A Major Project Report On "Online Shopping Cart"
A Major Project Report On "Online Shopping Cart"
A Major Project Report On "Online Shopping Cart"
During 2011-2012
Submitted To:
Submitted By:-
Mr.Narender Agarwal
Head of CSE
Abhishek Bharadwaj
Ankit Kumar Singh
Abhishek Mudgal
Table Of Content
INTRODUCTION
The main aim of the project is to improve the services of Customers and vendors. It maintains
the details of customer payments, product receipts, addition of new customers, products and
also updating, deletion for the same. It also mails the details of users which have logged in
the shopping portal to the email id which they have given during the signup process.
The primary features of the project entitled are high accuracy,design flexibility and easy
availability. And also it uses database tables Representing entities and relationships between
entities.The site containing avery interesting feature sending a mail to the customer about
their registration process
Online shopping is the process whereby consumers directly buy goods, services etc. from a
seller interactively in real-time without an intermediary service over the internet. Online
shopping is the process of buying goods and services from merchants who sell on the
Internet. Since the emergence of the World Wide Web, merchants have sought to sell their
products to people who surf the Internet. Shoppers can visit web stores from the comfort of
their homes and shop as they sit in front of the computer. Consumers buy a variety of items
from online stores. In fact, people can purchase just about anything from companies that
provide their products online.
Books, clothing, household appliances, toys, hardware, software, and health insurance are
just some of the hundreds of products consumers can buy from an online store.
Many people choose to conduct shopping online because of the convenience. For example,
when a person shops at a brick-and- mortar store, she has to drive to the store, find a parking
place, and walk throughout the store until she locates the products she needs. After finding
the items she wants to purchase, she may often need to stand in long lines at the cash register.
Despite the convenience of online shopping, not everyone chooses to purchase items and
services online. Some people like the idea of physically going to a store and experiencing the
shopping process. They like to touch the merchandise, try on clothing, and be around other
people. Online shopping doesn't permit shoppers to touch products or
1.OVERVIEW OF PROJECT
The central concept of the application is to allow the customer to shop virtually using the
Internet and allow customers to buy the items and articles of their desire from the store. The
information pertaining to the products are stores on an RDBMS at the server side (store)
which is maintained in My SQL. The Server process the customers and the items are shipped
to the address submitted by them.
The application was designed into two modules:I>
Customers who wish to buy the articles.
II>
Storekeepers who maintains and updates the information pertaining to the articles
and those of the customers.
The end user of this product is a departmental store where the application is hosted on the
web and the administrator maintains the database. The application which is deployed at the
customer database, the details of the items are brought forward from the database for the
customer view based on the selection through the menu and the database of all the products
are updated at the end of each transaction. Data entry into the application can be done
through.
2. SYSTEM STUDY
Information systems projects originate from many reasons: to achieve greater speed in
processing data, better accuracy and improved consistency, faster information retrieval,
integration of business areas, reduced cost and better security. The sources also vary project
proposals originate with department managers, senior executives and systems analysis.
Sometimes the real origin is an outside source, such as a government agency which stipulates
a systems requirements the organisation must meet. When the request is made, the first
systems activity, the preliminary investigation, begins. The activity has three parts: request
clarification, feasibility study and request approval.
3.SYSTEM ANALYSIS
This system is all about the converting the shopping system from manual to online.
Customer can buy products online after login to the site.
Administrator is adding product to database.
Administrator can edit or delete the product from the database.
After buying and making payment the products are send to customers address that he has
given.
Customer can write feedback for the product or services.
Admin can see daily sell and feedback given by customer.
Administrator is adding the delivery report to the database.
Both admin and customer can see the delivery report.
3.1 Purpose:
Online shopping tries to enhance access to care and improve the continuity
and efficiency of services. Depending on the specific setting and locale, case managers are
responsible for a variety of tasks, ranging from linking clients to services to actually
providing intensive shopping and delivery services themselves.
Main objective
To shop wile in the comfort of your own home, without having to step out of the door.
Sell at lower rate due to less over head.
Provide home delivery free of cost.
No wait to see the products if someone else is taking that.
3.2 Scope:
This product has great future scope. Online shopping Internet software developed on and for
the Windows and later versions environments and Linux OS. This project also provides
security with the use of Login-id and Password, so that any unauthorized users can not use
your account. The only Authorized that will have proper access authority can access the
software.
The online shopping (HOME SHOP) is an easy to maintain, ready to run, scalable,
affordable and reliable cost saving tool from Software Associates suited for small, medium,
and large shopping complex and shopping malls.
The proposed system can be used even by the nave users and it does not require
any educational level, experience, and technical expertise in computer field but it will be of
good use if the user has the good knowledge of how to operate a computer.
are the savings that will result from the system, including tangible and
intangible ones?
nd operational costs?
4.5.3 Software Interface:Software required to make working of product is:1. Operating System: Windows XP/vista/7 or later version, Linux OS which
networking.
2. JAVA development tool kit.
supports
The product does require back-end database server My SQL for storing the username and
password for different types of user of the system as well as various databases regarding
various insurance information.
Assumptions:
User must be trained for basic computer functionalities .User must have the basic knowledge
of English.The system must be able to respond to database software within reasonable time.
PROBLEM DEFINITION
To develop a web-based application to improve the service to the customers and shopkeeper
which in turn increases the sales and profit in "ONLINESHOPPING CART ".
As the customer can easily buy the products which are visible to him if the product is in the
stock of the shop.
HARDWARE REQUIRED:
SOFTWARE:
JDK 1.6.0_21
TOM-CAT SERVER 5.0 and above ,
My SQL SERVER .
OPERATING SYSTEM :
Windows NT and above
Macintosh
Linux
Data flow diagrams (DFD) was first developed by LARRY CONSTANTINE as way
representing system requirements in a graphical form; this lead to modular design. A DFD
describes what data flow (logical) rather than how they are processed, so it does not depend
on hardware, software, data structure or file organization. It is also known as bubble chart.A
Data Flow Diagrams is a structured analysis and design tool that can be used for flowcharting
in place of, or in association with, information-oriented and process-oriented systems flow
charts. A DFD is a network that describes the flow of data and the processes that change, or
transform, data throughout a system. This network is constructed by using a set of symbols
that do not imply a physical implementation. It has the purpose of clarifying system
requirements and identifying major transformations that will become programs in system
design.
So it is the starting point of the design phase that functionality decomposes the requirement
specifications down to the lowest level of detail.
The symbols used to prepare DFD do not imply a physical implementation, a DFD can be
considered to an abstract of the logic of an information-oriented or a process-oriented system
flow-chart. For these reasons DFDs are often referred to as logical data flow diagrams. The
four basic symbols used to construct data flow diagrams are shown below:
TABLES
-----------------------------------------------------------------------------------------------username
varchar
password
varchar
firstname
varchar
middlename
varchar
lastname
varchar
photos
blob
address
varchar
city
varchar
state
varchar
pincode
varchar
emailid
varchar
phoneno
varchar
itemtype
status
lot_no
description
varchar
int
varchar
varchar
price
edition
category
bookid
isbn_no
double
varchar
varchar
int
varchar
-----------------------------------------------------------------------------------------------clothid
int
type
varchar
price
double
lot_no
varchar
size
int
category
varchar
company
varchar
6. TESTING
Software Testing is an empirical investigation conducted to provide stakeholders
with information about the quality of the product or service under test, with respect to the
context in which it is intended to operate. Software Testing also provides an objective,
independent view of the software to allow the business to appreciate and understand the risks
at implementation of the software. Test techniques include, but are not limited to, the process
of executing a program or application with the intent of finding software bugs. It can also be
stated as the process of validating and verifying that a software program/application/product
meets the business and technical requirements that guided its design and development, so that
it works as expected and can be implemented with the same characteristics.
Software Testing, depending on the testing method employed, can be implemented at
any time in the development process, however the most test effort is employed after the
requirements have been defined and coding process has been completed.
The IEEE Standards for the Software Quality Assurance Plans states that the plan should
contain the following sections:
1. Purpose
2. Reference documents
3. Management
4. Documentation
5. Standards, practices and conventions
6. Reviews and Audits
7. Configuration Management
8. Problem reporting and corrective action
9. Tools, techniques and methodologies
10. Code Control
11. Media Control
12. Supplier Control
13. Records collection, maintenance and retention.
2. Reference documents:
Software Quality Assurance, Principles and Practice: Nina S God bole.
3. Management:
An IEEE standard lays down three aspects that should be covered in the Software Quality
Assurance Plan:
Organization:
The organization section includes the roles of the team members, their hierarchy etc. It is
important that the head of the Software Quality Assurance (SQA) function in the organization
has the adequate 37authority to be able to perform independent verification that the processes
are adhered to. The following describes the functional groups that influence and control
software quality.
ONLINE
SHOPPING
for IV&V in
Process
-item delivery Process
b) Responsibilities:
The project manager and design/development teams have primary responsibility for
the quality controls applied during the development of the software project.
The quality manager will:
objectives.
e on corrective action with the project manager for any discrepancies, nonconformities found and ensure that corrective action is taken.
4. Documentation:
The basic purpose of the documentation section of the Software Quality Assurance Plan is to
describe the documentation to be produced and how it is to be reviewed. The documentation
section normally includes the following:
defining the software requirements specifications and it aims to check the adequacy of the
requirements.
Design Review: The purpose of this review is to approve formally, the software
top-level design document.
design document as a basis for further development work.
ftware Verification Review: The purpose of this review is to approve the test plan. It is
the evaluation of the adequacy and completeness of the methods described.
software
requirements specification have been met.
consistent prior to delivery to the user.
-Process Audit: In-Process audits of a sample design are held to verify the consistency of
the design.
7. Configuration Management:
This Configuration Management section of the Software Quality Assurance Plan
covers configuration identification, configuration control, configuration status accounting,
and configuration auditing.
folder/files, software traceability matrices, test drivers, test case generators, static or dynamic
test tools, and information engineering CASE tools.
Techniques - techniques include review of the use of standards, software
inspections, requirements tracing, requirements and design verification, reliability
measurements and assessments, and rigorous or formal logic analysis.
Methodologies - methodologies are an integrated set of the above tools and
techniques. The methodologies should be well documented for accomplishing the task or
activity and provide a description of the process to be used.
Damage
1. Supplier Control:
Prior to any purchase of software to support the development effort, SQA
and project members will define and provide complete requirements to the supplier/vendor.
The Software Tool Evaluation Process will be followed. Part of the evaluation process will
require the supplier or vendor to describe their technical support, handling of user questions
and problems, and software product upgrades.
Australians are embracing the internet, with nearly nine in 10 adults (people aged 18 years
and over) in fixed-line telephone households personally using the internet either at home or
away from home at April 2011. Eighty-seven per cent of fixed-line telephone households in
Australia also had an internet connection, with the majority of these households having a
broadband connection (98 per cent).i The number of households with an internet connection
increased from 82 per cent at November 2009.
In addition to increased levels of online connectivity, Australians are using the internet more
frequently59 per cent of adults go online several times a day (up from 53 per cent in
November 2010).
Increasing online participation is paralleled by greater knowledge of the internet and the
associated benefits of going online. At the same time, more organisations have integrated the
internet into their operational plans either by providing retail customer-oriented services
online or by developing electronic supply chains with key suppliers and major customers.
These developments have a number of specific and well-documented benefits for businesses
including:
>
>
>
>
>
avoiding high rental costs (or reducing rental costs) for business premises
comparatively low barriers to entry in terms of business establishment costs
low barriers to geographic expansion across Australia and overseas
reducing the amount of advertising needed to sell products
removing the need for intermediaries and associated costs by interacting directly with
customers. Latest data available from the Australian Bureau of Statistics (ABS) reflects
the increasing importance of the internet to business revenues. The ABS reports that
Australian business received an estimated $143 billion in internet orders during the 2009
10 financial year, an increase of 15 per cent on 200809.ii This included business-tobusiness (B2B) and business-to-consumer (B2C) online sales. In addition, the recent
Sensis report The Online Experience of Small and Medium Enterprises shows that an
estimated 59 per cent of small and medium enterprises (SMEs)businesses with 1200
employeesin Australia received orders for goods and services online at April 2011,
compared to 58 per cent at April 2010 (Figure 1). Industry sectors most prominent in
taking orders online include wholesale trade (76 per cent of SMEs in that sector taking
orders online) and manufacturing (72 per cent) (Figure 2). These sectors are more likely to
be involved in B2B e-commerce, providing services to other industries. According to the
Sensis report, at April 2011, approximately 59 per cent of SMEs in the retail trade
industry, where the majority of B2C activity occurs, took online orders for goods and
services.
70
60
58
59
56
% of SMEs connected to the internet
54
50
48
40
30
20
10
0
2007
2008
2009
2010
2011
Figure 1 Australian SMEs taking orders for goods and services online
Profile shopping online
In the six months to April 2011, approximately 62 per cent of adult internet users purchased a
good or service online (Figure 5). A number of demographic factors influence whether a
consumer purchases online.
Age
People aged 3544 years were the most prominent age group to adopt online shopping, with
73 per cent having made a purchase online in the six months to April 2011. The incidence of
shopping online decreased significantly in people aged over 44, falling to 40 per cent of
internet users aged 65 years and over in the six month to April 2011.
80
73
% of internet users aged 18 years and over
69
65
62
61
60
52
40
40
20
0
Total
1824
2534
3544
Age group
4554
5564
65 +
Income
Income level is also strongly correlated to online purchasing, with 86 per cent of those
earning over $150,000 per annum having made a purchase in the six months to April 2011,
compared to 46 per cent of those earning under $50,000 a year (Figure 6).
Other factors
Online purchasing was also influenced by other factors such as level of education and
employment status. The higher the level of education achieved, the higher the incidence of
online shopping75 per cent of those with postgraduate qualifications shopped online
compared to 43 per cent of those with primary or some secondary
However, as discussed below, mobile phones are increasingly being used for other
e-commerce transactions; specifically, banking and bill payment.
Computer
100
Mobile
97
Other devices
97
80
60
40
20
2
0
Jun-10
Jun-11
Registration Page
Search Records
Search page for Cosmetic items
Updation Process
Update Book
DELETE RECORDS
Delete Books
About US
The system has been implemented and tested successfully. It meets the information
requirements specified to the great extent. Although the system has been designed keeping
the present and future requirements in mind and made very flexible.
There are limitations of the System. Proper consideration has been given for a wide range
ofnew enhancements in the future, throughout the development of system. The system is
developed user friendly.
In future, if it is required to generate reports other than provided by the system, it can be
simply achieved by a separate module to the main menu without affecting the design of the
system.
CONCLUSION
The central concept of the application is to allow the customer to shop virtually using the
Internet and allow customers to buy the items and articles of their desire from the store. The
information pertaining to the products are stores on an RDBMS at the server side (store). The
Server process the customers and the items are shipped to the address submitted by them.
The application was designed into two modules first is for the customers who wish to buy the
articles. Second is for the storekeepers who maintains and updates the information pertaining
to the articles andthose of the customers.The end user of this product is a departmental store
where the application ishosted on the web and the administrator maintains the database. The
application which is deployed at the customer database, the details of the items are brought
forward fromthe database for the customer view based on the selection through the menu and
the database of all the products are updated at the end of each transaction.
Data entry into the application can be done through various screens designed for various
levels of users. Once the authorized personnel feed the relevant data into the system, several
reports could be generated as per the requirements. This system offers information relevant to
the user accessing the application thus avoiding unnecessary overloading and at the same
time maintaining the security.
BIBILIOGRAPHY