Sie sind auf Seite 1von 33

CHAPTER 1

INTRODUCTION
Online Shopping System (PAUL STORE) is the simple shopping solution. It’s a full-featured
website and shopping cart system that bends over backwards to give you the flexibility you need
to run your online store. This project is a web based shopping system for an existing shop. The
project objective is to deliver the online shopping application.
The basic concept of the application is to allow the customer to shop virtually using the Internet
and allow customers to buy the items and articles of their desire from the store. The information
pertaining to the products are store on an RDBMS at the server side(store).The server process the
customers and the items are shipped to the address submitted by them. The details of the items
are brought forward from the database for the customer view based on the selection through the
menu and database of all products are updated at the end of each transaction.
Online shopping is the process whereby consumers directly buy goods or services from a seller
in real-time, without an intermediary service, over the Internet. It is a form of electronic
commerce. The process is called business-to-consumer (B2C) online shopping.
The Project entitled "PAUL STORE" is a web-based application Software developed in PHP
LANGUAGE using PHP as front end and MYSQL as backend.
The main aim of "PAUL STORE" is to improve the services of Customers and vendors. It
maintains the details of customer payments, product receipts, addition of new customers,
products and also updating, deletion for the same. It also stores the details of invoices generated
by customer and payments made by them with all Payments details like credit card.
The main aim of "PAUL STORE" is to improve the services of Customers and vendors. It
maintains the details of customer payments, product receipts, addition of new customers,
products and also updating, deletion for the same. It also stores the details of invoices generated
by customer and payments made by them with all Payments details like credit card.
The primary features of the project entitled "PAUL STORE" are high accuracy, design flexibility
and easy availability. And also it uses database tables Representing entities and relationships
between entities.
The application was designed into two modules first for the customers(USER) who wish to buy
the articles. Second is for the storekeepers(ADMIN) who maintains and updates the information
pertaining to the articles and those of the customers.

1.1 Module Description:-


The project entitled “PAUL STORE” mainly broken into following modules:-
 Admin module
 User module
 Purchase module
 Payment module
 Validation and Security ,etc
These modules are meant to perform different functionality for the Admin end and User end. At
the time, I have done with Admin Window and somewhat about user window.

1.1.1 Admin module:-


Ø Admin LOGIN using username and password.
Ø Admin can change the password and need to enter old password then new password with
confirm password.
Ø Admin is one who can add, delete or modified the products.
Ø And he/she can add CATEGORY, SUBCATEGORY and PRODUCT .
Ø Admin is the one having overall control of the website.
Ø Only Admin comes to know about the order placed on the site and ensure the delivery of the
product at time.
Ø Administrator of Shopping Cart System has multiple features such as Add, Delete, Update
shopping Items.

1.1.2 User module :-


Ø This is a public link of the website used by the user for shopping purpose.
Ø Firstly user need to Login the account to order the product from the website if he/she is not
register then he/she cannot login firstly need to register the user , Otherwise, he or she (user) can
see the products on the site but cannot order them.
Ø User can select amy category wise products.
Ø Both online payment methods and cash on delivery will be available to make a transaction.

1.1.3 Purchase module :-


Ø In this module user select the ADD TO CART option for purchasing the desired product.
Ø This module is very important because its main aim to purchase the product or item by the
user .

1.1.4 Payment module :-


In this module user enable for select payment options like credit card and after delivery.
The module takes care of the all the secured payments that should happen for the purchases that
happens online, so to implement a security algorithm is one of the major concepts of the
payment.
CHAPTER 2
LITERATURE REVIEW
2.1 HTML:-
Hypertext Markup Language (HTML) is the standard markup language for creating web
pages and web applications. With Cascading Style Sheets (CSS) and JavaScript, it forms a
triad of cornerstone technologies for the World Wide Web.
Web browsers receive HTML documents from a web server or from local storage and render
the documents into multimedia web pages. HTML describes the structure of a web page
semantically and originally included cues for the appearance of the document.
HTML elements are the building blocks of HTML pages. With HTML constructs, images
and other objects such as interactive forms may be embedded into the rendered page. HTML
provides a means to create structured documents by denoting structural semantics for text
such as headings, paragraphs, lists, links, quotes and other items. HTML elements are
delineated by tags, written using angle brackets. Tags such as <img /> and <input /> directly
introduce content into the page. Other tags such as <p> surround and provide information
about document text and may include other tags as sub-elements. Browsers do not display the
HTML tags, but use them to interpret the content of the page.

2.1.1 HTML FORMS:-


A webform, web form or HTML form on a web page allows a user to enter data that is sent to
a server for processing. Forms can resemble paper or database forms because web users fill
out the forms using checkboxes, radio buttons, or text fields
Forms can be made up of standard graphical user interface elements:
 text — a simple text box that allows input of a single line of text.
 email - a type of text that requires a partially validated email address
 number - a type of text that requires a number
 password — similar to text, it is used for security purposes, in which the characters
typed in are invisible or replaced by symbols such as *)
 radio — a radio button
 file — a file select control for uploading a file
 reset — a reset button that, when activated, tells the browser to restore the values to
their initial values.

1
 submit — a button that tells the browser to take action on the form (typically to send
it to a server)
 text area — much like the text input field except a textarea allows for multiple rows of
data to be shown and entered
 select — a drop-down list that displays a list of items a user can select from

2.3 HTML TABLES:-


The HTML tables allow web authors to arrange data like text, images, links, other tables,
etc. into rows and columns of cells.

The HTML tables are created using the <table> tag in which the <tr> tag is used to create
table rows and <td> tag is used to create data cells. The elements under <td> are regular and
left aligned by default

2.2 CSS (CASCADING STYLE SHEET):-


Cascading Style Sheets (CSS) is a style sheet language used for describing the presentation of
a document written in a markup language like HTML.CSS is a cornerstone technology of the
World Wide Web, alongside HTML and JavaScript.
CSS is designed to enable the separation of presentation and content, including layout, colors,
and fonts.This separation can improve content accessibility, provide more flexibility and
control in the specification of presentation characteristics, enable multiple web pages to share
formatting by specifying the relevant CSS in a separate .css file, and reduce complexity and
repetition in the structural content.

2.2.1 Three Types of CSS:-


CSS comes in three types:
 In a separate file (external)
 At the top of a web page document (internal)
 Right next to the text it decorates (inline)

1. External style sheets are separate files full of CSS instructions (with the file
extension .css). When any web page includes an external style sheet, its look and feel
will be controlled by this CSS file (unless you decide to override a style using one of
these next two types). This is how you change a whole website at once. And that's

2
perfect if you want to keep up with the latest fashion in web pages without rewriting
every page!

2. Internal styles are placed at the top of each web page document, before any of the
content is listed. This is the next best thing to external, because they're easy to find,
yet allow you to 'override' an external style sheet -- for that special page that wants to
be a nonconformist

3. Inline styles are placed right where you need them, next to the text or graphic you
wish to decorate. You can insert inline styles anywhere in the middle of your HTML
code, giving you real freedom to specify each web page element. On the other hand,
this can make maintaining web pages a real chore!

2.3 JAVASCRIPT AND JQUERY:-


2.3.1 JAVASCRIPT:-
JavaScript often abbreviated as JS, is a high-level, interpreted programming language that
conforms to the ECMAScript specification. JavaScript has curly-bracket syntax, dynamic
typing, prototype-based object-orientation, and first-class functions.
Alongside HTML and CSS, JavaScript is one of the core technologies of the World Wide
Web. JavaScript enables interactive web pages and is an essential part of web applications.
The vast majority of websites use it, and major web browsers have a dedicated JavaScript
engine to execute it.
As a multi-paradigm language, JavaScript supports event-driven, functional, and imperative
(including object-oriented and prototype-based) programming styles. It has APIs for working
with text, arrays, dates, regular expressions, and the DOM, but the language itself does not
include any I/O, such as networking, storage, or graphics facilities. It relies upon the host
environment in which it is embedded to provide these features.
2.3.2 Where to put your scripts?
You can place your scripts in any of the following locations:
 Between the HTML document's head tags.
 Within the HTML document's body (i.e. between the body tags).

3
 In an external file (and link to it from your HTML document).

2.3.3 JQUERY:-
JQuery is a JavaScript library designed to simplify HTML DOM tree traversal and
manipulation, as well as event handling, CSS animation, and Ajax It is free, open-source
software using the permissive MIT License. Web analysis (from 2017) indicates that it is the
most widely deployed JavaScript library by a large margin.
jQuery's syntax is designed to make it easier to navigate a document, select DOM elements,
create animations, handle events, and develop Ajax applications. jQuery also provides
capabilities for developers to create plug-ins on top of the JavaScript library. This enables
developers to create abstractions for low-level interaction and animation, advanced effects
and high-level, theme able widgets. The modular approach to the jQuery library allows the
creation of powerful dynamic web pages and Web applications.
2.4 BOOTSTRAP:-
Bootstrap is a free front-end framework for faster and easier web development Bootstrap
includes HTML and CSS based design templates for typography, forms, buttons, tables,
navigation, modals, image carousels and many other, as well as optional JavaScript
plugins.Bootstrap also gives you the ability to easily create responsive designs

2.5 Introduction to PHP:-


PHP is a powerful language and the interpreter, whether included in a web server as a module
or executed as a separate CGI binary, is able to access files, execute commands and open
network connections on the server. These properties make anything run on a web server
insecure by default. PHP is designed specifically to be a more secure language for
writing CGI programs than Perl or C, and with correct selection of compile-time and runtime
configuration options, and proper coding practices, it can give you exactly the combination of
freedom and security you need.
The configuration flexibility of PHP is equally rivalled by the code flexibility. PHP can be
used to build complete server applications, with all the power of a shell user, or it can be used
for simple server-side includes with little risk in a tightly controlled environment. How you
build that environment, and how secure it is, is largely up to the PHP developer.

2.5.1 Features:-

4
 Open Source (Only one file encrypted) .

 Nice layout from start.

 Support Most payment vendors.

 Unlimited level of categories.

 Unique Extra Fields that is also sortable.

 Large user community.

 Uses Template and language system that keeps your customize.

 Regions Module is included (using Ajax).

 Picture Gallery.

 Publishing tool for custom pages by you.

 Easy code.

 Normalized Database Layout

 Fast.

2.5.2 Installation and configuration:-


There are two primary ways for adding support for PHP to a web server – as a native web server
module, or as a CGI executable. PHP has a direct module interface calledServer Application
Programming Interface (SAPI), which is supported by many web servers including Apache
HTTP Server, Microsoft IIS, Netscape (now defunct) and iPlanet. Some other web servers, such
as OmniHTTPd, support the Internet Server Application Programming Interface (ISAPI), which
is a Microsoft's web server module interface. If PHP has no module support for a web server, it
can always be used as a Common Gateway Interface (CGI) or FastCGI processor; in that case,
the web server is configured to use PHP's CGI executable to process all requests to PHP files.

2.5.3 Usage:-
PHP is a general-purpose scripting language that is especially suited to server-side web
development, in which case PHP generally runs on a web server. Any PHP code in a requested
file is executed by the PHP runtime, usually to create dynamic web page content or dynamic
images used on websites or elsewhere. It can also be used for command-line scripting and client-
side graphical user interface (GUI) applications. PHP can be deployed on most web servers,

5
many operating systems and platforms, and can be used with many relational database
management systems (RDBMS). Most web hosting providers support PHP for use by their
clients. It is available free of charge, and the PHP Group provides the complete source code for
users to build, customize and extend for their own use.

Dynamic web page: example of server-side scripting (PHP and MySQL).

PHP acts primarily as a filter, taking input from a file or stream containing text and/or PHP
instructions and outputting another stream of data. Most commonly the output will be HTML,
although it could be JSON, XMLor binary data such as image or audio formats. Since PHP 4,
the PHP parser compiles input to produce bytecode for processing by the Zend Engine, giving
improved performance over its interpreter predecessor.

2.6 BACK END:-

2.6.1 MySQL:-
MySQL is an open-source relational database management system (RDBMS). Its name is a
combination of "My", the name of co-founder Michael Widenius' daughter, and "SQL", the
abbreviation for Structured Query Language. The MySQL development project has made its
source code available under the terms of the GNU General Public License, as well as under a
variety of proprietary agreements. MySQL was owned and sponsored by a single for-profit firm,
the Swedish company MySQL AB, now owned by Oracle Corporation. MySQL is a central
component of the LAMP open-source web application software stack (and other "AMP" stacks).
LAMP is an acronym for "Linux, Apache, MySQL,  Perl/PHP/Python".Applications
include: TYPO3, MODx, Joomla, WordPress, phpBB, MyBB, and Drupal. MySQL is also used
in many high-profile, large-scale websites, including Google (though not for
searches), Facebook, Twitter, Flickr, and YouTube.
2.6.1.1 Features:-

6
MySQL is offered under two different editions: the open source MySQL Community Server and
the proprietary Enterprise Server. MySQL Enterprise Server is differentiated by a series of
proprietary extensions which install as server plugins, but otherwise shares the version
numbering system and is built from the same code base
Major features as available in MySQL 5.6:
 A broad subset of ANSI SQL 99, as well as extensions
 Cross-platform support
 Stored procedures, using a procedural language that closely adheres to SQL/PSM
 Cursors
 Triggers
 Updatable views
 Partitioned tables with pruning of partitions in optimizer
 Multiple storage engines, allowing one to choose the one that is most effective for each table
in the application.
2.6.1.2 Deployment:-
MySQL can be built and installed manually from source code, but it is more commonly installed
from a binary package unless special customizations are required. On most Linux distributions,
the package management system can download and install MySQL with minimal effort, though
further configuration is often required to adjust security and optimization settings.Though
MySQL began as a low-end alternative to more powerful proprietary databases, it has gradually
evolved to support higher-scale needs as well. It is still most commonly used in small to medium
scale single-server deployments, either as a component in a LAMP-based web application or as
a standalone database server. Much of MySQL's appeal originates in its relative simplicity and
ease of use, which is enabled by an ecosystem of open source tools such as phpMyAdmin. In the
medium range, MySQL can be scaled by deploying it on more powerful hardware, such as a
multi-processor server with gigabytes of memory.A typical high-end configuration can include a
powerful master database which handles data write operations and is replicated to multiple
slaves that handle all read operations. The master server continually pushes binlog events to
connected slaves so in the event of failure a slave can be promoted to become the new master,
minimizing downtime. Further improvements in performance can be achieved by caching the
results from database queries in memory using memcached, or breaking down a database into
smaller chunks called shards which can be spread across a number of distributed server clusters.

7
2.6.2 Wamp Server:-
Wamp Server refers to a software stack for the Microsoft Windows operating system, created
by Romain Bourdon and consisting of the Apache web server, OpenSSL for SSL
support, MySQL database and PHP programming language.
It stands for "Windows, Apache, MySQL, and PHP." WAMP is a variation of LAMP for
Windows systems and is often installed as a software bundle (Apache, MySQL, and PHP). It
is often used for web development and internal testing, but may also be used to serve live
websites.
The most important part of the WAMP package is Apache (or "Apache HTTP Server") which
is used run the web server within Windows. By running a local Apache web server on a
Windows machine, a web developer can test webpages in a web browser without publishing
them live on the Internet.
WAMP also includes MySQL and PHP, which are two of the most common technologies
used for creating dynamic websites. MySQL is a high-speed database, while PHP is a
scripting language that can be used to access data from the database. By installing these two
components locally, a developer can build and test a dynamic website before publishing it to
a public web server.

While Apache, MySQL, and PHP are open source components that can be installed
individually, they are usually installed together. One popular package is called
"WampServer," which provides a user-friendly way to install and configure the "AMP"
components on Windows

2.6.2.1 Latest Version of Wamp is 7.2.14 :-

WampServer is a Web development platform on Windows that allows you to create dynamic
Web applications with Apache2, PHP, MySQL and MariaDB. WampServer automatically
installs everything you need to intuitively develope Web applications. You will be able to
tune your server without even touching its setting files. Best of all, WampServer is available
for free (under GPML license) in both 32 and 64 bit versions. Wampserver is not compatible
with Windows XP, SP3, or Windows Server 2003.

8
2.6.2.2 Functionalities of Wamp:-

WampServer’s functionalities are very complete and easy to use .

With a left click on WampServer’s icon, you will be able to:-

 manage your Apache and MySQL services

 switch online/offline (give access to everyone or only localhost)


 install and switch Apache, MySQL and PHP releases
 manage your servers settings
 access your logs
 access your settings files
 create alias

With a right click :


 change WampServer’s menu language
 access this page

CHAPTER 3
9
THREE-TIER WEB APPLICATION DEVELOPMENT
To implement a web application client-server architecture is required. The most popular
client-server architectures are the two-tier and the three-tier architecture. In web application
development, three-tier architecture refers to separating the application process into three
specific layers. What the user sees via a web browser is called the presentation tier and is
content served from a web server. The middle tier performs the business logic processing that
occurs, for example, when a user submits a form. The back end consists of the data tier which
handles the database processing and access to the data.
This system is designed based on a traditional three-tier architecture used bymany web
applications. Three-tier architecture includes a presentation layer, businessrules/ logic layer r,
and the data layer. The three-tier architecture is shown in Figure.

3.1 PRESENTATION TIER:-


The Presentation Tier or User Interface is the portion the user sees when they open a web
page in the browser. It is what is presented to the user on the client side within their web
browser. If you were to view the source code, you would only see code such as HTML, PHP,
and Cascading Style Sheets Viewing source code on a web page, you would not see database

10
queries or loops or calls to classes or any behind-the-scenes processing. Languages used in
this layer are typically HTML, PHP, CSS, jquery and Bootstrap.

3.2 BUSINESS LOGIC OR APPLICATION TIER:-

The Business Logic, Functional Process Logic, Business Rules are kept in a separate layer.
You would not use HTML or PHP in this layer. In this layer you typically define your
classes, properties, etc.

3.3 DATA ACCESS TIER:-


In PHP, the Data Access layer is where you define your database server. In our project we
have used wamp server. It is where you define your queries. The business tier may then
make use of this functionality.

CHAPTER 4

11
SYSTEM DESIGN

Systems design is the process of defining the architecture, components, modules, interfaces,
and data for a system to satisfy specified requirements. One could see it as the application of
systems theory to product development.
There is some overlap with the disciplines of systems analysis, systems architecture and
systems engineering. If the broader topic of product development "blends the perspective of
marketing, design, and manufacturing into a single approach to product development, then
design is the act of taking the marketing information and creating the design of the product to
be manufactured.
Systems design is therefore the process of defining and developing systems to satisfy
specified requirements of the user.
Object-oriented analysis and design methods are becoming the most widely used methods for
computer systems design. System design is to deliver the requirements as specified in the
feasibility report.
The main objectives of the design are :
 Practicality
 Efficiency
 Cost
 Flexibility
 Security
4.1 Benefits: -
A System Design engagement typically provides the following benefits:
 Customers gain a detailed understanding of how their users use their system. This
Usage Profile can be leveraged to develop future architecture changes.
 Potential to learn of future concerns, allowing customers to take proactive measures to
avoid problems.
 Improved system performance; individually tailored configuration advice
demonstrates where improvement is necessary, and how to improve the system to
regain lost performance.

4.2 ER DIAGRAM:-

12
Entity – Relationship Diagram: This depicts relationship between data objects. The attribute
of each data objects noted in the entity- relationship diagram can be described using a data
object description. Data flow diagram serves two
 Purposes:-To provide an indication of how data are transformed as they move
through the system.To depict the functions that transformation the data flow.
 Data Objects:-A data object is a representation of almost any composite
information that must be understood by the software. By composite information, we
mean something that has a number of different properties or attributes. A data
object encapsulates data only there is no reference within a data object to operations
that act on the data.
 Attributes:- Attributes define the properties of a data object and take on one
of three different characteristics. They can be used to:
 Name an instance of data object.
 Describe the instance.
 Make reference to another instance in other table

 Relationships:- Data objects are connected to one another in a variety of


different ways. We can define a set of object relationship pairs that define the
relevant relationships.
 Cardinality:-The data model must be capable of representing the number of
occurrences of objects in a given relationship. The cardinality of an object relationship pair
is:-

♦ One-To-One (1:1):An occurrence of object ‘A’ can relate to one and only one
occurrence of object ‘B’ and vice versa.

♦ One-To-Many (1:N): One occurrence of object ‘A’ can relate to one or may
occurrences of object ‘B’ but an occurrence of object ‘B’ can relate to only one
occurrence of object ‘A’.

♦ Many-To-Many (M: N): An occurrences of ‘B’ and an occurrence of ‘B’ can


relate to one or many occurrence of ‘A’.

 Modality:The modality of a relationship is zero if there is no explicit need for the

13
relationship to occur or the relationship is optional. The Modality is one if the occurrence of
the relationship is mandatory.
The object relationship pair can be represented graphically using the Entity Relationship
Diagrams. A set of primary components are identified for the Entity Relationship Diagram,
1. Attributes,
2. Relationships and
3. Various Type Indicators.

4.3 DFD:-
A data flow diagram is a graphical representation of the “flow” of data through an
information system, modeling its process aspects. A Data Flow Diagram is a structured
analysis and design tool that can be used for flowcharting in place of, or in association with,
information-oriented systems flowcharts. A DFD is often used as a preliminary step to create
an overview of the system, which can later be elaborated. DFDs can also be used for the
utilizing of data processing. A DFD shows what kind of information will be input to and
output from the system, where the data will come from and go to, and where the data will be
stored. It does not show information about the timing of process or information about
whether processes will operate in sequence or in parallel.

Splash Activity

Login

Admin App User App

14
DFD at 0 Level:-

15
1’ Level DFD:-

Administrator Customer Employee

Registratio
Auth. DB n process

Authentication
Validation Process India
Check

For New User


or Visitor
DATABASE Admin Process

User status and


total bill
Order for the
product

Check delivery
status
Payment Mode Daily Update
Process
16
DATABASE

2’ Level DFD:-
Employee

User

Registration
Interaction to Process
Account

User Activity

Listing of
Admin order Login
Process Category Process
Login

Administrator Add new


product to
sale
Authorized
Listing of
work
user

Product
selection
Outsider
Source Payment Process

Product

17
E-R DIAGRAMS :-
● LOGIN

● USER DETAILS

● PRODUCT DETAILS

● PRODUCT ORDERS

18
● COMPLETE DIAGRAM

19
CHAPTER 5
SYSTEM ANALYSIS
Systems analysis is a process of collecting factual data, understand the processes involved,
identifying problems and recommending feasible suggestions for improving the system
functioning. This involves studying the business processes, gathering operational data,
understand the information flow, finding out bottlenecks and evolving solutions for
overcoming the weaknesses of the system so as to achieve the organizational goals.

5.1 Problem Definition:- The e-shopping Administrator is the super user and has
complete control over all the activities that can be performed. The application notifies the
administrator of all shop creation requests, and the administrator can then approve or reject
them. The administrator also manages the list of available product categories. The
administrator can also view and delete entries in the guestbook.

5.2 Shop Owner:- Any user can submit a shop creation request through the application.
When the request is approved by the Mall Administrator, the requester is notified, and from
there on is given the role of Shop Owner. The Shop Owner is responsible for setting up the
shop and maintaining it. The job involves managing the sub-categories of the items in the
shop. Also, the shop owner can add or remove items from his shop. The Shop Owner can
view different reports that give details of the sales and orders specific to his shop. The Shop
Owner can also decide to close shop and remove it from the mall.

5.3 Employees:-

 Purchase department under a Purchase manager to overlook purchasing activities if


warehousing needs arise.

 Sales department under a Sales manager who will look after the sale of products and
services, the most important activity.

 Accounts department under an Accounts manager to look after the accounting


activities of the enterprise.

20
5.4 Requirement Specification:- It is quite difficult and time consuming task to find
the information as well as maintaining information manually. If all these information are to
be kept at a single place it is also not possible in the manual system. Computerized system
will upgrade and manage information very easily.
As it is a web-based application so it uses Internet technologies and its hardware/software
requirement will also be more comprehensive than Desktop application system. Some
Network devices will be required like modems, switches, Internet connection.
Software required for the system is also different from a normal desktop system. First of all a
server software will be mandatory (here Internet Information Server (IIS)). A browser is also
needed as a client process on the user side.

5.5 Preliminary Investigation:- System Analysis is not only time consuming but also
a rigorous task. But it is crucial and most important phase of Software development process.
Preliminary Investigation is the process of gathering data for requirement analysis. It is more
helpful for problem definition and requirement specification.

21
CHAPTER 6
SYSTEM REQUIREMENTS

6.1 Hardware Specifications:


• Processor Used : Intel core i3
• Processor Speed : 1.60 GHZ
• RAM : 512 MB
• Hard Disk Capacity : 80 GB
• Display Device : Any Monitor
• Keyboard Type : Any Keyboard

6.2 Software Specifications:


• Technology Implemented : PHP
• Database : MySQL
• Web Browser : Mozilla, Google Chrome, Wamp Server
• User Interface Design : HTML,BOOTSTRAP, CSS

22
CHAPTER 7

FEASIBILITY STUDY

Feasibility is the determination of whether or not a project is worth doing. The process
followed in making this determination is called a feasibility study. This type of study
determines if a project can and should be taken. Once it has been determined that a project is
feasible, the analyst can go ahead and prepare the project specification which finalizes project
requirements.

7.1Different Type of Feasibility Study:-


In the conduct of the feasibility study, the analyst will usually consider seven distinct, but
inter- related types of feasibility. They are
Technical Feasibility
Operational Feasibility
Economic Feasibility
Social Feasibility
Management Feasibility
Legal Feasibility
Time Feasibility

7.1.1 Technical Feasibility:-

This is concerned with specifying equipment and software that will successfully satisfy the
user requirement; the technical needs of the system may vary considerably, but might
include:
The facility to produce outputs in a given time:
 Response time under certain conditions.
 Ability to process a certain volume of transaction at a particular speed.
 Facility to communicate data to distant location.

In examine technical feasibility; configuration of the system is given more importance than
the actual make of hardware. The configuration should give the complete picture about the
system’s requirement: How many workstations are required, how these units are

23
interconnected so that they could operate and communicate smoothly. What speeds of input
and output should be achieved at particular quality of printing. This can be used as a basis for
the tender document

7.1.2 Operational Feasibility:-

It is mainly related to human organization and political aspects. The points to be considered
are:
 What changes will be brought with the system?
 What organizational structures are distributed?
 What new skills will be required? Do the existing staff members have
these skills? If not, can they be trained in due course of time?
Generally project will not be rejected simply because of operational infallibility but such
considerations are likely to critically affect the nature and scope of the eventual
recommendations.

7.1.3 Economical Feasibility:-

Economic analysis is the most frequently used technique for evaluating the effectiveness of a
proposed system. More frequently known as cost / benefit analysis; the procedure is to
determine the benefits and saving that are expected from a proposed system and compare
them with costs. If benefits outweigh costs, a decision is taken to design and implement the
system. Otherwise, further justification or alternative in the proposed system will have to be
made if it is to have a change of being approved. This is an ongoing effort that improves in
accuracy at each phase of the system life cycle.

7.1.4 Social Feasibility:-

Social feasibility is a determination of whether a proposed project will be acceptable to the


people or not. This determination typically examines the probability of the project accepted
by the group directly affected by the proposed system change.

7.1.5 Management Feasibility:-

It is a determination of whether a proposed project will be acceptable to management .if does

24
not accept a project or gives a negligible support to it; the analyst will tend to view the project
as a non-feasible one.

7.1.6 Legal Feasibility:-

Legal feasibility is a determination of whether a proposed project infringes on known Acts


Statutes, as well as any pending legislation. Although in some instances the project might
appear sound, on closer investigation it may be found to infringe on several legal areas.

7.1.7 Time Feasibility:-

Time feasibility is a determination of whether a proposed project can be implemented fully


within a stipulated time frame. If a project takes too much time it is likely to be rejected.

25
CHAPTER 8
DATA DICTIONARY
Table: -Tbl_ User
Description: - This table store information of User like Name, Address,
Contact No, and Email Address. Each User has associated reference in User,
which stores projects belong to User, product which stores Product Information
belong to User.

Fields:
Field Name Data Type Description Allow Null

vcID Varchar(50) User Name Primary key

vcPass Varchar(20) Password Not Null

vcFsNm Varchar(50) First Name Not Null

vcLsNm Varchar(50) Last Name Not Null

vcGender Varchar(6) Gender Not Null

vcAdd Varchar(50) Address Not Null

vcCity Varchar(50) City Not Null

vcState Varchar(50) State Not Null

vcZipCode Varchar(10) Zip Code Not Null

vcCnctNo Varchar(20) Contact No Not Null

vcEmailId Varchar(50) Email ID Not Null

vcConPass Varchar(20) ConformPassword Not Null

26
Table: - Tbl_Product
Description: - This table stores Information about Product of each User.

Fields:
Field Name Data Type Description Allow Null

nmID Numeric(4,0) Product ID Primary key

vcNm Varchar(50) Product Name Not Null

txtDes Text Description Not Null

nmPrice Numeric(18,0) Price Not Null

nmQuan Numeric(18,0) Quantity Not Null

nmDis Numeric(18,0) Discount Not Null

Image Image Product image Not Null

nmCtgryID Numeric(3,0) Category ID Foreign key

Table: - Tbl_Category
Description: - This table stores Information about Category of each User.

Fields:
Field Name Data Type Description Allow Null

nmCtgryID Numeric(3,0) Category ID Primary key

vcNm Varchar(50) Category Name Not Null

txtDes Text Description Not Null

27
Table: - Tbl_ Shopping Cart
Description: - This table stores Information about Cart.

Fields:
Field Name Data Type Description Allow Null

nmID Numeric(4,0) Product ID primary key

vcNm Varchar(50) Product Name Not Null

nmQuan Numeric(18,0) Quantity Not Null

nmPrice Numeric(18,0) Price Not Null

Table: - Tbl_ Order detail


Description: - This table stores Information about Order of each User.

Fields:
Field Name Data Type Description Allow Null

nmNo Numeric(4,0) Order No Primary key

nmID Numeric(4,0) Product ID Foreign key

nmQuan Numeric(18,0) Quantity Not Null

nmPrice Numeric(18,0) Order Price Not Null

nmAmt Numeric(18,0) Total Amount Not Null

28
Table: - Tbl_Admin
Description: - This table stores Information about Admin.

Fields:
Field Name Data Type Description Allow Null

vcID Varchar(50) Admin ID Primary key

vcPass Varchar(20) Admin Password Not Null

vcEmailID Varchar(50) Admin Email ID Not Null

29
30

Das könnte Ihnen auch gefallen