Project Post and Sale Report
Project Post and Sale Report
Project Post and Sale Report
Online Classified
Kuldeep Singh
Acknowledgement
I special thanks to the Almighty God who protected me until now and from whom
Wisdom and knowledge comes. . I heartedly give greatly thanks to the College of
Computer Science And Information Technology in Teerthanker Mahaveer
University for their uncountable support during those years. I would also like to
thanks Faculty Mr. Sachin Singh & Mr. Rajeev Kumar
for his guidance and support during my project research.Special thanks also to my
parents, friends that have been so close during our studies.I give special thanks
to my classmates who we have collaborated with since westarted College of
Computer Science And Information Technology in Teerthanker Mahaveer
University.I Say special Thanks to Mr.Afzal Khan
an to Support me develop this software , lastly I kindly express my gratitude to all
my classmates and colleagues for their partnership.
Page 2
Certificate
Enrollment Number:
TCA 1006010
in partial fulfillment of the requirements for the award of College of
Computer Science and Information Technology in Teerthanker
Mahaveer University, during the academic year 2014-15.
Signature :
Mr. /Miss/
Faculty
Mr. Sachin Singh
MR. Rajeev Kumar
Page 3
Abstract
The aim of this project was to design and create a computer program that
gives easy interaction to the online classifieds portal. This site allows the user to
view different classifieds, send query for particular classified and get response for
it. And it allows advertiser to upload and manage their classifieds, get queries of
user and send them response.
The site is simple, user friendly and secured. The solution is designed to
implement several database management techniques and was primarily evaluated
by its ability to transfer data speedily, maintaining secure transaction and easy
interaction. The final result is a PHP program, which provides facilities at an
instance.
It has many technical elements and the rules are fairly simple. This
simplicity makes it a good choice for learning a new program environment. It
covers a range of areas (data modeling, some coding challenges, user interface, etc)
but none too difficult.
Page 4
Table of Contents
S.no
Topic
Page no.
i
Ii
Cover Page
Acknowledgement
iii
Certificate
Iv
Abstract
Introduction
1.1
Project Profile
1.2
Project Introduction
Feasibility study
10
2.1
12
2.2
14
2.3
Feasibility report
16
2.4
17
2.5
Effort distribution
18
2.6
19
20
3.1
Requirement specification
21
3.2
24
3.3
Introduction of Php
25
3.4
Introduction of Mysql
27
3.5
Introduction of HTML
29
3.6
Introduction of css
30
Design
32
4.1
ER diagram
33
4.2
35
4.3
Module
40
Page 5
4.4
Database
42
4.5
Screen shot
44
Testing
57
66
6.1
System Limitation
67
6.2
Future scope
68
Conclusion
69
Refrence
71
Page 6
Page 7
Project Title:
Front-end tool:
Back-end tool:
Mysql
Project category:
Internet Based
Project guide:
Team Size:
Project Duration:
3 months.
Submitted by:
Kuldeep Singh
Afzal Khan
Submitted to:
Page 8
to
serve
as
your
online
Online
classified
portal
site
provides
classifieds/ads. It also allow user to upload their ads.
different
categorized
Guest section
User section
Advertiser section
Admin section
Page 9
Guest section:
In this section, guest user can view categorized classifieds/ads.
Register themselves as a user or advertiser.
Guest user can search a particular classifieds.
Guest user can view company information, contact detail and can also
give suggestion/feedback about site or classifieds.
User Section:
In this section, user can view categorized classifieds/ads and also able
to save the particular ads.
User can send a query request for particular classified/ad and get
response from advertiser for that query.
User can also search particular classifieds/ads.
User can also update their personal profile and password.
User can also give a feedback for the site or classified.
Advertiser Section:
In this section advertiser can purchase scheme to upload their
classifieds/ads.
Advertiser can upload and manage different classifieds in particular
scheme.
Advertiser can receive query from user and able to give response too.
Advertiser also able to view his/her scheme ledger that contains
information like:
How many schemes are there
How many classifieds/ads are uploaded in particular scheme
Scheme status (i.e. running, expired or inactive) and
sufficient balance, etc.
Admin Section:
Admin can manage different database entries.
Admin can view the information related registered users, advertisers
with their scheme details and their feedback.
Admin can also upload/update ads.
Admin can approve scheme activation and ad activation request of the
advertiser.
Page 10
Page 11
Heni
Heni
Management staff
They attend customers call & register their complain & give
them complain number.
On the starting of the day they prepare list of new
complains, pending complains & product installation.
During the day if they receive an emergency call then they
pass it to a particular engineer.
Workload is distributed to different engineers according to
list prepared.
Engineer
Page 12
Payroll
Page 13
Lost of data
In manual system all calls are book on paper means manually &
stock are also maintained by Stock register. If some papers are lost then
it is hard to recollect it. So the documents are more important for service
center.
Tedious
Manual system would take a lot time, concentration & more
paper work. Thus manual system becomes boring.
Expensive
In service center, single person cannot handle all accounts, it
requires more people. So their salary expenses are higher & other
different miscellaneous expenses are also there.
Laborious
In service center many services or call take place. In manual
system whole process is handled by all the staff members & they have a
lot of paper work. Manual system takes a long time & the workload is also
very high.
Manpower used
To do any work manpower is used for e.g. attend the call, work
allotment, stock maintaining. In all case manpower is used & time is also
consumed because man is not as speedier as computer.
Page 14
Less secure
As we know that whole system is based on paper work. So any
unauthorized person may show the important details of the service
center. So it is possible to lack the important information. So manual
system is not secure.
Calculation error
In service centre there is a possibility to arise calculation errors
such as counting of amc-amount (i.e. charged to dealer), salary, repairing
parts quantity, etc.
Lack of instant information
It is very difficult to get information about particular things on a
particular day.
Difficult to generate different types of report
Report generation is the major problem of the service center.
Because it is very difficult to generate timely report. (Means one cannot
able to see any report with minimal efforts, on particular time)
Page 15
Page 16
Page 17
Project Planning:
2 to 3 %
Requirement Analysis:
10 to 25 %
Design:
20 to 25 %
Coding:
15 to 20 %
Testing / Debugging:
30 to 40 %
Page 18
2. Requirement Analysis:
Here we have tried to gather all the requirements pertaining program code, user
interface and database design. The detailed flow of data in the system is depicted. We have
shown the relationships between the entities of data through entities relationship diagrams.
This particular phase leads milestone SOFTWARE REQUIREMENT SPECIFICATION.
Page 19
Page 20
Page 21
If data is not obtained in time, the entire system is considered to be a bad system.
SYSTEM ANALYSIS
1. All user requirements were found feasible instead message alerts on owners
cell phone requirement because product was needed within 10 days so this
requirement cant be met in required time frame. It will be added in future.
2. Searching of Product according to price and color will be added in future.
3. Product listing will be done
4. Necessary email notifications will be sent on owners email id when user wants
to see latest design of products.
SYSTEM DESIGN
The design phase focuses on the detailed implementation for the system
recommendation in the feasibility study. The design phase is a translation from a
program-oriented-document to user-oriented-document. The design activity begins
when the required document for the software to be developed is available. This may
be SRS for the complete system, in case of waterfall model is being followed or the
requirement for the next iteration, if the iterative enhancement is being followed or
the requirement for the prototype if the prototyping is being followed. Design is
essentially the bridge between requirement specification and the final solution for
satisfying the requirements. The term design is used in two ways, when used as a
verb it represents the process the designing while it represents the result of design
process. The goal of design process is to produce some order, which can be later
used to build that system. The produced model is called the design of the system.
The design of the system is essentially a blueprint or a plan for solution for the
system. Here we consider a system to be asset of components which clearly defines
the behavior that interacts with each other in a fixed define manner. A component
of a system can be considered as a system with its own components. In a software
system a component is a software module.
Page 22
The design process for software system has two levels, Top level and logical design.
In top level, it is indicated that how the modules should be integrated. Logical
design expands the system design to contain more detailed description of
processing logic and data structures.
Design is essentially the bridge between requirement specification and the final
solution for satisfying the requirements. The term design is used in two ways,
when used as a verb it represents the process the designing while it represents the
result of design process.
The goal of design process is to produce some order, which can be later used to
build that system. The produced model is called the design of the system. The
design of the system is essentially a blueprint or a plan for solution for the system.
Here we consider a system to be asset of components which clearly defines the
behavior that interacts with each other in a fixed define manner. A component of a
system can be considered as a system with its own components. In a software
system a component is a software module.
MODULAR DESCRIPTION
Administrator: The administrator is most powerful part. All rights are in hand of
administrator.
Administrator
can
add
different
categories,
subcategories,
Subcategories type, Add Products, Purchasing, Issuing. He is the only one who can
adding entries to the database. Without admin permission, nothing can be changed.
Categories: The whole picture revolves around the categories. The categories
includes the Ladies, Gents, Others and party wear. Further the categories are
divided into sub categories like different locations from where products are
purchased all such are the sub categories. To start with anything on the site, the
user has to first select some category and the selection of the category is controlled
by the session. User have to login to purchase the products.
User: Users can view the products, If he/she is interested to purchase the product
firstly he/she need to login in if he/she already registered then start shopping
otherwise he/she have to create account.
Submitted by:- Kuldeep Singh
Page 23
Page 24
PHP is a powerful language and the interpreter, whether included in a web server as
a module or executed as a separate CGI binary, is able to access files, execute
commands and open network connections on the server. These properties make
anything run on a web server insecure by default. PHP is designed specifically to be
a more secure language for writing CGI programs than Perl or C, and with correct
selection of compile-time and runtime configuration options, and proper coding
practices, it can give you exactly the combination of freedom and security you
need.
As there are many different ways of utilizing PHP, there are many configuration
options controlling its behavior. A large selection of options guarantees you can use
PHP for a lot of purposes, but it also means there are combinations of these options
and server configurations that result in an insecure setup.
The configuration flexibility of PHP is equally rivaled by the code flexibility. PHP can
be used to build complete server applications, with all the power of a shell user, or
it can be used for simple server-side includes with little risk in a tightly controlled
environment. How you build that environment, and how secure it is, is largely up to
the PHP developer.
This chapter starts with some general security advice, explains the different
configuration option combinations and the situations they can be safely used, and
describes different considerations in coding for different levels of security.
Page 25
PHP can handle forms, i.e. gather data from files, save data to a file, thru
email you can send data, return data to the user.
You add, delete, and modify elements within your database through PHP.
Using PHP, you can restrict users to access some pages of your website.
Page 26
Query Analyzer: It offers a quick and dirty method for performing queries against
any of your SQL Server databases. It's a great way to quickly pull information out
of a database in response to a user request, test queries before implementing them
in other applications, create/modify stored procedures and execute administrative
tasks.
SQL Profiler: It provides a window into the inner workings of your database. You
can monitor many different event types and observe database performance in real
time. SQL Profiler allows you to capture and replay system "traces" that log various
activities. It's a great tool for optimizing databases with performance issues or
troubleshooting particular problems.
Service Manager: It is used to control the MSSQLServer (the main SQL Server
process),
MSDTC
(Microsoft
Distributed
Transaction
Coordinator)
and
SQLServerAgent processes. An icon for this service normally resides in the system
tray of machines running SQL Server. You can use Service Manager to start, stop or
pause any one of these services.
Page 27
Books Online: is an often overlooked resource provided with SQL Server that
contains answers to a variety of administrative, development and installation
issues. It's a great resource to consult before turning to the Internet or technical
support.
Page 28
The first tag in a pair is the start tag, the second tag is the end tag
Start and end tags are also called opening tags and closing tags.
HTML Documents
a) HTML documents describe web pages
b) HTML documents contain HTML tags and plain text
c) HTML documents are also called web pages
The purpose of a web browser (like Internet Explorer or Firefox) is to read HTML
documents and display them as web pages. The browser does not display the HTML
tags, but uses the tags to interpret the content of the page.
Page 29
Page 30
Generally speaking we can say that all the styles will "cascade" into a new "virtual"
style sheet by the following rules, where number four has the highest priority:
Browser default
External style sheet
Internal style sheet (inside the <head> tag)
Inline style (inside an HTML element)
So, an inline style (inside an HTML element) has the highest priority, which means
that it will override a style declared inside the <head> tag, in an external style
sheet, or in a browser (a default value).
Page 31
4.1 ER Diagram
4.2 Data flow Diagram
4.3 Module
4.4 Database
4.5 Screen Shot
Page 32
4.1 ER Diagram
Data Flow Diagramming is a means of representing a system at any level of
detail with a graphic network of symbols showing data flows, data stores, data
processes, and data sources/destination.
The data flow diagram is analogous to a road map. It is a network model
of all possibilities with different detail shown on different hierarchical levels. This
processes of representing different details level is called leveling or partitioning
by some data flow diagram advocates. Like a road map, there is no starting point or
stop point, no time or timing, or steps to get somewhere. We just know that the
data path must exist because at some point it will be needed. A road map shows all
existing or planned roads because the road is needed.
Details that is not shown on the different levels of the data flow diagram
such as volumes, timing, frequency, etc. is shown on supplementary diagrams or in
the data dictionary. For example, data store contents may be shown in the data
dictionary.
Data Flow Diagram (DFD) uses a number of symbols to represent the
systems. Data Flow Diagram also known as Bubble Chart is used to clarify system
requirements and identifying the major transformations that will become programs
in system design. So it is the starting point of the design phase that functionally
decomposes the requirements specifications down to the level of details.
Page 33
Page 34
Page 35
Process
A process transforms data values. The lowest level processes are pure
functions without side effects. An entire data flow graphics high level process.
Graphical representation:
Graphical Representation:
Data flows
A data flow connects the output of an object or process to input of another
Actors
An actor is active object that drives the data flow graph by producing or
consuming values.
Page 36
Data store
A data store is a passive object with in a data flow diagram that stores data
External Entity
A rectangle represents an external entity such as a librarian ,a library
member.
Graphical Representation:
OutPut Symbol
Graphical Representation:
Page 37
ClassifiedsOnline
Page 38
ClassifiedsOnline
Page 39
4.3 Module
1. Search Ads:
Through this module Viewer can view ads, can also send
response to particular poster.
2. Yellow Pages:
3. Login :
4. Registration Process:
Through this module new posters can registered them.
After giving their details, they will get a user id and
password. Then to get entry into poster section they need
to provide this id and password and only poster with valid
id and password will get entry into poster zone. This is
also a security feature to avoid entry of unauthorized
user.
5. Poster
:
Through this module a poster can post a new ad, update
ad details. He can update including user name and
password and search and shortlist the Viewers, check the
status of advertisements response. He can reply to the
viewers In short this module deals with the whole
advertisement process.
6. Administrator:
This is the Administrators module by which he keep the
eye on whole site and maintain and upgrade the sites
Page 40
document or
9. Mail Inbox:
You can check your mail also and attach the important
files with your mail box.
10. Help:
Provide the functionality to get help about the online
reminder.
Page 41
4.4 Database
Freead:
S.No.
1.
Field Name
Id
Data Type
Integer
Description
Unique ID
2.
Cat_id
Integer
Category ID
3.
Ad_title
Varchar
Title of adv.
4.
Photo_name
Varchar
Name of photo
5.
Description
Text
Description of adv.
6.
Price
Integer
Expected Price
7.
Contact_name
Varchar
Name of contact
8.
Varchar
Email of contact
9.
m_number
Integer
10.
Address
Text
Address of contact
Field Name
Id
Title
Visible
Extension
Data Type
Integer
Verchar
Tinyint
varchar
Description
Unique id
Title of heading
Visible of heading
Extension of heading
Data Type
Int
Int
Varchar
Int
Description
Unique id
Id of sub heading
Title of sub heading
Position of sub heading
Heading:
S.No.
1.
2.
3.
4.
Sub_heading:
S.No.
1.
2.
3.
4.
Field Name
Id
Sub_id
Sub_title
Position
Page 42
User:
S.No.
1.
2.
3.
4.
5.
6.
Field Name
Id
F_Name
L_Name
U_email
U_hash
Username
Data Type
Integer
Varchar
Varchar
Varchar
Varchar
Varchar
Description
Unique id
First name of user
Second name of user
Email of user
Encrypted password of user
Username of user
Data Type
Integer
Integer
Varchar
Varchar
Text
Integaer
Varchar
Varchar
Varchar
Varchar
Varchar
Description
Unique id of user adv.
Category id of user adv.
Title of user adv.
Photo name of adv.
Description of adv.
Expected price
Contact name of user
Email of user
Mobile number of user
Address of user
User name of user
userad:
S.No.
1.
2.
3.
4.
5.
7.
8.
9.
10.
11.
12.
Field Name
Id
Cat_id
Ad_title
Photo_name
Description
Price
Contact_name
Email
M_number
Address
U_name
Page 43
Page 44
lOGIN
Page 45
Signup
Page 46
Page 47
User Login
Page 48
Page 49
Ad of your choice
Page 50
Post an add
Page 51
Contact us
Page 52
Site Map
Page 53
Page 54
SYSTEM TESTING
Here the System testing involved is the most widely used testing process
consisting of five stages as shown in the figure. In general, the sequence of testing
activities is component testing, integration testing, and then user testing.
However, as defects are discovered at any one stage, they require program
modifications to correct them and this may require other stages in the testing
process to be repeated.
Testing is the process of detecting errors. Testing performs a very critical role
for quality assurance and for ensuring the reliability of the software. The results of
testing are used later on during maintenance also.
Submitted by:- Kuldeep Singh
Page 55
Testing is vital to the success of the system. System testing makes a logical
assumption that if the parts of the system are correct, the goal will be successfully
achieved. In adequate testing or non-testing leads to errors that may not appear
until months or even years later (Remember the New York three day power failure
due to a misplaced Break statement).
The time lag between the cause and the appearance of the problem.
2.
The time interval effect of the system errors on files and the records on the
system.
A small error can conceivably explode into a much larger problem. Effective testing
early in the process translates directly into long term cost savings from a reduced
number of errors.
Another reason for system testing is its utility as a user oriented vehicle before
implementation. The best program is worthless if it does not meet the user
requirements. Unfortunately, the users demands are often compromised by efforts
to facilitate program or design efficiency in terms of processing time or design
efficiency.
Thus in this phase we went to test the code we wrote. We needed to know if the
code compiled with the design or not? Whether the code gave the desired outputs
on given inputs? Whether it was ready to be installed on the users computer or
some more modifications were needed?
Page 56
Through the web applications are characteristically different from there software
counterparts but the basic approach for testing these web applications is quite
similar. These basic steps of testing have been picked from software engineering
practices. The following are the steps, we undertook:
3. When web applications are considered the concept of unit changes. Each web
page
encapsulate
content
navigation
links,
content
and
processing
Page 57
content delivery. the various user cases are used that test the system for
errors and mistakes.
6. Thread based testing is done to monitor the regression tests so that the site
does not become very slow is a lot of users are simultaneously logged on.
PSYCHOLOGY OF TESTING
Page 58
TESTING OBJECTIVES:
A good test case is one that has a high probability of finding error, if it
exists.
The software more or less confirms to the quality and reliable standards.
LEVELS OF TESTING
Page 59
Unit testing
Unit testing focuses verification effort on the smallest unit of software i.e. the
module. Using the detailed design and the process specifications, testing is done to
uncover errors within the boundary of the module. All modules must be successful
in the unit test before the start of the integration testing begins.
In this project each service can be thought of a module. There are so many
modules like Login, HR Department, Interviewer Section, etc. Each module has
been tested by giving different sets of inputs. When developing the module as well
as finishing the development, the module works without any error. The inputs are
validated when accepting them from the user.
Integration Testing
After unit testing, we have to perform integration testing. The goal here is to
see if modules can be integrated properly, the emphasis being on testing interfaces
Page 60
between modules. This testing activity can be considered as testing the design and
hence the emphasis on testing module interactions.
In this project the main system is formed by integrating all the modules.
When integrating all the modules I have checked whether the integration effects
working of any of the services by giving different combinations of inputs with which
the two services run perfectly before Integration.
SYSTEM TESTING
Here the entire software system is tested. The reference document for this
process is the requirements document, and the goal is to see if software meets its
requirements.
Here entire HRRP has been tested against requirements of project and it is
checked whether all requirements of project have been satisfied or not.
ACCEPTANCE TESTING
Page 61
and also a complete verification to determine whether the objectives are met and
the user requirements are satisfied.
This is a unit testing method, where a unit will be taken at a time and tested
thoroughly at a statement level to find the maximum possible errors.
I tested step wise every piece of code, taking care that every statement in
the code is executed at least once. The white box testing is also called Glass Box
Testing.
I have generated a list of test cases, sample data, which is used to check all
possible combinations of execution paths through the code at every module level.
White-box test focuses on the program control structure. Test cases are
derived to ensure that all statement in the program control structure. Test cases
are derived to ensure that all statement in the program control structure. Test
cases are derived to ensure that all statement in the program has been executed at
least once during testing and that all logical conditions have been exercised. Basis
path testing, a white box technique, makes use of program graphs (or graph
matrices) to derive the set of linearly independent test that will ensure coverage.
Condition and data flow testing further exercising degrees of complexity.
Submitted by:- Kuldeep Singh
Page 62
Graph based testing methods explore the relationship between and behavior
of program objects. Equivalence partitioning divides the input classes of data are
likely to exercise specific software function. Boundary values analysis probes the
programs ability to handle data at the limits of acceptability.
Page 63
Page 64
Page 65
Page 66
Page 67
Page 68
Page 69
7.1 Conclusion
All feasible requirements of project are met.
Things that have been achieved are:
o Customer can view all the product details
o A customer can login if he already have registered and can buy
the product online.
o Customer can view the products and see the product details like
images and price.
o Only those products will be displayed on website that are allowed
by admin.
o Only admin can edit products details
o Customer can contact admin about product related problems.
Page 70
8.1 Bibliography
8.2 Webography
Page 71
8.1 Bibliography
Php Tutorial
Complete Refrence
Php and Mysql Development
Programming PHP(paperback)
Learning PHP,Mysql And Java script
Sql for Mysql Developers
The Web book
8.2 Webography
www.google.com
www.phptpoint.com
www.w3school.com
www.wix.com
www.htmldrive.net
Page 72