JSP Project Report (Funosphere)
JSP Project Report (Funosphere)
JSP Project Report (Funosphere)
ON
FUN O SPHERE
COMPLETED AT
Next Education
By
Seerat
(2019)
19BTD5050286
ON
FUN O SPHERE
COMPLETED AT
NEXT INSTITUTE
SUBMITTED IN PARTIAL FULFILLMENT FOR AWARD OF DEGREE OF
BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE AND ENGG(CSE)
By
SEERAT
(19BTD5050286)
It is great pleasure to present this report on the project named “FUN O SPHERE” undertaken by
opportunity and I express my deepest thanks to all coordinators, of VAISHNO COLLEGE for
providing all the possible help and assistance and their constant encouragement.
First and foremost I would like to express my gratitude towards our training guide Mr. Varinder
Chugh for placing complete faith and confidence in my ability to carry out this project and for
criticism and constant interest. He took personal interest in spite of numerous commitments and
busy schedule to help me complete this project. Without the sincere and honest guidance of my
respected project guide i would have not been to reach the present stage.
Abstract
This is a project report on “FUN O SPHERE”. During the making/developing of this project i
explored new ideas and functionality behind the working of a notepad and various IDE
This project is the output of our planning, schedule, programming skill and the hard work, and
this report reflects our steps taken at various levels of programming skill, planning and schedule.
I have learnt a lot during this project and liked the improvement in our testing skills and deep
Our project is“ FUN O SPHERE” .This is a web based application which helps people to buy
online ticket for enjoying his week days and check the offers on a park for a particular time
period with different functionalities on internet. It is useful in the way that it makes an easier way
to buy ticket online and knows regarding various rides on an individual parks.
In this application we have basically 2 modules. The first module includes the customer module
1. Customer Module:-The customer have to register for any enquiry related to Parks. The
unregistered person can’t access this application. The registered customer can view
details of parks and he can buy the Ticket of his choice and need. He has to pay the price
of Ticket.
2. The admin module:-contains the access of admin on the application. The admin can
change everything in the application. He have the ability to add, delete,update any
INTRODUCTION
of entertainment attractions, rides, and other events in a location for the enjoyment of large
numbers of people. They have a fixed location, as opposed to travelling funfairs and traveling
carnivals, and are more elaborate than simple city parks or playgrounds, usually providing
attractions meant to cater specifically to certain age groups, as well as some that are aimed
Theme parks, a specific type of amusement park, are usually much more intricately themed to a
Amusement parks evolved from European fairs and pleasure gardens, which were created for
people's recreation. World's fairs and expositions were another influence on the development of
In common language, the terms theme park and amusement park are often synonymous.
A theme park has landscaping, buildings, and attractions that are based on one or more specific
themes or stories.Despite many older parks adding themed rides and areas, qualifying the park as
a theme park,
The first Amusement park built with the original intention of promoting a specific theme, Santa
Claus Land, in Santa Claus, Indiana, did not open until 1946.
Disneyland, located in Anaheim, California, built around the concept of encapsulating multiple
theme parks into a single amusement park, is often mistakenly cited as the first themed
amusement park, but is instead the park that made the idea popular.
Despite many older parks adding themed rides and areas, qualifying the park as a theme park, the
first park built with the original intention of promoting a specific theme, Santa Claus Land
Some parks use rides and attractions for educational purposes. Disney was the first to
successfully open a large-scale theme park built around education. Named Epcot it opened in
1982 as the second park in the Walt Disney World Resort. There are also Holy Land USA and
the Holy Land Experience which are theme parks built to inspire Christian piety. Dinosaur
World entertains families with dinosaurs in natural settings, while the SeaWorld and Busch
Gardens parks also offer educational experiences, with each of the parks housing several
thousand animals, fish and other sea life in dozens of attractions and exhibits focusing on animal
education.
Some theme parks did evolve from more traditional amusement park enterprises, such as Knott's
Berry Farm In the 1920s, Walter Knott and his family sold berries from a roadside stand, which
grew to include a restaurant serving fried chicken dinners. Within a few years, lines outside the
restaurant were often several hours long. To entertain the waiting crowds, Walter Knott built a
Ghost Town in 1940, using buildings relocated from real old west towns such as the Calico,
California ghost town and Prescott, Arizona. In 1968, the Knott family fenced the farm, charged
admission for the first time, and Knott's Berry Farm officially became an amusement
park. Because of its long history, Knott's Berry Farm currently claims to be "America's First
Theme Park." Knott's Berry Farm is now owned by Cedar Fair Entertainment Company. Lake
Compounce in Bristol, Connecticut may be the true oldest continuously operating amusement
park
3) Regional parks
The first regional amusement park, as well as the first Six Flags park, Six Flags over Texas was
officially opened in 1961 in Arlington, Texas The first Six Flags amusement park was the vision
of Angus Wynne, Jr. and helped create the modern, competitive amusement park industry. In the
late 1950s, Wynne visited Disneyland and was inspired to create an affordable, closer, and larger
amusement park that would be filled with fantasy. He followed in the steps of Disney and had
subdivisions within the park that reflected different lands. The subdivisions included the Old
South and other sections that referenced Wynne's background. By 1968, the second Six
Flags park, Six Flags Over Georgia opened, and in 1971, Six Flags Over Mid-America (now Six
Flags St. Louis) opened near St. Louis, Missouri Also in 1971 was the opening of the Walt
Disney World resort complex in Florida with the Magic Kingdom (1971), Epcot (1982), Disney's
1.2 Importance
Everyone is fascinated by amusement parks no matter what the age of a person is. People visit
amusement park to have fun and spend time with family and friends. Amusement centers provide
attractions more elaborate than simple city park or playground. They are equipped
with amusement center equipment specifically designed to match their chosen theme.
Amusement parks are built to attract not just the locals living within the park’s vicinity but also
those from other countries. Their aim is to be a tourist destination which is why a wide variety of
attractions are presented. They offer various forms of entertainment such as arcade centers
carousels, merry-go-round, Ferris wheel, roller coasters, as well as food, drink, and souvenirs.
The success of an amusement park would not be possible without the amusement center
equipment. If the park has a unique ride, there is a big chance that it will be talked about a lot.
The spread of story can serve as the park’s publicity and the curiosity among people will
and are set-up temporarily on vacant lots while amusement parks have permanent location.
Typically, the latter charge an admission fee unlike funfairs and carnival.
Nowadays, amusement parks are collaborated with beach resorts to provide total pleasure to its
visitors. Since they are becoming tourist destinations, the visitors tend to spend several days to
experience more of what the park can offer. An example of this is the Resorts World Sentosa that
1.3.1 Following are the main objectives of the amusement theme park:
4. To help the local society by providing various jobs in our theme park.
6. To be the leading share holder in the coming five years in the entertainment sector.
8 To attract the foreign and local tourist and to provide them better environment
9. To be socially responsible towards the environment and natural habitat.
Advantage # NEXT
NEXT students are offered International Certifications at highly subsidized cost, which is
NEXT is the key organization to train IT and Cyber Security professionals in India.
NEXT students exclusively enjoy Original courseware, Discount vouchers, Access codes
Employable skills are integrated as a essential training module along with the core
curriculum.
Mission
beyound Excellence.
Plav a vital role with Govt. to train IT/Cyber Security professionals, Safeguard Nation,
Make NEXTians the first choice for Recruiters and Companies across the Globe.
Chapter 2
Fun defines enjoyment and sphere defines a piece of land where the parks are constructed.
There is a huge untapped potential in this segment for Indian market. There are handfuls
of amusements parks in the country and seeing the success of such properties, industry
analysts have revealed that in the coming years there would be around 200 more
By 2020, the industry will grow by almost 100 per cent. As of now the total industry is
worth Rs 4,000 crore which is expected to grow by Rs 15-20,000 crore by 2020. Only
when user see that there is free of cost site by which everyone from everywhere can book
The amusement park industry in India is worth Rs. 7,000 crore and has been growing
exponentially in the last few years. The associated and participatory entertainment in the
amusement industry is one of the major reasons behind the rapid growth of amusement
parks. Hence, the industry has a bright future in the coming years.
Indian amusement industry is expected to grow more in near future. More and more
investment in the industry can be expected. The entertainment industry is ready to invest
Theme Parks markets. World market for Theme Parks is projected to reach US$31.8
entertainment and leisure platforms, and growing base of middle class households,
In today’s busy world, people don’t have time for their personal needs. And the technology is
so fast that anyone can do anything by just sitting in a room. The internet is the way that helps a
person in all aspects. If someone wish to buy and view things, he can buy online with the help of
internet.
Today there are very least organizations which are manual. Everything is going to be
computerized and online whether it is banking, advertising or shopping. We are trying to help
In this we have introduced many modules like admin module and customer module. The
customer have to register for any enquiry related to parks, online booking of tickets etc. The
unregistered person can’t access this application. The registered customer can view details of
parks and he can buy ticket . He has to pay the price of ticket of a particular park
The admin module contains the access of admin on the application. The admin can change
everything in the application. He has the ability to add, delete, update any information regarding
the parks
The project’s home page includes the registration link. The registered users can login to their
account for their queries or buy ticket by choosing particular park by own. And the unregistered
users have first to register. The registration can be done by following the sign up link .
3.1.1 RIDES IN FUN-O-SPHERE INDUSTRY:
1) KIDDIE’S RIDES:-These are off two types
a) Bike
b) Horse
Specification:
SIZE: - 4 X 2 FEET
CAPACITY: - 1 PERSONS
PRICE: - Rs. 200 per person
2) VIDEO GAMES:-These are off three types
a) Video Race Bike
b) Speed Champ Car
c) Monaco Gp Video Car
Specification:
SIZE: - 5 X 3 FEET
CAPACITY: - 1 PERSON
PRICE: - Rs. 500 Per person
3) SKILL GAMES:-These are off-two types
a) Air Hockey
Specification:
SIZE: - 102”X60”X72”H
CAPACITY: - 2 PERSON
PRICE: - Rs. 100 per person
b) Basket ball
Specification:
SIZE: - 84”X42”X84”H
CAPACITY: - 2 PLAYERS
PRICE: - Rs.100 per person
4) GIFT GAMES:-it is only off 1 type
a) Boxing
Specification:
SIZE: - 5 X 5
CAPACITY: - 1 PERSON
PRICE: - Rs. 1000 per person
5) FAMILY THRILL RIDES:
a) Flume Coster
Specification:
SIZE: - 30 X 80
CAPACITY: - 6 PERSON AT A TIME
PRICE: - Rs. 35 per person
b) Tora Tora
Specification:
SIZE: - 30 Ft. Dia
CAPACITY: - 36 PERSONS AT A TIME
PRICE: - Rs. 200 per person
c) Striking Car
Specification:
SIZE: - 2, 000 SQ. FT
CAPACITY: - 1 PERSON IN 1 CAR
PRICE: - Rs.400-500
6) WALKING ANIMALS AND CARS:
Specification:
CAPACITY: - 1 CHILD
PRICE: - Rs. 50 PER PIECE
7) PLAY PORT:
Specification:
PRICE:40 per Student
3.2 Components of the project
How to Login
In this module, the user will enter his username and password to view and buy latest
In this site, the candidate can join this application , if he is not a member yet by pressing
sign up link .User should provide some details that are asked to join.
Any park can be searched by selecting the given park which the user wish to view or buy
First the user has to login,and then he will visit and view all kinds of parks and select a
park of his choice where user wants to go. Then after selection he will be able to buy
ticket and the rate of a given park and also discounts offered will show to the user.
From an end-user perspective, the Online Amusement Park Project consists of various functional
Elements:
Ticketing System is designed to handle various type of identification technology such as bar
code paper tickets,magnetic paper tickets ,RFID tags,Biometry and also virtual electronic
ticket which can be issued by E-Mail or MMS.Tickets can be used for entry charges ,but also for
further identification inside the facility utilizing and additional customer services.It also provide
single payment and ticketing system for all services regardless which ticketing system is used.
Such a way visitor can pay entry fee by auto pay parking station and use parking ticket for entry
to the facility.
Ticket reservation, service or product reservation and many others can be processed by
integrated reservation system. Reservation system can be used via phone (call center), e-mail,
web or by on-line terminals distributed among facility. Payment and reservation terminals can
utilize same hardware equipment. Typical usage is booking of sport facilities, seats in
System provide complete support for manually operated payment counters or fully automated
payment station. .Payment can be done by cash, credit cards, vouchr or by mobile phones.
Payment counter can be also fully virtual and work as part of electronic reservation system or E-
SHOP via web interface. All credit card payments and internet payments must always follow the
regulations and banking standards in each country. Payment counters can also use third party
Theme parks has typically two possible scenarios of stock management utilization.
First case has to handle all equipment, which is borrowed to visitors (including registration,
maintenance, returns, deposits etc.) and second is handling standard stock of goods or food for
shops, restaurants and catering facilities. EPOS 3000 is able automatically generate demand on
This system also highly limit possible fraud of goods by employees. Similar concept can be used
for all merchants in the facility if required not limited only on food.
a) Sell barcoded tickets for validation at Point of Sale, mobile devices, or turnstiles
b) Integrates directly with your local applications, eliminating the need for additional manual
processes
c) Changes to your inventory items, such as price or description, will synchronize directly to
d) Operate an online retail store with inventory control integrated to your POS
f) We manage the web server for you, so you don’t need to worry about server security or up-
time
d) Projected labor budgets as you are building schedules help to control labor costs
e) Employees can view and print their schedule from any computer operating the CenterEdge
Advantage software
platform. Since Java has its own runtime environment (JRE) and API, it is called platform.
Java Example:
class test
Where it is used?
According to Sun, 3 billion devices run java. There are many devices where java is currently
4. Mobile
5. Embedded System
6. Smart Card
7. Robotics
8. Games etc.
3.4.2 Types of Java Applications
There are mainly 4 type of applications that can be created using java programming:
1) Standalone Application
need to install on every machine such as media player, antivirus etc. AWT and Swing are used in
2) Web Application
An application that runs on the server side and creates dynamic page, is called web application.
Currently, servlet, jsp, struts, jsf etc. technologies are used for creating web applications in java.
3) Enterprise Application
An application that is distributed in nature, such as banking applications etc. It has the advantage
of high level security, load balancing and clustering. In java, EJB is used for creating enterprise
applications.
4) Mobile Application
An application that is created for mobile devices. Currently Android and Java ME are used for
has no programming background and has never learnt introductory programming languages like
C++, learning the concepts of JAVA wouldn’t be a barrier. Without the necessity to use and
understand magic characters like Generics Angle Brackets etc., JAVA promotes English syntax
and commands instead. Once the initial lessons are caught hold, the rest often becomes easier.
Applications that are developed using the OOPS (Object Oriented Programming) concept of
JAVA are more competent as they are extensible, scalable and flexible. It has a rich library of
default design patterns and other best practices. Open sources like Spring etc. use the concepts of
Object Oriented Programing making it all the more adaptable for application developments on
Java.
3) Platform Independent
Since the time JAVA has gained popularity, i.e. from 1990s, its Platform Independent nature has
made it a highly demanded technology. This feature has made it complement the tagline “Write
Once Run Anywhere” in true sense as it has opened doors to many new developments. Till
today, this continues to be the reason why many Java applications are built on Windows and run
on UNIX.
JAVA’s community support has been bliss to all programmers. Bundles of forums to post
queries, Stackoverflows and other user groups has always extended support and help on all
topics. Giving and taking advice on Java application developments from experts for free has
Since JAVA requires high storage capacity and uses more memory, it becomes slower in
2) Security Concerns
Being platform independent, JAVA developments are at a risk of facing security breaches.
1) Variables
2) Method
3) Constructor
4) Instance Block
5) Static Block
Variable
Method
Constructor
Instance Block
Static Block
}
1) Variables
Variables are used to store values by using these values we are able to execute that values
a) local variable
b) Instance variable
c) Static Variable
Void m1()
Int a=10;
System.out.println(a
t.m1();
}
}
b) Instance Variable:-are those variable which is declare inside the class but outside the
methods,constructor or block.
int a=10;
int b=20;
System.out.println(t.a);
System.out.println(t.b);
c) Static Variable:-The variable which is declared inside the class but outside the
{
static int a=100;
System.out.println(c);
System.out.println(Test.a);
System.out.println(Test.b);
2) Method
Inside the class directly writing the business logics are not allowed .Methods are used to write
Logics application
a) Instance method
b) Static method
a) Instance method:-Method are used to write logics of the application and memory is allocated
System.out.println(“This is m1 method”);
Void m2()
System.out.println(“this is m2 method”)
t.m1();
t.m2();
b) Static method:-are used to write the buisness logics of the application by using static
modifier
System.out.println(“This is m1 method”);
System.out.println(“this is m2 method”)
Test.m1();
Test.m2();
3) Constructor
Constructor in java is a special type of method that is used to initialize the object. Java
constructor is invoked at the time of object creation. It constructs the values i.e. provides data for
b) Parameterized constructor
a) Default Constructor:
For ex:-
Class Test
{
Test()
b) Parameterized constructor:
For ex:
class Student4{
int id;
String name;
id = i;
name = n;
}
void display(){System.out.println(id+" "+name);}
s1.display();
s2.display();
The Java Development Kit (JDK) :-is a Sun Microsystems product aimed at Java developers.
Since the introduction of Java, it has been by far the most widely used Java SDK. On 17
November 2006, Sun announced that it would be released under the GNU General Public
License (GPL), thus making it free software. This happened in large part on 8 May 2007 and the
The primary components of the JDK are a selection of programming tools, including:
JAVA – The loader for Java applications. This tool is an interpreter and can interpret the
class files generated by the javac compiler. Now a single launcher is used for both
development and deployment. The old deployment launcher, jre, is no longer provided with
Sun JDK.
JAVAC – The compiler, which converts source code into Java bytecode
JAR – The archiver, which packages related class libraries into a single JAR file. This tool
APPLETVIEWER – This tool can be used to run and debug Java applets without a web
browser.
JAVAH – The C header and stub generator, used to write native methods
JSTACK – (Experimental) This utility prints Java stack traces of Java threads.
JINFO – (Experimental) This utility gets configuration information from a running Java
JMAP – (Experimental) This utility outputs the memory map for Java and can print shared
object memory maps or heap memory details of a given process or core dump.
IDLJ – The IDL-to-Java compiler. This utility generates Java bindings from a given IDL
file.
POLICY TOOL – The policy creation and management tool, which can determine policy
for a Java runtime, specifying which permissions are available for code from various
sources
VISUALVM – visual tool integrating several command line JDK tools and lightweight
The JDK also comes with a complete Java Runtime Environment, usually called a private
runtime. It consists of a Java Virtual Machine and all of the class libraries that will be present in
the production environment, as well as additional libraries only useful to developers, such as the
Also included are a wide selection of example programs demonstrating the use of almost all
Java virtual Machine (JVM):-is a virtual Machine that provides runtime environment to
execute java byte code. The JVM doesn't understand Java typo, that's why you compile
your *.java files to obtain *.class files that contain the byte codes understandable by the JVM.
JVM control execution of every Java program. It enables features such as automated exception
Fig3.1:-Architecture of JVM
Program register : Program register holds the address of JVM instruction currently being
executed.
Executive Engine : Execution engine controls the execute of instructions contained in the
Native Method Interface : Native method interface gives an interface between java code and
Native Method Libraries : Native Libraries consist of files required for the execution of native
code.
a software suite that consolidates the basic tools developers need to write and test software.
Typically, an IDE contains a code editor, a compiler or interpreter and a debugger that the
developer accesses through a single graphical user interface (GUI). An IDE may be a standalone
application, or it may be included as part of one or more existing and compatible applications.
For ex:
My Eclipse
NetBeans
3.5.4 Front End:
Java Server Pages (JSP) :-is a server-side programming technology that enables the creation of
dynamic, platform-independent method for building Web-based applications. JSP have access to
the entire family of Java APIs, including the JDBC API to access enterprise databases.
2) About servlet:
Servlet:is a technology is used to create web application (resides at server side and generates
Servlet technology is robust and scalable because of java language. Before Servlet, CGI
language. But there was many disadvantages of this technology. We have discussed these
disadvantages below.
There are many interfaces and classes in the servlet API such as Servlet, GenericServlet,
Java Database Connectivity (JDBC):- is an application programming interface (API) for the
programming language Java, which defines how a client may access a database. It is part of the
with first-class functions, and is best known as the scripting language for Web pages, but
scripting language that is dynamic, and supports object-oriented, imperative, and functional
programming styles.
JavaScript runs on the client side of the web, which can be used to design / program how the web
pages behave on the occurrence of an event. JavaScript is an easy to learn and also powerful
HTML (Hypertext Markup Language):- is the set of markup symbols or codes inserted in a
file intended for display on a World Wide Web browser page. The markup tells the Web browser
how to display a Web page's words and images for the user. Each individual markup code is
referred to as an element (but many people also refer to it as a tag). Some elements come in pairs
that indicate when some display effect is to begin and when it is to end.
A cascading style sheet (CSS) :-is a Web page derived from multiple sources with a defined
order of precedence where the definitions of any style element conflict. The Cascading Style
Sheet, level 1 (CSS1) recommendation from the World Wide Web Consortium (W3C), which is
implemented in the latest versions of the Netscape and Microsoft Web browsers, specifies the
possible style sheets or statements that may determine how a given element is presented in a
Web page.
3.5.5 Back End
1) About mysql
MySQL is the world's most popular open source database. With its proven performance,
reliability and ease-of-use, MySQL has become the leading database choice for web-based
applications, used by high profile web properties including Facebook, Twitter, YouTube, Yahoo!
Oracle drives MySQL innovation, delivering new capabilities to power next generation web,
MySQL runs on virtually all platforms, including Linux, UNIX, and Windows. Although it can
be used in a wide range of applications, MySQL is most often associated with web-based
applications and online publishing and is an important component of an open source enterprise
stack called LAMP. LAMP is a Web development platform that uses Linux as the operating
system, Apache as the Web server, MySQL as the relational database management system
Chapter 4
EVALUATION OF TRAINING
The Systems Development Life Cycle (SDLC) is a conceptual model used in project
management that describes the stages involved in an information system development project
from an initial feasibility study through maintenance of the completed application. Various
SDLC methodologies have been developed to guide the processes involved including the
waterfall model (the original SDLC method). Documentation is crucial regardless of the type of
model chosen or devised for any application, and is usually done in parallel with the
development process. Some methods work better for specific types of projects, but in the final
analysis, the most important factor for the success of a project may be how closely particular
plan was followed.
Applications
The main applications of the FUN-O-SPHERE is the ability of the website to properly show
enroll the users and manage information about them. The administrator has the ability to change
,modify, view and delete the various details regarding the users and arts. The users have the
Challenges
The challenges mainly lie in detecting attacks like viruses, hacking and also in the
implementation of firewall. A virus can enter the system and can disrupt the working of the
website. Hacking can be done by some people who want to access some restricted sections of the
website (e.g. administrator’s area) and to modify or taper some aspects of the website.
4) The loopholes remaining in the system (or website) which are used by attackers.
5) The server from where the viruses or hackers are gaining access to the system.
Goal of Thesis
The goal of our thesis is to develop a website that can be used as an enrollment website with the
features of interaction and problem solving. The whole project will be based on JAVA with
MYSQL as the database with certain security constraints added to it. the Administrator part in to
the project so that the server or administrator himself can view, add, delete and modify.
Administrator
He has to see whether the website is working properly and whether the details available in the
system are relevant and correct. He can view, add, modify, delete details.
Database
The database keeps all the records of all the users i.e. name, course, phone no., dob, city,
country,etc. For creating such records it takes the help of tables which is created in the MYSQL.
The tables can have infinite entries of all the registered users as well as administrators.
Clients
Our aim will also to provide efficient way by which client can enter to see the offers available for
parks and also buy online ticket easily without wasting a time.
Security Constraints
There need to be certain constraints which have to be implemented on the database as well as on
the administrator in order to work properly the whole system, such as declaring the primary key,
Each user has a field called username which can be used to differentiate between
different users.
The administrator has his own password known to no one else to access a unique page.
Only the administrator has the right to delete, modify users and questions.
Administrator has to first login to get access to myaccount part and modify some data
A new user cannot have same username and password as of some already registered user.
When user or administrator click on logout the session of the user ends and he has to
again login using his/her username and password to access the same functionality.
From the inception of ideas for software system, until it is implemented and delivered to
customer and even after that the system undergoes gradual developments and evaluations.
At the feasibility stage, it is desirable that two or three different configuration will be pursed that
satisfy the key technical requirement but which represent different level of ambition and cost.
Feasibility is the determination of whether or not a project is worth doing. A feasibility study is
The data collected during primary investigation examines system feasibilities that is likelihood
Technical Feasibility :-This is concerned with specifying equipment and software that
will successfully satisfy the use considerably, but might include
o The feasibility to produce output in a given time because system is fast enough to
o Response time under certain circumstances and ability to process a certain volume
Economical Feasibility :- Economic analysis is the most frequently used technique used
cost/benefit analysis the procedure is to determine the benefits and savings that are
expected from a proposed system and compared them with cost. Though the cost of
installing the system may appear high, it is one time investment. The resulting benefits is
that automation results in turnaround time. The resulting cost/benefit ratio is favorable.
The design phase involves converting the informational, functional, and network requirements
identified during the initiation and planning phases into unified design specifications that
developers use to script programs during the development phase. Program designs are
constructed in various ways. Using a top-down approach, designers first identify and link major
program components and interfaces, then expand design layouts as they identify and link smaller
subsystems and connections. Using a bottom-up approach, designers first identify and link minor
program components and interfaces, then expand design layouts as they identify and link systems
and connections.
Contemporary design techniques often use prototyping tools that build mock-up designs of
items such as application screens, database layouts, and system architectures. End users,
designers, developers, database managers, and network administrators should review and refine
the prototyped designs in an iterative process until they agree on an acceptable design.
programmer’s ability to develop programs and modify them after they are placed in production.
The documentation also helps management ensure final programs are consistent with original
goals and specifications. Organizations should create initial testing, conversion, implementation,
and training plans during the design phase. Additionally, they should draft user, operator, and
maintenance manuals.
A DFD also known as ‘bubble chart’, has the purpose of clarifying system requirements and
identifying major transformations. It shows the flow of data through a system. It is a graphical
tool because it presents a picture. The DFD may be partitioned into levels that represent
increasing information flow and functional detail. Four simple notations are used to complete a
DATA FLOW:-The data flow is used to describe the movement of information from one part of
PROCESS:-A circle or bubble represents a process that transforms incoming data to outgoing
data. Process shows a part of the system that transform inputs to outputs.
entities represent any entity that supplies or receive information from the system but is not a part
of the system.
data store symbol which can represent either a data structure or a physical file on disk. The data
store is used to collect data at rest or a temporary repository of data. It is represented by open
rectangle.
OUTPUT:-The output symbol is used when a hard copy is produced and the user of the copies
Request Request
Online Amusement
Park Park
user
Company
Response Response
Admin
Fig4.1:Level 0 DFD
SCREEN SHOTS
1) HOME PAGE
2) LOGIN PAGE
5) USER ACCOUNT
1) Software testing
Software testing is the process used to measure the quality of developed computer software.
Usually, quality is constrained to such topics as correctness, completeness, security, but can also
include more technical requirements as described under the ISO standard ISO 9126, such as
intended to reveal quality-related information about the product with respect to the context in
White box and black box testing are terms used to describe the point of view that a test engineer
Black box testing treats the software as a black-box without any understanding as to how the
internals behave. Thus, the tester inputs data and only sees the output from the test object. This
level of testing usually requires thorough test cases to be provided to the tester who then can
simply verify that for a given input, the output value (or behavior), is the same as the expected
and algorithms. For this reason, unit testing and debugging can be classified as white-box testing
and it usually requires writing code, or at a minimum, stepping through it, and thus requires more
skill than the black-box tester. If the software in test is an interface or API of any sort, white-box
In recent years the term grey box testing has come into common usage. This involves having
access to internal data structures and algorithms for purposes of designing the test cases, but
testing at the user, or black-box level. Manipulating input data and formatting output do not
qualify as grey-box because the input and output are clearly outside of the black-box we are
calling the software under test. This is particularly important when conducting integration testing
between two modules of code written by two different developers, where only the interfaces are
Grey box testing could be used in the context of testing a client-server environment when the
tester has control over the input, inspects the value in a SQL database, and the output value, and
then compares all three (the input, sql value, and output), to determine if the data got corrupt on
Software testing is used in association with verification and validation (V&V). Verification is the
checking of or testing of items, including software, for conformance and consistency with an
associated specification. Software testing is just one kind of verification, which also uses
techniques such as reviews, inspections, and walkthroughs. Validation is the process of checking
Verification: Have we built the software right? (i.e. does it match the specification).
Validation: Have we built the right software? (i.e. Is this what the customer wants?)
Level of testing
Unit testing tests the minimal software component, or module. Each unit (basic component) of
the software is tested to verify that the detailed design for the unit has been correctly
implemented. In an Object-oriented environment, this is usually at the class level, and the
Integration testing exposes defects in the interfaces and interaction between integrated
works as a system.
Functional testing tests at any level (class, module, interface, or system) for proper functionality
System testing tests a completely integrated system to verify that it meets its requirements.
System integration testing verifies that a system is integrated to any external or third party
Acceptance testing can be conducted by the end-user, customer, or client to validate whether or
not to accept the product. Acceptance testing may be performed as part of the hand-off process
independent test team at the developers' site. Alpha testing is often employed for off-the-
shelf software as a form of internal acceptance testing, before the software goes to beta
testing.
Beta testing comes after alpha testing. Versions of the software, known as beta versions,
are released to a limited audience outside of the company. The software is released to
groups of people so that further testing can ensure the product has few faults or bugs.
Sometimes, beta versions are made available to the open public to increase the feedback
immersion. The rigors that are applied are often unsystematic and many of the basic tenets of
testing process are not used. The Alpha and Beta period provides insight into environmental and
After modifying software, either for a change in functionality or to fix defects, a regression test
re-runs previously passing tests on the modified software to ensure that the modifications haven't
performed at any or all of the above test levels. These regression tests are often automated.
environments. Primary tasks include announcing the implementation schedule, training end
users, and installing the product. Additionally, organizations should input and verify data,
configure and test system and security parameters, and conduct post-implementation reviews.
Management should circulate implementation schedules to all affected parties and should notify
transferred to a new system. Verifying the accuracy of the input data and security configurations
is a critical part of the implementation process. Organizations often run a new system in parallel
with an old system until they verify the accuracy and reliability of the new system. Employees
should document any programming, procedural, or configuration changes made during the
verification process.
4.1.7 TEST PLAN
The testing phase requires organizations to complete various tests to ensure the accuracy of
applications and other network components. Thorough testing is critical to ensuring systems
meet
Bottom-up tests often begin with functional (requirements based) testing. Functional tests should
ensure that expected functional, security, and internal control features are present and operating
properly. Testers then complete integration and end-to-end testing to ensure application and
system components interact properly. Users then conduct acceptance tests to ensure systems
meet defined acceptance criteria. Organizations should review and complete user, operator, and
maintenance manuals during the testing phase. Additionally, they should finalize conversion,
software, and documentation to support its operational effectiveness. It includes making changes
Routine changes are not as complex as major modifications and can usually be implemented in
the normal course of business. Routine change controls should include procedures for requesting,
accurate, up-to-date hardware and software inventories is a critical part of all change
management processes. Management should carefully document all modifications to ensure
accurate system inventories. Management should coordinate all technology related changes
through an oversight committee and assign an appropriate party responsibility for administering
software patch management programs. Quality assurance, security, audit, regulatory compliance,
processes. Risk and security review should be done whenever a system modification is
Chapter 5
We have successfully implemented the site ‘Fun O Sphere. With the help of various links and
tools, we have been able to provide a site which is live and running on the web. We have been
successful in our attempt to take care of the needs of both the customers as well as the
administrator. Finally we hope that this will go a long way in popularizing the organization and
making it’s work of enrollment, keeping track of Records of items, problem solving, etc much
more efficient.
In our experiment the "integration phase", while not mechanised, was so simple that it could
have been mechanised. Even in the few cases where errors did occur, the system had been
structured in such a way that diagnostic messages automatically indicated the module making the
error. We had no need for anyone who had a thorough knowledge of the whole system.
We can implement easily this application. Reusability is possible as and when we require in this
application. We can update it next version. We can add new features as and when we require.
There is flexibility in all the modules. Scope of this document is to put down the requirements,
clearly identifying the information needed by the user, the source of the information and outputs
expected from the system.
The following section discusses the work that will be implemented with future releases of the
software.
1. Detailed categories: Future work could involve adding more categories which are more
detailed and have additional items.
2. Watch/Wish List: Work can add a watch list or wish list so that users can add an rides to a
list to watch for item prices to go down or to see when there is a discount on any of those items.
3. Enhanced User Interface: Work on enhancing the user interface by adding more user-
interactive features.
4. Recommended Items: Add a bar that would display the most-recommended parks which
would depend on the number of times an ticket has been purchased by any users.
5. Payment Options: Add different payment options, such as Visa, MasterCard, PayPal, etc.,
where a user can also save the card information for later checkouts.
BIBLIOGRAPHY