Anda di halaman 1dari 28

1.

INTRODUCTION

1.1 ABOUT THE PROJECT


This project is mainly used to track the queries of the customers in the organization and
resolve the queries. This Project also sends the services to the customer to find out the customer
satisfaction and employee performance. The system has a major problem in finding the product
support and service activities that are undertaken by the employees. Once the products have
installed at the client’s site, the cycle of warranty maintenance starts. To keep the customers in a
proper chain of satisfaction the system needs the data to be organized in a proper relational
way.This Project also sends the services to the customer to find out the customer satisfaction and
employee performance.

The system has a major problem in finding the product support and service activities that
are undertaken by the employees. Once the products have installed at the client’s site, the cycle
of warranty maintenance starts. To keep the customers in a proper chain of satisfaction the
system needs the data to be organized in a proper relational way. The project is to maintain the
relational communication among the project is to maintain this relational communication among
the data, such that consistency, reliability and integrity can be achieved. The major technicality
within the system lies in managing the coordination among the sales and service departments,
which is the major hold upon the system to gain or achieve profits.

MODULES:

 Login
 Home
 Products
 online Purchase
 Customer query Booking
 Job allocation
 Job statas
 Contact us/ Suggestions

1
MODULE DESCRIPTION

Home
This module contains the details of the organisation website home page linked with its
contents.

About Us
The about us module contains the details about the organization, Infrastructure and
History.

Products
The Product details can be viewed through this module. In this module the product details
can be shown in the screen.

Customer Query Booking


Customers should be free to post their queries to the concern department. The system
must identify each query with an automatically generated Query Id, for future references.

Job allocation
The contain the module detail of job type, job name, customer name, customer address, phone
number, contact person and job allocation id.

Job Status

This module contain the detail about job status detail. Job type, job name, employee name,
employee id, customer id and etc.,

Contact Us/Suggestion
The contact us Module contains the details to contact with the school through all mode of
communications and it also provides the customer to give suggestions regaring the process or
any details to the concern through online.

2
1.2 ABOUT THE ORGANIZATION

Maruthi Power Supply has grown to be a leader in the field of power conditioning by
manufacturing and exporting products like Domestic Inverters, UPSs, Automatic stabilizers,
Servo Controlled Stabilizers, CVT (constant voltage transformers), Auto Transformers, Isolation
Transformers, Automatic water level controller, Solar PCU, MPPT charger controller, Solar
power plant, Solar lantern, solar garden lights, Solar street lights, solar water pump and solar
Water heater. Our expertise is based on 15 years of experience in developing customized power
solution to meet the specific requirements of various industrial and commercial applications. Our
company is committed to offer unmatched quality products at market leading prices to ensure
client satisfaction across the Coimbatore. For attaining our established quality trademark, we
procure these stabilizers and other UPS from those manufacturers and suppliers who have
established themselves in this sector by offering only reliable and durable Constant Voltage
Transformer and Induction Stoves.

We always try to deliver quality. Hence, before offering these Automatic & Servo
Stabilizers, Home UPSs, Online UPSs, Constant Voltage Transformers (CVT) and Induction
Stoves, we perform quality testing of all procured UPS and Stabilizers. Since our inception, we
have been following ethical business approach such as integrity, dependability and endurance
that help us in maintaining the long term relationship with our existed clients and creating new
clientele with us. Our absolute power backup and power cut solution has enabled us to contribute
considerably in the arena of continuous backup in the power industry.

3
2. SYSTEM ANALYSIS
2.1 EXISTING SYSTEM:

The existing system is used manual. The user has been maintaining their system manually
is a tedious job. All the process must be done manually.The users are interested to speed up the
Operations and all the operations must be done automatically. Existing system is the manual one
which has the following drawbacks.

DRAWBACKS

 Waste of time for manual operations.


 Sometimes the operations done manually will prone to unsecured access.
 Required information cannot be retrieved easily.
 Risk of mismanagement and of data when the project is under development.
 Less Security.
 No proper coordination between different Applications and Users.

2.2 PROPOSED SYSTEM


The proposed system is to computerize for maintaining secure of file operations. The aim
of the proposed system is the overcome the difficulties of the existing system. The proposed
system is to computerize for various purposes and maintained securable process. The latest
technology will be used in the proposed system.

ADVANTAGES
 The required information can be secured easily.
 Time will not be wasted in the process.
 There is no risk of data mismanagement at any level
 Wastage of manpower is reduced.

4
2.3 SYSTEM REQUIREMENTS
2.3.1 Hardware Requirements:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 512 Mb.

2.3.2 Software Requirements:


 Operating system : Windows XP.
 Coding Language : JSP,HTML
 Designing : Photoshop

2.3.3 ABOUT THE SOFTWARE

HTML (HYPERTEXT MARKUP LANGUAGE)

HTML stands for Hypertext Markup Language, and it is the language in which, until
recently, virtually all Web pages were written. Now, don’t break out in hives when you hear the
word “language.” You don’t need complex logical or mathematical formulas to work with
HTML, and you don’t need to think like a programmer to use it.

Hypertext refers to the way in which Web pages (HTML documents) are linked together.
When you click a link in a Web page, you are using hypertext. It is this system of linking
documents that has made the World Wide Web the global phenomenon it has become. Markup
Language describes how HTML works. With a markup language, you simply “mark up” a text
document with tags that tell a Web browser how to structure it. HTML originally was developed
with the intent of defining the structure of documents (headings, paragraphs, lists, and so forth)
to facilitate the sharing of scientific information between researchers.

5
FOUR KEY CONCEPTS
The first step toward understanding and working with HTML is learning the basic terms
that describe most of the functions of this language. You will come across these terms repeatedly
as you use HTML and if you understand them, you will have progressed a long way toward
comprehending HTML, not to mention XHTML.

ELEMENTS
All HTML pages are made up of elements. Think of an element as a container in which a
portion of a page is placed. Whatever is contained inside the element will take on the
characteristics of that element. For example, to identify a heading on a page, you would enclose
it in a heading element <h1> </h1>. If you want to create a table, you put the table information
inside the table element <table> </table>. To construct a form, you need the form element
<form> </form>.

TAGS
Often, you’ll find the terms element and tag used interchangeably. It’s fairly common,
but not strictly accurate. An element is made up of two tags: an opening tag and a closing tag.
Although it might seem somewhat picky to make this distinction, when you begin to work with
XHTML (Extensible Hypertext Markup Language), it will be a very important difference to
remember. If you get into the habit of distinguishing elements and tags from the very beginning,
you’ll save yourself some confusion down the line.

All tags are constructed the same way. The tag begins with a “less than” sign (<), then the
element name, followed by a “greater than” sign (>). For example, an opening tag for
the paragraph element would look like this: <p>. The only difference in a closing tag is that the
closing tag includes a slash (/) before the element name: </p>. Your content goes between the
tags. A simple paragraph might look like this:<p>this is an HTML paragraph. </p>

Some elements do not use closing tags because they do not enclose content. These are
called empty elements. For example, the line break element <br> does not require a closing tag.
In the case of empty elements, add a closing slash after the element name, like this: <br />. When

6
a browser sees the slash, it will recognize the element as one that does not need a separate,
closing tag.

ATTRIBUTES AND VALUES


Attributes are another important part of HTML markup. An attribute is used to define the
characteristics of an element and is placed inside the element’s opening tag. For example, to
specify the size of an image or graphic on your page, you would use the image element <img />
along with the height and width attributes:
<img height=" " width=" " />

Be sure to notice that an equal’s sign and a set of quotation marks follow both the height
and the width attributes. That’s because attributes need values to go with them. values work
together with attributes to complete the definition of an element’s characteristics.

An easy way to think of how attributes and values work together is to compare them with
nouns and adjectives. A noun names something; an adjective describes it. An attribute names a
characteristic; a value describes it. Imagine that you are trying to identify a person’s hair color
with a markup language. Hair would be the element, color the attribute, and red the value. You
might write such a description as follows:<hair color="red">Red-headed Person</hair>.

NESTING
Often you will want to apply more than one element to a portion of your page. An essential
concept to understand is nesting. Nesting simply means that elements must never overlap. Web
browsers displaying an HTML page can be pretty forgiving if your elements are not properly
nested; however, overlapped elements can create garbled results, particularly if you are trying to
construct frames or tables. Also, when you become familiar with XHTML’s stricter standards,
you’ll discover that overlapping elements are an absolute “no-no.”

LISTS
HTML provides three different types of lists to choose from when building a page,
including unordered, ordered, and definition lists. Unordered lists are for lists of items where
order isn’t of important. While ordered lists place strong importance on the order of items. In the

7
case where there is a list of terms and descriptions, perhaps for a glossary, definition lists are
available. Choosing what type of list to use, or to use a list at all, comes down to the content at
hand and what is the most semantic choice for displaying the content in HTML.
With three different types of lists to use within HTML there are multiple ways to stylize
them using CSS? Some of these options include deciding what type of bullet to use on a list.
Maybe the bullet should be square, round, numeral, alphabetical, or perhaps not even exist at all.
Also, deciding if a list should be displayed vertically or horizontally plays a hand in stylization.

UNORDERED LIST

Unordered lists are purely a list of related items, in which their order does not matter nor
do they have a numbered or alphabetical list element. Creating an unordered list in HTML is
accomplished using the unordered list, ul, block level element. Each list item within an
unordered list is individually marked up using the list item, li, block level element. By default
most browsers represent each list item with a solid dot. This solid dot is referred to as the list
item element and can be changed using CSS.

ORDERED LIST

The ordered list element, ol, works just like the unordered list element, including how
each individual list item is created. The main difference between an ordered list and an
unordered list is that with an ordered list the order of which items are represented is important.
Instead of showing a dot as the default list item element, an ordered list uses numbers. Using
CSS, these numbers can then be changed to letters, Roman numerals, and so on.
With the introduction of HTML5 also came the introduction of two new attributes for
ordered lists. These new attributes include start and reversed. The start attribute determines from
where an ordered lists should start. By default, ordered list start at 1. However, there may be a
case where a list should start at 5.
The reversed attribute allows a list to appear in a reversed order. A list of 5 items ordered
1 to 5 may be reversed and ordered from 5 to 1. The reversed attribute is a Boolean attribute so it
doesn’t accept any values. Including it within the opening ol will reverse the list. As part of the
HTML5 specification, not all browsers currently support the start andreversed attributes.

8
Additionally, the value attribute may be used on an individual list item within an ordered list to
change its value within the list. Any list item appearing below an item with an
updated value attribute will then be recalculated accordingly. As an example, if the second item
in a list has a value attribute of 9, the number of that list item will appear as the ninth item. All
other items below this one will be calculated as necessary, starting at ten.

DEFINITION LIST

Another type of list often seen online, yet quite different than that of an unordered or
ordered list, is the definition list. Definition lists are used to outline multiple terms and
descriptions, often in the case of a glossary. Creating a definition list in HTML is accomplished
using the dl element. Instead of using the li element to mark up list items, the definition list
actually requires two elements: the definition term element, dt, and the definition description
element, dd.
A definition list may contain numerous terms and descriptions, one after the other.
Additionally, a definition list may have multiple terms per description as well as multiple
descriptions per term. A single term may have multiple meanings and warrant multiple
definitions. In comparison, a single description may be suitable for multiple terms.

In adding a definition term and description, the term must come before the description.
Subsequently, the term and the following description will correspond to one another. Definition
lists do not have any list item elements; however the default styling of a definition list does
indent any descriptions.

DEFINITION LIST DEMO


The devotion of time and attention to acquiring knowledge on an academic subject, esp.
by means of books design a plan or drawing produced to show the look and function or workings
of a building, garment, or other object before it is built or made Purpose, planning, or intention
that exists or is thought to exist behind an action, fact, or material object business work a
person’s regular occupation, profession, or trade

9
NESTED LISTS

One reason lists are extremely powerful within HTML is the ability to nest lists inside
one another. Unordered lists can live within ordered or definition lists, definition lists can live
within unordered and ordered lists, and vice versa. Every list has the ability to be placed within
another list, nesting them continually. The potential to do so doesn’t provide free reign to build
pages completely out of lists. Lists should still be reserved specifically for where they hold the
most semantic value. Building a nested list is fairly simple. Determine where a nested list should
appear, and rather than closing a list item, begin a new list. Once the nested list is complete,
close the wrapping list item and continue on with the original list.

PHP
PHP is a server-side scripting language designed for web development but also used as
a general-purpose programming language. As of January 2013, PHP was installed on more than
240 million websites (39% of those sampled) and 2.1 million web servers. Originally created
by Rasmus Lerdorf in 1995, the reference implementation of PHP is now produced by The PHP
Group. While PHP originally stood for Personal Home Page, it now stands for PHP: Hypertext
Preprocessor, a recursive backronym.

PHP code is interpreted by a web server with a PHP processor module, which generates
the resulting web page: PHP commands can be embedded directly into an HTML source
document rather than calling an external file to process data. It has also evolved to include
a command-line interface capability and can be used in standalone graphical applications.PHP
is free software released under the PHP License. PHP can be deployed on most web servers and
also as a standalone shell on almost every operating and platform, free of charge.

PHP stores whole numbers in a platform-dependent range, either a 64-bit or 32-


bit signed integer equivalent to the C-language long type. Unsigned integers are converted to
signed values in certain situations; this behavior is different from other programming
languages. Integer variables can be assigned using decimal (positive and
negative), octal, hexadecimal, and binary notations. Floating point numbers are also stored in a
platform-specific range.

10
ADVANTAGES OF PHP

 Easy to learn: PHP has a short learning curve and programmers can quickly become
productive. PHP was designed to appeal to Web designers and HTML coders, and they
appreciate the ability to freely mix HTML and PHP. PHP allows them to easily and
gradually add dynamic page generation features to their Web sites.

 Open Source: PHP is distributed under an Apache-style license that allows for both
commercial and non-commercial use and development. This means that you can use it
freely, without paying any licenses fees for machine, CPU, and so on. Also, there is a
worldwide network of talented developers continuously improving and enhancing PHP.
You can fix bugs or customize the software to your specific needs (or pay someone to do
so) because the source code is available. This is not possible with commercial, off-the-
shelf products.

 Community: PHP has a large base of users and developers. It is easy to find
programmers fluent in the language. Many online resources are dedicated to PHP (Web
sites, mailing lists, and so on) that provide valuable information and support.

 Database support: PHP provides extensive database support. It supports ODBC, open
source databases such as MySQL and PostgreSQL, as well as commercial ones such as
Microsoft SQL Server, Oracle, and Sybase.

 Multiplatform support: PHP runs on a variety of platforms and Web servers. PHP runs
in most flavors of Unix and Windows as well as other OS such as Mac OS, OS X, or
OS/2. PHP supports a wide variety of Web servers, ranging from the popular Apache,
Microsoft IIS, and Netscape servers to less-known ones such as http or AOLserver.

11
MYSQL

MySQL is the world's most popular open source database software, with over 100 million
copies of its software downloaded or distributed throughout it's history. With its superior speed,
reliability, and ease of use, MySQL has become the preferred choice for Web, Web 2.0, SaaS,
ISV, Telecom companies and forward-thinking corporate IT Managers because it eliminates the
major problems associated with downtime, maintenance and administration for modern, online
applications.

Many of the world's largest and fastest-growing organizations use MySQL to save time and
money powering their high-volume Web sites, critical business systems, and packaged software
including industry leaders such as Yahoo!, Alcatel-Lucent, Google, Nokia, YouTube, Wikipedia,
and Booking.com.

The flagship MySQL offering is MySQL Enterprise, a comprehensive set of production-


tested software, proactive monitoring tools, and premium support services available in an
affordable annual subscription. MySQL is a key part of LAMP (Linux, Apache, MySQL, PHP /
Perl / Python), the fast-growing open source enterprise software stack. More and more
companies are using LAMP as an alternative to expensive proprietary software stacks because of
its lower cost and freedom from platform lock-in.

4.9.1 THE ADVANTAGES OF MYSQL ARE:

 My SQL is an open source database system. Hence it can be downloaded and used by the
developer for free.
 MySQL occupies very less disk space.
 MySQL can be easily installed in all major operating systems like Microsoft Windows,
Linux, and UNIX.
 MySQL can be easily learnt using the tutorials that are available on internet.
 Though MySQL is open source, it offers most of the features provided by Oracle and
other leading databases.
 MySQL is best suited for small and medium applications.

12
3. SYSTEM DESIGN
3.1. DESIGN NOTATION

A database is an organized mechanism that has the capability of storing information


through which a user can retrieve stored information in an effective and efficient manner. The
data is the purpose of any database and must be protected. The database design is a two level
process. In the first step, user requirements are gather together and a database is designed which
will meet these requirements as clearly as possible. This step is called Information Level Design
and it is taken independent of any individual DBMS.

In the second step, this Information level design is transferred into a design for the
specific DABMS that will be used to implement the system in question. This step is called
Physical Level Design, concerned with the characteristics of the specific DBMS that will be
used. A database design runs parallel with the system design.

3.1.1 DATA FLOW DIAGRAM


LEVEL: 0

Login ELECTRIC AND


Admin Process ELECTRONIC
GOODS FOR
SALES AND
SERVICE

13
Home
LEVEL: 1 Details

Login product stored


Home process
Home Product
Process
process

Product details
Suggestion details

Product
Suggestion Suggestion Query Detail
Details Process process
receipts process

Qury detail Online


qury purch Purch Detail
Cus qury Detail
Process Process
Purchase
process

Service Details

14
Level 2
Customer qury
booking
Qury booking

Customer Booking Job allecation


qury booking process

process
Job allcation data

Job statas data

Jab statas Jab statas Job allacation


Process Process
process
process

Customer qury
Customer qury
booking
booking

15
3.1.2 SYSTEM FLOW DIAGRAM

LOGIN

No

Data
validation

Yes

Product Online Employee Customer


Purchase

PROCESS

Job Allocation Query Booking Job Status


Detail Detail Detail

REPORTS

Product Job Allocation Online Query Job Status


Report Report Purchase Booking Report
Report Report

16
3.2 DESIGN PROCESS
Systems design implies a systematic approach to the design of a system. It may
take a bottom-up or top-down approach, but either way the process is systematic wherein it takes
into account all related variables of the system that needs to be created—from the architecture, to
the required hardware and software, right down to the data and how it travels and transforms
throughout its travel through the system. Systems design then overlaps with systems analysis,
systems engineering and systems architecture. The system design transforms a logical
representation of what a given system is required to be in to the physical specification. Design
starts with the system’s requirement specification and coverts it into a physical reality during the
development. It is the part of the effective and efficient function of the system. Design activities
are
 Input Design
 Output Design
 Database Design

The systems design approach first appeared right before World War II, when engineers
were trying to solve complex control and communications problems. They needed to be able to
standardize their work into a formal discipline with proper methods, especially for new fields
like information theory, operations research and computer science in general.

3.2.1 INPUT DESIGN


Input design is part of overall system design that requires special attention designing
input data is to make the data entry easy and free from errors. The input forms are designed using
the controls available in PHP.

 Write Article and Upload Relevant Files


 Post Related URL to each article for other users reference
 Search and Read Article posted by other users
 Rate the articles posted by other users
The articles which are written by any user are sent to the Administrator for Approval.
After approval of the articles by the administrator, they are available for the users to search and
download. Based on the Description provided in an article, it can be searched by any registered
17
user on the system. The user can see the article, download a file if available and the user can rate
the article based on the article. Rating can be given in terms of 1 Star to 5 Star. The users can
search the article. The list of articles displayed can be sorted based on following parameters

3.2.2 OUTPUT DESIGN


Computer output is the important and direct source of information to the user. The
objective of output is to create contents, all documents, results in an attractive manner. It help
user to pass information to the users, provide permanent storage etc. The “Office Automation in
a digital studio” generates receipts for particular transactions for each customer. Outputs can also
be generated for the following: The reports are Rating Popularity (Number of Clicks on the
Article), Relevance (Based on number of matching keywords provided) All Articles uploaded by
a specific user.

Screen Design
The Login form has designed as home page to the project. The username and password
fields are place to set the appropriate value. After the validation of username and password the
page redirected to Main form. All the input form contains there are three basic actions performed
namely Add, save, exit and some form contains delete. Add is used to clear the existing entries in
the form and create a space for new entries. Save is used to insert the new details and Delete is
for delete the unwanted records. Exit is for close the current form and it goes to the Main form.
The Grid viewer is also used to show the records at the moment of running.

3.4.3 DATABASE DESIGN


TABLE DESIGN
Table Name: Login
Primary key: sno
Description: This table is to store the user login details.
FIELD NAME DATA TYPE WIDTH KEY FIELD DESCRIPTION
uname Varchar 20 Not null Username
pword Varchar 20 Not null Password

18
Tabel Name: Product
Primary key: product code
Description: This table is to store the Product Details.

FIELD NAME DATA TYPE WIDTH KEY FIELD DESCRIPTION

Pcode Integer 5 Primary Product code

ptype Varchar 20 Not Null Product Type

pname Varchar 30 Not Null Product Name

pcname Varchar 30 Not Null Product Company Name

pprice Varchar 5 Not Null Product Price

fname Varchar 30 Not Null Product Image File Name

Table Name: Online purchase


Secondary key: pcode
Description: This table is to store the Client Suggestion Details.

FIELD NAME DATA TYPE WIDTH KEY FIELD DESCRIPTION

Pcode Integer 5 Secondary key Product code

cname Varchar 25 Not null Customer Name

Caddress Varchar 250 Not null Customer address

Mobno Varchar 15 Not null Mobil no

Cemailid Varchar 15 Not null Customer email id

Cashmod Varchar 10 Not null Cash mode

19
Tabel Name: Customer Query Booking_details
Primary key: ccode
Description: This table is to query Details.

FIELD NAME DATA TYPE WIDTH KEY FIELD DESCRIPTION

Ccode Integer 5 Primary Customer code

Cname Varchar 25 Customername

Cadd Varchar 250 Customer address

Mobile no Int 15 Mobile no

Emil Varchar 30 Email

pname Varchar 25 Not Null Product Name

pcat Varchar 20 Not Null Product Category

cname Varchar 25 Not Null Customer Name

cnum Varchar 15 Not Null Customer Number

cmail Varchar 40 Not Null Customer Email

cadress Varchar 200 Not Null Customer Address

odate Date Not Null Complaint Date

20
Tabel Name: Job allocation
Primary key: jcode
Description: This table is to store the Service Details.

FIELD NAME DATA TYPE WIDTH KEY FIELD DESCRIPTION

jobcode Integer 5 Primary Job code

Cuscode Integer 5 Secondary Customer code

cusname Varchar 30 Not Null Customer Name

mob Varchar 13 Not Null Mobile Number

email Varchar 35 Not Null Email Address

ptype Varchar 20 Not Null Product Type

pname Varchar 25 Not Null Product Name

problem Varchar 300 Not Null Problem Of The Product

adate Varchar Not Null Appointment Wanted Date

pdate Varchar Not Null Posted Date

Table Name: Job statas


Primary key: job code
Description: his table is to store the job stats Details.

FIELD NAME DATA TYPE WIDTH KEY FIELD DESCRIPTION

jobcode Integer 5 Primary Job code

Cuscode Integer 5 Secondary Customer code

problem Varchar 300 Not Null Problem Of The Product

adate Varchar 10 Not Null Appointment Wanted Date

pdate Varchar 10 Not Null Posted Date

Stats Varchar 15 Job statas

21
Table Name: Suggestion
Secandary key: coid
Description: It holds the details of the customer suggestion given to website.

Field Name Data Type Width Key Field Description

coid integer 05 Foreign Key Consumer id

stype character 08 Not Null suggestion type

pno integer 02 Not Null Phone number

caddr varchar 08 Not Null Contact address

sugdes integer 04 Not Null Suggestion description

22
4. SYSTEM TESING AND IMPLEMENTATION

System testing is critical aspect of software quality assurance and represents the ultimate
Review of specification, design and coding. Testing is a process of executing a program with the
intent of finding an error. A good testing case is that has the probability of finding as yet
undiscovered error. The purpose of the system testing is to identify and correct bugs in the
developed system. Nothing is complete without testing. Testing is vital to the success of the
system.

4.1 SYSTEM TESTING

After each program passes its own test, it is linkage to the other programs is scrutinized
with a program integration test. This ensures that the program work together as intended. Before
the implementation phase the designed system should be tested with raw data to ensure that all
modules of the system work correctly and satisfactorily. If some bug is found they can be
removed before the implementation phase. The testing has the four kind of testing that is as
follows.

WHITE BOX TESTING

White box testing, sometimes called glass-box testing is a test case design method that
uses the control structure of the procedural design to derive test cases. Using white box testing
methods, the software engineer can derive test cases.
1. Guarantee that all independent paths within a module have exercised at least once.
2. Exercise all logical decisions on their true and false sides.
3. Execute all loops at their boundaries and within their operational bounds.
4. Exercise internal data structures to ensure their validity.

23
BLACK BOX TESTING

Black box testing, also called behavioral testing, focuses on the functional requirements
of the software. That is, black box testing enables the software engineer to derive sets of input
conditions that will fully exercise all functional requirements for a program. Black box testing is
not an alternative to white box techniques. Rather it is a complementary approach that is likely to
uncover a different class of errors than white box methods. Black box testing attempts to find
errors in the following categories.

UNIT TESTING

Unit testing is the basic level of testing where individual components are tested to
ensure that they operate correctly. In a properly designed system, each component should have a
precise specification, and test cases must be defined to check that the component meets its
specification. Unit testing considers each component to be a stand-alone entity, which does not
require other system components to be present during the testing process. The modules purchase,
sales are individually unit tested using the above approach.

ACCEPTANCE TESTING

Acceptance testing involves planning an execution of a functional test, performance test


and stress test to verify that the implemented system satisfies the requirement. The acceptance
testing is the final stage of the user the various possibilities of the data are entered and the results
are tested.

VALIDATION TESTING

Software validation is achieved through a series of test that demonstrates the conformity
and requirements. Thus the proposed system under consideration has to be tested by validation
and found to be working satisfactorily. For example in customer enters phone number field
should contain number otherwise it produces an error message Similarly in all the forms the
fields are validated.

24
SYSTEM SECURITY

During the maintenance phase, the system is maintained according to the proposed
design. This phase includes coding and debugging. In the phase the programs are coded. The
programs are entered to the computer and checked for any possible errors. After all the errors
have been corrected, the programs are tested using the sample data.
System security refers to the technical innovations and procedure applied to the hardware
and operating system to protect against celebrates or accidental damages from a defined thread.

4.2 SYSTEM MAINTENANCE

The maintenance phase of the software cycle is the time in which a Software product
performs useful work. After a system is successfully implemented, it should be maintained in a
proper manner. System maintenance is an important aspect in the software development life
cycle. The need for system maintenance is for it to make adaptable to the changes in the system
environment. There may be social, technical and other environmental changes, which affect a
system, which is being implemented. Software product enhancements may involve providing
new functional capabilities, improving user displays and mode of interaction, upgrading the
performance characteristics of the system. So only through proper system maintenance
procedures, the system can be adapted to cope up with these changes.

The backup of the system is stored in on another directory and duplication is created. The
execution error in the system or if the system failed backup system is executed temporarily. The
first maintenance activity occurs because it is unreasonable to assume that software testing will
uncover all latent errors in a large software system. During the use of any large program, errors
will occur and be reported to the developer. The process that includes the diagnosis and
correction of one or more errors is called corrective maintenance.

The third activity that may be applied to a definition of maintenance occurs when a
software package is successful. As the software is used, recommendations for new capabilities,
modifications to existing functions, and general enhancements are received from users. To
satisfy requests in this category, perfective maintenance is performed.

25
4.3 IMPLEMENTATION

System implementation is loss creative than design but it is a crucial phase in the system
life cycle. It is primarily concerned with ordering of the items. Implementation is the process of
concerning a new system design into an operational one. Implementation is the stage in the
project where the theoretical design is turned into a working system. The most crucial stage is
achieving a new successful system and in giving confidence is in getting the approval for the
system manager.

The data entry, the various menus and most important reports that the system is capable
of producing are shown to the staff. This is done in view of any last minute changes that will be
necessary in the formats.When everyone is satisfied, the new system is finally handled over to
the data entry operators. The more complex the system is being implemented, the more involved
will be the systems analysis and design effect required for the implementation.

26
5. CONCLUSION AND FEATURE ENHANCEMENT

5.1 CONCLUSION
It is concluded that the application works well and satisfy the company and Cutomer. The
application is tested very well and errors are properly debugged. The application is
simultaneously accessed from more than one system. Simultaneous login from more than one
place is tested.

The application works according to the restrictions provided in their respective browsers.
Further enhancements can be made to the application, so that the application functions very
interactive and useful to existing application .The application satisfies both the company and
Customer by eliminating more input. The speed of the transactions become more enough now.

5.2 FEATURE ENHANCEMENT


This provides all the sophisticated solutions needed for a new site.but even then there is
scope for a little improvement. More facilities can be given to the registered users of the site.
This project has been successfully developed and interpreted and system was developed
according to the user requirements. The system produces accurate results and it also reduces a lot
of overheads, which the manual system faced. By using this, The information requirements may
still increase in the near future. Any further enhancement can easily accompanied with the
existing module without alteration. In future, booking room modules can also be included.

27
BIBLIOGRAPHY
Reference books
1) Jesus Castagnetto, Sascha Schumann, “Proffesional Php Programming”, Addison
wosley Publication, Fifth Edition.
2) Jay Greenspan, Brad Bulgar, “Mysql/Php Database Applications”,Tata McGraw-Hill
Publishing Company, Third Edition.
3) William Stallings, “Cryptography And Network Security”,Tata McGraw-Hill
Publishing Company, Third Edition.
4) Bruce Schneier, “Applied Cryptography”,Pearson Education, Second Edition.
5) Rogers Pressman, “Software Engineering And Applications”, Galgotie Publication,
Sixth Edition.

Reference Websites:

1. www.onlinetutorial.com

2. www.cryptography.com

3. www.Tenders.com

28

Anda mungkin juga menyukai