Flee Bazaar
Flee Bazaar
Flee Bazaar
SYNOPSIS
1. SYNOPSIS
Flea bazaar is a web-based a system for shopping specifically designed to facilitates both
software sellers and buyers. Through this software sellers can post and sell their products
and customers can buy and search for their software’s of different type the customer can
search items based on category. In this seller, buyers can do their job easily. In the client
can find items, can see the video running, the rating of each software, categorized view of
product, can post quires, and view the replies about a product under one roof. In those 4
type users –users, buyers, marketing agents, vendors can work jointly under one software
according to needs.
INTRODUCTION
Our portfolio of reusable frameworks and components can be adapted to suit clients?
Requirements with minimum customization, so we do not have to re-invent the
wheel every time. This ensures speedy product delivery and faster time to market.
Our unflinching commitment to continuous process improvement and our holistic
approach to quality will ensure measurable benefits to our clients by way of cost
savings, productivity increases and speed in achieving business goals.
HARDWARE REQUIREMENTS
Processor requirements: Dual core
Hdd : 1.2 Gd
Mouse : I ball
SOFTWARE REQUIREMENTS
Operating system : windows 8
SYSTEM ANALYSIS
3.SYSTEM ANALYSIS
3.1 EXISTING SYSTEM
The existing system contains outdated contents and technologies. It has lot of difficulties
and draw backs. The users have to go through number of sites for their needs. In existing
systems downloading is only possible and in most cases their only two users are present
an admin and a user.
Draw backs
3. The vendors are called through advertising through newspaper or through an external
source
It supports networking.
*change password
2 .Vendor management
vendor posts his products in system after adimin varification.he add his products with its
all details and add advertaisement schemes to make product attactive to user.This system
consists of lot of advertaisement methods like adding vedios ,photos etc to add marketing
tecnics.the normal user can post qurories about that product and vendor have provision to
reply to them based on their products
*Marketing products
*Deleting Products
*Password change
*Change password
*Viewing Products
*Change password
Economical feasibility
Technical feasibility
Behavioral feasibility
Avoid duplication
High security
People are inheritantly resistant to change and computers have been known to facilitate
change. Staff and user react positively as computer application will decrease workload.
As a result this new system gets approval from the employee. New system issue friendly
since training is not needed.
REQUIREMENT ANALYSIS
Problem recognition
Modeling
PROBLEM RECOGNITION
The conventional l product trading operated in partially web based manner.
Administration of product trading is a very tedious and time-consuming task.
Mailing facility
Users are allowed to know all details of their products with the help of advertising
agents
The model helps analyst to understand information, function and behavior of the
system.
The model becomes the main reference for review to determine completeness,
consistency and accuracy of the specification.
SYSTEM DESIGN
DATA DESIGN
Data design creates a new model of data or information that is
represented at a high level of abstraction the structure of data has always been an
important part of software design. The data design activity translates these elements of
requirement model into data structure at the software component level. In actuality, the
design of data begins during the creation of analysis model.
ARCHITECTURAL DESIGN
Architectural design is a comprehensive framework that
describes its form and a structure- its components and how they fit together. Architectural
design, a software component can be something as simple as a program module, but it
can also be extended to include database and “middleware” that enable the configuration
of a network of client and servers. The properties of components are those that
characteristics that are necessary to an understanding of how the component interacts
with other components. Architectural design focuses on the representation of the structure
of software components, their properties and interactions.
INTERFACE DESIGN
Interface design creates an effective communication medium
between the computers and human. Different interface designs are:
INPUT DESIGN
The input design is the link between the information system and
the user. It comprises the developing specification and procedures for data preparation
and those steps are necessary to put transaction data into a usable form for processing
data entry. The activity of putting data into the computer for processing can be achieved
by inspecting the computer to read data from a written or printed document or it can
occur by having people keying the data directly in to the system. The design of input
focuses on controlling the amount of input required, controlling errors, avoiding delay,
avoiding extra steps and keeping the process simple.
The system needs the data regarding the asset items, depreciation
rates, asset transfer, and physical verification for various validation, checking, calculation
and report generation. The error raising method is also included in the software, which
helps to raise error message while wrong entry of input is done.
OUTPUT DESIGN
Computer output is the most important and direct information
source to the user. Output design is a process that involves designing necessary outputs in
the form of reports that should be given to the users according to the requirements.
Efficient, intelligible output design should improve the system’s relationship with the
user and help in decision making. Since the reports are directing referred by the
management for taking decisions and to draw conclusions they must be designed with
almost care and the details in the reports must be simple, descriptive and clear to the user.
So while designing output the following things are to be considered.
CODING
SYSTEM TESTING
White box is a test case design method that uses the control structure of the procedural
design to derive test cases. Using the white box testing methods, we derived test cases
that guarantee that all independent paths within a module have been exercised at least
once. This testing should
Exercise all logical decisions on their true and false sides.
Execute all loops at their boundaries and within their operational bounds.
Exercise internal data structures to ensure their validity.
Black box testing might be called testing in large.
In functional testing, the software or module to be tested is treated as a black
box and the test case is decided based on specifications of the system or module. So this
testing is also called black box testing. It tests the external behavior of the system.
Black box testing is done to find incorrect or missing function, interface errors,
errors in external database access, performance errors and initialization and termination
errors.
The specification states what the program should do and how it should perform
under various conditions used. Test cases are developed, that will result in the execution
of every instruction on the program or module.
Testing progress by moving outward along the spiral to the integration testing
where the focus is to design and construction of the software architecture. Taking
another turn out of the spiral, we finally encounter validation testing.
Unit testing heavily make use of white box testing strategies exercising
specific paths in a modules control structure to ensure complete coverage and maximum
error detection. Unit testing focuses on modules to locate errors. The test cases needed
for unit testing must exercise each condition and option. If the module receives input or
generates output test case are needed to test the range of values expected including valid
and invalid data.
After coding, each dialog was tested and run individually. All the
unnecessarily coded statements were removed and it was endured that all the
functionalities worked as expected. Any logical errors found were corrected.
Integration Testing
Integrated testing is a systematic testing that can be done with sample data.
The need for the integrated test is to find the overall system performance. In integration
testing, the relationship between the modules is tested. For this purpose, test cases are
developed for each condition or combination of inputs. By examining the results it can
be determined whether the program performs according to its specified requirements. In
this project the modules that are specified in unit testing are testing are tested for their
relationships.
Black box test case design techniques are the most prevalent during
integration. Integration testing is the systematic technique for constructing the program
structure by condition tests to uncover error associated with the interfacing. Many test
modules are combined into subsystems, which are then tested. Rigorous integration is
conducted to make the application free for any interface errors that may occur during
transactions. Integration testing is a verification of the interface among system parts.
Integration test addressing the issues associated with the dual problems of verification
and program construction.
System validation checks the quality of the software in both simulated and live
environments. First the software goes through a phase in which errors and failures based
on simulated user requirements are verified and studies. The modified software is then
subjected to phase two in the actual user’s site or live environment. Validation testing
provides the final assurance that the software meets all the functional, behavioral and
performance requirements.
IMPLEMENTATION
Implementation Methods:
There are several methods for handling the implementation and
the consequent conversion from the old to the new computerized system.
The most secure method for conversion from the old system to
the new system is to run the old and new system in parallel. In this approach, a person
may operate in the manual older processing system as well as start operating the new
computerized system. This method offers high security, because even if there is a flaw in
the computerized system, we can depend upon the manual system. However, the cost for
maintaining two systems in parallel is very high. This outweighs its benefits.
Implementation Plan:
The implementation plan includes a description of all the
activities that must occur to implement the new system and to put it into operation. It
identifies the personal responsible for the activities and prepares a time chart for
implementing the system. The implementation plan consists of the following steps:
Identify all data required to build new files during the implementation.
List all new documents and procedures that go into the new system
SOFTWARE MAINTENANCE
The maintenance phase of the software cycle is the time in which a Software product
performs useful work. After a system is successfully implemented, it should be
maintained in a proper manner. System maintenance is an important aspect in the
software development life cycle. The need for system maintenance is for it to make
adaptable to the changes in the system environment. There may be social, technical and
other environmental changes, which affect a system, which is being implemented.
Software product enhancements may involve providing new functional capabilities,
improving user displays and mode of interaction, upgrading the performance
characteristics of the system. So only through proper system maintenance procedures, the
system can be adapted to cope up with these changes. Software maintenance is of course,
far more than “finding mistakes”. We may define maintenance by describing four
activities that are undertaken to after a program is released for use.
The third activity that may be applied to a definition of maintenance occurs when
a software package is successful. As the software is used, recommendations for new
capabilities, modifications to existing functions, and general enhancements are received
from users. To satisfy requests in this category, preventive maintenance is performed.
This activity accounts for the majority of all effort expended on software maintenance.
APPENDICES
Primary Key:payid
CONTEXT LEVEL(LEVEL0)
Request Response
LEVEL 3_CUSTOMER
CONCLUSION
BIBLIOGRAPHY