Vous êtes sur la page 1sur 93

CUSTOMER CARE MANAGEMENT SYSTEM In the partial fulfillment for the award for the degree Of BACHELOR OF COMPUTER

APPLICATION Submitted by

Name1 Name2

10CUSB0000 10CUSB0000

ABC Degree College.


BANGALORE UNIVERSITY: BANGALORE 560001
-1-

BONAFIDE CERTIFICATE
Certified that this project report CUSTOMER CARE MANAGEMENT SYSTEM is the bonafide work of NITA PRADHAN & MITA who carried out the project work under my supervision.

SIGNATURE

PRINCIPAL SIGNATURE

ABC Degree College.


BANGALORE UNIVERSITY: BANGALOR-560001

-2-

CERTIFICATE

This is to certify that Mr. Name1 and

Mr. Name2 has satisfactorily

completed the project entitled Customer Care Management System under the guidance of Ms. Aruna for the academic year 2012 -2013.

_______________ Signature of the H.O.D (Dept. of Comp. Sc.)

______________ Faculty in Charge

____________ Principal Signature

Examiners: 1) _ _ _ _ _ _ _ _

2)_ _ _ _ _ _ _ _

Date: _ _ _ _ __ _ _ _ _

-3-

-4-

ACKNOWLEDGEMENT
We are really indebted to Vivekananda College of Science, Commerce & Arts College, Bangalore, for such an opportunity to undertake this project work as a partial fulfillment to the BCA course curriculum. We express our sincere thanks to our project guide Ms. Aruna for her constant supervision. On the completion of this project, we would like to render our heartfelt gratitude to certain individuals who guided us all through the project. We thank our teachers, who guided to success in our voyage through this competitive world. We feel honored to avail the opportunity to express my sincere gratitude to the principal for his consent in the preparation of the manuscript. Finally my sincere thanks to our project members, undersigned, without whom the project could never have been completed on time.

Name Name1 Name2

Reg. Number 10CUSB0000 10CUSB0000

Signature

. .

-5-

-6-

CONTENTS
About the Project Hardware & Software specification DFD(Data flow diagram) ER Diagram Data Dictionary (Table Structure) Functional Description Software Environment Testing About us Conclusion Bibliography

-7-

ABOUT THE PROJECT: This document gives all the information regarding Customer Care Management System which is developed for company to manage customer care online. Now the company can able to communicate with his customers online using this online customer care management system. This system provides options for admin, employee and users to communicate between them. So every problem or query or question raised by the customer can answered by the employee.

INTRODUCTION: The project entitled Online Customer Care Management for branded product is developed as part of the VI Semester final project for the partial fulfillment of the BCA degree.

PROJECT: Online Customer Care Management for branded product is online website to maintain all the day to day activities of the customer support, the site also provide option to process the complaints, allocate the employee to manage the service and It is also provide option to analyze the service provided the employee. Based on the analysis company can know how services are done to the customers.

-8-

Customer care involves putting systems in place to maximize the customers' satisfaction with the business. It should be a prime consideration for every business. Sales and profitability depends on keeping your customers happy. Customer care is more directly important in some roles than others. For receptionists, sales staff and other employees in customerfacing roles, customer care should be a core element of their job description for every employee. OBJECTIVE: The main objective of the application is to automate the existing system of manually maintaining the records of the customer complaints, requires, service related problems etc., The proposed software help to store all data digitally and can be searched with in no time compare to the manual searching. SCOPE: This application can be used by any branded product companies to process the customer complaints and requites. So this project can be used by any of the branded product companies, later this application can customized to other type product companies also.

-9-

Customer Care Management System project covers the following details. They are:

Admin Module
Category Details Product Details General FAQ Qualification Details Profession Details State Details City Details Emp Details Customer Details

- 10 -

Employee Module
View Product List Answer Questions View FAQ Change Password

Customer Module
View Product List View FAQ Ask Questions View Answer

- 11 -

Scope of the Customer Care Management System The scope of the Customer Care Management System includes:1. It is single application system to manage all customer care related problems online. 2. Used to answer all the questions or problems raised by the user. 3. The program works on online so many people can work simultaneously. 4.The program works on online so user can sit anywhere on the earth and he can ask the questions. 5. All information digitally stored so it is long lasting.

- 12 -

- 13 -

Hardware And Software Requirement Hardware Specification: Processor Type Speed Ram Hard disk Keyboard Mouse : Pentium IV : 2.4 GHZ : 1 GB RAM : 40 GB HD : 101/102 Standard Keys Keyboard : Scroll Mouse

Software Specification: Operating System Programming Package Server Facility Database : Win XP or Win 7 : Java, Jsp, html, css : Glass Fish Server : Netbeans : MYSQL Database Server

- 14 -

- 15 -

DATA FLOW DIAGRAM


A Dataflow Diagram also known as Bubble Chart is used to clarify System requirements and identifying major transformations that all become programs in System Design

SYMBOLS

Data Source/Destination

Process

Data Storage

- 16 -

Flow of data

Dataflow Diagram

- 17 -

- 18 -

- 19 -

Entity Relationship Diagram


In software engineering, an entity-relationship model (ERM) is an abstract and conceptual representation of data. Entity-relationship modeling is a database modeling method, used to produce a type of conceptual schema or semantic data model of a system, often a relational database, and its requirements in a top-down fashion. Diagrams created by this process are called entity-relationship diagrams, ER diagrams, or ERDs. Data flow diagrams can be used to provide a clear representation of any business function. The technique starts with an overall picture of the business and continues by analyzing each of the functional areas of interest. This analysis can be carried out to precisely the level of detail required. The technique exploits a method called top-down expansion to conduct the analysis in a targeted way. The result is a series of diagrams that represent the business activities in a way that is clear and easy to communicate. A business model comprises one or more data flow diagrams (also known as business process diagrams). Initially a context diagram is drawn, which is a simple representation of the entire system under investigation. This is followed by a level 1 diagram; which provides an overview of the major functional areas of the business.

- 20 -

Entity relationship diagram symbols

ENTITY

RELATIONSHIP

KET ATTRIBUTE

ATTRIBUTE

- 21 -

ER Diagram

- 22 -

- 23 -

Data Dictionary
Table Name uName pWord Table Name catName details Table Name ProductName details catName specification price Table Name qno ProductName question Answer Table Name edName details : : : : : AdminLoginTab varchar(50) varchar(50) CategoryTab varchar(50) varchar(50) ProductTab varchar(50) varchar(250) varchar(50) varchar(250) int FAQTab int varchar(50) varchar(250) varchar(250) QualificationTab varchar(50) varchar(50) - 24 -

Table Name jobName details Table Name StateName details Table Name cityName details statename

ProfessionTab varchar(50) varchar(50)

StateTab varchar(50) varchar(50)

CityTab varchar(50) varchar(50) varchar(50)

Table Name uName pWord custName cAdd cityname statename phonenos email qualification designation approved

CustDetTab varchar(50) varchar(50) varchar(50) varchar(250) varchar(50) varchar(50) varchar(50) varchar(50) varchar(50) varchar(50) varchar(1) - 25 -

Table Name qno qDate uName ProductName question Answer empcode

QATab int, date, varchar(50) varchar(50) varchar(250) varchar(250) varchar(25)

Table Name empcode pWord empName eAdd cityname statename phonenos email qualification designation

EmpDetTab varchar(50) varchar(50) varchar(50) varchar(250) varchar(50) varchar(50) varchar(50) varchar(50) varchar(50) varchar(50)

- 26 -

- 27 -

Functional Description
The problem under study is being divided into several modules/functions discussed below to understand the approach to the solution in the broader way:

Admin Module
Category Details Product Details General FAQ Qualification Details Profession Details State Details City Details Emp Details Customer Details

- 28 -

Employee Module
View Product List Answer Questions View FAQ Change Password

Customer Module
View Product List View FAQ Ask Questions View Answer

- 29 -

System Architecture Description

A system architecture or systems architecture is the conceptual model that defines the structure, behavior, and more views of a system. An architecture description is a formal description and representation of a system, organized in a way that supports reasoning about the structure of the system which comprises system components, the externally visible properties of those components, the relationships (e.g. the behavior) between them, and provides a plan from which products can be procured, and systems developed, that will work together to implement the overall system. The language for architecture description is called the architecture description language. This project consists many dynamic pages, each page is used to do particular task, below each form is explained in detail.

Index.jsp Index.jsp is the main page of the project, It will have introductory information and navigational link to the other page which consists of navigational link to login and signup page. The index page reflects the site information, and also gives the project details. This page consist multiple images and some content.

- 30 -

Admin Login form Loginform.jsp contains the login options, that is username and password, user as to enter the username and password to login to the site, username and password are validated using script language. Without entering this information one cant get into the site. The user data is all ready stored in the database, so when user enter the user name and password, it will compared with the existing data to verify, if it matches then the user is allowed to login.

Mainform Mainform.jsp contains the links for all the pages, it is serve the purpose of interaction between each page. Also it contains main information which is necessary for people to understand about this company. It also contain a link to register, on register the data will be stored in the text file. This page will be updated as and when new information is available.

- 31 -

Customer signup form This page contains option to enter the personal details who want to know more about broad band services. The detail entered by the used is validated through vbscript. This script will check whether user will enter all the information or not. And also it will check number validation. The data entered here will be stored in database file, later the same is used to verify the user details.

Customer Login form CustLoginform.jsp contains the login options, that is username and password, user as to enter the username and password to login to the site, username and password are validated using script language. Without entering this information one cant get into the site. The user data is all ready stored in the database, so when user enter the user name and password, it will compared with the existing data to verify, if it matches then the user is allowed to login.

Admin Main Page AdminMainPage.jsp contains the links for all the pages, it is serve the purpose of interaction between each page. Once admin successfully logins this page will appear. It is having link to other admin controlled pages. These pages are mainly master entry pages, the data entered in these pages will be utilized in other forms. Also links are provided to - 32 -

list the entered data. So admin can check out which data is entered and which is not.

Category Details This page contains the textboxes to enter the category name and its details. All the products are categorized, so category names are important. Using this form we can create different categories required for this project. The data entered here will be stored in mysql cattab table.

Product Details This page contains the textboxes to enter the product name and its details. Drop down box is provided to display the existing category names. All the products are categorized, so category names are important. Using this form we can create different product details for this project. Customer need to know which product they have the problem so complete list will be provided to the customer. The data entered here will be stored in mysql product tab table.

- 33 -

General FAQ This page contains the textboxes to enter the faq question and answers. Drop down box is provided to display the existing product names. All the products are categorized, so category names are important. Using this form we can enter different common questions user generally asks. Customer has some general query about each product, all such kind of question and answers can be entered here, so the user can see all these informations.

Qualification Details This page contains the textboxes to enter the qualification name and its details. Qualifications details enter here are stored in the qualification table. which act as master table. The same data is called in employee and customer details. Where it acts as foreign key. The information entered here is validated to check whether this data is all ready present or not.

Profession Details This page contains the textboxes to enter the profession name and its details. Profession details enter here are stored in the profession table. Which act as master table. The same data is called in employee and customer details; here it acts as foreign key. The information entered here is validated to check whether this data is all ready present or not. - 34 -

State Name Details This page contains the textboxes to enter the state name and its details. State details enter here are stored in the State table. which act as master table. The same data is called in employee and customer details here it acts as foreign key. The information entered here is validated to check whether this data is all ready present or not.

City Name Details This page contains the textboxes to enter the city name and its details. City details enter here are stored in the city table. which act as master table. The same data is called in employee and customer details here it acts as foreign key. The information entered here is validated to check whether this data is all ready present or not.

Customer Details List This page consists of all the customer details who are signed up to this website. This is a report page. Admin can see all the customer details using this page. The necessary information related to the customer will display in this form.

- 35 -

Employee Module

View Product List This page consists of all the product details which are entered by the admin. This is a report page. Employees can see all the product details using this page. The necessary information related to the products will display in this form.

Answer Questions This page is used by employee to answer the questions raised by the customers. In this page all the question raised by the customers are listed one by one, employee will select the question to answer it. On selection it will take to the next page, where answer textbox is provided to enter the answer details. After entering the answer employee will save the answers, later user can able to see this answer.

View FAQ List This page consists of all faq list, faq stands for Frequently Asked Questions. Admin will enter all the question and answers, the same - 36 -

can be viewable by the employee. This list will help the employee to answer the customer queries.

Change Password This page is used to change the password of the employee. Actually employee password is set by the admin by default, so employee can able to change the password as and when required. The page provide all the options for the employee to change the password. The original password is validated before changing to the new password.

Customer Module

View Product List This page consists of all the product details which are entered by the admin. This is a report page. Employees can see all the product details using this page. The necessary information related to the products will display in this form.

- 37 -

View FAQ List This page consists of all faq list, faq stands for Frequently Asked Questions. Admin will enter the entire question and answers, the same can be viewable by the employee. This list will help the employee to answer the customer queries.

Ask Questions The main aim of this project is to provide a sufficient tool for customer to ask for his problem. This form will serve this purpose, using this page customer can ask any question they want. They can also register the problem they have. It is a web based application so customer sitting anywhere on the earth can able to raise the question, so he/she no need drop into the company customer care center to explain their problem. This enable the company to solve customers problem where ever they are. The questions raised here are answered by the employees.

View Answer This page is used to view the answers answered by the employee. The question asked by the user is answered by the employee, now user can able to see that answer here. In this page all the questions asked by the user will be displayed, then they can click any of them to view the answers. - 38 -

Change Password This page is used to change the password of the user. This page is providing all the options for the user to change the password. The original password is validated before changing to the new password.

- 39 -

- 40 -

SOFTWARE ENVIRONMENT
The proposed system is developed using Java, HTML as the front end and MYSQL as the back end.

Java
Java Packages Eight environment. packages comprise the standard Java development

The Java Language Package The Java language package, also known as java.lang, contains classes that are core to the Java language. The classes in this package are grouped as follows:

Object The granddaddy of all classes--the class from which all others inherit.

Data Type Wrappers A collection of classes used to wrap variables of a primitive data type: Boolean, Character, and Double, Float Integer and Long.

- 41 -

Strings Two classes that implement character data. The String and String Buffer Classes is a thorough lesson on the use of both types of strings.

System and Runtime These two classes provide let your programs use system resources. System provides a system-independent programming interface to system resources and Runtime gives you direct system-specific access to the runtime environment. Using System Resources Describes both the System and Runtime classes and their methods.

Threads The language. The java.lang package also defines the runnable interface. Thread, Thread Death and Thread Group classes

supplement the multi-threading capabilities so important to the Java

Runnable makes it convenient for Java class to be active without sub classing the Thread class. Through an example-oriented approach Threads of Control will teach you about Java threads.

Classes The Class provides a runtime description of a class and the Class Loader class allows you to load classes into your program during runtime.

- 42 -

Math The Math class provides a library of math routines and values such as pi.

Exception, Error, and Throwable When an error occurs in a Java program, the program throws an object, which indicates what the problem was and the state of the interpreter when the error occurred. Only objects that derive from the throwable class can be thrown. There are two main subclasses of Throwable: Exception and Error. Exceptions are a form of Throwable that "normal" programs may try to catch. Errors are used for more catastrophic errors--normal programs should not catch errors. The java.lang package contains the Throwable, Exception, and Error classes, and numerous Subclasses of Exception and Error that represent specific Problems. Handling Error Using Exceptions shows you how to use exceptions in your Java programs to handle errors.

Process Process objects represent the system process that is created when you use Runtime to execute system commands. The java.lang Packages defines and implements the generic Process class. The compiler automatically imports this package for you. No other packages are automatically imported.

The Java I/O Package The Java I/O Package (java.io) provides a set of input and Output streams used to read and write data to files or other Input and output

- 43 -

sources. The classes and interfaces defined In java.io are covered fully in Input and Output Streams.

The Java Utility Package This Java package, java.util, contains a collection of utility classes. Among them are several generic data structures (Dictionary, Stack, Vector, and Hash table) a useful object for tokenizing a string and another for manipulating calendar dates. The java.util package also contains the Observer interface and Observable class, which allow objects to notify one another when they change. The java.util classes aren't covered separately in this tutorial although some examples use these classes.

The Java Networking Package The java.net package contains classes and interface definitions that implement various networking capabilities. The Classes in this package include a class that implement a URL, a connection to a URL, a socket connection, and a datagram packet. You can use these classes to implement client- server applications and other networking communication applications. Custom Networking and Security has several examples using these classes, including a client-server example and an example that uses datagrams. The Applet Package This package contains the Applet class -- the class that you must subclass if you're writing an applet. Included in this Package is the Audio Clip interface which provides a very high level abstraction of audio. Writing Applets explains the ins and outs of developing your own applets.

- 44 -

The Abstract Window Toolkit Packages Three packages comprise the Abstract Window Toolkit: Java.awt, java.awt.image, and java.awt.peer. AWT Package The java.awt package provides graphical user interface (GUI) elements that are used to get input from and display information to the user. These elements include windows, buttons, scrollbars, and text items. AWT Image Package The java.awt.image package contains classes and interfaces for managing image data, such as setting the color model, cropping, color filtering, setting pixel values, and grabbing snapshots of the screen. AWT Peer Package The java.awt.peer package contains classes and interfaces that connect platformindependent AWT components to their platformdependent implementation (such as Motif widgets or Microsoft Windows controls). Creating a User Interface covers all three of the AWT packages.

- 45 -

FEATURES OF JAVA Distributed Java has an extensive library of routines for coping with TCP/IP protocols like HTTP and FTP Java applications can open and access across the Net via URLs with the same ease as when accessing local file system. We have found the networking capabilities of Java to be both strong and easy to use. Anyone who has tries to do Internet programming using another language will revel. How simple Java makes onerous tasks will like opening a socket connection. Robust Java is intended for writing programs that must be readable in a Variety ways. Java puts a lot of emphasis on early checking for possible problems, later dynamic checking, and eliminating situations that are error prone... The single biggest difference between Java has a pointer model that eliminates the possibility of overwriting memory and corrupting data. The Java compiler detects many problems that in other languages would only show up at runtime. As for the second point, anyone who has spent hours chasing a memory leak cost by a printer bug will be very happy with this feature of Java. Java gives you the best of both worlds. You need not pointers for everyday constructs like string and arrays. You have the power of pointers if you need it, for example, for like lists. And you have always-complete safety, Since you can never access a bad pointer or make memory allocation errors. Secure Java is intended to be used in networked/distributed environment toward that end; a lot of emphasis has been placed on security. Java enables the contraction of virus-free, temper-free systems.

- 46 -

Here is a sample of what Javas security features are supposed to keep a Java programming from doing: 1. Overrunning the runtime stack. 2. Corrupting memory outside its own process space. 3. Reading or writing local files when invoked through a security-conscious class loader like Web browser. Architecture Neutral The compiler generates an architecture neutral object file format- the compiled code is executable on many processors, given the presence of Java runtime system...The Java compiler does this by generating byte code instructions which have nothing to do with a particular computer architecture. Rather they ere designed to be both easy to any machine and easily translated into native machine code on the fly. Twenty years ago, the UCSD Pascal system did the same thing in a commercial product and, even before that, Nicholas Worths original implementation of Pascal used the same approach. By using bytecodes, performance takes major hit. The designers of Java did an excellent job developing a byte code instruction set those workers well on todays most common computer architectures. And the codes have been designed to translate easily into actual machine instructions. Portable Unlike C and C++, they are no "implementation dependent" aspects of the specifications. The sizes of the primitives data types are specified, as is the behavior of arithmetic on them. For example, an int in Java is always a 32-bit integer. In C/C++, int can mean a 16-bit integer, a 32-bit integer, or any size the compiler

- 47 -

vendor likes. The only restriction is that it must have at least as many bytes int and cannot have more bytes than a long int. The libraries that are a part of the system define portable interfaces. For example, there is an abstract window class and implementations of it UNIX, Windows, and the Macintosh. Interpreted The Java interpreters can execute Java byte codes directly on any machine to which the interpreter has been ported. Since linking is a more incremental and lightweight process, the development process can be much more rapid and explanatory. One problem is that the JDK is fairly slow at compiling your source code to the bytecodes that will, ultimately, be interpreted in the current version. High Performance While the performance of interpreted bytecodes is usually more than adequate, there are situations higher performance is required. The bytecodes can be translated on fly into machine code for the particular CPU the application is running on. Native code compilers for Java are not yet generally available. Instead there are just-in- time (jit) compilers. These work by compiling the byte codes Into native code once, caching the results, and the calling them again, if needed. This speeds up code once, catching the results, and calling them again, if needed. This speed up the loop tremendously since once has to do the interpretation only once. Although still slightly slower than a true native code compiler, just-in- time compilers can give you a 10-or even 20-fold speedup for some programs and will almost always be significantly faster than the Java Interpreter.

- 48 -

Multithreaded In a number of ways, Java is more dynamic language than C or C++. It was designed to adapt to an evolving environment. Libraries can freely add new methods and instance variables without any effect on their clients.... In Java, finding out run time type information is straightforward. This is an important feature in those situations where code needs to be added to a running program. A prime example is code that is downloaded from the Internet to run in browser.

PARADIGM OF JAVA Java as a programming language evolved keeping in view certain criteria and features. It was built around a model that had these features. Some of the features of this model we have seen like the object oriented, architecture neutral, robust, secure etc. Some additional features are explaining below Dynamic downloading of applets- Applets should be downloadable on to a client machine as and when required. Elimination of fatter phenomenon - Java based products could eliminate these by giving the users only those features of a product that the user needs at a time. The remaining features of a product can remain on the server itself. Supports Networks centric computing- Java should be able to support low cost Network computers. Supports CORBA& DCOM-Java supports Common Object Request Broken Architecture (CORBA) and Distributed Common Object Model (DCOM). This ensures that certain standards for object Programming are net. Supports Active X also.

- 49 -

JAVA APPLETS Applets are a common way of writing Java applications. Integrating web based sound and graphics into applications is simplified by using methods in Applet class. Applets are essentially program that run from within a browser. They appear as part of HTML documents in the same way that pictures are presented. The major difference is that instead of a static graphics, the Java Applet is a complete running program. An Applet is just like a widow application, but without a classic window frame. The range of programs that can be written as an APPLET are reduced because of security limitations imposed by the target browser. Applets run only from with in Java-Enabled browsers such as NETSCAPE, hot Java, and INTERNET EXPLOSER. ADVANTAGES OF APPLETS: There are several advantages using Applets. The most obvious is that you only need one copy of your production class files on an HTML server. This reduces the nightmare of distributing and installing software by the tape or disk. Internet and Intranet based software also reduces the problems of LAN accesses to software instead of accessing a disk by way of a networkmounted disk. Files are accessed through http and FTP. WEB pages can also be used as a method of presenting help to your users as well as keeping them informed about the latest changes to your programs. This enables due to keep in constant touch your users. DISADVANTAGES OF APPLET: Running your application from a web browser is not necessarily a good thing. Target users must be running a version of web browser that supports that Java. It also helps if uses have an Internet connection of 28.8 k or higher on relatively fast computers. Another large problem is local file access.

- 50 -

If the applet was loaded from an http server, no local files can be read or written to on the client machines. Loading the applet from the users local disk storage can alleviate this, but this defeats any of the web-based applet advantages mention earlier. Applets have reduced network access. If an applet is loaded from networked machine. Only that machine can be communicated with a via a socket connection this prevents the applet from communicating to other machines on web. This security restriction is alleviated if the applet is loaded from the users local disk. Any Java based graphical application can be easily converted into an applet. This id because both frame and applet are executed from the container class. APPLET LIFE CYCLE: There are four methods that give the framework to build the applet Init () Start () Stop () Destroy () Init (): - Used for initial setup such as defining Layout, passing parameters and other initializations. Start (): - This is called immediately after init () start () is called each time user return to the pea or when the page is deconified. Unlike start, init is called only once. Stop (): - This method is called when the user moves off the page on which the Applet sits or when it is iconified. If an applet if not doing time consuming activities like performing animation, this need not be implemented. Destroy (): - This method is called when the browser shuts down. It is used to re-claim resources.

- 51 -

JAVA VS C++: The syntax of Java looks very much like C+ +. Compared to c++, Java used similar syntax for if and loops structures. The notion of a constructor is all very similar to what C++ has. The following are some of the differences of Java over C++. If you understand these differences you will see why Java is such a beneficial programming language. Compare to C++ Java runs 20 times slower because of platform independents. Every thing must be in a class. There are no global functions or global data. If you want the equivalent of global, make static methods and static data within a class. There are no structures or enumeration or unions. Only class. The Char type uses the international 16-bit. Unicode character set, so it can automatically represent most national characters. All non-primitive types can only be created using new. All primitive types can only be created directly, without new. There are wrapper classes for all primitive classes so you can create equivalent heap-based objects with new Java has no Preprocessors. If you want to use classes in another library, you say import and the name of the library. There are no preprocessor-like macros. There are no Java pointers in the sense of C and C++. When you create an object with new, you get back a reference. For example String s = new String ("peers"); Java has no templates or other implementation of parameterized types. There is a set of containers : Vectors, stacks and Hash table that hold object references, and through which you can satisfy your container needs, but

- 52 -

these containers are not designed for efficiently like the C++ standard template library(STL) Java has built-in support for comment document action, so the source code file can also contain its own documentation, which is stripped out and reformatted into HTML using an apart program. This is boon for documentation maintenance and use. Java has standard libraries for solving specific tasks. C++ relies on nonstandard third-party libraries. These tasks include - Networking - Database Connection (via JDBC) - Multithreading - Distributed Objects (via RMI and CORBA) - Compression - Commerce The availability and standard nature of these libraries allow for more rapid application development. Generally, Java is more robust, via Object handles initialized to null Handles are always checked and exceptions are thrown for failure all array accesses are checked for bounds violations Automatic garbage collection prevents memory leaks Clean, relatively fool-proof exception handling bytecodes verification of network applets

- 53 -

INTRODUCTION TO JDBC

What is JDBC and Why JDBC? JDBC (Java Database Connectivity) is a front-tool for connecting to a server and is similar to ODBC in the respect. However, JDBC can connect only Java clients and uses ODBC for the connectivity. JDBC is essentially a low- level Application, Programming Interface. It is called a low-level API since any data manipulation, storage and retrieval has to be done by the program itself. Some tools that provide a higher level abstraction are expected shortly. JDBC Driver types: There are four types of JDBC drivers each having its own functionality. Please note that, they do not substitute one another, each having their own suitability aspects. They are classified based on how they access data from the database. 1.Native Jdbc driver: A JDBC driver, which is partly written in Java and most of each, implemented using native methods to access the database. This is useful in case of Java application that can run only on some specific platforms. Writing these type drivers is easier compare to writing other drivers 2. All Java JDBC Net Drivers: A JDBC net drivers which uses a common network protocol to connect to an intermediate server, which is turn employees native calls to connect to the data base. This approach is used for applets where the request must go through the intermediate server. 3. JDBC-ODBC bridge driver:

- 54 -

A bridge driver provided with JDBC can convert. The Jdbc calls in to equaling ODBC calls using the native methods. Since ODBC provides for connection to any type of database that is ODBC compliant, to connect a number of databases simultaneously, it is very simple matter. This approach is a recommended once since using ODBC drivers, which are industry standard as of now, would make an application truly portable across the databases. 4. Native Protocol ALL Java Drivers: This type of Jdbc driver is written completely in Java and can access the database by making use of native protocols of the database. This method of data access is suitable in case of Intranets were carry every thing can run as an application instead of an applet. JDBC ARCHITECTURE: JDBC architecture is shown below. Components of JDBC are 1. JDBC Driver Manager 2. JDBC Driver 3. JDB-ODBC Bridge 4. Applications. Uses Native uses special Uses native Calls to net protocols net protocols

- 55 -

Access The data to accessthe to access the base database database DATA BASE JDBC Driver Manager: - Function of the driver manager is to findout available drivers in the system and connects the application to the appropriate database. Whenever a connection is requested. However, to help the driver manager identify different types of drivers, each driver should be registered with the driver Manager. JDBC Driver: - Function of the JDBC Driver is to accept the SQL calls from the application and convert them into native calls to the database. However, in this process it may take help some other drivers or even servers, which depends on the type of Jdbc Driver we are using. Also, it is possible that the total functionality of the database server could be built into the driver itself. JDBC-ODBC Bridge: Sunsoft provides a special JDBC Driver called JDBC-ODBC bridge driver, which can be used to connect to any existing database, that is ODBC complaint. APPLICATION: Application is a Java Program that needs the information to be modified in some database or wants to retrieve the information. SERVLETS: Client and Servers To understand the World Wide Web and Server Side programming must understand the division between Web clients and Web servers and how HTTP facilities the interaction between the two. Putting in simple words, a server handles request from various clients. For example, suppose you are using a word processing program to edit files on another compute. Your computer would be the client because it is requesting the files from another computer. The other computer would be the server because it is handling

- 56 -

your computer's request. With networked computers, clients and servers are very common. A server typically runs on a different machine than the client, although this not always the case. The interaction between the two usually begins on the client side. The client software request an object or transaction from the server software, which either handles the request an object or transaction from the server software, which either handles the request or denies it. If the request is handled, the object is sent back to the client software. On the World Wide Web server are known as webservers, and clients are known as Webbrowsers. Web browsers request documents from web servers, allowing you to view documents on the World Wide Web. Some of the most common browsers are Netscape Navigator, Internet Explorer, and NCA's Mosaic. Like most software companies that distribute Web Browsers, these companies also distribute Web server software (in our case we uses JWS Java Web Browser). The process of viewing a document on the web starts when a web browser sends a request to web server in http request headers. The Web server receives and views the http request headers for any relevant information, such as the name of the file being requested, and sends back the file with HTTP response headers. The web browser then uses the HTTP response headers to determine how to display the file or data being returned by the web server. In the case of Servlets we would refer to a URL with a default port at 8080. If the above said server are Java Enabled Web Severs. HTTP is defaulted at port 80 and in case of Servlets it is defaulted at 8080 that could be changed. WHY USE SERVLETS? You may have noticed that the preceding CGI example could just as easily been a simple HTML file. In fact, you don't gain advantage from making it a server side script. So why use any server side scripting? Well, for the preceding example, you wouldn't. It is just a simple example CGI script. As

- 57 -

you learn Servlets, however, you will see that it allows you to extend the functionality of Web documents to produce dynamic and interactive pages. 1.An Invitation to Servlets: This session provides answer to the questions "What is Servlets" shows typical uses for Servlets. It also gives a quick introduction to HTTP and its implementation in the HttpSetvlet class. What is Servlets? Servlets are modules of Java code that run in a server application to answer client requests. Servlets are not tied to a specific client- server protocol but they are most commonly used with Http and the word "SERVLET" is often used in the meaning of "HTTP Servlets". Servlets make use of the Java standard extension classes in the packages javax.servlet and javax.servlet.http (extension of the Servlets framework for Servlets that answer HTTP requests). Since Servlets are written in the highly portable Java Language and follow a standard framework, they provide a means to create server extensions in a server and operating system independent way. Typical uses for HTTP Servlets include: Processing and/or storing data submitted an HTML form. Providing synergic content, e.g. returning the results of a database query to the client. Managing state information on top of the stateless HTTP, e.g. for an online shopping chart system which manages shopping charts for many concurrent customers and maps every request to the right customer. The Servlet Environment: Inter-Servlet communication

- 58 -

The inter Servlet communication method which is described in this section can only be used with Servlet engines which implement version 1.0 or 2.0 of the Servlet API. It will not work with Servlet engines, which comply strictly, to version 2.1 Servlets are not alone in a web server. They have access to other Servlets in the same Servlet context (usually a Servlet directory), represented by an instance of javax.servlet.servletContext. The Servlet Context is available through the Servlet Config object's get Servlet context method. A Servlet can get a list of all othg3r Servlets in the Servlet context by calling get Servlet Names on the Servlet Context object. A Servlet for a known name (probably obtained through getServletNames) is returned by getServlet. Note that this method can throw a ServletException because it may need to load and initialize the requested ServletException if this was not already done. After obtaining the reference to another Servlet that Servlets methods can be called. Methods, which are not declared in javax.servlet.Servelet but in a subclass thereof can, called by casting the returned object to the required class type. Note that in Java the identity of a class is not only defined by the class name but also by the Class Loader by which it was loaded. Web servers usually load each Servlet with a different class loader. This is necessary to reload Servlets on the fly because single classes cannot be replaced in the running JVM. Only a classloader object with all loaded classes can be replaced. This means that classes, which are loaded by a Servlet class loader, cannot be used for inter-Servlet communication. A class literal FooServlet (as used in a type cast like "FooServlet foo ((FooServlet) context.getServlet ("FooServlet")") which is used in class BarServlet is different from the class literal FooServlet as used in FooServlet itself.

- 59 -

A way to overcome 5this problem is using a supercalss or and interface which is loaded by the system loader and thus shared by all Servlets. In a Web Server, which is written in Java, these classes are usually located in the class path (as defined by the CLASSPATH environment variable) Sharing Data between Servlets Version 2.1 of the Servlet API offers a new way of sharing named objects between all the Servlets in a Servlets in Servlet context (and also other contexts, as youll see below) by binding the objects to the ServletContext object which is shared by several Servlets. The ServletContext class has several methods for accessing the shared objects: Public void setAttributes (string name, Object) adds a new object or replaces an old object by the specified name. The attribute name should follow the same naming convention as a package name (e.g. a Servlet com.foo.fooservlet could have an attribute com.foo.fooservlet.bar). Just like a custom ServletRequest attribute an object which is stored as a ServletContext attribute should also be serializable to allow attributes to be shared by Servlets which are running in different JVMS on different machines in a load balancing server environment. Public Object getAtributes (String name) returns the name object or null if the attribute does not exist. In addition to the user-defined attributes there may also be predefined attributes, which are specific to the Servlet engine and provide additional information about a Servlet (Context) environment. Public environment getAtributes name () returns an Enumeration of the names of all available attributes.

- 60 -

Public void remove Attribute (String name) removes the attributes with the specified name if it exists. The separation of Servlets into Servlet contexts depends on the Servlet engine. The Servlet Context objects of a Servlet with a known local URL can be retrieved with the method public Servlet Context getContext (String unipath) of the Servlets own Servlet Context. This method returns null if there is no Servlet for the specified path or if this Servlet is not allowed to get the Servlet Context for the specified path due to security restrictions. Compiling Servlets Servlets can be compiled with the JDK and other Java compilers, just like Applets and Applications. If the Servlet packages javax.servlet and javax.servlet.http are not included with the compiler or your Servlet engine you have to install them separately by downloading the JSDK (Java Servlet Development Kit) and including the JSDK classes in your CLASSPATH environment variable. They can also be worked out with Java Web Server. Both JSDK and JWS follow the same rules, except for JSDK providing supporting for the other servers like IIS and other third party vendors.

- 61 -

Introduction to world wide web

Internet: The Internet is a network. Its consists of thousands of interconnected networks consisting of different types of computers. It is the worldwide access to people and information. The internet stemmed from the concept of universal database: data that would not only be accessible to people around the world, but information that would link easily to others pieces of information so that the relevant data can be quickly found by a user. In 1960s this was explored revolution all aspects of humaninformation interaction. The Internet first began in 1969 when the United States Department of Defense researched ways of communication via decentralized computer networks. After that computers in government and universities were voluntarily linked. This quickly spread to other institutions around the world where today there are an estimated 20 million computers linked together. UNDERSTANDING INTERNET A network in which computers are connected using cables or some other direct media are said to be in LAN. When a group of LAN's are connected together they are called Wans. These Wan's are connected via telephone line, satellite links etc. Importantly these LAN's are connected to form Wans through special computers called Routers. The job of a Router is to provide a link from one network to other where networks can be LANs to form Wans to become even larger Wan's.

- 62 -

HARDWARE REQUIREMENTS: If Internet being accessed through a telephone line Then we need A computer with minimum requirements A modem A telephone Taking a first issue of computers with minimum requirements may put everyone wondering what could be the requirements? It would be safe enough to use the 486 or higher processors for a computer to be fast enough with at least 16MB to 64MB MEMORY.

INTRODUCTION TO HTML WHAT IS World Wide Web? The World Wide Web is a network of information resources. The web realize on three mechanism to make the resources readily available to the widest possible audience: 1. A Uniform name is scheme for locating resources on the web (E.g.: URLs) 2. Protocols, for access to named resources over the web (E.g.: - http). 3. Hypertext, for easy navigation among resources (E.g.: - HTML) The ties between the three mechanisms are

- 63 -

apparent throughout this specification. Introduction to URLs Every resource available on the web-TML document, image, video clips, program, etc. Has an address that may be an encoded by a Uniform Resource Locator, or "URL" URLs typically consist of three pieces: 1. The naming scheme of the mechanism used to access the resource. 2. The name of the machine hosting the resource. 3. The name of the resource itself, given as a path. Consider the URL that designates the current html specification: http://www.w3.org//TR/Pr-html4/cover.html This URL may be read as follows: Theyre a document available via an http protocol, residing on the machine www.w3.org Accessible Via the path" TR/Pr- html4/cover.html". Other schemes you may see in HTML documents include "mailto " for E-mail and FTP for FTP. Here is another example if a URL. This one refers to a User's mailbox: This is text.... For all comments, please send E-mail to <A href="mailto:Joe@ omeplace.com> JoeCool</a>. Fragment Identifiers

- 64 -

Some URLs refer to a location within a resource. This kind of URL ends with "#" followed by an anchor identifier (called the "fragment identifier"). Relative URLs A relative URL doesn't contain any naming scheme information. Its path generally refers to a resource on the same on the same machine as the current document. Relative URLs may contain relative path components (".." means one level up in the hierarchy defined by the path), and may contain fragment identifiers. Relative URLs are resolved to full URLs using a base URL. As an example of relative URL resolution, assume we have the base URL http://www.ame.com/support/intro.html. The relative URL in the following markup for a hypertext link: <A href="supplies.html"> Supplies </a> In HTML, URLs play a role in these situations: Linking to another document or resource. Linking to an external style sheet for inclusion in a page. Images objects and applets for inclusion in a page. Image maps. Form submission Frames Citing an external reference. Referring to metadata conventions describing a document.

- 65 -

What is HTML?

- 66 -

To publish information for global distribution, one needs a universally understood language, a kind of publishing mother tongue that all computers may potentially understand. The publishing language used by the World Web is HTML (from HyperTextMarkupLanguage). HTML gives authors the means to: Publish online documents with headings, text, tables, lists, photos, etc. Retrieve online information via hypertext links, at the click of a button. Design forms for conducting transaction with remote services, for use in searching for information, making reservations, ordering products, etc. Include spreadsheets, video clips, sound clip, and other applications directly in their documents. A brief History of HTML HTML was originally developed by Tim Berners-Lee while at CERN, and popularized by the Mosaic browser developed at NCSA. During the course of the 1990s it has blossomed with the explosive growth of the Web. During this time, HTML has been extended in a number of ways. The Web depends on Web page others and vendors sharing the same conventions for HTML. This has motivated joint work on specification for HTML. HTML 2.0 (November 1995) was developed under the aegis of the Internet Engineering Task Force (IETF) to codify common practice in late 1994. HTML+(1993) and [HTML 3.0] (1995)

- 67 -

proposed much richer versions of HTML.Despite never receiving consensus in standard discussions, these drafts led to the adoption of a range of new features. The efforts of the World Wide Web Consortiums Html working group to codify common practice in 1996 resulted in HTML 3.2(January 1997). Most people agree that HTML documents should work well across different browsers and platforms. Achieving interoperability lowers costs to content provides since that must develop only one version of a document. If the effort is not made, there is much greater risk that the Web will evolve into a proprietary world of incompatible formats, ultimately reducing the Web's commercial potential for all participants. HTML has been developed with the vision that all manner of devices should be able to use information on the Web; PCs with graphics displays of varying resolution and color depths, cellular telephones, hand held devices, devices for speech for output and input, computers with high or low bandwidth, and so on. HTML 4.0 HTML 4.0 extends HTML with mechanism for style sheets, scripting, frames, embedding objects, improved support for right to left and mixed direction text, richer tables, and enhancements to forms, offering improved accessibility for people with disabilities. Internalization This version of HTML has been designed with the help of experts in the field of international -libation, so that document may be written in every language and web transported easily

- 68 -

around the world. This has been accomplished by incorporating [RFC2070], which deals with the internationalization of HTML. One important step has been the adoption of the ISO? IEC: 10646 Standard (ISO10646) as the document character set for HTML. This is the world's most inclusive standard dealing with issues of the representation of international characters, test direction, punctuation, and other world language issues. HTML now offers greater support for diverse human languages within a document. This allows for more effective indexing of documents for search engines, higher-quality typography, better text-to-text-speech conversion, correct hyphenation, etc. Accessibility As the Web community grows and its members diversify in their abilities and skills, it is crucial that the underlying technologies be appropriate to their specific needs. HTML has been designed to make Web pages more accessible to those with physical limitations. HTML 4.0 developments in the area of accessibility include: Encouraging the use of style sheets to achieve layout effect. Making it easier to provide alternate descriptions of images for non-visual browsers. Providing labels for form fields.

- 69 -

Providing labeled hierarchical groupings for form fields. Providing the ability to associate a longer text description with an HTML element. Tables Authors now have greater control over structure and layout (e.g., column groups). The ability of designers to recommend column widths allows user agents to display table data incrementally as it arrives rather than waiting for the entire table before rendering. Compound Documents HTML now offers a standard mechanism for embedding generic media objects and applications in HTML documents. The OBJECT element (together with its more specific ancestor elements IMG and APPLET) provides a mechanism for including images, video, sound, mathematics, specialized applications, and other objects in a document. It also allows authors to specify a hierarchy of alternate renderings for user agents that don't support a specific rendering. Style Sheets Style Sheets simplify HTML markup and largely relieve HTML of the responsibilities of presentation. They give both authors and users control over the presentation of documents-font information, alignment, colors, etc. The mechanism for associating a style sheet with a document is independent of the style sheet language. Before the advent of style sheets, authors and had limited control over rendering. HTML 3.2 included a number of

- 70 -

attributes and elements offering control over alignment, font size, and text color. Authors also exploited tables and images as a means for laying out pages. The relatively long time it takes for users to upgrade their browsers means that these features will continue to be used for some time. However, since style sheets often more powerful presentation mechanisms, the World Wide Web consortium will eventually phases out many of HTML's presentation elements and attributes. COMPONENTS OF WWW: WEBPAGE: The part of the Web the user sees the front-end" is known as a Web page, made up of links, images, navigation tools text, etc. Web documents are files of information residing at a Web site. These documents are usually coded in HyperTextMarkupLanguage (HTML) HOME PAGE: Home page is the first page of web documents. Home page is the entry point for that particular WWW site. Also, home page is the page a browser loads. Every browser has its own home page. However, the default homepage for a browser can be changed. LINK: A link can be anything on a page such as text or graphics, is a gateway to another page within the sight, sore to an entirely different site. WEB SITES: -

- 71 -

A group of related pages is a site. They are the pages to go on he Web. Companies, Government agencies, institutions, individuals, etc maintain the web sites. WEB SERVERS: Web sites are housed on a server, which is a computer design to "serve" the file up to the user in a proper format. It is also refer to as the "Back-end" and is actually software that runs at a web site and returns web documents upon request by the web browser. Servers run all the time and wait for users to request information. The web gets its name, in fact, from the interdependent network of servers worldwide. The user's computer is a terminal, or end point, in this network. HEPERTEXT: The operation web realizes on hypertext as its means of interacting with users. Hypertext is basically the same regular text- it can be stored read, searched or edited- with an important extension: Hypertext contains connections with in the text to other documents. This new text would themselves have links and a connection to others documents. Continually selecting Hypertext is like taking a free-associative tool of information. In this way, hypertext links, called hyper links, can create a complex virtual web of connections. GATEWAY PROGRAMS: Programs that accept and process request from a web server and generate new web pages. These programs add a new level of interactivity on the web not possible by simple HTML documents. These programs usually

- 72 -

OVERVIEW OF MYSQL
MySQL is one of the most exciting programs first created and marketed for large main frame computers and mini computers over more than 10 years. MySQL relational database management system has improved full featured SQL based database system.

Features of mysql MySQL products are based on a concept called client server technology. This concepts involve segregating the processing of an application between two systems one perform all activities related to the database (server) and the other performs activities that help the user to interact with the application (client). A client or front-end database application also interacts with the database by requesting and receiving information from the 'database server'. It acts as an interface between the user and database. Further, it also checks for validation against the data entered by the user. The Database Server or back end is used to manage the database tables optimally among multiple clients who concurrently request the server for the same data. It also enforces data integrity across all client applications and controls database access and other security requirements. SQL supports the following commands:

- 73 -

Data Definition language Commands: Create, Alter, Drop Data Manipulation language Commands: Insert, Select, Delete,

Update. Data Control Language Commands: Grant ,Revoke Transaction Control Language Commands: Commit, Save point , Rollback Commands PL/SQL(Procedure Language/SQL) : PL/SQL is an extension of SQL. The SQL statements seen so far are primitive and could be used to provide outputs for simple operations. When the operations become complex, it becomes inevitable to combine these statements in producing the result. So, MySQL introduces the procedural language PL/SQL, which helps in building a program that could be compiled and executed. PL/SQL block can contain any number of SQL statements integrated with flow of control statements. Thus PL/SQL combines the data manipulating power of SQL with flow of control statements integrated with of control statements. Thus PL/SQL combines the data manipulating power of SQL with date processing power of procedural language. ADVANTAGES OF PL/SQL : Procedural Capabilities Improved Performance Enhanced Productivity Portability Integration with RDBMS

- 74 -

Data Export Options


Once you have connected to a database, the export option is available from the Tools menu, or simply click the Export button in the toolbar to open the export data dialog. Data Export Formats DatabaseSpy2010 supports five formats for data export:

XML Each row in the table is exported with an identifying <Row> XML element and each column entry is identified by an XML element that matches the column name. This format also includes a commented header documenting the SQL SELECT statement used to retrieve the data. XML Structure Each row in the table is exported with an identifying XML element that matches the exported table name. This lets you preserve table hierarchies and relationships when you export from more than one database table. CSV Each row is exported as plain text, with multiple delimiter and newline options. HTML Each row is exported with HTML coding to form an HTML table that can be opened in a Web browser or incorporated into a larger HTML page. Excel Each row is exported directly to a Microsoft Excel spreadsheet file.

DatabaseSpy2010 allows you to fine tune the content of the output with special refinement options for each format.

Data Export Source


- 75 -

DatabaseSpy2010 gives you complete control over the source data selected for export. You can select any table or view from any connected database. As you browse the hierarchy of your database in the export source window, you have the same Layouts, Filters, Favorites, and the Object Locator features available in the Online Database Browser to simplify navigation of the database structure. You can also switch the source window from a database hierarchy to a SQL display. If you select one or more tables for output, then switch to SQL Source, DatabaseSpy2010 displays the SQL query it will use to retrieve data. You can edit the query in the Source window if you like, or paste SQL statements copied from the DatabaseSpy2010 SQL Editor window. When youre working in the SQL Editor you even have a dedicated Export button to let you instantly open an export dialog box pre-loaded with your current SQL Editor statements. This lets you construct a specialized SQL query, test it in the SQL editor, and conveniently export the resuilts in any of the five supported export formats.

Data Export Destination


The destination section of the export dialog lets you specify the path for output files, as you would expect. If your selected format is XML, XML Structure, CSV, or HTML, you can also export directly to Altova XMLSpy. If you select multiple tables or views for export, each is written to a separate file.

MySQL Security
- 76 -

MySQL security works by limiting both the users who have access to a database and what they are allowed to do once they have access. This requires careful consideration of issues such as who is allowed to read from or write to particular database tables and which users have permission to delete tables or use other MySQL features.

security requirements: In order to achieve the highest possible level of security, the installation and configuration of MySQL should be performed in accordance with the following security requirements:

MySQL database must be executed in a chrooted environment; MySQL processes must run under a unique UID/GID that is not used by any other system process; Only local access to MySQL will be allowed; MySQL roots account must be protected by a hard to guess password; The administrators account will be renamed; Anonymous access to the database (by using the nobody account) must be disabled; All sample databases and tables must be removed.

MySQL privileges and user security


The MySQL privilege system ensures that all your users can perform only the operations that are allowed to them. When you connect to a MySQL server, your identity is determined by the host system that you are connected to and the user ID that you specify. When you issue SQL statements after connecting, MySQL access control grants privileges according to your identity and what you want to do.

- 77 -

MySQL access control performs the following stages when you are running a client program that connects to the MySQL server:

Stage 1: The MySQL server checks whether you are allowed to connect. Stage 2: The MySQL server checks each SQL statement that you issue to determine whether you have sufficient privileges to perform the operation.

MySQL provides the following tools that you can use to administer MySQL, work with MySQL databases, run queries, and so on:

MySQL Administrator MySQL Query Browser.

- 78 -

Future Development

At this stage of time when the whole world is running after advanced technology in every aspect of life and to comfort mans life these small electronic machines like computers have become as indispensable part of our lives. The project Customer Care Management System covers various information required by user. In future we hope that this demonstration model can be further improved so that it will define more things about Customer Care Management System so the users are further benefited. We can also implement forum to discuss, discussion between technical people of the company and the end user. We can also implement online payment system, through which people can make their payment. The payment which occurred due the usage of Customer Care Management System.

- 79 -

- 80 -

TESTING
This section deals with the details of the classes of tests which must be conducted to validate the functions, performance, and the constraints. This is achieved basically by the means of testing which plays a vital role in the development of the software. The various low level testing which can be grouped on a broader sense are discussed as below: Unit Testing: Testing of each and every module individually is called unit testing. Each module is designed and executed so that it works independently and generates some relative output. Unit testing of a module results in a set of individually executing modules that generates its independent output. The modules in this project i.e. purchases, sales, returns, cash and bank transactions, stock status and others are individually tested. Integration Testing: Integration testing is one in which the modules are combined with one another to synchronize the outputs and coordinate the flow of control. Each module is coalesced with other module to establish proper connectivity between the two modules. All the individual modules have been integrated and tested. Validation Testing: Validation testing deals with testing that whether the validations are justified and all the requirements are fulfilled logically as per the requirements as the validations are designed according to the requirements of the application an approach to the problem in a logical and relational manner. All the validation testing have been done (like only the numbers should be accepted in the phone number , amount , bill no fields ,quantity and

- 81 -

other related fields, similarly for the text to accepted only in related fields like the names and other related fields). The stock validation is the major validation that keeps track of the products dealt and the reorder levels. System Testing: Testing the whole system i.e. verifying and validating the whole source code to check if the system as a whole is executing is called system testing. The proposed system undergoes it under all conditions to be called a successful system.

Notes All testing has been carried out using some sample data. Each section in the remainder of this document has lists of test criteria that must be satisfied for the system to have passed that section of testing. In front of the each criteria test Passed or Failed is written.

Unit Testing The purpose of unit testing is to uncover errors in the smallest software unit -- the routine. Each routine will be tested individually using black boxoriented tests. The programmer of each module will design a set of test cases for that module and ensure that the module is fully tested. Important or complex routines will also be tested by at least one other person.

- 82 -

Integration Testing This section describes the integration strategy and procedures for the system. It gives the order in which modules will be developed and how they will be integrated. It also describes the specific tests that will be performed on integrated sets of modules. Note: It is important that each module be thoroughly tested as a unit before being integrated with other modules. Integration testing of unit tested modules is necessary to ensure that:

modules interface correctly with each other; one module does not have inadvertent, undesirable effects on another module; sub modules (routines) combine to produce the desired functions of the major module; Interfaces to, and use of global data structures are consistent.

- 83 -

System Testing Functional Requirements Testing The functionality tests should be performed by the application

representatives and treat the whole system as a black box using the actual applications or middleware. The aim of these tests is to verify the overall functionality of the system. This will be performed by a section by section walkthrough of the SRS functional requirements section. All functional requirements in the SRS must be fulfilled. Performance and Stress Testing A set of tests have been developed for performance and stress testing. Performance tests will ensure that the system responds in a reasonable time to user input (as defined in the SRS). The aim of stress testing is to try to break the program by giving it abnormal or extreme input quantity, frequency or volume. Performance testing will be performed at the client's site after installation. According to the SRS: The system must respond to all reports within 10 seconds on an Pentium IV computer with a load average less than 1. Performance criteria satisfied.

- 84 -

About Us: We Umashankar Kumar and Govindaraj H. R. the final year computer science students (BCA) of Vivekananda COLLEGE of Science, commerce & arts college are simulating the project Customer Care Management System which is based on Visual Basic Program. Customer Care Management System project defines the various information of student details, test dates, test marks, exam dates and exam marks of student. We are completed this project Customer Care Management

System successfully.

Thanking You..

- 85 -

- 86 -

CONCLUSION
Computer is the magic word of todays world. The object of Customer Care Management System project is to harness the power of the computer for our practical and potential need. This report expected to extensively cover this concept and plant a seed of inquisitiveness in the minds of the users.

We are thankful to all the people who have given us their hearty support in this endeavor, we again thank out college for providing us all the facilities and thanks to our beloved Coordinator Ms Aruna and to our guide Sri. Nagaraj M. L

- 87 -

REFERENCE

1. Master in Visual Basic, Concepts and Code, Dan Appleman 2. Visual Basic.Net Programming , Den Clark 3. Learning Visual Basic Step by Step , Jesse Liberty 4. Website : en.wikipedia.org/wiki/Visual_Basic

5. Website : www.vbtutor.net 6. Website : msdn.microsoft.com Visual Studio Developer Center Languages

- 88 -

- 89 -

- 90 -

Login Form

- 91 -

- 92 -

Welcome Form

Private Sub Form_Load() I=1 End Sub Private Sub Timer1_Timer() I=I+1 If I > 5 Then Timer1.Enabled = False Unload Me LoginForm.Show End If End Sub

- 93 -

Vous aimerez peut-être aussi