner of the book store
on the particular issue.
2010-2011
53
Map page:
Description: - This will show the map page of the website.
Criticality: - This is the map page of the website. It helps the user find
out in the map of India where the particular book store is located.
Cart page:
Description: - This is the cart page of the website.
Criticality: - The cart page of the website will show the shopping cart
is empty, if the customer has selected any book to buy then it will
show two buttons which will ask you for continue shopping or check
out.
2010-2011
54
Here, in this screen the user can come and either log in if he/she is already a registered user
or else can click on new registration link to proceed for registration.
This is the new user registration page where the users can fill their details and register
themselves.
2010-2011
55
If the user enters all the values correctly, then all the validations are successful passed and
the user is given his/her customer id and account no. for future reference.
2010-2011
56
This is the users homepage where he/she can perform all the listed activities.
2010-2011
57
This is the trading page. Here, the users can enter details of the trade and then do trading.
2010-2011
58
Before, the user is actually entered into the trading system and confirmed, the user is given a
preview of the order.
2010-2011
59
The user is given a Broker Reference number for future reference once the order is
successfully placed.
2010-2011
60
The user can view the latest share price by visiting the above page through the current price
link on the homepage.
2010-2011
61
This is the output screen that the current price page will give.
2010-2011
62
Order book web page will give the details of the orders the user has placed.
2010-2011
63
My Portfolio page lists all the shares the user has in his/her
account.
2010-2011
64
This page takes the input as dates and gives the details of only those shares that have been
traded.
2010-2011
65
2010-2011
66
This the change password page from where the user can change his/her security details.
2010-2011
67
2010-2011
68
E n d -to -e n d
s y s te m te s ts
t e s t t h a t v e r if y in t e g r a t e d
com ponant
t e s t t h a t v e r if y c o m p o n a n t
o f is o la t io n
White-Box Testing:
White box testing is a security testing method that can be used to validate whether code
implementation follows intended design, to validate implemented security functionality, and
to uncover exploitable vulnerabilities.
White box testing requires access to the source code. Though white box testing can be
performed any time in the cycle after the code is developed, it is a good practice to perform
white box testing during the unit testing phase.
S t a t e m e n t t e s t in g
W h it e
box
T e s t in g
D e c is i o n T e s t in g
C o n d i t i o n t e s t in g
Guarantees that all independent parts within a module have been exercised at least
once.
2010-2011
69
Blackbox Testing:
Black-box testing is the craft of testing a program from the external view. We look at how
the program operates in its context, getting to know needs and reactions of the users,
hardware and software platforms.
E x p e c te d
in p u t s
B la c k
box
T e s t in g
B o u n d ary
V a lu e s
I le g a l
v a lu e s
Black-box Testing is testing without knowledge of the internal working of the item being
tested.
Black box testing in our application attempts to find errors in following categories:
2010-2011
70
TEST REPORTS
Test for
Action
performed
Register
Trade
Current
price
Registration of Enter
User
informatio
n
Trading
Scrip
id
,Buy/Sell
View at
current price
Order
Book
Trade
Book
Portfolio
5
6
Change
password
Logout
Input
Successfully
loging out
Scrip id
New
password
and
confirm
password
Result
Expected
Obtained
Result
Remar
k
Type of
Testing
User
registers
itself
Complete
Trade
User gets
customer id and
acc no
Transaction of
share is done
Succes
s
Succes
s
User get
result after
viewing
whether to
trade
Order
Status
Traded
Orders
Shares in
users
account
Password
change
successfull
y
Current price
can be viewed
Succes
s
Succes
s
Succes
s
Succes
s
Password is
changed
Succes
s
Logout
completely
Succes
s
2010-2011
71
6. OUTPUT SCREEN
This is the output web page that is displayed once the user successfully changes his/her
security details.
2010-2011
72
When the user logs out from his/her account then she/he gets this page as a confirmation for
logout. The can also click on the Re-Login link provided on this page to re-login.
2010-2011
73
7. IMPLEMENTATION PROCEDURES
Security:
Security is an important concern when it comes to the system maintenance. This is an
important aspect maintained by the developed system. Each and every user gets access to
the system only through a valid login.
Storage:
In a database there is a huge amount of data which is stored and is required to be accessed
on a timely basis. The proposed system uses SQL server which will provide ample of space
for data storage. More to that it is very efficient in handling transactions.
2010-2011
74
8. USER MANUAL
The website consists of the various modules that are given below in
the figures:-
The hyperlink directs towards the sign up page where the user first
have to register and then only he can do the start trading.
The hyperlink directs towards the my account page which shows the
login window only when the customer has fill the registration form.
2010-2011
75
METHODOLOGY USED
Waterfall Model:
P r o b le m
D e fin itio n
A n a ly s is
D e s ig n
C o d in g
T e s tin g
M a in te n a n c e
Waterfall Model or Life Cycle Model is used in the development of the Software. Here the
name of the software is Online Share Trading System cum Exchange. This model is used to
breakup the identifiable activities into series of actions each of which must be completed
before the next begins. Waterfall Model consists of six distinct phases these phases are
mentioned below:
1.
2.
3.
4.
5.
6.
Problem Definition.
Analysis.
Design.
Coding.
Testing.
Maintenance.
2010-2011
76
1. Problem Definition:
This activity requires precise definition of problem in user terms. A clear statement of
problem is crucial for the success of the software. It helps not only to the developer but
also to the user to understand the problem very well. We find out the problems and
analyze them.
2. Analysis:
In the analysis requirements are both in terms of user and software. The requirement
gathering is all about the processes such as, what are the inputs, what are the processes
required, what are the outputs expected, what are the constraints etc. This step helps us
to gather the system requirements with the goal of determining how these requirements
will be accommodated in the system.
Design:
The design phase deals with various concepts of the system design such as data
structure, software architecture and algorithm. The phase translates requirement into
representation of the software. This phase consists of Entity Relationship Diagram, Data
Flow Diagram, Data Dictionary, Tables etc. In this phase we construct the interface of
the software.
4. Coding:
After the Design next phase is Coding. The phase refers to the translation of the design
into machine readable form. The more detailed is the design the more easier is the
coding.
5. Testing:
After the coding next phase is Testing. Once the code is written it should be tested
rigorously for correctness. Testing may involve the individual unit of the whole system.
It requires detailed plan as what to test, when to test and how to test. The goal of internal
testing is to make sure that the computer code is efficient, standardized, & well
documented.
6. Maintenance:
After the testing last phase is Maintenance. After the software has been installed it may
undergo some changes. This may occur due to change in user requirements, change in
2010-2011
77
Though the system designed has been implemented as much as possible, but time
resources and knowledge constraint prevent any system to be far from the best system
that is in mind.
Also, now a days many computer shops are providing discount on different occasions,
to their regular customer. So this project can be used in the computer retail shops after
adding some more useful modules in the project.
2010-2011
78
10. CONCLUSION
It removes the age old technique of manual record keeping.
Large number of record can be stored in the database.
Security can be maintained.
This website is user friendly and interactive.
Since the website presents the information as a whole hence the
owner can be make better decision.
Using system analysis and design techniques like data flow diagram in designing the
system.
2010-2011
79
11.BIBLIOGRAPHY
1. C Sharp by Balgurusamy.
2. Wikipedia.com for Class, ERD, UML and Normal forms for ERD Normalization.
3. Debugging strategies for .NET Developer.
2010-2011
80