Vous êtes sur la page 1sur 87

ONLINE APPLIANCES HIRE

PROJECT REPORT
Submitted in partial fulfillment of the requirement for the award of the Degree of

BACHELOR OF COMPUTER APPLICATIONS


Submitted by
RESHMI.A.M
REGISTER. No: 16MCAL017

Under the Guidance of


[Mr./ Ms. Initial. Guide Name. Qualification]

eg. M.Bhuvaneswari, M.CA, M. Phil

[Designation]

(eg. Assistant Professor, Dept of Computer Applications)

DEPARTMENT OF COMPUTER APPLICATION


CMS COLLEGE OF SCIENCE & COMMERCE
(AUTONOMOUS)
Re-Accredited at the ‘A’ level by NAAC, with CGPA of 3.53 out of 4

(Affiliated to Bharathiar University)

Coimbatore – 641 049

OCTOBER -2018
CERTIFICATE
DEPARTMENT OF COMPUTER APPLICATION
CMS COLLEGE OF SCIENCE & COMMERCE
(AUTONOMOUS)
Re-Accredited at the ‘A’ level by NAAC, with CGPA of 3.53 out of 4

(Affiliated to Bharathiar University)

Coimbatore – 641 049

CERTIFICATE
This is to certify that the Project work entitled

ONLINE APPLIANCES HIRE


is a bonafide original record of work done by

RESHMI.A.M
16MCAL017

in partial fulfillment of the requirements for the award of the degree of

BACHELOR OF COMPUTER APPLICATIONS

Submitted for Viva - Voce Examination held on _______________

Countersigned

_______________________ ________________________

Project Guide HOD

____________________ ________________________

Internal Examiner External Examiner


PROJECT COMPLETION CERTIFICATE

For students doing project in CMS College,


the certificate will be provided by the college through
Department of computer Applications.
DECLARATION
DECLARATION

“Ms. RESHMI.A.M [Reg.No: 16MCAL017]” hereby declare that the project work entitled

“ONLINE APPLIANCES HIRE

”developed at CMS College of Science & Commerceand submitted to Bharathiar University,


Coimbatore in partial fulfillment of the requirements for the award of the degree of
BACHELOR OF COMPUTER APPLICATIONS, is a record of original project work done
by me during the period of [2013–2016], under the supervision and guidance of Mr./ Ms Initial.
Guide Name, Qualification., Designation, School of Computer Science, CMS College of
Science & Commerce, Coimbatore

Signature of the candidate

Place: Coimbatore -49 RESHMI.A.M

Date: (Reg. No: 16MCAL017)


ACKNOWLEDGEMENT
ACKNOWLEDGMENT

I amvery much grateful to t he Almighty who has helped me all the way through the project and
who has moulded me into what I’m today.

I have been fortunate enough to be able to secure co-opération, guidance and assistance from
a number of people. I am at a loss of how to express the deep sense of gratitude I have
towards all of them. I am greatly indebted to our PRINCIPAL
Dr. S.SANDHYA MENON M.Com.,M.B.A.,Ph.Dwho has given me the permission for the
fulfilment of this venture.

I wouldlike to express my sincere gratitude to Mrs. M. Bhuvaneswari, M.C.A., M. Phil.,


Head of the Department, Dept of Computer Applications, CMS College of Science &
Commerce, for his invaluable support and guidance during my project.

I would like to express my deep sense of gratitude to my guide Mr./Ms. GUIDE NAME,
Qualification, Designation, Dept of Computer Applications, for the valuable encouragement and
guidance he/she had given me for the successful completion of this project. I am grateful to
him/her in all the ways.

I would like to express my heart feel gratitude to all other faculty members, School of
Computer Science, for their guidance and support throughout my project.

Last but certainly not the least I would like to express my deep sense of gratitude to my family
members and beloved friends for their moral support and encouragement without which I would not have
been able to follow my dreams.

RESHMI.A.M
SYNOPSIS
SYNOPSIS

“Online Appliances Hire” is a web based project which is made for remote-hire purchase
through internet as the technology is being advanced the way of life is changing accordance .now
a days we can place the order for anything from our home. There is no need to go the shop of the
things we want. The order can be placed online through internet. The payment confirmation of
purchasing everything we want. Now we can think that how the days have been changed with
time. The registered customers can view the details of home appliances. They can pay
instalments according to the product requirements.
The software use PHP as front end software and MYSQL as Back end software.
The proposed system helps the user to choose products as per his/her wish. There are huge
collection home appliances in the system the user can purchase home appliances through online.
And also payment through online and also other payment options is also there. The user can
track their product details using their tracking code. In addition the site also provides instalment
schemes for the home appliances.

The project consists of major five modules. The first module is Administrator. Administrator has
the permission to control the overall system. He/she manages the products (Computers, Fitness,
laundry, etc.) and also manages home appliances details of particular item. He can also receive
the orders from customer. Customer is an authorized user. They get a unique user id and
password at the time of registration. Using that user id and password user must login to this
system to view home appliances of particular product. Product details will display to the
customer by selecting required home appliances from the given list. Now customer has to fill
order request form to get the required home appliances. Search module helps the user to view
home appliances with specified requirements they want. This helps the customer to easily search
the home appliances as their needs instead of viewing all home appliances. Order module helps
to order. After viewing the home appliances the customer can place the order through online by
filling a order request form. At the time of ordering a home appliances the customer get a
tracking Id. This helps the user to track their ordered items location payment module includes the
details of payment. While buying product through online customer has different payment
options. They can view their instalment, Balance amount to be Paid etc.

CONTENTS
CONTENTS

CONTENT PAGE NO

1. INTRODUCTION 1
1.1 OVERVIEW OF THE PROJECT
2
1.2 MODULE DESCRIPTION
2. SYSTEM ANALYSIS 2

2.1 EXISTING SYSTEM


4
2.2 PROPOSED SYSTEM
2.3 HARDWARE SPECIFICATION 5

2.4 SOFTWARE SPECIFICATION 5


3. SYSTEM DESIGN
6
3.1 INPUT DESIGN
3.2 OUTPUT DESIGN 7
3.3 DATABASE DESIGN
7
4. SYSTEM TESTING
4.1 SYSTEM TESTING 11
5. SYSTEM IMPLEMENTATION AND MAINTAINANCE
12
5.1 SYSTEM IMPLEMENTATION
5.2 SYSTEM MAINTENANCE 14
6. SCOPE FOR FUTURE DEVELOPMENT
15
7. CONCLUSION
8. BIBLIOGRAPHY 16

9. APPENDIX
16
9.1 DATA FLOW DIAGRAM
9.2 PROCESS DIAGRAM 17

9.3 SAMPLE CODING 19


9.4 SCREENSHOTS
INTRODUCTION
1. INTRODUCTION

1.1 OVERVIEW OF THE PROJECT

The central concept of the application is to allow the customer to shop virtually using the
Internet and allow customers to buy the items and articles of their desire from the store. The
information pertaining to the products are stored on an RDBMS at the server side (store). The
server process the customers and the items are shipped to the address submitted by them.
The application was designed into five modules-first is for the customers who wish to buy the
home appliances. Second is for the admin who maintains and updates the information
pertaining to the appliances and those of the customer’s .Search module helps the user to view
home appliances with specified requirements they want. This helps the customer to easily
Search the home appliances as their needs instead of viewing all home appliances. Order
module helps to order after viewing the home appliances the customer can place the order
through online by filling a order request form. At the time of ordering a home appliances the
customer get a tracking Id. This helps the user to track their ordered items location payment
module includes the details of payment. While buying product through online customer has
different payment options. They can view their instalment, balance amount to be paid etc.

1.2 SOFTWARE DESCRIPTION

1.2.1 SOFTWARE TOOLS USED

Software selection is an important work in a project development cycle. Software must be


selected in accordance with the application and the latest technology available. My choice is
PHP, HTML, JAVA SCRIPT and JQuery as Front end and MYSQLas back end.
FRONT END

PHP

PHP is a programming language that is used mostly for building interactive websites. It is an
open-source server-side scripting language. Instead of a PHP Program running on a desktop computer for
the use of one person, it typically runs on a web server and is accessed by lots of people using web
browsers on their own computers.

Server side scripting languages makes it possible to create advanced web sites. This page
contains descriptions of the most common scripting languages available in web hosting accounts. For
making advanced dynamic web sites, we need some kind of server side scripting. Server side scripts are
programs that are executed on the server, and can be used in many ways. Template based web sites and
shopping carts are just two examples. The languages used for these tasks are normal programming
languages with special libraries/packages for server side scripting.

When someone visits our PHP webpage, our web server processes the PHP code. It then sees
which parts it needs to show to visitors (content and pictures) and hides the other stuff (file operations,
math calculations, etc.) then translates our PHP into HTML. After the translation into HTML, it ends the
webpage to our visitor's web browser.

HTML

Hyper Text Markup Language is a scripting language used for writing data in web pages. It
specifies the layout and linking commands present in the hypertext documents themselves. The word
hypertext refers to the non-linear information on the document, which helps to navigate through the
pages. HTML was invented by Tim Burners LEE at CERN, the European laboratory for practical physics
in Geneva. An HTML document is a plain ASCII text file created using any text editor with codes
inserted in the text to define elements in the document. Users have to provide formatting through their
browser platform combination. HTML publishing tools are used for making web pages in the net.

Markup is the process of taking extra ordinary text and extra signals. Each of the signals used by
the markup in the HTML is a command that tells the browser how to display the text. HTML defines the
structure of a particular type of document via what is called a document type definition. It is a simple
language used to design and describe the layout of web page. HTML also supports multimedia and
document links HTML consists of special codes which embedded in text, adds formatting.
JAVA SCRIPT

Java script is a very new language-even newer than Java. Despite its newness it has attracted
great attention because of its expressive power. Java script is having the power in order to create more
attractive, dynamic and interesting web pages. No programming knowledge is required to write java script
but some knowledge of html and web page authoring is assumed. No experience with java script is
required, either using java script we can create web pages and wish to enliven and enhance them.

JavaScript is mostly used for client side scripting. It is mainly used for validating the user
input. Invalid user input will either cause the data to be sending back from the web server to the browser
or give rise to an error message.

JavaScript is an object-oriented language that allows creation of interactive web pages. JavaScript allows
users entries, which are loaded in to an HTML form to be processed as required. This empowers a web
site to return side information according to user’s requests. JavaScript is a scripting language.

JavaScript is traditionally embedded into a standard HTML program. It embedded between the
<SCRIPT>…. </SCRIPT> HTML tags. JavaScript is embedded in to an HTML program because
JavaScript uses the file name html and the HTTP protocol to transport itself from the web server to the
client’s browser where the JavaScript executes and process client information. Only a browser that is
JavaScript enabled will be able to interpret JavaScript code.

jQuery

jQuery is a new kind of JavaScript Library. It is fast and concise JavaScript Library that
simplifies HTML document traversing, event handling, animating, and Ajax interactions for rapid web
development. jQuery is designed to change the way that we write JavaScript.

FEATURES

Features of PHP

 Standard CGI, FastCGI and Apache module support - As a standard CGI program, PHP can be
installed on any UNIX machine running any UNIX web server. With support for the new
FastCGI standard, PHP can take advantage of the speed improvements gained through this
mechanism. As an Apache module, PHP becomes an extremely powerful and lightning fast
alternative to CGI programming.
 Access Logging - With the access logging capabilities of PHP, users can maintain their own hit
counting and logging. It does not use the system's central access log files in any way, and it
provides real-time access monitoring. The Log Viewer Script provides a quick summary of the
accesses to a set of pages owned by an individual user. In addition to that, the package can be
configured to generate footer on every page which shows access information. See the bottom of
this page for an example of this.
 Access Control - A built-in web-based configuration screen handles access control configuration.
It is possible to create rules for all or some web pages owned by a certain person which place
various restrictions on who can view these pages and how they will be viewed. Pages can be
password protected, completely restricted, logging disabled and more based on the client's
domain, browser, e-mail address or even the referring document.
 PostgresSQL Support - Postgres is an advanced free RDBMS. PHP supports embedding
PostgreSQL "SQL queries" directly in .html files.
 RFC-1867 File Upload Support - File Upload is a new feature in Netscape 2.0. It lets users upload
files to a web server. PHP provides the actual Mime decoding to make this work and also
provides the additional framework to do something useful with the uploaded file once it has been
received.
 HTTP-based authentication control - PHP can be used to create customized HTTP-based
authentication mechanisms for the Apache web server.
 Variables, Arrays, Associative Arrays - PHP supports typed variables, arrays and even Perl-like
associative arrays. These can all be passed from one web page to another using either GET or
POST method forms.
 Conditionals, While Loops - PHP supports a full-featured C-like scripting language. We can have
if/then/elseif/else/endif conditions as well as while loops and switch/case statements to guide the
logical flow of how the html page should be displayed.
 Extended Regular Expressions - Regular expressions are heavily used for pattern matching,
pattern substitutions and general string manipulation. PHP supports all common regular
expression operations.
 Raw HTTP Header Control - The ability to have web pages send customized raw HTTP headers
based on some condition is essential for high-level web site design. A frequent use is to send a
Location: URL header to redirect the calling client to some other URL. It can also be used to turn
off cacheing or manipulate the last update header of pages.
 On-the-fly GIF image creation - PHP has support for Thomas Boutell's GD image library which
makes it possible to generate GIF images on the fly.
 ISP "Safe Mode" support - PHP supports an unique "Safe Mode" which makes it safe to have
multiple users run PHP scripts on the same server.
 It's Free! - One final essential feature. The package is completely free. It is licensed under the
GNU/GPL which allows you to use the software for any purpose, commercial or otherwise.

Features of JavaScript

A Great Programming Tool for HTML:


Professional Web designers are undoubtedly adept in using HTML and proficient in
website design but not necessarily skillful in computer programming. JavaScript is a
programming tool for such a situation. JavaScript is a powerful scripting language that helps
HTML designers to effectively and interactively design websites and web pages in a very simple
and efficient way.

Handles Dynamic Effects:


JavaScript is such a powerful scripting language which has features to achieve dynamic
effects in web pages. Using the features available in JavaScript, the designer can decide to have
dynamically placed text at run time

Browser Detection:
One of the powerful feature of JavaScript is its ability to detect client browser. Browser
detection feature of JavaScript helps to achieve independent platforms. JavaScript can detect the
type of browser the visitor is using and programatically switch the page to show customised
pages designed for different browsers. Thus by making use of browser detection feature of
JavaScript, the designer gets better control over the browser.

Saves Time:
JavaScript also has the feature of validating data submitted at the client level. This helps
in saving the processing time of the server because JavaScript initially creates the validation on
the client side.

DOM:
Client side JavaScript is embedded inside HTML This embedded JavaScript is used along
with DOM (Document Object Model) for control over the browser by means of objects.
Popular Scripting language:
JavaScript has simple rules and procedures that make it easier to use and learn for
programmers. This has made JavaScript a popular client-side scripting language.

Interpreted Language: It is an interpreted language, meaning that it can be used or executed with ease
without pre-compilation

Back End
Mysql

Database
A database is a separate application that stores a collection of data. Each database has one
or more distinct APIs for creating, accessing, managing, searching and replicating the data it
holds.
Other kinds of data stores can be used, such as files on the file system or large hash tables in
memory but data fetching and writing would not be so fast and easy with those types of systems.
So nowadays, we use relational database management systems (RDBMS) to store and manage
huge volume of data. This is called relational database because all the data is stored into different
tables and relations are established using primary keys or other keys known as foreign keys.
A Relational DataBase Management System (RDBMS) is a software that:

 Enables you to implement a database with tables, columns and indexes.


 Guarantees the Referential Integrity between rows of various tables.
 Updates the indexes automatically.
 Interprets an SQL query and combines information from various tables.

RDBMS Terminology:
Before we proceed to explain MySQL database system, let's revise few definitions related to
database.

 Database: A database is a collection of tables, with related data.


 Table: A table is a matrix with data. A table in a database looks like a simple
spreadsheet.
 Column: One column (data element) contains data of one and the same kind, for
example the column postcode.
 Row: A row (= tuple, entry or record) is a group of related data, for example the data of
one subscription.
 Redundancy: Storing data twice, redundantly to make the system faster.
 Primary Key: A primary key is unique. A key value can not occur twice in one table.
With a key, you can find at most one row.
 Foreign Key: A foreign key is the linking pin between two tables.
 Compound Key: A compound key (composite key) is a key that consists of multiple
columns, because one column is not sufficiently unique.
 Index: An index in a database resembles an index at the back of a book.
 Referential Integrity: Referential Integrity makes sure that a foreign key value always
points to an existing row.

MySQL Database:
MySQL is a fast, easy-to-use RDBMS being used for many small and big businesses.
MySQL is developed, marketed, and supported by MySQLAB, which is a Swedish
company. MySQL is becoming so popular because of many good reasons:

 MySQL is released under an open-source license. So we have nothing to pay to use it.
 MySQL is a very powerful program in its own right. It handles a large subset of the
functionality of the most expensive and powerful database packages.
 MySQL uses a standard form of the well-known SQL data language.
 MySQL works on many operating systems and with many languages including PHP,
PERL, C, C++, JAVA, etc.
 MySQL works very quickly and works well even with large data sets.
 MySQL is very friendly to PHP, the most appreciated language for web development.
 MySQL supports large databases, up to 50 million rows or more in a table. The default
file size limit for a table is 4GB, but we can increase this (if our operating system can
handle it) to a theoretical limit of 8 million terabytes (TB).
 MySQL is customizable. The open-source GPL license allows programmers to modify
the MySQL software to fit their own specific environments
SYSTEM ANALYSIS

2. SYSTEM ANALYSIS

2.1 EXISTING SYSTEM

As for now, there is no present system working for making the Hire Purchase Systems
normally. All the buying and selling of the Home Appliances is done through a Appliances
Showroom. Usually these stores contain many items from which customers can choose their
required item. The stores are managed by people and the manager of the store takes care of
the selling buying and other customer related things. The present working can be
summarized in the following way: Customer goes to a Appliances Showroom which is
convenient to them. Items in the store are normally arranged by their types and price. He
chooses from the collection of items, where the items are labelled by their price and
occasionally. Only User can view only the products in the Store. Sometimes User does not
get Appliances as per his/her requirements.

2.1.1 DRAW BACKS OF EXISTING SYSTEM

1. The Current Hire Appliance Shopping is only through direct shopping. It is very
time consuming process.
2. In Existing Hire Appliance Shopping users go directly to shop for purchasing. It is
very expensive.
3. In existing hire appliance shopping sales person persuade the user to buy more or
buy other things when a specific Product is not available
4. We can purchase Home Appliances only on Showroom’s working times.
2.2 PROPOSED SYSTEM

The Proposed System helps the user to choose products as per his/her wish there are huge
collection Home Appliances in the system. The user can purchase Home Appliances through
online Payment through online and also other payment options are also there. The user can
track their product details using their tracking code. In addition the site also provides
instalment schemes for the Home Appliances.

2.2.1 ADVANTAGES OF PROPOSED SYSTEM

1. Lower prices: Many consider that the prices of items available in the more conventional
brick & mortar stores are more affordable than those in online stores, But this was long ago.
Now that there are probably thousands (if not more) of online stores, the prices are getting
more competitive, not only between online stores, but also their offline counterparts. Many
online sellers understand that customers always compare prices before making a purchase.

2. It is quick: One of the biggest benefits of Online Appliances Hire is the fast process of
finding specific merchandise. We can of course browse through different counters in malls
to find things we want, but in an online store, all we have to do is type some words in the
search box. People with tight schedule everyday can shop online without disrupting their
daily activities as well.

3. Items availability: When we are buying a home appliance in a home appliance


showroom, there is big chance that we cannot find the items we want because the store runs
out of stock, so we have to wait until next week to buy them. Online stores do not have such
drawback; even when one store runs out of stock, we can easily switch between stores by
few clicks easily.
4. Non persuasive and discreet: Hire Appliance System do not hire any salesperson to
persuade us to buy more or buy other things when a specific product is not currently
available. There are indeed banners or promotional codes in online stores, but we can
dismiss them easily. Moreover, there is no awkward moment when we buy personal
needs for examples very large clothes or underpants.
2.3 FEASIBILITY STUDY

Feasibility study is made to see if the project on completion will serve the purpose of
the organization for the amount of work, effort and the time spent on it. Feasibility study
lets the developer foresee the future of the project and the usefulness. A feasibility study of
a system proposal is according to its workability, which is the impact on the organization,
ability to meet their user needs and effective use of resources. Thus when a new application
is proposed it normally goes through a feasibility study before it is approved for
development.

The document provide the feasibility of the project that is being designed and lists
various areas that were considered very carefully during the feasibility study of this project
such as Technical, Economic and Operational feasibilities.

The following are its features.

The key considerations involved in the feasibility are:

 Technical feasibility

 Economic feasibility

 Operational feasibility

 Behavioural feasibility.

Technical Feasibility

The system must be evaluated from the technical point of view first. The assessment
of this feasibility must be based on an outline design of the system requirement in the terms
of input, output, programs and procedures. Having identified an outline system, the
investigation must go on to suggest the type of equipment, required method developing the
system, of running the system once it has been designed.
The project should be developed such that the necessary functions and performance
are achieved within the constraints. The project is developed within latest technology.
Through the technology may become obsolete after some period of time, due to the fact that
newer version of same software supports older versions, the system may still be used. So
there are minimal constraints involved with this project. The system has been developed
using Java. The project is technically feasible for development.

Economic Feasibility

The developing system must be justified by cost and benefit. Criteria to ensure that effort is
concentrated on project, which will give best return at the earliest. One of the factors, which
affect the development of a new system, is the cost it would require.

Operational Feasibility

Operational Feasibility is consideration about the working of the system after the
installation of the system. The computerization will increase the operational efficiency of
the employees.

The purpose of the operational feasibility study is to determine whether the new
system will be used, if it is developed and implemented. And whether there will be
resistance from users that will undermine the possible application benefits. There was no
difficulty in, implementing the system and the proposed system is so effective, user friendly
and functionally reliable so that the users in the company will find that the new system
reduce their hard-steps. If the users of the system are fully aware of the internal working of
the system, then the users will not be facing any problem in running the system.

Behavioural Feasibility
This includes the following questions:
 Will the proposed system cause harm?

 Is there sufficient support for the users?

The project would be beneficial because it satisfies the objectives when developed and
installed. All behavioural aspects are considered carefully and conclude that the project is
behaviourally feasible.

2.4 HARDWARE SPECIFICATION

 Processor : Intel(R) Core(TM) i3 CPU


 RAM : 1 GB
 Hard Disk : 2 GB
 Monitor : 15”
 KeyBoard : 104 keys
 Mouse : Optical

2.5 SOFTWARE SPECIFICATION

 Operating System : Windows, Linux


 Web Browsers : IE, Firefox, Chrome, Mozilla, Opera
 Web Server : Apache 2.0
 Front End : PHP
 Back End :MySql
SYSTEM DESIGN

3. SYSTEM DESIGN

3.1 INPUT DESIGN

Input design is a part of overall system design, which requires careful attention. It is the
process of converting user-originated inputs to a computer-based format. The major objective of
the input design is to make data entry easy, logical and error free.

In PHP, input to the system is entered through forms. A form is “any surface on which
information is to be entered, the nature of which is determined by what is already on the
surface”. If the data going into the system is incorrect, then processing and output will magnify
these errors. So designer should ensure that form is acceptable and understandable by the user.

This application has been developed in a user-friendly manner. The layout of the form is
made in such a way that the user will not find any difficulty in going from one field to other by
just pressing the tab. During the processing the cursor is placed in the position where the data
must be entered.

The user is also provided with an option of selecting an appropriate input from a list of
values. Necessary dropdown list boxes and combo boxes are included for necessary fields so that
the user need not remember all the data and can just select from it.

Validation is made for each and every data entered. Help messages are also provided
whenever the users enter a wrong data into a particular field. This makes the user to understand
what is to be entered, moreover whenever an erroneous data is entered the error message is
displayed and the user can move to the next field only after entering the correct data.

The clear label for the menus and fields are also provided. Consultations are provided so
that a user can view the details of any process at any time.

3.2 OUTPUT DESIGN

One of the most important features of a system for users is the output it produces. Output
design should improve the system’s relationship with the user and help in decision-making.
Considering the future use of output required, and depending on the nature, it is displayed on the
monitor for immediate need of obtaining the hard copy.

The objective of output design is to define the controls and format of all printed
documents and reports and of screens that will be produced by the system. Computer output is
the most important and direct source of information to the user.

Objectives of Output Design

1. Design output to serve the intended purpose.

2. Deliver the appropriate quality of output.

3. Choose the right output method.

4. Provide output on time.

Output, generally refers to the results that are generated by the system. The output of the
system is designed so as to include number of reports. Reports reflect the output design.
3.3 DATABASE DESIGN

The activity deals with the design of the database. A key is to determine how the access
paths are to be implemented. A physical path is derived from a logical path. The general theme
behind database is to handle information as a whole. A database is a collection of interrelated
data stored with minimum redundancy to serve many users quickly and efficiently.

The general objective is to make information access easy, quick, inexpensive and
flexible for the user. Database design is the most critical part of the design phase. An elegantly
designed, well-defined database is a strong foundation for the whole system. Files in a relational
database are called as tables. Columns of tables represent data and rows represent the records in
conventional technology.

3.4 CODE DESIGN

Login.php

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"


"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />

<title></title>

<meta name="keywords" content="" />

<meta name="description" content="" />

<link href="http://fonts.googleapis.com/css?family=Open+Sans:400,300,600|Archivo+Narrow:400,700"
rel="stylesheet" type="text/css" />

<link href="default.css" rel="stylesheet" type="text/css" media="all" />

<style type="text/css">

<!--
.style16 {color: #FFFF33}

-->

</style>

//<!--[if IE 6]>

<link href="default_ie6.css" rel="stylesheet" type="text/css" />

<![endif]--></head>

<body onload="document.form1.txtusername.focus();">

<div id="header" class="container">

<div id="logo">

<h1 class="style2"><span class="m1">SINGLE POINT </span></h1>

<h1 class="style2"><span class="style16">SNARE PORTAL</span></h1>

</div>

<div id="menu">

<ul>

<li><a href="index.php" accesskey="2" title="">HOME PAGE</a></li>

<li class="active"><a href="login.php" accesskey="1" title="">LOGIN</a></li>

<li><a href="register.php" accesskey="5" title="">register</a></li>

<li><a href="about.php" accesskey="2" title="">About Us</a></li>

<li><a href="contact.php" accesskey="5" title="">Contact Us</a></li>

</ul>

</div>

</div>

<div id="wrapper">

<div id="wrapper-bgbtm">

<div id="featured" class="container">


<div id="sidebar"><a href="#"><img src="products/2LG.jpg" alt="" width="146%"
height="257" /></a>

<h2>LG</h2>

<p>.</p>

<a href="#" class="button"><span>Login To Start Searching</span></a></div>

<div id="fbox3">

<div align="center" id="fbox1">

<h1>Login :</h1>

<form name="form1" method="post" action="">

<table width="244">

<tr>

<td colspan="2">&nbsp;</td>

</tr>

<tr>

<td width="75"><div align="right">Username :</div></td>

<td width="144"><label for="textfield"></label>

<div align="left">

<input type="text" name="txtusername" id="txtusername" />

</div></td>

</tr>

<tr>

<td><div align="right">Password :</div></td>

<td><label for="textfield"></label>

<div align="left">
<input type="password" name="txtpassword" id="txtpassword" />

</div></td>

</tr>

<tr>

<td colspan="2">&nbsp;</td>

</tr>

<tr>

<td><div align="center"></div></td>

<td><input type="submit" name="button" id="button" value="Login"/>

<input type="reset" name="button2" id="button2" value="Reset" /></td>

</tr>

<tr>

<td height="27"><div align="center"></div></td>

<td><a href="register.php"><strong>REGISTER NOW</strong></a></td>

</tr>

</table>

</form>

</div>

</div>

</div>

</div>

</div>

</div>

</body>
</html>

<?php

session_start();

mysql_connect("localhost","root","");

mysql_select_db("hire");

if(isset($_POST['button']))

$a=$_POST['txtusername'];

$b=$_POST['txtpassword'];

$qry="select * from registration where username='$a' and password='$b'";

$res=mysql_query($qry);

$n=mysql_num_rows($res);

if($n>0)

while($r=mysql_fetch_array($res))

$_SESSION['sbuser']=$a;

$_SESSION['sbpass']=$b;

header("location:search.php");

else
{?>

<script language="javascript"type="text/javascript">

alert("Invalid username and password");

window.location.assign("login.php");

</script>

<?php

?>

Register.php

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"


"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />

<title></title>

<meta name="keywords" content="" />

<meta name="description" content="" />

<link href="http://fonts.googleapis.com/css?family=Open+Sans:400,300,600|Archivo+Narrow:400,700"
rel="stylesheet" type="text/css" />
<link href="default.css" rel="stylesheet" type="text/css" media="all" />

<!--[if IE 6]>

<link href="default_ie6.css" rel="stylesheet" type="text/css" />

<![endif]-->

<!--------------->

<script type="text/JavaScript">

function usernamecheck()

var f=0;

var n=document.form1.txtusername.value;

var n1=n.length;

if(n1<4)

var f=1;

alert(" Enter username atleast 4 in length");

document.form1.txtusername.value="";

document.form1.txtusername.focus();

return false;

function pwcheck()

{
var f=0;

var p=document.form1.txtpwd.value;

var r=document.form1.txtrepwd.value;

var l1=p.length;

var l2=r.length;

if(l1<6)

f=1;

alert("Enter password atleast 6 in length");

document.form1.txtpwd.value="";

document.form1.txtpwd.focus();

return false;

if((f==0)||(l1==0)||(l2==0))

if(p!=r)

alert("password not matching");

document.form1.txtpwd.value="";

document.form1.txtrepwd.value="";

document.form1.txtpwd.focus();

return false;

}
}

function namecheck()

var a=document.form1.tname.value;

//var l=a.length;

var alphabet=/^[a-zA-Z. ]+$/ ;

if(!(a.match(alphabet)))

alert('please enter your name');

document.form1.tname.focus();

return false;

function address()

var a=document.form1.txtaddr.value;

if(a=="")

alert('Enter address');

document.form1.txtaddr.focus();

return false;
}

function pincheck()

var a=document.form1.txtpin.value;

if(isNaN(a))

alert('please enter correct pin No');

document.form1.txtpin.focus();

return false;

else if(a=="")

alert('Enter pin no');

document.form1.txtpin.focus();

return false;

function phonecheck()

var a=document.form1.mobile.value;

if(isNaN(a))
{

alert('please enter phone number');

document.form1.mobile.value="";

document.form1.mobile.focus();

return false;

else

var l=a.length;

if(l!=10)

alert("enter 10 digit phonenumber");

document.form1.mobile.value="";

document.form1.mobile.focus();

return false;

function emailcheck()

if(document.form1.txtemail.value.indexOf("@")<1||
document.form1.txtemail.value.indexOf(".")<document.form1.txtemail.value.indexOf("@")+2

||document.form1.txtemail.value.indexOf (".")+2>=document.form1.txtemail.value.length)

alert("Not a valid e-mail address");

//document.form1.txtemail.value="";

document.form1.txtemail.focus();

return false;

function browsecheck()

var b=document.form1.f1.value;

if(b=="")

alert("please upload your photo")

return false;

function allcheck()

{
if(usernamecheck(document.form1.txtusername.value)==false)

return false;

if(pwcheck(document.form1.txtpwd.value)==false)

return false;

if(namecheck(document.form1.tname.value)==false)

return false;

if(address(document.form1.txtaddr.value)==false)

return false;

if(pincheck(document.form1.txtpin.value)==false)

return false;

if(phonecheck(document.form1.mobile.value)==false)

return false;

}
if(emailcheck(document.form1.txtemail.value)==false)

return false;

if(browsecheck(document.form1.f1.value)==false)

return false;

</script>

<!---->

<style type="text/css">

<!--

.style1 {color: #FF9900}

-->

</style>

</head>

<body onload="document.form1.txtusername.focus();">
<div id="header" class="container">

<div id="logo">

<h1 class="style2"><span class="m1">SINGLE POINT </span></h1>

<h1 class="style2"><span class="style16">SNARE PORTAL</span></h1>

</div>

<div id="menu">

<ul>

<li><a href="index.php" accesskey="1" title="">Home page</a></li>

<li><a href="login.php" accesskey="1" title="">Login</a></li>

<li class="active"><a href="register.php" accesskey="1" title="">Register</a></li>

<li><a href="about.php" accesskey="2" title="">About Us</a></li>

<li><a href="contact.php" accesskey="5" title="">Contact Us</a></li>

</ul>

</div>

</div>

<div id="wrapper">

<div id="wrapper-bgbtm">

<div align="center">

<h1> Registration..</h1>

<form action="" method="post" enctype="multipart/form-data" name="form1">

<table width="452" height="388" border="0">


<tr>

<td >&nbsp;</td>

<td >&nbsp;</td>

</tr>

<tr>

<td width="189" ><div align="right">Type :</div></td>

<td width="253" ><label>

<select name="type" id="select">

<option>USER</option>

<option>SELLER</option>

</select>

</label></td>

</tr>

<tr>

<td ><div align="right">Username :</div></td>

<td ><label for="txtusername"></label>

<div align="left">

<input type="text" name="txtusername" id="txtusername" value="" />

</div></td>

</tr>

<tr>

<td><div align="right">Password :</div></td>

<td><label for="txtpwd"></label>

<div align="left">
<input type="password" name="txtpwd" id="txtpwd" value="" />

</div></td>

</tr>

<tr>

<td class="style3"><div align="right">Re-Enter Password :</div></td>

<td><label for="txtrepwd"></label>

<div align="left">

<input type="password" name="txtrepwd" id="txtrepwd" />

</div></td>

</tr>

<tr>

<td><div align="right">Name :</div></td>

<td><label for="tname"></label>

<div align="left">

<input type="text" name="tname" id="tname" />

</div></td>

</tr>

<tr>

<td><div align="right">Gender : </div></td>

<td><p align="left">

<label>

<input type="radio" name="rbsex" value="Male" id="rbsex" checked="checked" />

Male </label>

<input type="radio" name="rbsex" value="Female" id="rbsex" />

<label>Female</label>
</p></td>

</tr>

<tr>

<td><div align="right">Address :</div></td>

<td><label for="txtaddr"></label>

<div align="left">

<textarea name="txtaddr" id="txtaddr" ></textarea>

</div></td>

</tr>

<tr>

<td><div align="right">State :</div></td>

<td><label for="textfield5"></label>

<div align="left">

<label for="lststate"></label>

<select name="lststate" id="lststate">

<option>ANDRA PRADESH</option>

<option>ARUNACHAL PRADESH</option>

<option>ASSAM</option>

<option>BIHAR</option>

<option>CHHATTISGARH</option>

</select>

</div></td>

</tr>
<tr>

<td><div align="right">Pin No :</div></td>

<td><label for="textfield6"></label>

<div align="left">

<label>

<input type="text" name="txtpin" id="txtpin" />

</label>

</div></td>

</tr>

<tr>

<td><div align="right">Mobile No :</div></td>

<td>

<div align="left">

<input type="text" name="mobile" id="mobile" />

</div></td>

</tr>

<tr>

<td ><div align="right">Email ID :</div></td>

<td><div align="left">

<input type="text" name="txtemail" id="txtemail" />

</div></td>

</tr>

<tr>

<td ><div align="right">Upload Photo :</div></td>

<td><label for="fileField"></label>
<div align="left">

<input type="file" name="f1" id="fileField" />

</div></td>

</tr>

<tr>

<td >&nbsp;</td>

<td>&nbsp;</td>

</tr>

<tr>

<td ><div align="right">

<input type="submit" name="register" id="register" value="REGISTER" onclick="return allcheck();" />

</div></td>

<td><label for="txtemail"></label>

<div align="left">

<label>

<input type="reset" name="cancel" id="cancel" value="CANCEL" />

</label>

</div></td>

</tr>

</table>

</form>

</div>

</div>

</div>

</div>
</body>

</html>

<?php

if(isset($_POST["register"]))

$t=$_POST['type'];

$a=trim($_POST['txtusername']);

$b=trim($_POST['txtpwd']);

$c=$_POST['txtrepwd'];

$d=ucfirst(trim($_POST['tname']));

$f=ucfirst($_POST['txtaddr']);

$e=$_POST['rbsex'];

$g=$_POST['lststate'];

$h=$_POST['txtpin'];

$j=strtolower($_POST['txtemail']);

$i=$_POST['mobile'];

move_uploaded_file($_FILES['f1']['tmp_name'],"profilepicture/".$a.".jpg");

mysql_connect("localhost","root","");

mysql_select_db("hire");

//mysql_query("insert into user values('','$a','$b','$d','$e','$f','$g','$h','$i','$j','0','$t')");

mysql_query("insert into user values('','$a','$b','$d','$e','$f','$g','$h','$i','$j','0')");

?>

<script type="text/javascript">
alert("Your registration sent for approval!...");

</script>

<?php

?>

AddProduct.php

<?php

session_start();

?>

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"


"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />

<title></title>

<meta name="keywords" content="" />

<meta name="description" content="" />

<link
href="http://fonts.googleapis.com/css?family=Open+Sans:400,300,600|Archivo+Narrow:400,70
0" rel="stylesheet" type="text/css" />

<link href="default.css" rel="stylesheet" type="text/css" media="all" />

<!--[if IE 6]>

<link href="default_ie6.css" rel="stylesheet" type="text/css" />

<![endif]-->

<script>
function amtcheck()

var a=document.form1.txtsrate.value;

if(isNaN(a))

alert('please enter amt in digits');

document.form1.txtsrate.focus();

return false;

function browsecheck()

var b=document.form1.browse.value;

if(b=="")

alert("please upload your photo")

return false;

function allcheck()
{

if(amtcheck(document.form1.txtsrate.value)==false)

return false;

if(browsecheck(document.form1.browse.value)==false)

return false;

</script>

</head>

<body>

<?php

$user=$_SESSION['admin'];

$pass=$_SESSION['pass'];

if($user=="")

{?>

<script type="text/javascript">

alert("login again");
</script>

<?php

?>

<div id="header" class="container">

<div id="logo">

<h1 class="style2"><span class="m1">SINGLE POINT </span></h1>

<h1 class="style2"><span class="style16">SNARE PORTAL</span></h1>

</div>

<div id="menu">

<ul>

<li class="active"><a href="admin.php">ADD PRODUCT</a></li>

<li><a href="listusers.php" accesskey="1" title="">users</a></li>

<li><a href="acceptdelete.php" accesskey="1" title="">Requests</a></li>

<li><a href="listproducts.php" accesskey="1" title="">products</a></li>

<li><a href="addcategory.php" accesskey="1" title="">Manage category</a></li>

<li><a href="adminlogout.php" accesskey="1" title="">logout</a></li>

</ul></div>

</div>
<div id="wrapper">

<div id="wrapper-bgbtm">

<div id="featured" class="container">

<div id="fbox1">

<p>&nbsp;</p>

<p>&nbsp;</p>

</div>

<div id="fbox2">

<form action="" method="post" enctype="multipart/form-data" id="form1" name="form1">

<table width="417" border="0">

<tr>

<td colspan="2"><h2>ADD NEW PRODUCT</h2></td>

</tr>

<tr>

<td width="154">&nbsp;</td>

<td width="253">&nbsp;</td>

</tr>

<tr>

<td><div align="right">Shop Name :</div></td>

<td><input type="text" name="txtshpnamel" id="txtshpnamel" /></td>

</tr>

<tr>

<td><div align="right">Product ID :</div></td>

<td><input type="text" name="txtid" id="txtid" /></td>

</tr>
<tr>

<td><div align="right">Model :</div></td>

<td><input type="text" name="txtmodel" id="txtmodel" /></td>

</tr>

<tr>

<td><div align="right">Product name :</div></td>

<td>

<div align="left">

<input type="text" name="txtpname" id="txtpname" />

</div></td>

</tr>

<tr>

<td><div align="right">Category :</div></td>

<td>

<?php

$con=mysql_connect("localhost","root","");

mysql_select_db("dbauction");

$res="select * from category";

$res1=mysql_query($res);

?>

<select name='lstcategory' id='select'>

<?php

while($r=mysql_fetch_array($res1))

{?>
<option value="<?php echo $r[1];?>"><?php echo
$r[1];?></option>

<?php

?>

</select>

</td>

</tr>

<tr>

<td><div align="right">Starting rate :</div></td>

<td><label for="txtsrate"></label>

<div align="left">

<input type="text" name="txtsrate" id="txtsrate" />

</div></td>

</tr>

<tr>

<td><div align="right">Expiary Date :</div></td>

<td><div align="left">

<label for="select2"></label>

YYYY

<select name="lstyr" id="lstyr">

<?php

for($i=2013;$i<=2020;$i++)

?>
<option><?php echo $i ?></option>

<?php } ?>

</select>

MM

<select name="lstmonth" id="lstmonth">

<?php

for($i=1;$i<=12;$i++)

?>

<option><?php echo $i ?></option>

<?php } ?>

</select>

DD

<select name="lstday" id="lstday">

<?php

for($i=1;$i<=31;$i++)

?>

<option><?php echo $i ?></option>

<?php } ?>

</select>
</div></td>

</tr>

<tr>

<td><div align="right">upload image :</div></td>

<td><div align="left">

<input type="file" name="browse" id="browse" />

</div></td>

</tr>

<tr>

<td height="32"><div align="right">

<input type="submit" name="button" id="button" value="add" onclick="return allcheck();" />

</div></td>

<td><div align="left">

<div align="left">

<input type="reset" name="button2" id="button2" value="reset" />

</div>

</div></td>

</tr>

</table>

</form>

</div>

<div id="fbox3">

<div align="center">

<p>&nbsp;</p>
<p>&nbsp;</p>

</div>

</div>

</div>

</div>

</div>

</div>

</body>

</html>

<?php

if(isset($_POST["button"]))

$name=$_SESSION['admin'];

$a=ucfirst($_POST['txtmodel']);

$b=ucfirst(trim($_POST['txtpname']));

$c=$_POST['lstcategory'];

$d=$_POST['txtsrate'];

$e=$_POST['txtshpnamel'];

$f=$_POST['lstyr'];

$g=$_POST['lstmonth'];

$h=$_POST['lstday'];
$dt=($f."-".$g."-".$h);

$con=mysql_connect("localhost","root","");

mysql_select_db("dbauction");

mysql_query("insert into products values('','$a','$b','$c','$d','$dt','$e')");

$con=mysql_connect("localhost","root","");

mysql_select_db("dbauction");

$res=mysql_query("select max(pid) from products");

while($r=mysql_fetch_array($res))

$g=$r[0];

move_uploaded_file($_FILES['fpimage']['tmp_name'],"products/".$g.$b.".jpg");

?>
SYSTEM TESTING
4. SYSTEM TESTING

4.1 SYSTEM TESTING

TESTING METHEDOLOGIES

System Testing

System testing includes code testing which examines the logic of the program. Each and
every part of the program is checked or executed individually to find out the errors. Once the
errors in the program are found out, they are debugged. If wrong data is entered, an error
message is displayed on the screen so that the user can correct the data at that time itself.

System testing is actually a series of different tests whose primary purpose is to fully
exercise the computer based system. A series of testing are performed for the proposed system
before the system is ready for the user acceptance test. A candidate system is subject to variety
of tests – volume, stress, recovery, security and usability tests.

The steps in the system testing can be categorized as follows:

 Unit Testing

 Requirement Testing

 User Testing

 Validation Testing

 Integration Testing

 User Acceptance Testing

Unit Testing

Unit testing focuses on verification efforts on the smallest unit of software design i.e., the
module. The unit testing is always white box oriented and the step can be conducted in parallel
for modules. The module interface is tested to ensure that information properly flows in and out
of the program unit under test. The ‘local data structures ‘ are examined to ensure that data
stored temporarily maintains its integrity during all steps in an algorithm execution.” Boundary
Conditions” are tested to ensure that the module operates properly at boundaries established to
limit or restrict processing. All ‘independent paths ‘ through the control structures are exercised
to ensure that all statement in a module have been executed at least once. Finally all “Error-
Handling “ are tested.

Requirement Testing

The main aim of this test plan is to see whether the outputs created and inputs were given
according to the user requirements and specifications that have been established. This was done
in the security department by having the developer as a secondary person and another employee
who conducted the actual test. Some Suggestion was made while requirement testing was done
that has been incorporated.

User Testing

During the testing the tester places the role of the individual who desires to penetrate the
system. The tester may attempt to acquire passwords through external clerical means and may
attack the system with the custom software design to break down any defenses that have been
constructed. The tester may also overwhelm the system thereby denying service to other s and
may purposely cause system errors to penetrate during recovery and may browse through
insecure data, hoping to find key to system entry.

Validation Testing

At the end of user testing, software is completely assembled as a package, interfacing


errors have now being uncovered and correcting test begins. Software testing and validation are
achieved through a serious black box tests that demonstrate conformity with the requirement.

A plan outlines the classes of tests to be conducted and test procedure defines specific
cases that will be used to demonstrate conformity with requirements. Both the plan and the
procedure are designed to ensure that all functional requirements are achieved, documentation is
correct and other requirements are met. After the validation test, one of the conditions exists.
The function or performance characteristics confirm to specification and are accepted. A
deviation from the specification is uncovered and a deficiency list is created. The deviation or
error discovered at this stage in a project can rarely be corrected prior to scheduled completion.
It is necessary to negotiate with the customer to establish methods.

Integration testing

Integration testing is a systematic technique for constructing the program structure while
conducting tests to uncover errors associated with interfacing. The objective is to take unit
testing modules and build a program structure that has been dictated by design.

There is often a tendency to attempt non incremental integration; that is to construct the
program using “big-bang” approach. All modules are combined in advance. The entire program
is tested as a whole. When a set of errors is encountered, correction is difficult because isolation
of causes is complicated by the vast expanse of the entire program. Once these errors are
corrected new ones appear and the process continues in a seemingly endless loop.

Incremental integration is the antithesis of big-bang approach. The program is


constructed and tested in small sequence, where errors are easier to isolate and correct; interfaces
are more likely to be tested completely; and a systematic test approach may be applied.

User acceptance testing

Acceptance testing involves planning and execution of functional tests, performance test,
and stress tests to verify that the implemented system satisfies its requirements. Acceptance tests
are typically performed by quality assurance and/or customer organizations. Functional and
performance tests are performed to determine the limitations of the system. Typically ,
acceptance typically, acceptance test will incorporate test cases developed during unit testing
and integration testing. Additional test cases are added to achieve desired level of functional ,
performance, and stress testing of the entire system. Tools of Special importance during
acceptance testing include a test Coverage analyzer, a timing analyzer, and a coding standards
checker. A test coverage analyzer records the control paths followed for each test case. Timing
analyzer reports the time spent in various regions of the source code and different test cases.
White Box Testing
White Box Testing is a testing in which in which the software tester has knowledge of the
inner workings, structure and language of the software, or at least its purpose. It is purpose. It is
used to test areas that cannot be reached from a black box level.

Black Box Testing


Black Box Testing is testing the software without any knowledge of the inner workings,
structure or language of the module being tested. Black box tests, as most other kinds of tests,
must be written from a definitive source document, such as specification or requirements
document. It is a testing in which the software under test is treated, as a black box. We cannot
“see” into it. The test provides inputs and responds to outputs without considering how the
software works.
SYSTEM IMPLEMENTATION AND MAINTAINANCE

5. SYSTEM IMPLEMENTATION AND MAINTAINANCE

5.1 SYSTEM IMPLEMENTATION

Implementation Planning:

This section describes about the Implementation of the Safe application and the details of
how to access this control from any application.

Implementation is the process of assuring that the information system is operational and
then allowing users take over its operation for use and evaluation. Implementation includes the
following activities.

 Obtaining and installing the system hardware.

 Installing the system and making it run on its intended hardware.

 Providing user access to the system.

 Creating and updating the database.

 Documenting the system for its users and for those who will be responsible for
maintaining it in the future.

 Making arrangements to support the users as the system is used.

 Transferring ongoing responsibility for the system from its developers to the operations
or maintenance part.

 Evaluating the operation and use of the system.

Implementation Phase in this project:

The new system of Online Appliances Hire System has been implemented. The present system
has been integrated with the already existing hardware. The database was put into the Microsoft
SQL server. This was connected by JDBC. The database is accessible through Internet on any
geographic location. Documentation is provided well in such a way that it is useful for users and
maintainers.

5.2 MAINTENANCE:

Maintenance is any work done to change the system after it is in operational. The term
maintenance is used to describe activities that occur following the delivery of the product to the
customer. The maintenance phase of the software life cycle is the time period in which a
software product performs useful work.

Maintenance activities involve making enhancements to products, adapting products to new


environments, correcting problems.

In this we retrieve the data from the database design by searching the database. So, for
maintaining data our project has a backup facility so that there is an additional copy of data,
which needs to be maintained.

More over this project would update the annual data on to a CD, which could be used for
later reference

Methods of implementation:

The four basic methods of implementation are:

1. Parallel system method.

2. Direct cut over method.

3. Pilot system method.

4. Phase in method.
FUTURE ENHANCEMENT

6. FUTURE ENHANCEMENT
Purchasing and selling products and services over the internet without the need of going
physically to the market is what online shopping all about. Online shopping is just like a retail
store shopping that we do by going to the market, but it is done through the internet. Hire
Appliance has made shopping painless and added more fun. Hire Appliance stores offer product
description, pictures, comparisons, price and much more. Few examples of these are
Amazon.com, and the benefits of online Hire Appliance System is that by having direct access to
consumer, the online stores can offer products that cater to the needs of consumer, cookies can
be used for tracking the customer selection over the internet or what is of their interest when they
visit the site again. Hire Appliance System makes use of digital technology for managing the
flow of information, products, and payment of consumers.
CONCLUSION
7. CONCLUSION

Every day, millions of people go online to do research about products and make purchases from
thousands of different online merchants. The web allows customers to compare shop for the best
deals and locate products that might otherwise be difficult to find. But while online shopping
provides with a high level of convenience,. Retailers have a sizeable opportunity as the online
population starts to spend more and buy more frequently online. Online shoppers expect to see
good deals online accompanied by free or very low-cost shipping. Consumers are looking for
trust, security and privacy of information, timeliness, availability, convenience, customer service,
prices and wider selection during online shopping.
BIBLIOGRAPHY

10. BIBLIOGRAPHY

BOOK REFERENCES

1.” System Analysis and Design” ELIAS M.AWAD, Second Edition.

2.” Software Engineering” ROGER.S.PRESSMAN, Fifth Edition.

3. Microsoft 2008 Server Implementation and Maintenance.

WEB REFERENCES
 FOR MYSQL
www.msdn.microsoft.com

 FOR PHP
www.php.com/net/quickstart/aspplus/default.com

www.php.net

www.fmexpense.com/quickstart/aspplus/default.com

www.phptoday.com

www.phpfree.com

www.4guysfromrolla.com/index.com
APPENDIX
9. APPENDIX
8.1 SCREENSHOTS
Hire Appliance Portal Screen Shots

Login.php
Register.php

Contact.php
Addproduct.php
Viewusers.php

About.php
SYSTEM STUDY

9. SYSTEM STUDY

9.1 Data Flow Design

Data flow diagram is a way of representing system requirements in a graphic form. A


DFD also known as “Bubble Chart” has the purpose of clarifying system requirements and
identifies major transformations that will become program in system design. So it is the starting
point of design phase that functionally decomposes the requirements specifications down to the
lowest level of details. A DFD consist of series of bubbles joined by lines. The bubbles represent
data transformation and the lines represent data flow in the system.

DFD Symbols
In a DFD, there are four symbols
A square defines a source or destination of system data.

An arrow identifies data flow in motion. It is a pipeline through which in


format flows

A circle or a bubble represents a process that transforms incoming data flows


into going data flows.

An open rectangle is a data source or data at rest or a temporary of data


constructing a DFD.

Rules in drawing DFD’s


 Process should have name and numbered for easy reference.
 The direction of flow is from top to bottom and from left to right. Data traditionally flow
from source to destination, although they may flow from source.
 When a process is exploded into lower levels, they are numbered.
 The names of data source, sources and destination are written in capital letters. process
and data flow names have the first letter of each word capital

A DFD is often used as a preliminary step to create an overview of the system, which can
later be elaborated. The DFD is designed to aid communication. The rule of thumb is exploding
the DFD to a functional level, so that the next sublevel does not exceed to process. Beyond that it
is best to take each function separately and expand it to show the explosion of single process.
Data flow diagrams are one of the three essential perspectives of the structured-systems analysis
and design method SSADM. With a data flow diagram, users are able to visualize how the
system will operate, what the system will accomplish, and how the system will be implemented.
It is a common practice to show the interaction between the system and external agents which act
as data sources and data links.
DATAFLOW DIAGRAM

LEVEL 0

Request Hire Request


User Appliance Admin
System

Response Response

LEVEL 1

Add
HomeApp Appliance_details
liances

Admin
Update/Delet
eHomeAppli Appliance_ Details
ances

Login
View
Order Order_Details
Details
Track_Details

LEVEL 2

View/Search
Home
Appliance_details
Appliance
details

user
Registration

Order
Home Order_Details
Appliance
s
Registratio
n
Login

Payment
Payment_Details

Registration

View
HomeAppli
Tracking_Details
ance
Tracking

ER DIAGRAM

Custphno
Custname m
Custaddres username Password
Custid

Customer Hire Administrator


Appliance
System
9.2 TABLE DESIGN
User_Register
Column Name Data type Constraints Description
RegId Varchar(30) Primary Key Id of the User
FirstName Varchar(30) Not Null FirstName of the User
LastName Varchar(30) Not Null LastName of the User
Address Varchar(20) Not Null Address of the User
Age Integer(20) Not Null Age of the User
Gender Varchar(20) Not Null Gender of theUser
Mobno Integer(20) Not Null Mobile number of theUser
EmailId Varchar(20) Not Null EmailId of the User
UserName Varchar(20) Not Null UserName of the User
Password Varchar(30) Not Null Password of the User

Order_Details
Column Name Data type Constraints Description
Orderid Varchar(30) PrimaryKey,AutoIncrement Id of ApplianceOrder
ApplianceName Varchar(30) Not Null Name of Appliance
ApplianceType Varchar(30) Not Null Type of Appliance
Srate Integer(20) Not Null Srate

Appliance
OfferPrice Integer(30) Not Null Number of Products
MonthlyPayment Varchar(30) Not Null Description of
Products
NumberOfInstallments Integer(30) Not Null Name of Receiver
Mobile_Number Integer(20) Not Null Mobile number of the
Receiver
Emailid Varchar(30) Not Null EmailId of the
Receiver
Pincode Integer(20) Not Null Pincode of the
Receiver
Address Varchar(30) Not Null Address of the
Receiver

Add_Applinces
Column Name Data type Constraints Description
App_Id Integer(20) Primary Key Id of Appliance
App_Name Varchar(30) Not Null ApplianceName
App_model Varchar(30) Not Null Appliance Model
App_Rate Integer(20) Not Null Appliance Rate
Mfgdate Integer(30) Not Null Appliance
Manufacturing Date
MonthlyPayment Integer(30) Not Null Monthly Payment of
Appliance

Payment
Column Name Data type Constraints Description
OrderId Integer(10) Primary Key OrderId
Name Varchar(30) Not Null Name of the User
P_type Varchar(30) Not Null Type of Payment
D_P Integer(20) Not Null DownPayment

Tracking_Details
Column Name Data type Constraints Description
Orderid Integer(30) Not Null Id of Order
C_lo Varchar(10) Not Null Current Product
Location
Re_D Integer(30) Remaining Days of
Delivery

Vous aimerez peut-être aussi