0% found this document useful (0 votes)
152 views23 pages

Report of Online Shopping

This document provides an overview and requirements for an online shopping system project being developed by students at Indus University. It outlines the goals of the project, including allowing customers to browse products, create shopping carts, and securely purchase items online. It describes the proposed system modules, including ones for customers, employees, and administrators. The document also specifies the technical requirements, including the programming languages, databases, and other tools to be used in developing the system.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
152 views23 pages

Report of Online Shopping

This document provides an overview and requirements for an online shopping system project being developed by students at Indus University. It outlines the goals of the project, including allowing customers to browse products, create shopping carts, and securely purchase items online. It describes the proposed system modules, including ones for customers, employees, and administrators. The document also specifies the technical requirements, including the programming languages, databases, and other tools to be used in developing the system.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 23

Indus University

Department of Computer Science and Engineering


A Report on online Shopping
Course Title: Web Engineering
Submitted By:
Student Name ID Work
M. Sumair Alam 500-2018 Backend
Muhammad Tahir Frontend
Sohail Anjum 1368-2018 Database
Abdullah Rasheed 2623-2017 Documentation

Semester : 6th Semester


Semester: Fall-2020
Section: B

Submitted To: Miss Sabika


Lecturer,
Department of Computer Science and Engineering,
Indus University.
ABSTRACT

Online classifieds are used to provide the customers with huge amount of information. This is a
site to login to get the latest updates of the automobiles, matrimony and real estates. An easy way
to buy a product just sitting in front of your computers by registering into our site.

This is to facilitate all people who are busy with their works and have no time to get their
desired goods. We are here to provide you all the best and suitable places for sale. If once you
register into our site, then you are benefitted with our latest updates of the sales!

This is used to advertise the products with images. One can easily login to get any kind of
information. Here the user is also facilitated to directly interact with the consumer. He can get
the desired product with different rates and quality.

The main goal is to provide the customer with various goods just by sitting in front of a
computer .He can get the goods easily without moving from place to place.

Consumers can also have a chance of introducing their products not only in a single place but
throughout the world using online classifieds. This system allows the user to interact directly
just by sitting in front of the computer. Consumers have a chance of comparing the product
and purchase the desired one

This document fully and formally describes the requirements of the proposed said project
system. It sets out the functional and non-functional requirements and includes a description
of the user interface and documentation and training requirements.
INTRODUCTION

Online shopping is a form of electronic commerce where the buyer is directly online to the
seller's computer usually via the internet. There is no intermediary service. The sale and
purchase transaction is completed electronically and interactively in real-time such as
Amazon.com for new books. If an intermediary is present, then the sale and purchase
transaction is called electronic commerce such as online shopping.

Proposed System:

The development of this new system contains the following activities, which try to develop
on-line application by keeping the entire process in the view of database integration approach.

1. Secure registration and profile management facilities for Customers.

2. Browsing through the e-Mall to see the items that are there in each category of

a. Products like Apparel, Kitchen accessories, Bath accessories, Food items etc.

3. Creating a Shopping cart so that customer can Shoppe ‘n’ no. of items and checkout
finally with the entire shopping cart

4. Customers should be able to mail the Shop about the items they would like to see in
the Shop

5. Secured mechanism for checking out from the Shop( Credit card verification
mechanism )

6. Updates to customers about the Recent Items in the Shop.

7. Uploading ‘Most Purchased’ Items in each category of products in the Shop like

a. Apparel, Kitchen accessories, Bath accessories, Food items etc.


Overview of online shopping

The central concept of the application is to allow the customer to shop virtually using the
Internet and allow customers to buy the items and articles of their desire from the store. The
information pertaining to the products are stores on an RDBMS at the server side (store). The
Server process the customers and the items are shipped to the address submitted by them. The
application was designed into two modules first Os for the customers who wish to buy the
articles. Second is for the storekeepers who maintains and updates the information pertaining
to the articles and those of the customers? The end user of this product is a departmental store
where the application is hosted on the web and the administrator maintains the database. The
application which is deployed at the customer database, the details of the items are brought
forward from the database for the customer view based on the selection through the menu and
the database of all the products are updated at the end of each transaction. Data entry into the
application can be done through various screens designed for various levels of users. Once
the authorized personnel feed the relevant data into the system, several reports could be
generated as per the security.

Number of Modules

The system after careful analysis has been identified to be presented with the following
modules:

1. Customer.

2. Employee.

3. Admin Module.

4. Security and Authentication


SOFTWARE REQUIREMENTS

Operating System : Windows XP


User Interface : HTML, CSS
Client-side Scripting : JavaScript
Programming Language : Java
Web Applications : JDBC, Servlets, JSP
IDE/Workbench : My Eclipse 6.0
Database : MYSQL
Server Deployment : Tomcat 5.x
Frame Work : Struts 1.x

HARDWARE REQUIREMENTS

Processor : Pentium IV
Hard Disk : 40GB
RAM : 512MB or more
SYSTEM ANALYSIS&DESIGN

Introduction

Analysis is the focus of system developing and is the stage when system designers have to
work at two levels of definition regarding the study of situational issues and possible solutions
in terms of “what to do” and “how to do”.

System Study

Definition of the system

A system is an orderly grouping of independent components linked together according to a


plan to achieve a specific objective. Its main characteristics are organization, interaction,
independent, integration and central objective a system does not necessarily mean to a
computer system. It may be a manual system or any other names.

Needs of the system

Social and economic factor: a wave of social and economic changes often follows in the wake
of the new technology. New opportunities may arise to improve on a production process or to
do something that was not previously possible. Changes in the ways individuals are organized
into groups may then be necessary, and the new groups may complete for economic resources
with established units.

Technological factor: people have never before in a time when the scope of scientific inquiry
was so broad, so when the speed of applying the new technology accounts for many changes
in the organization.

High level decisions and operating processes: in response to technological, socio-economical


factors, top level managers may decide to recognize operations and introduce new products.
To deal with these needs, people commonly seek new modified information to support the
decision. When that happens, then they obtain turn to a computer system for help the
information users and data processing specialist then work together to complete a series of
steps in a system study to produce output results to satisfy information needs.
System analysis

System Analysis is a process by which we attribute process or goals to a human activity,


determine how well those purpose are being achieved and specify the requirements of the
various tools and techniques that areto be used within the system if the system performances
are to be achieved.

System planning

Planning for information systems has a time horizon and a focus dimension. The time horizon
dimension specifies the time range of the plan, where as the focus dimension relates whether
the primary concern is strategic, managerial, or operational. The system i.e. The Project that
we were assigned was required to complete within 20 weeks. What we had planned is as
follows:

Requirements analysis, Preliminary Investigation & Information Gathering should be covered


st nd
within the 1 and 2 week. Since I was not aware of MYECLIPSE IDE it require 1 week for
me to adjust with that tool. 12 Weeks for the design of the system under development. 1 week
for Testing & Implementation. And rest 2 reserve weeks.

Preliminary Investigation

The initial investigation has the objective of determining the validity of the user’s request for
a candidate system and whether a feasibility study should be conducted.

The objectives of the problem posed by the user must be understood within the framework of
the organization’s MIS plan. Ihad investigated from the concerned authority about the project

Information gathering

A key part of feasibility analysis is gathering information about the present system. The
analyst must know what information to gather, where to find it, how to collect it, and what to
make of it. The proper use of tools for gathering information is the key to successful analysis.
The tools are the traditional interview, questionnaires, and on-site observation
STRUCTURED ANALYSIS

The traditional tools of data gathering have limitations. An English narrative description is
often vague and difficult for the user to grasp. System flowcharts focus more on physical than
on logical implementation of the candidate system. Because of these drawbacks, structured
tools were introduced for analysis. Structured analysis is a set of techniques and graphical
tools (DFD) that allow the analyst to develop a new kind of system specifications that are
easily understandable to the user.
PERFORMANCE REQUIREMENTS

We don't have an exact idea for the performance requirements at this stage. Maybe at this stage
we must say.

1. a powerful server: A large number of the html les are dynamically generated .This puts a lot of
load on the server. It is imperative that server must be powerful enough.

2. A good hard disk (fast and big) are essential for a shop

3. The shop must be well connected to the net by a good connection so that a large number of
customers can use the shop together.

ANALYSIS:

In day to day life, we will need to buy lots of goods or products from a shop. It may be food
items, electronic items, house hold items etc etc. Now a days, it is really hard to get some
time to go out and get them by ourselves due to busy life style or lots of works. In order to
solve this, B2C E-Commerce websites have been started. Using these websites, we can buy
goods or products online just by visiting the website and ordering the item online by making
payments online.

This existing system of buying goods has several disadvantages. It requires lots of time to travel
to the particular shop to buy the goods. Since everyone is leading busy life now a days, time
means a lot to everyone. Also there are expenses for travelling from house to shop. More over the
shop from where we would like to buy something may not be open 24*7*365. Hence we have to
adjust our time with the shopkeeper’s time or vendor’s time.

In order to overcome these, we have e-commerce solution, i.e one place where we can get all
required goods/products online. The proposed system helps in building a website to buy, sell
products or goods online using internet connection. Purchasing of goods online, user can
choose different products based on categories, online payments , delivery services and hence
covering the disadvantages of the
Chapter 1.0 HTML

INTRODUCTION

Webpages are written in HTML - a simple scripting language.

HTML is short for HyperText Markup Language.

Hypertext is simply a piece of text that works as a link.

Markup Language is a way of writing layout information within documents.

Basically an HTML document is a plain text file that contains text and nothing else.

When a browser opens an HTML file, the browser will look for HTML codes in the text and
use them to change the layout, insert images, or create links to other pages.
Since HTML documents are just text files they can be written in even the simplest text editor.

A more popular choice is to use a special HTML editor -maybe even one that puts focus on
the visual result rather than the codes - aso-called WYSIWYG editor

Some of the most popular HTML editors, such as FrontPage or Dreamweaver will let you
create pages more or less as you write documents in Word or whatever text editor you're
using.
However, there are some very good reasons to create your own pages - or parts of them - by
hand...
Chapter 2.0 CSS

What is CSS?

Cascading Style Sheets, fondly referred to as CSS, is a simple design language intended to
simplify the process of making web pages presentable.

CSS handles the look and feel part of a web page. Using CSS, you can control the color of the
text, the style of fonts, the spacing between paragraphs, how columns are sized and laid out,
what background images or colors are used, as well as a variety of other effects.

CSS is easy to learn and understand but it provides powerful control over the presentation of
an HTML document. Most commonly, CSS is combined with the markup languages HTML
or XHTML.

Advantages of CSS:

 CSS saves time - You can write CSS once and then reuse same sheet in multiple
HTML pages. You can define a style for each HTML element and apply it to as many Web
pages as you want.

 Pages load faster - If you are using CSS, you do not need to write HTML tag
attributes every time. Just write one CSS rule of a tag and apply to all the occurrences of that
tag. So less code means faster download times.

 Easy maintenance - To make a global change, simply change the style, and all

elements in all the web pages will be updated automatically.

 Superior styles to HTML - CSS has a much wider array of attributes than HTML so

you can give far better look to your HTML page in comparison of HTML attributes.

 Multiple Device Compatibility - Style sheets allow content to be optimized for more
than one type of device. By using the same HTML document, different versions of a website
can be presented for handheld devices such as PDAs and cell phones or for printing.

 Global web standards - Now HTML attributes are being deprecated and it is being
recommended to use CSS. So its a good idea to start using CSS in all the HTML pages to
make them compatible to future browsers.
CSS Versions:

Cascading Style Sheets, level 1 (CSS1) was came out of W3C as a recommendation in
December 1996. This version describes the CSS language as well as a simple visual
formatting model for all the HTML tags.

CSS2 was became a W3C recommendation in May 1998 and builds on CSS1. This version
adds support for media-specific style sheets e.g. printers and aural devices, downloadable
fonts, element positioning and tables.

About this Tutorial:

This tutorial covers both versions CSS1 and CSS2 and teaches you CSS starting from basic
concepts to advanced concepts. So now start from next chapter and finish it till end to become
master in CSS.
Chapter 3.0 JAVA SCRIPT

INTRODUCTION

JavaScript is not a programming language in strict sense. Instead, it is a scripting language


because it uses the browser to do the dirty work. If you command an image to be replaced by
another one, JavaScript tells the browser to go do it. Because the browser actually does the
work, you only need to pull some strings by writing some relatively easy lines of code. That’s
what makes JavaScript an easy language to start with.

But don’t be fooled by some beginner’s luck: JavaScript can be pretty difficult, too. First of

all, despite its simple appearance it is a full fledged programming language: it is possible to
write quite complex programs in JavaScript. This is rarely necessary when dealing with web
pages, but it is possible. This means that there are some complex programming structures that
you’ll only understand after protracted studies.

Secondly, and more importantly, there are the browser differences. Though modern web
browsers all support JavaScript, there is no sacred law that says they should support exactly
the same JavaScript. A large part of this site is devoted to exploring and explaining these
browser differences and finding ways to cope with them.

So basic JavaScript is easy to learn, but when you start writing advanced scripts browser
differences (and occasionally syntactic problems) will creep up.

Security:-

Client–side JavaScript has expressly been developed for use in a web browser in conjunction
with HTML pages. This has certain consequences for security.

First of all, please note carefully what happens when a user visits a JavaScript–enhanced web
site:

The user asks for a certain HTML page without knowing whether it contains JavaScript. The
HTML page is delivered to the browser, including the scripts. The scripts usually run
automatically when the page loads or when the user takes a certain action. In general the user
can’t do anything to stop the scripts (well, he could turn off JavaScript, but few end users
know how to do this, or that it can be done, or that JavaScript exists).

So basically an innocent end user downloads a random program and allows it to be executed
on his machine. Therefore there should be strict rules as to what this program can and cannot
do.
Chapter 4.0 MYSQL

What is Database?

A database is a separate application that stores a collection of data. Each database has one or
more distinct APIs for creating, accessing, managing, searching and replicating the data it
holds.

Other kinds of data stores can be used, such as files on the file system or large hash tables in
memory but data fetching and writing would not be so fast and easy with those types of
systems.

So nowadays, we use relational database management systems (RDBMS) to store and


manage huge volume of data. This is called relational database because all the data is stored
into different tables and relations are established using primary keys or other keys known as
foreign keys.

A Relational DataBase Management System (RDBMS) is a software that:

 Enables you to implement a database with tables, columns and indexes.

 Guarantees the Referential Integrity between rows of various tables.

 Updates the indexes automatically.

 Interprets an SQL query and combines information from various tables.

 RDBMS Terminology:

 Before we proceed to explain MySQL database system, let's revise few definitions
related to database.

 Database: A database is a collection of tables, with related data.


 Table: A table is a matrix with data. A table in a database looks like a simple
spreadsheet.

 Column: One column (data element) contains data of one and the same kind, for
example the column postcode.

 Row: A row (= tuple, entry or record) is a group of related data, for example the data
of one subscription.

 Redundancy: Storing data twice, redundantly to make the system faster.

 Primary Key: A primary key is unique. A key value can not occur twice in one table.
With a key, you can find at most one row.

 Foreign Key: A foreign key is the linking pin between two tables.

 Compound Key: A compound key (composite key) is a key that consists of multiple
columns, because one column is not sufficiently unique.

 Index: An index in a database resembles an index at the back of a book.

 Referential Integrity: Referential Integrity makes sure that a foreign key value
always points to an existing row

 MySQL Database:

 MySQL is a fast, easy-to-use RDBMS being used for many small and big businesses.
MySQL is developed, marketed, and supported by MySQL AB, which is a Swedish
company. MySQL is becoming so popular because of many good reasons:

 MySQL is released under an open-source license. So you have nothing to pay to use
it.

 MySQL is a very powerful program in its own right. It handles a large subset of the

 Functionality of the most expensive and powerful database packages.

 MySQL uses a standard form of the well-known SQL data language.

 MySQL works on many operating systems and with many languages including PHP,
PERL, C, C++, JAVA, etc.
 MySQL works very quickly and works well even with large data sets..

 MySQL supports large databases, up to 50 million rows or more in a table. The

 Default file size limit for a table is 4GB, but you can increase this (if your operating
system can handle it) to a theoretical limit of 8 million terabytes (TB).

 MySQL is customizable. The open-source GPL license allows programmers to modify


the MySQL software to fit their own specific environments.

Chapter 5.0 PHP

INTRODUCTION

PHP is a powerful language and the interpreter, whether included in a web server as a module
or executed as a separate CGI binary, is able to access files, execute commands and open
network connections on the server. These properties make anything run on a web server
insecure by default. PHP is designed specifically to be a more secure language for

Writing CGI programs than Perl or C, and with correct selection of compile-time and runtime
configuration options, and proper coding practices, it can give you exactly the combination of
freedom and security you need.

As there are many different ways of utilizing PHP, there are many configuration options
controlling its behaviour. A large selection of options guarantees you can use PHP for a lot of
purposes, but it also means there are combinations of these options and server configurations
that result in an insecure setup.

The configuration flexibility of PHP is equally rivalled by the code flexibility. PHP can be
used to build complete server applications, with all the power of a shell user, or it can be used
for simple server-side includes with little risk in a tightly controlled environment. How you
build that environment, and how secure it is, is largely up to the PHP developer.

This chapter starts with some general security advice, explains the different configuration
option combinations and the situations they can be safely used, and describes different
considerations in coding for different levels of security.
SNAPSHOT

Home Page
Shop Page
Cart Page
Home Slides Page
DATA FLOW DIAGRAM
INTERPRETATION OF THE RESULT

The system has been implemented and tested successfully. It meets the information requirements
specified to the great extent. Although the system has been designed keeping the present and
future requirements in mind and made very flexible.

There are limitations of the system. Proper consideration has been given for a wide range of new
enhancements. The system is developed user friendly. In future, if it is required to generate
reports other than provided by the system it can be simply achieved by a separate module to the
main menu without affecting the design of the system.

ADVANTAGES

(1) It simplifies the operation.

(2) It avoids a lot of manual work.

(3) Every transaction is obtained and processed immediately.

(4) Avoids errors by avoiding the manual work.

(5) User friendly screen to enter the data and enquire the database tables.

(6) Online help messages available to the operating system.

(7) User can easily access the system without much experience.

(8) Provide hardware and software securities.

(9) Portable and flexible for further extensions.


CONCLUSION

The central concept of the application is to allow the customer to shop virtually using the
Internet and allow customers to buy the items and articles of their desire from the store. The
information pertaining to the products are stores on an RDBMS at the server side (store).The
Server process the customers and the items are shipped to the address submitted by them.

The application was designed into two modules first Os for the customers who wish to buy
the articles. Second is for the storekeepers who maintains and updates the information
pertaining to the articles and those of the customers.

The end user of this product is a departmental store where the application is hosted on the
web and the administrator maintains the database. The application which is deployed at the
customer database, the details of the items are brought forward from the database for the
customer view based on the selection through the menu and the database of all the products
are updated at the end of each transaction.

You might also like