Changed 1
Changed 1
INTRODUCTION
This project is all about software for grocery shop management system. It
helps to have a full-fledged control over the internal datas of the shop. It
receives user name and password to log in. It maintains the record of customer
details, product details and worker details, it helps to add a new data and also
update the existing data .
The objective of this project is to let the students apply the programming
knowledge into a real- world situation/problem and exposed the students how
programming skills helps in developing a good software.
1
PROPOSED SYSTEM
Today one cannot afford to rely on the fallible human beings of be really
wants to stand against today’s merciless competition where not to wise saying
“to err is human” no longer valid, it’s outdated to rationalize your mistake.
So, to keep pace with time, to bring about the best result without
malfunctioning and greater efficiency so to replace the unending heaps of flies
with a much sophisticated hard disk of the computer.
One has to use the data management software. Software has been an
ascent in atomization various organisations. Many software products working
are now in markets, which have helped in making the organizations work easier
and efficiently. Data management initially had to maintain a lot of ledgers and a
lot of paper work has to be done but now software product on this organization
has made their work faster and easier. Now only this software has to be loaded
on the computer and work can be done.
This prevents a lot of time and money. The work becomes fully
automated and any information regarding the organization can be obtained by
clicking the button. Moreover, now it’s an age of computers of and automating
such an organization gives the better look.
2
SYSTEM DEVELOPMENT LIFE CYCLE (SDLC):
3
PHASES OF SYSTEM DEVELOPMENT LIFE CYCLE
INITIATION PHASE:
4
business case should also identify alternative solutions and detail as many
informational, functional, and network requirements as possible.
5
Document serves as an important reference document to support the
Information Technology Project Request (ITPR) process.
The ITPR must be approved by the State CIO before the project can
move forward.
PLANNING PHASE:
7
Develop the test and evaluation requirements that will be used to
determine acceptable system performance.
DESIGN PHASE:
8
Allocating processes to resources.
Preparing detailed logic specifications for each software module. The
result is a draft System Design Document which captures the preliminary
design for the system.
Everything requiring user input or approval is documented and reviewed
by the user. Once these documents have been approved by the Agency
CIO and Business Sponsor, the final System Design Document is created
to serve as the Critical/Detailed Design for the system.
This document receives a rigorous review by Agency technical and
functional representatives to ensure that it satisfies the business
requirements. Concurrent with the development of the system design, the
Agency Project Manager begins development of the Implementation
Plan, Operations and Maintenance Manual, and the Training Plan.
DEVELOPMENT PHASE:
9
Testing individual elements (units) for usability.
Preparing for integration and testing of the IT system.
IMPLEMENTATION PHASE:
This phase is initiated after the system has been tested and accepted by
the user. In this phase, the system is installed to support the intended
business functions. System performance is compared to performance
objectives established during the planning phase. Implementation includes
user notification, user training, installation of hardware, installation of
software onto production computers, and integration of the system into daily
work processes. This phase continues until the system is operating in
production in accordance with the defined user requirements.
10
Operational testing by the end user alone performing all functions.
Requirements are traced throughout testing,a final Independent
Verification & Validation evaluation is performed and all documentation
is reviewed and accepted prior to acceptance of the system.
11
FLOW CHART
START
STOP
12
SOURCE CODE
conn=sql.connect(host='localhost',user='root',passwd='mysqlxi',
database='grocery_shop',charset="utf8")
if conn.is_connected():
print('successfully connected')
c=conn.cursor()
print('1.login')
print('2.exit')
if choice==1:
print('connected successfully')
print('grocery shop')
print('1.customer details')
print('2.product details')
print('3.worker details')
13
print('7.see one customer details')
print('10.exit')
if choice==1:
c.execute(sql_insert)
conn.commit()
print('data is updated')
elif choice==2:
c.execute(sql_insert)
conn.commit()
print('data is updated')
14
elif choice==3:
"+str(worker_salary)+","+str(phone_no)+ ")"
c.execute(sql_insert)
conn.commit()
print('data is updated')
elif choice==4:
t=conn.cursor()
t.execute('select*from customer_details')
record=t.fetchall()
for i in record:
print(i)
elif choice==5:
t=conn.cursor()
t.execute('select*from product_details')
15
record=t.fetchall()
for i in record:
print(i)
elif choice==6:
t=conn.cursor()
t.execute('select*from worker_details')
record=t.fetchall()
for i in record:
print(i)
elif choice==7:
c.execute(t)
v=c.fetchall()
for i in v:
print(v)
elif choice==8:
c.execute(t)
16
v=c.fetchall()
for i in v:
print(v)
elif choice==9:
c.execute(t)
v=c.fetchall()
for i in v:
print(v)
elif choice==10:
print("**thank you**")
else:
if choice==2:
exit()
17
OUTPUT
Grocery shop
1. Customer details
2. Product details
3. Worker details
4. See all customer details
5. See all product details
6. See all worker details
7. See one customer details
8. See one product details
9. See one worker details
10.Exit
Enter the choice:1
Enter your name=vijay
Enter your phone number=8854455555
Enter the total bill cost=4755.31
Grocery shop
1. Customer details
2. Product details
3. Worker details
4. See all customer details
5. See all product details
6. See all worker details
7. See one customer details
8. See one product details
18
9. See one worker details
10.Exit
Enter the choice:2
Enter product name=python book
Enter the cost=575
Data is updated
Grocery shop
1. Customer details
2. Product details
3. Worker details
4. See all customer details
5. See all product details
6. See all worker details
7. See one customer details
8. See one product details
9. See one worker details
10.Exit
Enter the choice:3
Enter your name=ganesh
Enter your work=helper
Enter your age=19
Enter your salary=5000
Enter your phone number=8488415667
Data is updated
Grocery shop
1. Customer details
2. Product details
3. Worker details
4. See all customer details
5. See all product details
6. See all worker details
7. See one customer details
8. See one product details
19
9. See one worker details
10.Exit
Enter the choice:4
(984688556, ‘nitin’, 10000.0)
(945886234, ‘kalanithi’, 10.63)
(894555612, ‘vadu don’, 7356.0)
(447748454, ‘vishal’, 12540)
(895585656, ‘marri’, 5648.0)
(854541523, ‘ankit’, 1545.0)
(845786552, ‘ankit’, 1254.0)
(845565655, ‘ganesh’, 125.0)
(848256596, ‘binu’, 12496.0)
(84899845, ‘vibor’, 50.0)
(885445555, ‘vijay’, 4755.31)
Grocery shop
1. Customer details
2. Product details
3. Worker details
4. See all customer details
5. See all product details
6. See all worker details
7. See one customer details
8. See one product details
9. See one worker details
10.Exit
Enter the choice:5
(‘tomato’, 50.0)
(‘watch’, 1550.59)
(‘pen’, 5.0)
(‘water bottle’, 14.65)
(‘sonata’, 1564.0)
(‘python book’, 575.0)
20
Grocery shop
1. Customer details
2. Product details
3. Worker details
4. See all customer details
5. See all product details
6. See all worker details
7. See one customer details
8. See one product details
9. See one worker details
10.Exit
Enter the choice:6
( ‘nitin’ , ‘manager’ , 16 , 10000.0 , 861024564 )
( ‘kishor’ , ‘helper’ , 24 , 5000.0 , 875851563 )
( ‘ankit’ , ‘maintainer’ , 27 , 10000.0 , 854851555 )
( ‘sharan’ , 'distibutor' , 31 , 10067.0 , 845564155 )
( ‘ marri muth’ , ‘owner’ , 32 , 100000.0 , 84554555 )
( ‘ganesh’ , ‘helper’ , 19 , 5000.0 , 84884156 )
Grocery shop
1. Customer details
2. Product details
3. Worker details
4. See all customer details
5. See all product details
6. See all worker details
7. See one customer details
8. See one product details
9. See one worker details
10.Exit
Enter the choice:7
Enter your name:vijay
(885445555, ‘vijay’, 4755.31)
21
Grocery shop
1. Customer details
2. Product details
3. Worker details
4. See all customer details
5. See all product details
6. See all worker details
7. See one customer details
8. See one product details
9. See one worker details
10.Exit
Enter the choice:8
Enter your product_name:water bottle
(‘water bottle’, 14.65)
Grocery shop
1. Customer details
2. Product details
3. Worker details
4. See all customer details
5. See all product details
6. See all worker details
7. See one customer details
8. See one product details
9. See one worker details
10.Exit
Enter the choice:9
Enter your name=ganesh
( ‘ganesh’ , ‘helper’ , 19 , 5000.0 , 84884156 )
22
Grocery shop
1. Customer details
2. Product details
3. Worker details
4. See all customer details
5. See all product details
6. See all worker details
7. See one customer details
8. See one product details
9. See one worker details
10.Exit
Enter the choice:10
**thank you**
23
TESTING
TESTING METHODS
Software testing methods are traditionally divided into black box testing
and white box testing. These two approaches are used to describe the point of
view that a test engineer takes when designing test cases.
Black box testing treats the software as a "black box," without any
knowledge of internal implementation. Black box testing methods include:
equivalence partitioning, boundary value analysis, all-pairs testing, fuzz testing,
model-based testing, traceability matrix, exploratory testing and specification-
based testing.
24
SPECIFICATION BASED TESTING
The black box tester has no "bonds" with the code, and a tester's
perception is very simple: a code must have bugs. Using the principle, "Ask and
you shall receive," black box testers find bugs where programmers don't. But,
on the other hand, black box testing has been said to be "like a walk in a dark
labyrinth without a flashlight," because the tester doesn't know how the
software being tested was actually constructed.
That's why there are situations when a black box tester writes many test
cases to check something that can be tested by only one test case, and/or some
parts of the back end are not tested at all. Therefore, black box testing has the
advantage of "an unaffiliated opinion," on the one hand, and the disadvantage of
"blind exploring," on the other.
25
WHITE BOX TESTING
White box testing, by contrast to black box testing, is when the tester has
access to the internal data structures and algorithms (and the code that
implement these)
26
CODE COMPLETENESS EVALUATION
White box testing methods can also be used to evaluate the completeness
of a test suite that was created with black box testing methods. This allows the
software team to examine parts of a system that are rarely tested and ensures
that the most important function points have been tested.
27
HARDWARE AND SOFTWARE REQUIREMENTS
ATHALON(3800+- 4200+
DUALCORE)
SOFTWARE REQUIREMENTS:
I. Windows OS
II. Python
28
BIBLIOGRAPHY
29