Vous êtes sur la page 1sur 62

Chapter 1

Name of the System: E-Tailer of Jaesars Jewelry

1.0 Background of the Study

Jaesars is one of the jewelers that offer a remarkably wide selection of diamond, gemstone, and pearl jewelry. The company is mainly located at the heart of Davao, San Pedro Extension, which allows us immediate access to some of the best resources in the jewelry industry. It was founded way back 15 years by adequate number of jewelry industry

experts and seasoned entrepreneurs that are equipped with sophisticated machinery enabling us to produce in bulk in a short time period. It is a privately held company and it has multiple branches in the Mindanao.

The gemstone

companys jewelry

sources from

and

manufactures

diamond in

and the

specialized

markets

Philippines, making it possible to offer our customers fine jewelry at the best prices. Products are splendidly

designed artisan

in ship

unique and

patterns

and

manifest thus

masterpiece range of

sincere

efforts

making

jewelry a wide one. When a customer is purchasing jewelry at the last minute, often one would feel having no time to add personalized touches. Jaesars makes personalization

trivial by offering many care tips, sweet sayings, nice poems and fun jokes to help the customers create that extra special jewelry gift. Jaesars marked with overnight

delivery state that if a customer orders a gift by noon, it will be shipped on the same day so the gift will arrive on time. But still, time of delivery varies on distance.

Payments shall be made upon delivery and it should be in cash in order to avoid delays and bounds check. Jaesars eliminating buying the ensures the product quality and value in by

"middleman" goods

retailer, the

buying

volume, being

right

from

right

markets,

customer-conscious at every stage of production. Jaesars is looking forward to become an e-tailer of quality jewelry. They are hooked in a dilemma on how to offer their products solely through the Internet. They too requested extending a system that would provide them a wall in

their

expert jewelry advices, insider shopping

tips, unbiased jewelry reviews and a comprehensive jewelry

education.

However,

they

wanted

to

keep

all

personal

information confidential. They seek to have a system that protects customer information as it travels over the web to their secure servers. Then, protect it again in databases.

1.1

Statement of the Problem The web developers and database programmers generally

are inflicted with the dilemma on how to design and improve an e-tailer application of Jaesars Jewelry; and seek to answer these specific problems: 1. How to maintain confidentiality among customers

information? 2. How would the customers be able to post inquiries, comments and testimonies? 3. How would the customer be updated with the current prices of jewelries placed on his shopping cart? 4. How to automatically update the customers with the

prices, discounts and news feeds without logging on the page?

1.2

Objectives of the Study

The web developers and database programmers generally aim to advance the jewelry purchasing in this business

establishment in order to contend in the diverse demands of the public. The system should cater the following explicit objectives:

1.

To maintain confidentiality among customers and maintain a good rapport between the business owners and customers;

2.

To let the customers post inquiries, comments and testimonies on the wall yet upholding

security from unwanted access; 3. To update the buyers with the current price on carts while shopping; 4. To automatically update the customers with the prices, discounts and news feeds without

logging on the page; and 5. To implement an online purchasing.

1.3 Significance of the Study

This study is primarily of great significance to the proponents of the system. Skills on designing web pages and creating a database would be enhanced and from that, wide doors of job opportunities would relatively be opened.

The future researchers could also benefit the system. While the application is established, the adherents could have this as a reference and eventually develop another system that could suffice an impending issue.

Moreover, this study is essential in a business that would likely to compete in the heightening challenges. This is to produce an enormous Jaesars impact would in the emergence the of

jewelry

transaction.

increase

sales

promotion in the jewel industry through the links on the system. The company would be able to monitor the number of registrants in a day as well as the total sales. The

reviews, one of the systems features, would certainly be of great advantage to enhance its operation.

In

this

sense,

customers

will

be

brought

to

the

highest quality products, values, and services through an

easy and convenient online store. It would be accessible for the customers to view the prices, avail great deals and shop without going to the jewelry store.

1.4 Scope and Limitation

The system is limited only to the online purchasing of Jaesars Jewelry at San Pedro Extension, Davao City. Only customers in Mindanao could access the system.

Therein

is

the acquiring of registrants, monitoring

reviews from costumers, updating necessary information that evolves on selling shipping and and on purchasing the jewelry of to products, and and

accepting

delivering the system

products, establish

implementing

encryption

protract security. It does not support paypal or any credit cards; only, pay-upon delivery.

Moreover, the system is specified with Php and XML as the scripting language for web pages and MySQL 5.0 as the server for database. Web browsers can be Mozilla Firefox, Google Chrome, Internet Explorer 7.0 or higher. At least two cores for processor, 2-4GB memory and 40 GB for system

drive

are

required

for

the

hardware.

It

must

have

sufficient space for the base installation and sufficient space for diagnostics such as logging, debugging, creating memory dumps, and so on. For production use, it also needs additional free disk space for day-to-day operations.

1.5 Operational Feasibility

An e-purchasing system that would suffice the existing dilemma of a Jewelry shop was proposed. The system presents an alluring and comprehensive interface wherein the

internet buyers would be persuaded to navigate at the same time to register for further transaction. The company must hire a database and a web administrator, as well as network security head that are knowledgeable and skilled enough to perform handed responsibilities. In this means, the shop will no longer spend for trainings and seminars.

The

system So,

is it

only

limited

to

online online

ordering payment

of nor

jewelries.

accepts

neither

pawning of items. When shopping, the buyer must be a member in order to complete the transaction or at least reserve carts contents otherwise the cart will be empty as soon as the guest leaves the site.

Since the systems features enhance business operation and promotes the this business system itself be to the customers, by the

definitely,

would

supported

management. The company would but face innovation; hence, create an exceptional image. There will be no ethical

issues to be taken into account yet legal policy should be documented.

Likewise, part. For

the

system

is

operational

to

the and

buyers accounts

confiding

personal

information

demand guarantee of trust, the member has the advantage of paying item upon delivery. Practicality is also practiced here by the consumer since the company is at reach already on the web. and The the writings links and used in the are interface classified are thus

technical

pages

assuring a clear establishment of interaction between the shop and the internet buyer.

1.6 Technical Feasibility

Jaesars has 2-3 available computers in every branch that are enough to operate the system. Monitors are all

LCD; processors are two cores and higher; RAM ranges to 24GB and HDD of 40GB. These hardware resources can be

bought in any computer shops wherein diverse styles and specifications are offered at ranging prices and methods of payment. been Through DSL internet connection, the company has this as a way of is monitoring of great each help local in the

employing This

office.

network of

resource the new

implementation

system.

These

hardware

specifications are integral to that of software as well as to the entire performance of the project.

There

is

also

high

availability

of

web

hosting

wherein PHP, ASP.NET, MSSQL Free Domain Name, and Unlimited Emails are included. These resources can be searched

through the internet and apply for hosting and creating domain. So, there is no need for downloading file transfer software and installer of Apache. The database uses MySQL Server 2005.

The technical expertise required for the system can be acquired since it is just like keeping records

electronically. The proposed platform is pliable for future transaction volume and encroachment so the company does not need to modify the whole system.

The reliability of the system is high due to imposed security, organized features and chosen type of database. Jaesars may tie up with another company like Paypal by

means of this system. This appropriately interface external links hence the operation would be even more efficient.

1.8 Definition of Terms

CSS

(Cascading

Style

Sheet)

is

designed

primarily

to

enable the separation of document content (written in HTML or a similar markup language) from document

presentation, including elements such as the layout, colors, and fonts

Database is a structured collection of records or data that is stored in a computer system

E-Commerce (electronic commerce or EC) is the buying and selling of goods and services on the Internet,

especially the World Wide Web.

E-Tailer One that sells goods or commodities to consumers electronically, as over the Internet.

Hardware is a comprehensive term for all of the physical parts of a computer, as distinguished from the data it contains or operates on, and the software that

provides instructions for the hardware to acoomplish tasks.

HTML

(Hypertext

Markup

Language)

is

the

predominant

markup language for web pages

Jewelry

is as

form

of

personal rings,

adornment, brooches,

manifesting and

itself

necklaces,

earrings

bracelets.

Links is a word, group of words, or image that you can click on to jump to a new document or a new section within the current document

MySQL - is a relational database management system (RDBMS)[1] that runs as a server providing multi-user access to a number of databases

Normalization database

is

the process of organizing data in

Online

Ordering

System

this

system well

can

be

used image

to and

purchase

publicly

releasable

logged

well data files

Online Payment a transaction of goods and money in any form through the online media

Online Shopping the process of whereby consumers directly buy goods or services from a seller in real time over the internet

Shipping the commercial enterprise of transporting goods and materials

Software a collection of computer programs and related data that provide the instructions telling a computer what to do and how to do it

Transaction the act of transacting or the fact of being transacted

Website

collection and

of

online that

content reside

including on a web

documents

applications

server/servers.

Website Design - is a broad term used to encompass the way that content (usually hypertext or hypermedia) is

delivered to an end-user through the World Wide Web, using a web browser or other web-enabled software is displayed.

Chapter II

2.1 Review of Related Literature

The

programmers

have

found

related

reviews

of

literature and studies of Jaesars Jewellery E-Tailer. These are ranging from global, national to local perspectives.

The net has become an essential portal for jewellery suppliers and stores. Choosing from the internet jewellery stores is best for buyers also, because browsing by way of different shops and certain decorations are only a matter of clicks. A lot of distinguished brands have an on the internet presence; thus, keying insure keywords on search engines like Google usually takes you to jewellery shops and their exhaustive selections, from anywhere around the world. However, there are also disadvantages which can be discussed below. This trend has grown in most parts around the globe.

By

doing

business

online,

jeweler

avoids

the

overhead costs inherent in owning a traditional jewellery story. No shipping costs or rental costs, among other

things. This means that those savings get passed onto you when the online jeweler is determining prices. This is also an advantage for those residing in smaller cities where jewellery sale isnt regular or for people who are too

busy. A buyer can go to on the internet jewellery store anytime to purchase an item of her preference. Since,

Internet shopping allows you to a wide range of shops all around the world, some of which dont exist on the high street. Online shops usually carry a much larger stock.

On the flip side of the coin, while salespeople can be at time overbearing, sometimes you actually do want to

speak to real person. That real-life interaction is quite simply not available when shopping online. That is why many people are still worried that shopping online, because it means providing private account information, is not to be trusted. But while identify theft and bank account fraud still occurs from time to time and online shipments can get lost or damaged on the way to your house. To avoid having problems with lost shipments, read your online jewellery stores policy on lost or damaged merchandise and make sure that they have some kind of insurance or warranty that

covers it. We should be aware because there are a lot of

scammers

that

are

taking

advantages

by

using

online

purchasing.

Most of the Internet shoppers surf to the web sites they know and preferably, to the sites that attract them most. What are seem the to be catching of the the site attention of which of can the be

shoppers

content

enhanced by web developers and at the same time be a source of income.

web

site

typically

consists

of

text, images,

animation and /or video. The first page of a web site is known as the Home page or Index Page. Some web sites use what is commonly called a Splash Page. Splash pages might include a welcome message, language or region selection, or disclaimer, however search engines, in general, favor web sites that don't do this which has caused these types of pages to fall out of favor. Each web page within a web site is a file that has its own URL. After each web page is created, they are typically linked together using a

navigation menu composed of hyperlinks.

Once a web site is completed, it must be published or uploaded in order to be viewable to the public over

the internet. This may be done using an FTP client.

This article talks about the various advantages and disadvantages associated with website design. You should

keep these in mind while designing your website.

Website designing can easily be defined as a specific skill of presenting contents, which are mainly hypertexts, usually delivered to any end user while using the World Wide Web with the help of a web browser or any other web enabled software such as internet television clients, micro blogging, auto blogging clients or as RSS readers. Website design mainly serves the purpose of creating a website with well defined electronic documents and applications which

are meant for a particular web browser, while presenting contents with interfaces to the users, in the typical form called web pages. It is mainly achieved by using HTML or XML tags. If displaying media is required, you can use

Adobe Flash, Quick Time or Java runtime environment plugins, which is usually embedded in the web pages with the help of HTML tags.

Website designing may sound easy, but there are a lot of things that need to be taken care of. Website design has lots of advantages as well as disadvantages. Web designing to promote small business world wide, offers faster product consumption for small businesses, directly communicate with customers, reduce expenses, help advertising hard-to-sell products.

However, most of the times, people feel the need of web design mainly for customization. People also ask for specific requirements which they want on their web pages. But until or unless you are proficient in HTML, catering to such enhancements is not possible at all. Sometimes it gets really difficult to provide the client with exactly what is asked for, because of some technicality involved. If you concentrate more on the look of the website, then it may affect the layout or navigation systems. Or sometimes,

using Flash or CSS can also create problem for you.

If you need better visual effects for your site, then using flash is certainly a good idea. But if you are trying to draw more visitors through SEO, then it is better to limit Flash as it may distract the visitors. But when you

are

working

with

CSS,

there

are

many

advantages

and

disadvantages. This is mainly a popular style sheet tool for web designers. It helps great in terms of bandwidth, reformatting, progressive enhancement, consistency and

flexibility of the site. But using CSS in website design can have negative aspects lack too. of There may be vertical

control

limitations,

variables,

inconsistent

browser support or even poor layout controls; or in other terms, layout. it may not provide layout control for flexible

Moreover, Website Design is always a better idea when thinking always of building You a website; to keep but in a proper the planning of

helps. your

need

mind

purpose

creating

website;

otherwise

your

website

designing

might prove worthless.

Web

design

is

different

than an

traditional

print display

publishing.

Every website is

information

container, just as a book is a container; and every web page is like the page in a book. However the end size and shape of the web page is not known to the web designer,

whereas

the

print

designer

will

know

exactly

what

size

paper he will be printing on.

For the typical web sites, the basic aspects of design are:

The content: the

substance,

and

information

on

the

site should be relevant to the site and should target the area of the public that the website is concerned with.

The usability: the site should be user-friendly, with

the interface and navigation simple and reliable.

The appearance: the graphics and text should include a

single style that flows throughout, to show consistency. The style should be professional, appealing and relevant.

The structure: of the web site as a whole.

These are the top 10 Security Tips for Web Designing. First is to define and assess the security risks. Define what the security a requirements policy, are, how how the information policy will is be

classified,

security

monitored and who is responsible. List everything that is used, interacted with or altered by the website. Classify the data based on sensitivity and the effect unauthorised

modification, release or loss would have on your business. This will assist deciding where the most effort should be placed in protection. data, for is just the more For very on If or simple some the systems standard website with no

sensitive baselines application

insist project. complex

security or web data,

includes

sensitive

consider creating a threat model and identify the threats and possible of vulnerabilities. the websites The analysis will and is assist very

development

requirements

useful to the development team.

Second

is

to

take

holistic

view.

Information

security is not just about preventing theft or damage. It also includes ensuring your website is available, is fast enough, complying with legal and regulatory requirements, providing accurate information, preventing release of

confidential information to unauthorized users, protecting your business data and intellectual property from misuse or loss, inappropriate use, protecting your users, ensuring

business continuity and providing the ability to analyze and learn from incidents. Balance the level of security with ease of use and cost constraints.

Subsequently is not to trust anyone else's data (or your own). Your web site will have input from users, but also from other sources such as news feeds, other purchased data and the back-office systems of your own organization and perhaps of partners. All this data should be validated on input and on output to protect users and systems.

Fourth milepost. By

is

to

enforce a

review review

and of

approval security

at into

each the

undertaking

projects mileposts and formal approval, security becomes built into the development process and security issues can be tackled as soon as possible. The earlier security is thought about, the cheaper it is to mitigate risks. Build change control methodology into the design process.

Fifth is to help the development team code securely. Good development practices should ensure that the

development team is working to a consistent framework and that developers produce high quality code. Software will always contain errors, but with training, use of

development standards and guidelines, security risks can be minimized. Ensure that you provide enough time to develop the website or web application securely not just achieve the functionality requirements.

Next

is

to

integrate

securities

into

the

testing

program. All projects must include structured testing. The threat model (see No 4 above) can be used to help create test scenarios. Security testing involves checking what is not allowed as well as the intended functionality. This requires a change in mindset for conventional testers.

Seventh is to build in audit, logging and alerting. Facilities to audit what has occurred on a website through sufficient logging will assist detection of abnormal

activity and help identify how problems occurred. By having an early warning of issues, it may be possible to reduce the effect of an incident. the logs Protect include the logs from user

alteration.

Ensure

(numeric)

identities where available and are monitored.

Another

is

to

deploy

the

website

securely.

Development, test and live environments may be configured differently and many security issues can arise because of this. The management of the setup and launch of the website needs to be undertaken in a controlled and defined way to ensure all the security controls are in place and

additional

vulnerabilities are not created. Document the

configuration and any future alterations.

Ninth is to include security in every contract and service level agreement. Define what security protection

you need from your suppliers, partners and sub-contractors. Use the same processes to assess their security as Identify security what security will monitoring be detected you you and

would require

your and

own. how

breaches

disclosed.

Finally,

consider

disaster

recovery

(and

business

continuity). Consider what might cause loss of availability of the website and identify the likelihood of occurrence and the effect on the business. Examine whether actions should be taken to eliminate, reduce, insure or accept the risks.

One become surfing

of

the

technology to

terms

that

most at web

people or

have while

accustomed the

hearing along

either the

work

internet

with

sites

is

the

database. The database used to be an extremely technical term, however with the rise of computer systems and

information technology throughout our culture, the database has become a household term.

The

definition

of

database

is

structured

collection of records or data that is stored in a computer system. In order for a database to be truly functional, it must not only store large amounts of records well, but be accessed easily. In addition, new information and changes should also be fairly easy to input. In order to have a highly efficient database system, you need to incorporate a program that manages the queries and information stored on the system. This is usually System. referred Besides to as DBMS or a

Database

Management

these

features,

all

databases that are created should be built with high data integrity and the ability to recover data if hardware fails.

The Data Base has a lot of advantages on the normal manual methods for storing data because of the following:

Compactness - Where there is no need for the old paper files that has a big size. Speed - Because of the computer can restore the stored Data Base and upgrading it very fast than the normal human manual hand can do.

Less drudgery - Because the computer do every thing for you. Currency - The more specific you can have when you asking for a Data Base information.

Managing without

information the

of

business of

organization storage,

reducing

flexibility

data

manipulation and retrieval process is the main objective of database programming. It is a well-established fact that the information by of a business organization services. can This best is be the

managed

database

development

reason why its importance has increased in the past few years. Database offers a number of processing and

structuring advantages that have proven extremely helpful to managing business information deftly and precisely. In order to offer tailor-made solutions of clients varied

business requirements, Quality Web Programming has devoted itself in the field of web based database in programming. following

Database

developers

have

expertise

the

databases: MSSQL, MySQL, MS Access etc. The concept of database development has undergone a rapid transformation because of the development of

sophisticated technologies in this specific field. As new technologies are continuously evolving, there is growing

need for database programming service that can cope with the changes successfully. Our database programming service includes these below mentioned sections: Maintaining Workflow How the database solution will

perform in future is directly linked with the actions and the behavior of the users. Designing Interface of the Database A user-friendly

interface of database allows managing and manipulating database by reducing the possibility of data loss. Data Migration application successfully. Reviewing Database Implementation - After the completion of database integration, our seasoned database developers thoroughly check the entire process for minimizing the chance of errors for ensuring a smooth performance of the application. Capacity Strategy - The amount of data will be increased and therefore focus on formulating DBs capacity We with can a integrate newly existing developed data and

database

strategy plan which includes performance optimization,

utilization of space as far as possible and standby facility. Planning and Investigation - Before doing anything else, we try to pinpoint the needs of our clients. This helps us to meet the requirements of our clients with lan and ease.

Database design plays a major role in the stability and the reliability of data. Although there are a number of rules that can be followed in designing a database

structure, the design process is as much an art as it is a science. Follow these rules when at all possible, but not to the point where the database loses the functionality that is so important to the user.

Doing a paper design first has several advantages: It saves time, money, and problems; Makes system more

reliable;

avoids

potential

data-modification

problems;

Serves as a blueprint for discussion; Helps in estimating costs and size; A good design should have the following objectives: Meet the users' needs; Solve the problem; Be free of modification anomalies; Have a reliable and stable

database, where the tables are as independent as possible; and Be easy to use.

The following

design

of

the

database

structure

requires of

the your

steps:

Determine

the

purpose

database - Knowing the purpose will help you decide which facts you want to store; List the facts about the objects; Determine the tables you need - When you have a clear

purpose for your database, you can divide your information into separate subjects, such as "Employees" or "Orders"; Determine the fields you need - Decide what information you want to keep in each table. Each category of information in a table is called a field and is displayed as a column when you browse the table. For example, one field in an Employee table could be Last_name; another could be Hire_date.

Determine the relationships Look at each table and decide how the data in one table is related to the data in other tables. Add fields to tables or create new tables to

clarify the relationships, as necessary. Determine the key and linking columns and determine the constraints. Refine your design - Analyze your design for errors. Create the tables and add a few records of sample data. See if you can get the results you want from your tables. Make adjustments

to the design as needed. Evaluate the design model then implement the database.

To organize our database, we need to normalize. This includes creating tables and establishing relationships between those tables according to rules designed both to protect the data and to make the database more flexible by eliminating redundancy and inconsistent dependency.

Redundant data wastes disk space and creates maintenance problems. If data that exists in more than one place must be changed, the data must be changed in exactly the same way in all locations. A customer address change is much easier to implement if that data is stored only in the Customers table and nowhere else in the database.

What is an "inconsistent dependency"? Inconsistent dependencies can make data difficult to access because the path to find the data may be missing or broken.

There are a few rules for database normalization. Each rule is called a "normal form." If the first rule is

observed, the database is said to be in "first normal form."

First Normal Form


Eliminate repeating groups in individual tables. Create a separate table for each set of related data. Identify each set of related data with a primary key.

Do not use multiple fields in a single table to store similar data. For example, to track an inventory item that may come from two possible sources, an inventory record may contain fields for Vendor Code 1 and Vendor Code 2.

What happens when you add a third vendor? Adding a field is not the answer; it requires program and table

modifications and does not smoothly accommodate a dynamic number of vendors. Instead, place all vendor information in a separate table called Vendors, then link inventory to vendors with an item number key, or vendors to inventory with a vendor code key.

Second Normal Form

Create separate tables for sets of values that apply to multiple records.

Relate these tables with a foreign key. Records should not depend on anything other than a

table's primary key (a compound key, if necessary).

For

example,

consider

customer's

address

in

an

accounting system. The address is needed by the Customers table, but also by the Orders, Shipping, Invoices, Accounts Receivable, and Collections tables. Instead of storing the customer's address as a separate entry in each of these tables, store it in one place, either in the Customers

table or in a separate Addresses table.

Third Normal Form

Eliminate fields that do not depend on the key.

Values in a record that are not part of that record's key do not belong in the table. In general, any time the contents of a group of fields may apply to more than a single record in the table, consider placing those fields in a separate table.

EXCEPTION: Adhering to the third normal form, while

theoretically desirable, is not always practical. If you have a Customers table and you want to eliminate all

possible interfield dependencies, you must create separate tables customer for cities, ZIP codes, other sales representatives, that may be

classes,

and

any

factor

duplicated in multiple records. In theory, normalization is worth pursing. However, many small tables may degrade

performance or exceed open file and memory capacities.

It may be more feasible to apply third normal form only to data that changes frequently. If some dependent fields remain, design your application to require the user to verify all related fields when any one is changed.

2.2 Review of the Related Studies

2.2.1 DE Jewelry Centre

DE Jewelry Centre is one of the most popular online jewelry shops one can find and search over the internet globally. The company can be searched through this website One can have easy

address http://www.dejewelrystores.com.

access in this site because of the well organized system.

One must register in order to purchase a product. In MyAccount Link, the members list of orders, total amount, date of order and other necessary personal information are stored here. This system has also provided an option as to what currency to use when shopping.

Popular

searches of different section in bracelets,

pendants, rings, bangles, accessories etc. can be linked here. This features diverse categories of elegant items

with its available price offered.

When a specific item is

chosen, just click the link to see the image and the prices of that specific item/product. Monthly Special Feature

Items with image, captions and prices are also displayed. New products for the next fashion sense are also in the

other box.

There are also news archive link about the Articles with great fashion sense

products in this site.

can be read in this corner.

In the lower part of this site, you will see links About Us, Contact Us, Site Map, Privacy Policy,

Terms of Use, Return Policy and Shipping Policy. The shop supports Free Shipping for all the products, on all orders, worldwide. via DHL, UPS, the All international shipments are shipped EMS express use mail regular orders are In mainly, Air and at for by

FEDEX,

present

store

does

not

Mail

international international numbers and

orders. express inquire

All and

the buyers

are

shipped to

informed the

track Info Any

about

address.

Billing

Link, you can see information on how will you pay. credit card and bank accounts may be accepted.

Part

of

the

success

of

DE

Jewelry

Centre

is

its

accessibility in the internet. Losses were regained after 3 years of operation. The use of MySQL database and online ordering system highly aided the shop in storing and

monitoring the increasing number of customers. Especially noteworthy in e-tailing's growth curve is the role of the fourth quarter. As online shopping spikes every holiday

season, it pulls the rest of the year up with it. "In every year, it brings people online to buy, and so those people shop again the next quarter," Mudd notes. So the fourth quarter, "is important not only because it's as big as it is, but because it exposes the population to e-commerce more than any other." DE Jewelry Centre experiences

escalating sales by 16-18% every year.

2.2.3 Shell Accessories

Shell

Accessories

Online

Shopping

Store

is

subsidiary of Bedido Fashion Jewelry, one of the leading Manufacturers and Exporters of Philippine made handicrafts. Top quality This items, is all handcrafted in Cebu to perfection, Philippines. are This

assured.

based

City,

Online Shopping Store has the edge of being based in a country skilled that boasts of its rich natural resources and for online

people. are

Competitive offered. Its

prices site

especially an

wholesalers

contains

catalogue with clear and sharp item pictures of products, so that customers may conveniently shop anytime, anywhere. Digital catalogues upon request are also available. A

strong customer service and sales support system that deals

mainly on client needs have also been established. Hence, the company enjoys increasing profit.

In

the

homepage,

wide

selection

of

Shell

from

Philippine Seas, Complete line of Shell Jewelry from Shell Necklaces, Shell Dangling Earrings, Shell Anklets, Shell

Pendants, and Shell Beads pictures are showcased. At the top is where My Account, Cart Contents and Contact Us can be found. In My Account, there are two forms to be filled out one for the new customers to sign up while the other is for the returnees to sign in. The Cart Contents reminds the customers of what has already been shopped as well as the number of items during that time; if it has none, then Your shopping Cart is empty will prompt. The company

supports master card and other credit cards for billing. So, customers need not to worry if they ran out of cash.

At the right side locates the quick search of which keywords are encoded to find the product the customers are looking for. Live support is as well provided for anyone who has difficulty in comprehending the steps of shopping or browsing the interface. everyone visibility Another is thing to is the

advertisements products,

wherein high

invited 200

advertise and

enjoy

over

networks

increase sales. Next are the lists of Information regarding Gift Voucher FAQ, Fashion Topics, Jewelry Forum and Crafts Discussions are linked for the contents. These corners give the customers various tips about jewelry and their reviews help the shop to improve its management. The latest update of their site is the Jewelry Sale wherein the company posts the off-price item of the week.

2.2.3 Rosegold Pawnshop & Jeweler

Rosegold

Pawnshop

&

Jeweler

has

been

one

of

those

jewelry business establishments that built a great name in Davao. Aside from veracity and assiduousness, ingenuity has brought them to come up with an online purchasing and

pawning that would cater the sumptuous desire of customers for jewelry. The features on page sway the customers to revisit and incessantly support the business.

Rosegold Pawnshop & Jeweler page has 11 links at the top portion of the webpage. It is divided into two partsthe upper left side locates the links for Shopper where only Davao-based customers are invited to join; Business where great deals for business inclined individuals are

offered;

Advertise

where

owners

of

small

advertising

in

Davao can post ads; Website where a tour to other websites in Davao takes place; Videos where slideshow of items can be viewed in Youtube; and Ask Us where customers can email questions about Rosegold Pawnshop & Jeweler products. While on the upper right side, the Sign In Register FREE can be found. Account WowBuddy This would that navigate you to a sign up form for

Type: and

has only two choices of textbox the type. These features would

WowBusiness

redirect the consumer to social sites like facebook and twitter and e-businesses such as e-buy wherein more

Internet buyers may have surf the site and purchase items of their choice. In this way, the company has a persistent growth in sales.

Beneath are the online advertisements and information about promos and how to join. Through this, many customers are interested to keep updated with the advantages.

Chapter 3

3.0 Requirements Modeling

The programmers searched for a company that would serve as respondents.

The programmers wrote a letter to set an interview to the manager address. Questionnaires were also prepared.

The letter and questionnaires were verified. The programmers sent the letter to the companys e-mail address.

The programmers distributed questionnaires that inquire the company manager and staff regarding business transaction problems.

The programmers noted the all the hardware and software requirements available; and observed the business transaction.

The manager was interviewed


by the programmers about the company and booked a schedule for questionnaire dissemination.

The programmers assessed the companys problems from the collected answers on questionnaires

The programmers determined how the problems of the company be derived to state the dilemma of the programmers

The programmers segmented the general problem into sub problems.

3.1 Data and Processes Modeling

3.1.1 Systems Flowchart

3.1.2 Data Flow Diagram

3.2 Users Requirements and Considerations

Users come in two major categories the administrator and the customer. To maintain security in the system, every user must login using own username and encrypted password. Barely the administrator handles all the administrative

tasks like organizing accounts, enhancing features of the web pages, providing network security and so has the

privilege to access all files such as to hide or delete records that create profanity. The customers on the other hand are not granted with the permission to modify the

system only the selected functions supplied. A member or a guest may post comments and suggestions on the wall but not to edit or remove the post of other customers. All

customers are required to read and comprehend all the terms and conditions as well as supplementary policies set by the company especially when purchasing to avoid delays or

evasion of rights.

Chapter 4

4.0 Input Design

The first information to be keyed in by the user is the register and login. Textboxes are provided for manual input as well as buttons of submit and clear. Invalid User Account will prompt to filter illegal login and so requires users to register. For further inquiry and assistance, the member may post his questions on the wall.

The

administrator

has

all

the

permissions

to

input

photos of jewelries and add or modify information about those.

4.1 Output Design

The system presents various sections on jewelry types ring, necklaces, bracelets, etc. Once clicked, the customer will see all the products and prices sorted accordingly. Photos of discounted products are also featured at the home page.

It, moreover, provides a page wherein the member may view his profile as well as all the items, date, quantity and amount purchased. The member has also the privilege to add, change and delete the items on cart. Only the member could write comments on the wall. Answers for inquiries will be sent to their emails or a reply be displayed on the same page

4.2.1 ER Diagram

4.2.2

Data Dictionary

Column Name account_num firstname lastname email username password street

Customer Description Data Type Customers ID int number Customers first name Customers 20

Size

Null No No No Yes No No Yes

varchar 20 varchar 20

last name Customers e- varchar 30 mail Costumers user name Customers Password Street address of varchar 15 varchar 15 varchar 30

city/province

the customer City/province varchar 30 where customer the

Yes

contact

resides Customers contact

int

20

Yes

account_img

number Customers profile

varchar 20

Yes

picture account_aboutme Customers personal information

varchar 50

Yes

Column Name ordered_id account_num

Orders Description Data Type Orders ID int Customers int

Size 20 20 No No Yes 65,2 Yes

Null

ID number ordered_date Date of timestamp Order total_amount Total amount ordered status items Status of varchar 50 of decimal

Yes

the ordered item pending not if or

Column Name item_id

Items Description Data Type Items ID int

Size 20 No

Null

Description jewelry_type

number Items

varchar

50 20

No No

description Items varchar jewelry

type jewelry_class Items jewelry date_added class The when admin. added price item_img item Items price Items the

varchar

20

No null

Not

date timestamp the

Yes

decimal varchar int

65, 2 20 10

No No null Yes Not

image item_quantity Items quantity

Column Name

Ordered_item Description Data Type int ID 20 20 20

Size No

Null

order_item_num Ordered items order_id item_id

number Orders ID int Items ID int

No No

qty

number Ordered items

int

10

Yes

amount

quantity Ordered items total price

decimal

65, 2

No

Comment Column Name Description Data Type Comment_id Comments int ID number Account_num Customers item_id comment int

Size 20 20 20 50 No No No Yes yes

Null

ID number Items ID int number Customers varchar

comment Date_posted Date when timestamp the Customer posted comment the

Discounts

Column Name Discount_id

Description Data Type Discounted int items ID ID int of int

Size 20 No

Null

Item_id

number Items

20 20

No No No

number Discount_rate Rate Date_started

discount Date when timestamp discounts

Date_ended

started Date when timestamp discounts ended

No

Chapter 5

5.0

Hardware and Software Requirements

The system must have the following hardware requirements:

Component

Minimum

Recommended Dual processors that are each 3 GHz or faster 4 GB NTFS file systemformatted partition with 3 GB of

Processor 2.5 gigahertz (GHz) RAM 2 gigabyte (GB) NTFS file system formatted partition Disk with a minimum of 3 GB free space for your Web of free space sites DVD drive or the source Drive DVD drive copied to a local or network-accessible drive 1024 768 or higher Display 1024 768 resolution monitor 56 kilobits per second 56 Kbps or faster (Kbps) connection Network between client computers and server computers and server connection between client free space plus adequate

The system requires the following software specification:

Web browsers IE8, Firefox, Chrome, Opera and Safari. So to check that the page views are good across a variety of platforms.

Gimp For picture editing Dreamweaver MX 2004 text editing mode Xampp Xampp creates a server on PC so as to create a full working page and be tested before uploading Fireftp / Filezilla A Firefox plugin to transfer files. or Windows notepad Mainly used in

5.1 Security and Privacy

To establish logical security, the system would ask the user to register and login. Each username and password is unique so no users have the same username and password at the same time. Passwords are encrypted so that other may fraud the account. Only the administrator is granted with privileges changes. to access all accounts and modify necessary

If with

customer

chooses

to --

provide such are as

the in

administrator email or by the

personal

information forms

completing

other

which

submitted

through

website - this information is used only to respond to the customers questions or process the forms to complete the requested transactions. No information is shared with other

agencies

unless

it

is

required

by

law.

No

information

gathered is used to create individual profiles.

Backups are ensured every now and then in order to minimize data loss. System Restore will be the immediate action in case of loss.

It uses "cookies" to customize/enhance the use of this site. A cookie is a tiny piece of text that is placed on computer's hard drive. If a web browser is set to notify before accepting cookies, it will be prompted to accept before it is stored on computer. This cookie by itself only informs us a previous visitor has returned. It in no way

provides us with personal information about the customer.

In physical security, the company ensures that the items sold are genuine and are delivered on time. In networking connections, cable wires are separated from power chords to avoid EMS. Hard wares are locked with passwords so that only the delegated personnel can access.

5.2

Users Manual

This manual is provided for better understanding of the interface and functions of this system.

Home - It most often refers to the initial or main web page of a web site, sometimes called the front page. It also includes the login page wherein the system identifies

whether the one using is a guest or an administrator

Register One cannot login unless registered. So the user must register on this page.

Once logged in, the customers may view the above page to

navigate other features like view profile, cart, ordered items, and received items.

Cart The page where the customers shopped items are listed

Profile The member could view his profile information he provided upon registration; change username, edit

information, or edit profile photo

Discount

Page

This

is

where

you

can

shop

for

great

advantages of the week. Items information can also be found here.

New Items - This is where photos of newly arrived items are displayed

Bracelets Variety of bracelets are offered at this page

Earrings - Variety of earrings are offered at this page

About

Us

This

is

where

the

administrator

types

the

information about the company.

Contact Us To establish effective communication, users may contact the company through this page Chapter 6

6.0 Systems Recommendation

After a thorough elicitation and analysis of the system, the following are recommended:

Jewelry may tie up with other companies like Paypal in order to establish airtime payment. It may also have s to social sites for faster promotion of business. Hence the operation would be even more efficient.

If Version 2 be produced, the system may have 3D on photos, currency converter, calculator and calendar for

fascinating graphical user interface. Features like online chatting with camera may also be included here. This can be used for simultaneous interaction. A picture may also be included in the account of every user for personal

identification purposes.

References

www.about.com\hardware www.about.com\jewelry www.about.com\msql www.about.com\software www.ask.com\e-commerce www.ask.com\e-tailer www.ask.com\links www.ask.com\transaction www.dejewelrystores.com www.shellaccessories.com

www.wikipedia.com\css www.wikipedia.com\database www.wikipedia.com\html www.wikipedia.com\website www.wikipedia.com\webdesign

Vous aimerez peut-être aussi