School Name
School Name
2 B-BLOCK JANAKPURI
NEW DELHI 110058
1
SCAN SBV NO.2 B-BLOCK JANAKPURI
NEW DELHI 110058
A PROJECT REPORT ON
“E-Commerce Management System”
SUBMITTED TO :- SUBMITTED BY :-
2
CERTIFICATE
PRINCIPAL
3
4
TABLE OF CONTENTS [ T O C ]
1. ACKNOWLEDGEMENT
2. INTRODUCTION
4. PROPOSED SYSTEM
7. FLOW CHART
8. SOURCE CODE
9. OUTPUT
10. TESTING
12. BIBLIOGRAPHY
5
ACKNOWLEDGEMENT
for all the other students for my batch their friendship &
6
Introduction of the Project
This project automates the E – COMMERCE DATABASE MANAGEMENT SYSTEM which gives
the user three different options through which they can search for the product of their
choice, and finally place their orders.
The first option is to search through various categories of products, for e.g. Smartphones,
Clothes, Groceries, etc.
The user can choose their category and they will be shown all the products available in that
particular category.
The second option is to take a look at all the products available. The user can choose to take
a look all the different types of products available and choose their product from there.
The third option is to search through the various brands available. The user can choose to
take a look at all the brands available and choose a particular brand. On choosing the
particular brand the user will be shown all the products that are available from that
particular brand.
Lastly, the user can place an order of their product of choice. On placing the order of a
particular product, that product is added
into the order_table in the database with various other details like the transaction ID (which
is allotted to every transaction that has been made), product ID, product name, date of
dispatch and the contact details of the customer.
Also the quantity of the product which has been ordered is reduced by 1 from the
main_table.
7
OBJECTIVES OF THE PROJECT
The objective of a computer program for e-commerce is to provide a seamless, secure, and
efficient platform for buying and selling goods or services online. The program aims to
facilitate various aspects of the e-commerce process, including product browsing, order
integrating key features like a user-friendly interface, secure payment gateways, real-time
updates, and responsive design, the program seeks to enhance customer satisfaction,
optimize business operations, and drive sales growth for the online store. Additionally, it aims
technological advancements.
dynamic digital ecosystem that facilitates the entire process of online buying and selling of
goods and services. This system is designed to ensure smooth, efficient, and secure
transactions between buyers, sellers, and service providers while enhancing the overall user
secure, and efficient platform that meets the needs of both customers and businesses. It
should foster a smooth transaction process, enhance user experience, support business
growth, and ensure secure and compliant operations while adapting to future demands and
technological advancements.
8
PROPOSED SYSTEM
The proposed system for an e-commerce platform aims to create a robust, scalable, and
secure online marketplace that effectively supports the buying and selling of goods and
services. The system will be designed to handle a variety of e-commerce operations,
including product catalog management, order processing, secure payment handling,
customer relationship management, inventory management, and marketing.
System Overview
The system will be a web-based application with mobile compatibility, designed to cater to
both the customer and the admin (business owner) needs. It will consist of several
interrelated components that will work together to provide a seamless and secure online
shopping experience. Key features will include product browsing, payment processing, order
management, user profiles, customer support, and business analytics. In summary, the
objective of a computer program for e-commerce is to build a robust, secure, and efficient
platform that meets the needs of both customers and businesses. It should foster a smooth
transaction process, enhance user experience, support business growth, and ensure secure
and compliant operations while adapting to future demands and technological
advancements.
Conclusion
9
SYSTEM DEVELOPMENT LIFE CYCLE (SDLC)
The systems development life cycle is a project management technique that divides complex
projects into smaller, more easily managed segments or phases. Segmenting projects allows
managers to verify the successful completion of project phases before allocating resources to
phases may be divided differently depending on the organization involved. For example, initial
phases, or initiation, concept-development, and planning phases. End users of the system
under development should be involved in reviewing the output of each phase to ensure the
10
PHASES OF SYSTEM DEVELOPMENT LIFE CYCLE
INITIATION PHASE
The Initiation Phase begins when a business sponsor identifies a need or an opportunity. The
Recommend the exploration of alternative concepts and methods to satisfy the need
including questioning the need for technology, i.e., will a change in the business process
offer a solution?
Assure executive business and executive technical sponsorship. The Sponsor designates a
Project Manager and the business need is documented in a Concept Proposal. The
Concept Proposal includes information about the business process and the relationship to
the Agency/Organization.
Careful oversight is required to ensure projects support strategic business objectives and
initiation phase begins when an opportunity to add, improve, or correct a system is identified
and formally requested through the presentation of a business case. The business case should,
11
at a minimum, describe a proposal’s purpose, identify expected benefits, and explain how the
The business case should also identify alternative solutions and detail as many informational,
The System Concept Development Phase begins after a business need or opportunity is
CIO.
Identify system interfaces. Identify basic functional and data requirements to satisfy the
business need.
Establish system boundaries; identify goals, objectives, critical success factors, and
performance measures.
Evaluate costs and benefits of alternative approaches to satisfy the basic functional
requirements.
Assess project risks Identify and initiate risk mitigation actions, and Develop high-level
This phase explores potential technical solutions within the context of the business need.
It may include several trade-off decisions such as the decision to use COTS software
12
Construction of executable prototypes is encouraged to evaluate technology to support
the Information Technology Project Request (ITPR) process. The ITPR must be approved
PLANNING PHASE
The planning phase is the most critical step in completing development, acquisition, and
necessary to coordinate activities and manage project risks effectively. The depth and
formality of project plans should be commensurate with the characteristics and risks of a
given project.
13
Project plans refine the information gathered during the initiation phase by further identifying
the specific activities and resources required to complete a project. A critical part of a project
development, and network personnel to identify and document as many functional, security,
and network requirements as possible. During this phase, a plan is developed that documents
the approach to be used and includes a discussion of methods, tools, tasks, resources, project
schedules, and user input. Personnel assignments, costs, project schedule, and target dates
are established.
system security, verification and validation, and systems engineering management planning.
This phase formally defines the detailed functional user requirements using high-level
requirements identified in the Initiation, System Concept, and Planning phases. It also
maintainability requirements for the system. The requirements are defined in this phase to a
level of detail sufficient for systems design to proceed. They need to be measurable, testable,
and relate to the business need or opportunity identified in the Initiation Phase. The
requirements that will be used to determine acceptance of the system are captured in the
14
The purposes of this phase are to:
Further define and refine the functional and data requirements and document them in
what information drives the business process, what information is generated, who
generates it, where does the information go, and who processes it).
Develop detailed data and process models (system inputs, outputs, and the process.
Develop the test and evaluation requirements that will be used to determine acceptable
system performance.
DESIGN PHASE
The design phase involves converting the informational, functional, and network
requirements identified during the initiation and planning phases into unified design
specifications that developers use to script programs during the development phase. Program
designs are constructed in various ways. Using a top-down approach, designers first identify
and link major program components and interfaces, then expand design layouts as they
identify and link smaller subsystems and connections. Using a bottom-up approach, designers
first identify and link minor program components and interfaces, then expand design layouts
Contemporary design techniques often use prototyping tools that build mock-up designs of
items such as application screens, database layouts, and system architectures. End users,
designers, developers, database managers, and network administrators should review and
refine the prototyped designs in an iterative process until they agree on an acceptable design.
15
Audit, security, and quality assurance personnel should be involved in the review and approval
process. During this phase, the system is designed to satisfy the functional requirements
identified in the previous phase. Since problems in the design phase could be very expensive
to solve in the later stage of the software development, a variety of elements are considered
These include:
Preparing detailed logic specifications for each software module. The result is a draft
System Design Document which captures the preliminary design for the system.
Everything requiring user input or approval is documented and reviewed by the user.
Once these documents have been approved by the Agency CIO and Business Sponsor, the
final System Design Document is created to serve as the Critical/Detailed Design for the
system.
Concurrent with the development of the system design, the Agency Project Manager
16
DEVELOPMENT PHASE
The development phase involves converting design specifications into executable programs.
Effective development standards include requirements that programmers and other project
participants discuss design specifications before programming begins. The procedures help
Programmers use various techniques to develop computer programs. The large transaction
oriented programs associated with financial institutions have traditionally been developed
scripting of logical instructions that are combined to form a program. Effective completion of
the previous stages is a key factor in the success of the Development phase.
Subsystem integration, system, security, and user acceptance testing is conducted during the
integration and test phase. The user, with those responsible for quality assurance, validates
that the functional requirements, as defined in the functional requirements document, are
satisfied by the developed or modified system. OIT Security staff assesses the system security
Testing at the development facility by the contractor and possibly supported by end users
17
Testing as a deployed system with end users working together with contract personnel
Requirements are traced throughout testing, a final Independent Verification & Validation
IMPLEMENTATION PHASE
This phase is initiated after the system has been tested and accepted by the user. In this phase,
the system is installed to support the intended business functions. System performance is
includes user notification, user training, installation of hardware, installation of software onto
production computers, and integration of the system into daily work processes. This phase
continues until the system is operating in production in accordance with the defined user
requirements
The system operation is ongoing. The system is monitored for continued performance in
accordance with user requirements and needed system modifications are incorporated.
Operations continue as long as the system can be effectively adapted to respond to the
organization’s needs. When modifications or changes are identified, the system may reenter
18
Conduct periodic assessments of the system to ensure the functional requirements
continue to be satisfied.
19
FLOW CHART
20
SOURCE CODE
# Establish connection to the MySQL database
import mysql.connector
obj = mysql.connector.connect(
host="localhost",
user="root",
password="admin",
database="main_project"
)
curobj = obj.cursor()
def category():
print("*************** Categories available are: ***************\n")
a = "select distinct CATEGORY from main_table"
curobj.execute(a)
fetch = curobj.fetchall()
for i in fetch:
print(i[0])
print("\n")
for i in fetch:
print(i[0], "--------------", "PRICE:", i[1])
print("------------------------------------------------------")
def product():
a = "select PRODUCT_NAME, PRICE from main_table"
curobj.execute(a)
21
fetch = curobj.fetchall()
obj.commit()
for i in fetch:
print(i[0], "--------------", "PRICE:", i[1])
print("------------------------------------------------------")
def product():
a = "select PRODUCT_NAME, PRICE from main_table"
curobj.execute(a)
fetch = curobj.fetchall()
obj.commit()
for i in fetch:
print(i[0], "--------------", "PRICE:", i[1])
print("------------------------------------------------------")
def brand():
print("*************** Brands available are: ***************\n")
a = "select distinct BRAND_NAME from main_table"
curobj.execute(a)
fetch = curobj.fetchall()
for i in fetch:
print(i[0])
print("\n")
for i in fetch:
print(i[0], "--------------", "PRICE:", i[1])
print("------------------------------------------------------")
22
# Function to handle orders
def order():
inpContact = int(input("Enter your 10-digit phone number: "))
inpOrder = input("What do you want to order? ")
qty = "select QUANTITY from main_table where PRODUCT_NAME='{}'".format(inpOrder)
curobj.execute(qty)
fetch = curobj.fetchall()
if fetch[0][0] == 0:
print("OUT OF STOCK!!!!!!")
else:
product_id="selectPRODUCT_IDfrommain_tablewhere
PRODUCT_NAME='{}'".format(inpOrder)
curobj.execute(product_id)
fetch_id = curobj.fetchall()
while True:
print("WELCOME TO E-SHOP :) \n")
print("Press 1 if you are looking for a category.")
print("Press 2 if you are looking for a product.")
print("Press 3 if you are looking for a brand.")
print("Press 4 if you want to place an order.\n")
23
category()
elif inpint == 2:
product()
elif inpint == 3:
brand()
elif inpint == 4:
order()
else:
print("ERROR!!")
print("Check your number.")
24
25
OUTPUT
26
27
TESTING
Software Testing is an empirical investigation conducted to provide With
Information about the quality of the product or service under test stakeholders
a with respect to the context which it is intended to operate. Software Testing
also provides an objective, independent view of the software to allow the
business to appreciate and understand the risks at implementation of the
software. Test techniques include, but are not limited to, the process of
executing a program or application with the intent of finding software bugs. It
can also be stated as the process of validating and verifying that a software
program/application/product meets the business and technical requirements
that guided its design and development, so that it works as expected and can be
implemented with the same characteristics. Software Testing, depending on the
testing method employed, can be implemented at any time in the development
process, however the most test effort is employed after the requirements have
been defined and coding process has been completed.
TESTING METHODS
Software testing methods are traditionally divided into black box testing. These
one approaches are used to describe the point of view that a test engineer takes
when designing test cases.
28
SPECIFICATION-BASED TESTING
The black box tester has no "bonds" with the code, and a tester's perception is
very simple: a code must have bugs using the principle. "Ask and you shall
receive." black box testers find bugs where programmers don't. But, on the other
hand, black box testing has been said to be like a walk in a dark labyrinth without
a flashlight, because the tester doesn't know how the software being tested was
actually constructed. That's why there are situations when (1) a black box tester
writes many test cases to check something that can be tested by only one test
case, and/or (2) some parts of the back end are not tested at all. Therefore, black
box testing has the advantage of "an unaffiliated opinion," on the one hand, and
the disadvantage of "blind exploring," on the other.
29
HARDWARE AND SOFTWARE REQUIREMENTS
30
BIBLIOGRAPHY
1. python.org
2. Wikipedia
3. Our Subject Teacher Ganesh Naraian Meena
4. Preeti Arora and Sumita Arora python books
5. LearnPython.org
6. Google
31