Shoe Management Class 12
Shoe Management Class 12
ADITYAPUR, JAMSHEDPUR
SESSION: 2023-24
PROJECT REPORT ON
ROLL NO : 22712727
CLASS : XII
…………………………………….. ……………………………….
Teacher In-Charge Principal
……………………………………..
Practical Examiner School Stamp
2
TABLE OF CONTENTS [ T O C]
01 ACNOWLEDGEMENT 04
02 INTRODUCTION 05
04 PROPOSED SYSTEM 06
08 FLOWCHART 16
09 SOURCE CODE 19
10 OUTPUT 20
11 TESTING 23
12 BIBLIOGRAPHY 24
3
ACKNOWLEDGEMENT
Once again, I would like to thank my classmates and my friends also for
their encouragement and help in designing and making my project
creative. I am in debt of all these. Only because of them I was able to
create my project and make it good and enjoyable experience.
4
PROJECT ON SHOE BILLING SYSTEM (SMS)
INTRODUCTION
This project is based on the way in which the billing is done in the stores
here it is the shoe billing this is helpful for the owners to maintain the list of
the sales done on the day or in a year and also helpful in calculating the
profit.
The objective of this project is to let the students apply the programming
knowledge into a real world situation/problem and exposed the students
how programming skills helps in developing a good software.
5
PROPOSED SYSTEM
Today one cannot afford to rely on the fallible human beings of be really
wants to stand against today's merciless competition where not to wise
saying "to err is human" no longer valid, it's outdated to rationalize your
mistake. So, to keep pace with time, to bring about the best result without
malfunctioning and greater efficiency so to replace the unending heaps of
flies with a much sophisticated hard disk of the computer,
One has to use the data management software. Software has been an
ascent in atomization various organisations. Many software products
working are now in markets, which have helped in making the
organizations work easier and efficiently, Data management initially had to
maintain a lot of ledgers and a lot of paperwork has to be done but now
software production this organization has made their work faster and
easier. Now only this software has to be loaded on the computer and work
can be done.
This prevents a lot of time and money. The work becomes fully automated
and any information regarding the organization can be obtained by clicking
the button. Moreover, now it's an age of computers of and automating such
an organization gives the better look.
6
SYSTEM DEVELOPMENT LIFE CYCLE (SDLC)
7
PHASES OF SYSTEM DEVELOPMENT LIFE CYCLE
INITIATION PHASE
8
SYSTEM CONCEPT DEVELOPMENT PHASE
9
• Construction of executable prototypes is encouraged to evaluate
technology to support the business process. The System Boundary
Document serves as important reference document to support the
Information Technology Project Request (ITPR) process.
• The ITPR must be approved by the State CIO before the project can
move forward.
10
PICTORIAL REPRESENTATION OF SDLC:
PLANNING PHASE
11
input, Personnel assignments, costs, project schedule, and target dates are
established.
12
REQUIREMENTS ANALYSIS PHASE
This phase formally defines the detailed functional user requirements using
high-level requirements identified in the Initiation, System Concept, and
Planning phases. It also delineates the requirements in terms of data, system
performance security, and maintainability requirements for the system. The
requirements are defined in this phase to a level of detail sufficient for
systems design to proceed. They need to be measurable, testable, and
relate to the business need or opportunity identified in the Initiation Phase.
The requirements that will be used to determine. acceptance of the system
are captured in the Test and Evaluation Master Plan.
• Further define and refine the functional and data requirements and
document them in the Requirements Document.
13
DESIGN PHASE
The design phase involves converting the informational, functional, and network
requirements identified during the initiation and planning phases into unified design
specifications that developers use to script programs during the development phase.
Program designs are constructed in various ways. Using a top-down approach,
designers first identify and link major program components and interfaces, then expand
design layouts as they identify and link smaller subsystems and connections. Using a
bottom-up approach, designers first identify and link minor program components and
interfaces, then expand design layouts as they identify and link larger systems and
connections. Contemporary design techniques often use prototyping tools that build
mock-up designs of items such as application screens, database layouts, and system
architectures. End users, designers, developers, database managers, and network
administrators should review and refine the prototyped designs in an iterative process
until they agree on an acceptable design. Audit, security, and quality assurance
personnel should be involved in the review and approval process. During this phase, the
system is designed to satisfy the functional requirements identified in the previous
phase. Since problems in the design phase could be very expensive to solve in the later
stage of the software development, a variety of elements are considered in the design
to mitigate risk. These include:
• Identifying potential risks and defining mitigating design features
• Performing a security risk assessment
• Preparing detailed logic specifications for each software module. The result is a
draft System Design Document which captures the preliminary design for the
system
DEVELOPMENT PHASE
The development phase involves converting design specifications into executable
programs. Effective development standards include requirements that programmers and
other project participants discuss design specifications before programming begins. The
procedures help ensure programmers clearly understand program designs and
functional requirements. Programmers use various techniques to develop computer
programs. The large transaction oriented programs associated with financial institutions
have traditionally been developed using procedural programming techniques.
Procedural programming involves the line-by-line scripting of logical instructions that are
combined to form a program. Effective completion of the previous stages is a key factor
in the success of the Development phase. The Development phase consists of:
15
• Testing at the development facility by the contractor and possibly supported by
end users
• Testing as a deployed system with end users working together with contract
personnel
• Operational testing by the end user alone performing all functions. Requirements
are traced throughout testing, a final independent Verification & Validation
evaluation is performed and all documentation is reviewed and accepted prior to
acceptance of the system.
IMPLEMENTATION PHASE
This phase is initiated after the system has been tested and accepted by the user. In
this phase, the system is installed to support the intended business functions. System
performance is compared to performance objectives established. during the planning
phase. Implementation includes user notification, user training, installation of hardware,
installation of software onto production computers, and integration of the system into
daily work processes. This phase continues until the system is operating in production
in accordance with the defined user requirements.
The system operation is ongoing. The system is monitored for continued performance in
accordance with user requirements and needed system modifications are incorporated.
Operations continue as long as the system can be effectively adapted to respond to the
organization's needs. When modifications or changes are identified, the system may
reenter the planning phase.
16
HARDWARE AND SOFTWARE REQUIREMENTS
SOFTWARE REQUIREMENTS:
i. Windows OS
ii. Python
17
FLOWCHART
importmysql.connector as sql
conn=sql.connect(host='localhost',user='root
',passwd='manager',database='shoe_billing')
conn.autocommit=True
c1=conn.cursor()
FALSE
TRUE
if user=='raghavan' and
18
v_choice=int(input("enter
the choice"))
ifv_choice==1 :
code=input("enter code=")
conn.commit()
v_code=input("
c1.execute("select * from enter the code
shoe_details where shoe_code
"+v_code) 19
20
SOURCE CODE
importmysql.connector as sql
conn=sql.connect(host=‘localhost’,username=’root’,password=’manager’,
database=’shoe_billing’)
#if conn.is connected( ):
#print('connected sucessfully')
conn.autocommit=True
c1=conn.cursor()
#c1.execute("create table shoe_details(shoe_codeint primary
key, brand_name
varchar(25) customer_name
varchar(25), customer_number,, customer_address, amount )")
c1=conn.cursor()
username=input("enter username:")
password=input("enter password:")
if username == ‘raghavan’ and password == ‘leo':
print(" shoe billing")
print(“ ”)
print("1: shoe billing")
print(“ ”)
print("2: show result")
print(“ ”)
v choice=int(input("enter the choice"))
if v_choice==1:
code=input("enter code=")
brand=input("enter brand=")
name=input("enter customer name=")
number=input("enter phone number=")
21
details=input ("adress=")
amount input("amount=")
c1.execute("insert into shoe_details values
('+code+","+brand+" ' "+","+name+","+number+","+details+"""
+amount+")")
conn.commit()
elif v_choice==2:
v_code=input("enter the code number")
c1.execute("select * from shoe_details where shoe_code ="+v_code)
data cl.fetchall()
print("Shoe code:", data[0] [0])
print("brand name:", data[0][1])
print("customer name:", data[0] [2])
print("customer number:", data[0][3])
print("customer detail:",data[0][4])
print("amount:", data[0][5])
22
OUTPUT OF SOURCE CODE
23
PAGE SHOWING THE ENTRY OF CUSTOMERS DETAILS
24
PAGE SHOWING THE DETAILS OF CUSTOMERS
25
TESTING
TESTING METHODS
Software testing methods are traditionally divided into black box testing and
white box testing. These two approaches are used to describe the point of view
that a test engineer lakes when designing test cases.
Black box testing treats the software as a "black box without any knowledge of
internal implementation. Black box testing methods include: equivalence
partitioning, boundary value analysis, all-pairs testing, fuzz testing, model-based
testing, traceability matrix, exploratory testing and specification-based testing.
26
SPECIFICATION-BASED TESTING
White box testing, by contrast to black box testing, is when the tester has access
to the internal data structures and algorithms (and the code that implement
these)
27
• Code coverage creating tests to satisfy some criteria of code coverage.
For example, the test designer can create tests to cause all statements in the
program to be executed at least once.
• fault injection method.
• mutation testing methods.
• static testing-White box testing includes all static testing.
White box testing methods can also be used to evaluate the completeness of a test suite that
was created with black box testing methods. This allows the software team to examine parts of
a system that are rarely tested and ensures that the most important function points have been
tested.
28
BIBLIOGRAPHY
***
29