Ramu 5
Ramu 5
Filelost:-
When computerized system is no timplemented file is always lost
because of human environment. Some times due to some human
error there may be a loss of records.
Filedamaged:-
When a computerized system is not there file is always lost due to
some accdent like spilling of water by some member on file
accidentally. Besides some natural disaster like floods or fires may
also damage the files.
I studied and went through all set of tasks and activities regarding software
and identified them before project and also the time required for the
14
completion of project. Planning helped me in decision-making process
while I was studying how to initiate and what steps to follow to accomplish
the task. I also planned to finish the assigned task within appropriate cost,
effort, and resources to maintain the system feasible.
What are the inputs to be given to the system and what output should be
generated this is called the Functional Requirement for any system. They
describe the relationship between the input and output of the system.
Shopping cart is one of the important facility provided in online shopping, this lets
customer to browse different goods and services and once they select an item
topurchase they can place the item in shopping cart, and continue browsing till the
final selectionhave in the database. Limited access is available to the operator. As
this is generic software it can be used by a wide variety of outlets (Retailers and
Wholesalers) to automate the process of manually maintaining the records related
to the subject of maintaining the stock and cash flow:
This division works directly for the Administrator. The Administrator uses their
power to enter their user name and password. The following events
Administrator :-
Registration and Cancellation of User.
16
Adding, Updating and Deleting etc.
Searching various things.
Here the user is that which does the administrator register. Administrator gives
him a user name and password, which helps him to authorized entry in the site.
After authorized entry a user can add, update and search the information. The
deletion power is not given for the user. This power is only for the administrator.
There are so many visitors, who can visit this site daily. The VSM support the
visitors to visit the site easily and frequently. They can use the Premium Services
of the site to take the information about the Jewellery Shop.
User Login
This module is used to authenticate user to access the system. When user enters
login corresponding password of the user is matched so as to prevent
unauthorized access
To understand the web architecture the two things must be known one is web
browser and another is web server. Web browsers and servers cooperate to
17
provide content to a user. Consider a request for a static Web page. A user enters
a URL into a browser. The browser generates an HTTP request to the
appropriate we4b server. The web server maps this request to a specific file.
That file is returned in a HTTP response to the browser. The HTTP header in the
response indicates the type of text/plain.
The web browser can be thought of as a universal user interface. Whether you’re
doing some simple web browsing or transacting online banking, the web
browser’s responsibilities are that of presenting web contents, issuing request to
the web server, and handling any results generated by the request. The ubiquity
of browsers, the generic HTML and Internet access is what makes this
interesting.
The web server is the heart of any web application. The web server is a program
running on the server that listens for incoming requests and generate the
responses according to the requests. Depending on the type of request, the web
server might look for a web page, or it might execute a program on the server.
Either way, it will always return some kind of results to the web server, even if
it’s simply an error message saying that it couldn’t process the request.
Platform : Windows XP
Language : PHP
18
Internet Technology : HTML, PHP, Java Script, CSS
Hard Disk : 20 GB
19