SlideShare une entreprise Scribd logo
1  sur  51
Télécharger pour lire hors ligne
1
A
Project report on
“22Cart.com ”
A P J A K Technical University, Lucknow
Bachelor of Technology
In
“Computer Science Engineering”
2015 -2016
Submitted By: Submitted To:
Ankuj kumar(1233510002) Mr.Pawan Kumar Goel
HOD(CS/IT)
Shamli Institute of Engineering & Technology
Shamli
Village- Rajjak Nagar, 10KM,Milestone,Shamli – Kernal Road,Shamli-24776
2
Certificate
This is to certify that Report entitled “22Cart.com ” which is submitted by
Ankuj kumar (Roll no: 1233510002) has carried out the project work Summer Traning
From CETPA INFOTECH PRIVATE LIMITED, NOIDA in partial fulfillment of the
requirement for the award of degree B.Tech in Computer Science & Engineering
Technology to SIET, Shamli Affiliated from A.P.J.K.T.U. University Lucknow. It is a
record of the candidate own work carried out under the supervision of Mr. Pawan
kumar Goel. The matter embodied in this thesis is original and has not been submitted
for the award of any other degree.
Approved By:
Signature:
Asso.Prof.Pawan Kumar Goel
Head of Department of computer Science Engineering
Shamli Institute of Engineering & Technology, Shamli
3
DECLARATION
We hereby declare that this submission is our own work and that, to the best of our
Knowledge and belief, it contains no material previously published or written by
another personnor material which to a substantial extent has been accepted for the award
of any other degree or diploma of the university or other institute of higher learning,
Signature:
Name: Ankuj Kumar
Roll no: 1233510002
4
ACKNOWLEDGEMENT
We are grateful to Mr.Anil Kumar Singh, (CETPA INFOTECH NOIDA)
without his guidance and able support this project could never have been presented
in preset form. We got several opportunities to work independently and
experienced many new technologies, which We had only heard.
We express our sincere thanks to my college, “SIET, SHAMLI” for providing us
the opportunity to get this industrial exposure. We are also grateful our (HOD)
Computer Science & Engineering “ Mr. Pawan Kumar Goel” to provide us
the core and basic skills of this trade.
We are also thankful to company staff, our parents & friends for their
encouragement and help.
5
Abstract
The business-to-consumeraspectof electronic commerce(Cartapplication)is
the most visible business use of the World Wide Web. The primary goal of an
e-commerce site is to sell goods and services online.
This project deals with developing an e-commerce website (www.22cart.com)
for Online Book Sale. It provides the user with a catalog of different books
available for purchasein the store. In order to facilitate online purchase a
shopping cart is provided to the user. The system is implemented using a 3-
tier approach, with a backend database, a middle tier of Microsoft Internet
Information Services (IIS) and ASP.NET, and a web browseras the front end
client.
This is a project with the objective to develop a basic website where a
consumer is provided with a shopping cart application and also to know
about the technologies used to develop suchan application
6
Contents:
1. Introduction……………………………………………………….7
2. Requirements…………………………………………………….10
(a) . SoftwareComponents………………………………..11
(b). HardwareComponents……………………………...12
3.Softwarerequirement specification(SRS)………....13.
(a).SDLC……………………………………………………………….15
(b).problemanalysis…………………………………………….16
4. FEASIBILTY STUDY.....................................................19
5. About the Projects…………………………………………….21
6. Objective……………………………………………………………22
7. E-R Diagram cart application……………………………...24
8. Admin E-R Diagramically representation…………….26
9. Layout design of pages……………………………………..28
10. Login Panel ……………………………………………………..32
11. Testing……………………………………………………………..38
12. App Code …………………………………………………………41
13. Tables……………………………………………………………..46
14. Conclusion & Future Scope………………………………49
15.Reference………………………………………………………..50
7
Introduction:
Cart Application, You are doing it. Your neighbour is doing it. Your aunt is doing it.
Everyone you know and don’t know is doing it. Online shopping is like going to a mall
during a holiday season. Every day there is some sale or the other going on. And just like
the mall you have almost every imaginable item available. The online megastore, is one
of the top e-commerce sites in India. Visited by thousands of people on a daily basis,
Mega offers a massive collection of everything from electronics to baby clothing at some
of the best prices thanks to various discounts available onsite.
Cart Application offers expert, highly detailed and interactive descriptions for the
products listed on the site. This is to help you make an informed buying decision. So
whether you are looking for a new phone or a bed sheet, your job will be made easy.
Cart Application offers expert, highly detailed and interactive descriptions for the
products listed on the site. This is to help you make an informed buying decision. So
whether you are looking for a new phone or a bed sheets, your job will be made easy.
Also, Cart Application offers the compare option for the various listed products,
especially electronics. You can compare two or more products in terms of their price,
specifications and features.
8
About the Project:
22Cart Application offers expert, highly detailed and interactive descriptions for the
products listed on the site. This is to help you make an informed buying decision. So
whether you are looking for a new phone or a bed sheet, your job will be made easy.
Also, Market plus offers the compare option for the various listed products, especially
electronics. You can compare two or more products in terms of their price,
specifications and features.
22Cart Application is your one-stop shop for all your needs. You can shop for your
favorite books, apparel, footwear, jewellery, office supplies, movies, TV shows and
games, lifestyle accessories, babycare products, toys, posters, sports and fitness products,
mobile phones, laptops, cameras, music, health and beauty products, televisions,
refrigerators, air-conditioners, washing machines, kitchen and home appliances, MP3
players, beauty and personal care, automotive products and home theater systems.
Visit website : www.22cart.com
9
Objective:
The manual aims to enhance the capacity of cooperatives and other self-help
organizations to design projects that are appropriate to the needs of target groups,
comprehensive in relation to the whole project cycle, and adequate for donors’
requirements.
After studying this Project Design Manual, users should be able to:
• Design good, inclusive and sustainable project proposals using the Project Cycle
Management and the Logical Framework approachapplied to the context of cooperative
development.
• Understand and apply the core principles that should underlie any project in order for it
to be viable and sustainable.
• Develop a project idea on the basis of real needs and required resources, and transpose
the idea into an implementation plan and budget.
• Develop a monitoring and evaluation plan that incorporates a process forchecking and
correcting project implementation, as well as the assessment of achievements.
It also involves:
 Ithelps to understand how to make web pages more effective by graphics.
 Ithelps to providethe information to the users according to their level of interest.
 This projectjudgethe interest of users.
 Itawarethe users aboutthe currentlevel of coding and design.
10
Requirements:
Hardware Compnents:
 Processor : Intel Pentium3,corei-3 or above version
 RAM : Min 1 GB
 Hard disk : Min 200GB
Front end tool:
Visual basic:
 Asp .NET with version 4.5 Framework is perfectly survived worldwide
1. The language is very simple object oriented and easy to learn.
2. It resulted in high performance.
3. It is robustand secure.
4. It is platform independent.
5. It is architectural neutral & portable
11
2. Software Requirements:
 Front end : Microsoft visual studio 4 0r 4.5
 Back end : MySql Server 2005, 2008 or above
 Operating System : Windows 7,8,10 and above
Back end tool:
MySQL:
 MySQL is an application tool provided by Microsoft.
 Access makes it easy to users to work with database.
 We can create tables; manipulate data with very less effort.
 The form and report wizards can do the work of designing data entry, forms,
reports and mailing tables for us.
12
A simple Layout design of Project:Home
Cart Application is dedicated to 100% customer delight ensuring that everything from placing your
order to delivering it right to your doorstep is smooth and hassle-free. When it comes to online
transactions, Cart Application ensures that all credit/debit card and net banking transactions are done
through secure and trusted gateways. All your bank details are safe and secure, and will not be shared
with any third-party. Cart Application offers a cash on delivery option if you need an easier payment
method and excellent after sales services too. If you have any issues with your purchase, the easy
exchange and replacement policies comes to your rescue.
13
SYSTEM DEVELPOMENT LIFE CYCLE (SDLC)
The Systems Development Life Cycle (SDLC) is a conceptual model used in project management that
describes the stages involved in an information system development project from an initial feasibility
study through maintenance of the completed application. Various SDLC methodologies have been
developed to guide the processes involved including the waterfall model (the original SDLC method).
Documentation is crucial regardless of the type of model chosen or devised for any application, and is
usually done in parallel with the development process. Some methods work better for specific types of
projects, but in the final analysis, the most important factor for the success of a project may be how
closely particular plan was followed.
PROBLEM ANALYSIS
Applications
The main applications of the On Line Placement System is the ability of the website to
properly show enroll the artists and manage information about them. The administrator
14
has the ability to change ,modify, view and delete the various details regarding the users
and arts. The users have the ability to log in and post their queries and download arts.
Challenges
The challenges mainly lie in detecting attacks like viruses, hacking and also in the
implementation of firewall. A virus can enter the system and can disrupt the working of
the website. Hacking can be done by some people who want to access some restricted
sections of the website (e.g. administrator’s area) and to modify or taper some aspects of
the website.
Scanning attacks may yield:
(i) The method used by viruses to enter the system.
(ii) The types of databaseallowed through a firewall.
(iii) The paths or ways used by hackers to enter the system
(iv) The loopholes remaining in the system (or website) which are used by attackers.
(v) The server from where the viruses or hackers are gaining access to the system.
(vi) The types of viruses able to affect the website.
And with the implementation of firewall and other security mechanisms that are designed
for it, the On Line Placement System Website safe and secure.
REQUIREMENT ANALYSIS
Goalof Thesis
The goal of our thesis is to develop a website that can be used as an enrollment website
with the features of interaction and problem solving. The whole project will be based on
PHP with MYSQL as the database with certain security constraints added to it.
15
Our aim is also to implement the Administrator part in to the project so that the server or
administrator himself can view, add, delete and modify.
A. Administrator
He has to see whether the website is working properly and whether the details available
in the system are relevant and correct. He can view, add, modify, delete details.
B. Database
The database keeps all the records of all the users i.e. name,course, phone no.,dob, city,
country,etc. For creating such records it takes the help of tables which is created in the
MYSQL. The tables can have infinite entries of all the registered users as well as
administrators.
C. Clients
Our aim will also to provide efficient way by which client can enter to see his profile, ask
questions to his teacher and download softwares.
D. Security Constraints
There need to be certain constraints which have to be implemented on the database as
well as on the administrator in order to work properly the whole system, suchas
declaring the primary key, or such constraints in order to keep the database work
properly.
Some of such constraints are as follows:
1. Each user has a field called username which can be used to differentiate between
different users.
2. The administrator has his own password known to no one else to access a unique page.
3. Only the administrator has the right to delete, modify users and questions.
4. Administrator has to first login to get access to myaccount part and modify some data
available in the website.
16
5. A new user cannot have same username and password as of some already registered
user.
6.When user or administrator click on logout the sessionof the user ends and he has to
again login using his/her username and password to access the same functionality.
7. Checks are implemented so that the mandatory fields are filled by users when the user
is entering some information in the system.
8. Latest firewalls and other antivirus and anti hacking modules are to be used with the
website so as to protect the website from external attacks.
FEASIBILTY STUDY
From the inception of ideas for software system, until it is implemented and delivered to
customer and even after that the system undergoes gradual developments and evaluations.
The software is said to have life cycle composed ofseveral phases.
At the feasibility stage, it is desirable that two or three different configuration will be
pursed that satisfy the key technical requirement but which represent different level of
ambition and cost.
Feasibility is the determination of whether or not a project is worth doing. A feasibility
study is carried out select a best system that mate performance requirements.
The data collected during primary investigation examines system feasibilities that is
likelihood that the system will be beneficial to the organization. Four tests for feasibility
study are as follows:-
 TechnicalFeasibility: This is concerned with specifying equipment and software
that w ill successfully satisfy the use considerably, but might include
 The feasibility to produceoutput in a given time becausesystem is fast
enough to handle multiple users.
17
 Responsetime under certain circumstances and ability to process a certain
volume of transaction of a particular speed.
 Feasibility to communicate data to distant location.
 EconomicalFeasibility: Economic analysis is the most frequently used technique
used for evaluating the effectiveness of a proposed system. More commonly
known as cost/benefit analysis the procedureis to determine the benefits and
savings that are expected from a proposedsystemand compared them with cost.
Though the costof installing the system may appear high, it is one time
investment. The resulting benefits is that automation results in turnaround time.
The resulting cost/benefit ratio is favorable.
 OperationalFeasibility: It is mainly related to human organizational as social
aspects. The points to be considered are - The system interface is standard, user
friendly and provides extensive help. Hence no special training is not required.
 SocialFeasibility: Social feasibility is determination of whether a proposed
project will be acceptable to people or not, So this project is totally Social and
Feasible
SYSTEM ANALYSIS
The Analysis model:
The analysis model must achieve three primary objectives:
 To describe what the customer requires.
 To establish the basis for the enhancement of a software design.
 To define a set of requirements that can be validated once the software is
completely enhanced. The main elements of the analysis model are briefly
described below.
18
 At the core of the model lies the data dictionary, which is a repository that
contains descriptions of all the data objects consumed or produced by the software
.Three different diagrams surround the core.
 The entity relation diagram depicts relationships between data objects.
 The data flow diagram provides an indication of how the data is transformed as
they move through the system.
 The state transition diagram indicates how the system behaves as a consequence
of external events.
DESIGN PHASE
The design phase involves converting the informational, functional, and network
requirements identified during the initiation and planning phases into unified design
specifications that developers use to script programs during the development phase.
Program designs are constructed in various ways. Using a top-downapproach, designers
first identify and link major program components and interfaces, then expand design
layouts as they identify and link smaller subsystems and connections. Using a bottom-up
approach, designers first identify and link minor program components and interfaces,
then expand design layouts as they identify and link larger systems and connections.
Contemporary design techniques often use prototyping tools that build mock-up designs
of items such as application screens, database layouts, and system architectures. End
users, designers, developers, database managers, and network administrators should
review and refine the prototyped designs in an iterative process until they agree on an
acceptable design.
Designers should carefully document completed designs. Detailed documentation
enhances a programmer’s ability to develop programs and modify them after they are
placed in production. The documentation also helps management ensure final programs
are consistent with original goals and specifications. Organizations should create initial
testing, conversion, implementation, and training plans during the design phase.
Additionally, they should draft user, operator, and maintenance manuals.
19
For design of the website project:
1. First Database has to be designed which can be used to handle all the
requirements of the users.
2. The basic structure of the website has to be designed.
3. The main template to be used for the website is designed.
DATA FLOW DIAGRAM
DATA FLOW DIAGRAM OF
ONLINE PLACEMENT CELL MANAGEMENT SYSTEM
Student
Entries
CreatesAdmin
Student
Database
Request
Form
20
ScreenShots
21
22
.
23
Admin layout
24
Tables
Customer detail
Product Post Table
25
Admin detail Table
Product Review
26
TESTING
Software testing
Software testing is the process used to measure the quality of developed computer
software. Usually, quality is constrained to such topics as correctness, completeness,
security, but can also include more technical requirements as described under the ISO
standard ISO 9126, such as capability, reliability, efficiency, portability, maintainability,
compatibility, and usability. Testing is a process of technical investigation, performed on
behalf of stakeholders, that is intended to reveal quality-related information about the
product with respect to the context in which it is intended to operate .
27
White box, black box, and grey box testing
White box and black box testing are terms used to describe the point of view that a test
engineer takes when designing test cases. Black box testing treats the software as a
black-box without any understanding as to how the internals behave. Thus, the tester
inputs data and only sees the output from the test object. This level of testing usually
requires thorough test cases to be provided to the tester who then can simply verify that
for a given input, the output value (or behavior), is the same as the expected value
specified in the test case.
White box testing, however, is when the tester has access to the internal data structures,
code, and algorithms. For this reason, unit testing and debugging can be classified as
white-box testing and it usually requires writing code, or at a minimum, stepping through
it, and thus requires more skill than the black-box tester. If the software in test is an
interface or API of any sort, white-box testing is almost always required.
In recent years the term grey box testing has come into common usage. This involves
having access to internal data structures and algorithms for purposes of designing the test
cases, but testing at the user, or black-box level. Manipulating input data and formatting
output do not qualify as grey-box because the input and output are clearly outside of the
black-box we are calling the software under test. This is particularly important when
conducting integration testing between two modules of code written by two different
developers, where only the interfaces are exposed for test.
Grey box testing could be used in the context of testing a client-server environment when
the tester has control over the input, inspects the value in a SQL database, and the output
value, and then compares all three (the input, sql value, and output), to determine if the
data got corrupt on the database insertion or retrieval.
28
Verification and Validation
Software testing is used in association with verification and validation (V&V).
Verification is the checking of or testing of items, including software, for conformance
and consistency with an associated specification. Software testing is just one kind of
verification, which also uses techniques such as reviews, inspections, and walkthroughs.
Validation is the process of checking what has been specified is what the user actually
wanted.
 Verification: Have we built the software right? (i.e. does it match the
specification).
 Validation: Have we built the right software? (i.e. Is this what the customer
wants?)
Level of testing
 Unit testing tests the minimal software component, or module. Each unit (basic
component) of the software is tested to verify that the detailed design for the unit
has been correctly implemented. In an Object-oriented environment, this is usually
at the class level, and the minimal unit tests include the constructors and
destructors.
 Integration testing exposes defects in the interfaces and interaction between
integrated components (modules). Progressively larger groups of tested software
components corresponding to elements of the architectural design are integrated
and tested until the software works as a system.
 Functional testing tests at any level (class, module, interface, or system) for
proper functionality as defined in the specification.
 System testing tests a completely integrated system to verify that it meets its
requirements.
 System integration testing verifies that a system is integrated to any external or
third party systems defined in the system requirements.
 Acceptance testing can be conducted by the end-user, customer, or client to
validate whether or not to accept the product. Acceptance testing may be
performed as part of the hand-off process between any two phases of development.
 Alpha testing is simulated or actual operational testing by potential
users/customers or an independent test team at the developers' site. Alpha
testing is often employed for off-the-shelf software as a form of internal
acceptance testing, before the software goes to beta testing.
29
 Beta testing comes after alpha testing. Versions of the software, known as
beta versions, are released to a limited audience outside of the company. The
software is released to groups of people so that further testing can ensure the
product has few faults or bugs. Sometimes, beta versions are made available
to the open public to increase the feedback field to a maximal number of
future users.
It should be noted that although both Alpha and Beta are referred to as testing it is in fact use immersion.
The rigors that are applied are often unsystematic and many of the basic tenets of testing process are not
used. The Alpha and Beta period provides insight into environmental and utilization conditions that can
impact the software.
After modifying software, either for a change in functionality or to fix defects, a regression test re-runs
previously passing tests on the modified software to ensure that the modifications haven't
unintentionally caused a regression of previous functionality. Regression testing can be performed at
any or all of the above test levels. These regression tests are often automated.
SMOKE TESTING
Smoke testing is a term used in plumbing, woodwind repair, electronics, and computer software
development. It refers to the first test made after repairs or first assembly to provide some assurance that
the system under test will not catastrophically fail. After a smoke test proves that the pipes will not leak,
the keys seal properly, the circuit will not burn, or the software will not crash outright, the assembly is
ready for more stressful testing.
 In plumbing, a smoke test forces actual smoke through newly plumbed pipes to
find leaks, before water is allowed to flow through the pipes.
 In woodwind instrument repair, a smoke test involves plugging one end of an
instrument and blowing smoke into the other to test for leaks. (This test is no
longer in common use)
 In electronics, a smoke testing is the first time a circuit is attached to power, which
will sometimes produce actual smoke if a design or wiring mistake has been made.
IMPLEMENTATION PHASE
The implementation phase involves installing approved applications into production
environments. Primary tasks include announcing the implementation schedule, training
end users, and installing the product. Additionally, organizations should input and
verify data, configure and test system and security parameters, and conduct post-
30
implementation reviews. Management should circulate implementation schedules to all
affected parties and should notify users of any implementation responsibilities.
After organizations install a product, pre-existing data is manually input or
electronically transferred to a new system. Verifying the accuracy of the input data and
security configurations is a critical part of the implementation process. Organizations
often run a new system in parallel with an old system until they verify the accuracy and
reliability of the new system. Employees should document any programming,
procedural, or configuration changes made during the verification process.
For implementation of the website project:
1. The website can be installed on a computer or a server which has PHP and
MYSQL installed in it.
2. The owners of the website are to be properly trained to use all the features of the
website, giving details of each features of the website.
3. To show the accuracy of the website and conformance of the website to the
requirements of the owners or users of the website.
TEST PLAN
The testing phase requires organizations to complete various tests to ensure the accuracy
of programmed code, the inclusion of expected functionality, and the interoperability of
applications and other network components. Thorough testing is critical to ensuring
systems meet organizational and end-user requirements. Test plans created during initial
project phases enhance an organization’s ability to create detailed tests.
A bottom-up approachtests smaller components first and progressively adds and tests
additional components and systems. A top-downapproachfirst tests major components
31
and connections and progressively tests smaller components and connections.
Bottom-up tests often begin with functional (requirements based) testing. Functional tests
should ensure that expected functional, security, and internal control features are present
and operating properly. Testers then complete integration and end-to-end testing to
ensure application and system components interact properly. Users then conduct
acceptance tests to ensure systems meet defined acceptance criteria. Organizations should
review and complete user, operator, and maintenance manuals during the testing phase.
Additionally, they should finalize conversion, implementation, and training plans.
For testing of the website:
1. All the features of the website are tested by running each function available in the
website.
2. The results of the tests conducted on the website are analyzed properly.Only
after getting satisfactory results of testing the website can be uploaded on the
network i.e. internet.
MAINTENANCE
The maintenance phase involves making changes to hardware, software, and
documentation to support its operational effectiveness. It includes making changes to
improve a system’s performance, correct problems, enhance security, or address user
requirements. To ensure modifications do not disrupt operations or degrade a system’s
performance or security, organizations should establish appropriate change management
procedures.
Routine changes are not as complex as major modifications and can usually be
implemented in the normal course of business. Routine change controls should include
procedures for requesting, evaluating, approving, testing, installing, and documenting
software modifications.Maintaining accurate, up-to-date hardware and software
inventories is a critical part of all change management processes. Management should
32
carefully document all modifications to ensure accurate system inventories.
Management should coordinate all technology related changes through an oversight
committee and assign an appropriate party responsibility for administering software
patch management programs. Quality assurance, security, audit, regulatory compliance,
network, and end-user personnel should be appropriately included in change
management processes. Risk and security review should be done whenever a system
modification is implemented to ensure controls remain in place.
For maintenance of the website:
1. The database has to be updated regularly according to new available information.
2. Redundant and false information must be removed from the database.
3. Newer version of Asp.Net and MYSQL can be used for up gradation of website
and to improve the overall performance of the system.
33
APP CODE
using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.IO;
using System.Data;
using System.Data.SqlClient;
using System.Configuration;
public class GlobalClass
{
public SqlConnection con = null;
public SqlDataAdapter da;
private SqlCommand cmd;
public GlobalClass()
{
con = new SqlConnection(ConfigurationManager.ConnectionStrings["cn"].ConnectionString);
}
public DataSet GetData(string sqlqry)
{
da = new SqlDataAdapter(sqlqry, con);
DataSet ds = new DataSet();
da.Fill(ds);
return ds;
}
public void SubmitAdmin(string fname, string dob, string gen, string mstatus, string mno, string
phone, string city, string addres, string pin, string emailid, string qual, string sdate, string endate, string
smpty, string ques, string ans, string pwd, ref string err, ref int aa)
{
try
{
string[] ss = Guid.NewGuid().ToString().Split('-');
cmd = new SqlCommand("insert into admindetails
values(@a,@b,@c,@d,@e,@f,@g,@h,@i,@j,@j1,@k,@l,@m,@n,@o,@p,@q)", con);
cmd.Parameters.AddWithValue("@a", "SCI" + ss[0]);
cmd.Parameters.AddWithValue("@b", fname);
cmd.Parameters.AddWithValue("@c", dob);
cmd.Parameters.AddWithValue("@d", gen);
cmd.Parameters.AddWithValue("@e", mstatus);
cmd.Parameters.AddWithValue("@f", mno);
cmd.Parameters.AddWithValue("@g", phone);
34
cmd.Parameters.AddWithValue("@h", city);
cmd.Parameters.AddWithValue("@i", addres);
cmd.Parameters.AddWithValue("@j", pin);
cmd.Parameters.AddWithValue("@j1", emailid);
cmd.Parameters.AddWithValue("@k", qual);
cmd.Parameters.AddWithValue("@l", System.DateTime.Now.ToString());
cmd.Parameters.AddWithValue("@m", endate);
cmd.Parameters.AddWithValue("@n", smpty);
cmd.Parameters.AddWithValue("@o", ques);
cmd.Parameters.AddWithValue("@p", ans);
cmd.Parameters.AddWithValue("@q", pwd);
con.Open();
aa = cmd.ExecuteNonQuery();
if (aa > 0)
{
err = "Admin Registration Complete Successfully,Please check the mail..";
}
}
catch (Exception ex)
{
err = ex.Message;
}
finally
{
con.Close();
}
}
//admin password changed
public void adminpwdchange(string npwd, string emailid, string pwd, ref string errs, ref int aa)
{
try
{
string[] ss = Guid.NewGuid().ToString().Split('-');
cmd = new SqlCommand("update admindetails set pwd=@a where emailid=@b and pwd=@c",
con);
cmd.Parameters.AddWithValue("@a", npwd);
cmd.Parameters.AddWithValue("@b", emailid);
cmd.Parameters.AddWithValue("@c", pwd);
con.Open();
aa = cmd.ExecuteNonQuery();
if (aa > 0)
{
errs = "Employer Account Password Changed Successfully";
}
}
catch (Exception ex)
{
errs = ex.Message;
35
}
finally
{
con.Close();
}
}
public void EmpEdit(string fname, string dob, string gen, string mstatus, string mno, string phone,
string city, string addres, string pin, string qual, string sdate, string endate, string smpty, string ques,
string ans, string emailid, ref string err, ref int aa)
{
try
{
cmd = new SqlCommand("update empdetails set
fname=@b,dob=@c,gender=@d,mstatus=@e,mno=@f,phone=@g,city=@h,address=@i,pincode=@j,q
uali=@l,startdate=@m,enddate=@n,emptype=@o,hnt_ques=@p,hnt_ans=@q where emailid=@aa",
con);
cmd.Parameters.AddWithValue("@b", fname);
cmd.Parameters.AddWithValue("@c", dob);
cmd.Parameters.AddWithValue("@d", gen);
cmd.Parameters.AddWithValue("@e", mstatus);
cmd.Parameters.AddWithValue("@f", mno);
cmd.Parameters.AddWithValue("@g", phone);
cmd.Parameters.AddWithValue("@h", city);
cmd.Parameters.AddWithValue("@i", addres);
cmd.Parameters.AddWithValue("@j", pin);
cmd.Parameters.AddWithValue("@l", qual);
cmd.Parameters.AddWithValue("@m", sdate);
cmd.Parameters.AddWithValue("@n", endate);
cmd.Parameters.AddWithValue("@o", smpty);
cmd.Parameters.AddWithValue("@p", ques);
cmd.Parameters.AddWithValue("@q", ans);
cmd.Parameters.AddWithValue("@aa", emailid);
con.Open();
aa = cmd.ExecuteNonQuery();
if (aa > 0)
{
err = "Employee Profile Updated Successfully";
}
}
catch (Exception ex)
{
err = ex.Message;
}
finally
{
con.Close();
}
}
36
public void AdminReg(string sqlqry, ref string err, ref int aa)
{
try
{
cmd = new SqlCommand(sqlqry, con);
con.Open();
aa = cmd.ExecuteNonQuery();
if (aa > 0)
{
err = "Admin Registration Successfully";
}
}
catch (Exception ex)
{
err = ex.Message;
}
finally
{
con.Close();
}
}
public void AdminEdit(string sqlqry, ref string err,ref int aa)
{
try
{
cmd = new SqlCommand(sqlqry, con);
con.Open();
aa = cmd.ExecuteNonQuery();
if (aa > 0)
{
err = "Admin Profile Update Successfully";
}
}
catch (Exception ex)
{
err = ex.Message;
}
finally
{
con.Close();
}
}
public void Delete(string sqlqry, ref string err)
{
try
{
37
cmd.CommandText = sqlqry;
int aa = cmd.ExecuteNonQuery();
if (aa > 0)
{
err = "Employee Registration Deleted Successfully";
}
}
catch (Exception ex)
{
err = ex.Message;
}
finally
{
con.Close();
}
}
public void emppwdchange(string npwd, string emailid, string pwd, ref string errs, ref int aa)
{
try
{
string[] ss = Guid.NewGuid().ToString().Split('-');
cmd = new SqlCommand("update empdetails set pwd=@a where emailid=@b and pwd=@c",
con);
cmd.Parameters.AddWithValue("@a", npwd);
cmd.Parameters.AddWithValue("@b", emailid);
cmd.Parameters.AddWithValue("@c", pwd);
con.Open();
aa = cmd.ExecuteNonQuery();
if (aa > 0)
{
errs = "Employee Account Password Changed Successfully";
}
}
catch (Exception ex)
{
errs = ex.Message;
}
finally
{
con.Close();
}
}
public void Adminpwdchange(string npwd, string aid, string pwd, ref string errs, ref int aa)
{
try
{
string[] ss = Guid.NewGuid().ToString().Split('-');
cmd = new SqlCommand("update admin_reg set pwd=@a where aid=@b and pwd=@c", con);
cmd.Parameters.AddWithValue("@a", npwd);
38
cmd.Parameters.AddWithValue("@b", aid);
cmd.Parameters.AddWithValue("@c", pwd);
con.Open();
aa = cmd.ExecuteNonQuery();
if (aa > 0)
{
errs = "Admin Account Password Changed Successfully";
}
}
catch (Exception ex)
{
errs = ex.Message;
}
finally
{
con.Close();
}
}
//employer add Products
public void REgPostJobs(string seid, string pname, string abpro, string pername, string
contname,string mailid, string prodes, string pcity, string proqual, string protype, string percountry,
string gurantpp, string procate, string pricer, string nopro, string spoff, string imgg,string status,string
date, ref string err, ref int aa)
{
try
{
cmd = new SqlCommand("insert into productpostTB19
values(@a,@b,@c,@d,@e,@x,@f,@g,@h,@i,@j,@k,@l,@m,@n,@o,@p,@z,@q)", con);
cmd.Parameters.AddWithValue("@a", seid);
cmd.Parameters.AddWithValue("@b", pname);
cmd.Parameters.AddWithValue("@c", abpro);
cmd.Parameters.AddWithValue("@d", pername);
cmd.Parameters.AddWithValue("@e", contname);
cmd.Parameters.AddWithValue("@x", mailid);
cmd.Parameters.AddWithValue("@f", prodes);
cmd.Parameters.AddWithValue("@g", pcity);
cmd.Parameters.AddWithValue("@h", proqual);
cmd.Parameters.AddWithValue("@i", protype);
cmd.Parameters.AddWithValue("@j", percountry);
cmd.Parameters.AddWithValue("@k", gurantpp);
cmd.Parameters.AddWithValue("@l", procate);
cmd.Parameters.AddWithValue("@m", pricer);
cmd.Parameters.AddWithValue("@n", nopro);
cmd.Parameters.AddWithValue("@o", spoff);
cmd.Parameters.AddWithValue("@p", imgg);
cmd.Parameters.AddWithValue("@z", status);
cmd.Parameters.AddWithValue("@q", date);
39
con.Open();
aa = cmd.ExecuteNonQuery();
if (aa > 0)
{
err = "your job posted Successfully..";
}
}
catch (Exception ex)
{
err = ex.Message;
}
finally
{
con.Close();
}
}
public void REGUpdate(string eid, ref string err, ref int aa)
{
try
{
cmd = new SqlCommand("update regmaster set reg_approval=@b where empid=@a", con);
cmd.Parameters.AddWithValue("@a", eid);
cmd.Parameters.AddWithValue("@b", "Approved");
con.Open();
aa = cmd.ExecuteNonQuery();
if (aa > 0)
{
err = "Employee Resignation Approved Successfully";
}
}
catch (Exception ex)
{
err = ex.Message;
}
finally
{
con.Close();
}
}
//super admin details starts here
public void SubmitSuperAdmin(string fname, string dob, string gen, string mstatus, string mno, string
phone, string city, string addres, string pin, string emailid, string qual, string sdate, string endate, string
smpty, string ques, string ans, string pwd, ref string err, ref int aa)
{
try
40
{
string[] ss = Guid.NewGuid().ToString().Split('-');
cmd = new SqlCommand("insert into superadmindetails22
values(@a,@b,@c,@d,@e,@f,@g,@h,@i,@j,@j1,@k,@l,@m,@n,@o,@p,@q)", con);
cmd.Parameters.AddWithValue("@a", "SCI" + ss[0]);
cmd.Parameters.AddWithValue("@b", fname);
cmd.Parameters.AddWithValue("@c", dob);
cmd.Parameters.AddWithValue("@d", gen);
cmd.Parameters.AddWithValue("@e", mstatus);
cmd.Parameters.AddWithValue("@f", mno);
cmd.Parameters.AddWithValue("@g", phone);
cmd.Parameters.AddWithValue("@h", city);
cmd.Parameters.AddWithValue("@i", addres);
cmd.Parameters.AddWithValue("@j", pin);
cmd.Parameters.AddWithValue("@j1", emailid);
cmd.Parameters.AddWithValue("@k", qual);
cmd.Parameters.AddWithValue("@l", System.DateTime.Now.ToString());
cmd.Parameters.AddWithValue("@m", endate);
cmd.Parameters.AddWithValue("@n", smpty);
cmd.Parameters.AddWithValue("@o", ques);
cmd.Parameters.AddWithValue("@p", ans);
cmd.Parameters.AddWithValue("@q", pwd);
con.Open();
aa = cmd.ExecuteNonQuery();
if (aa > 0)
{
err = "Admin Registration Complete Successfully,Please check the mail..";
}
}
catch (Exception ex)
{
err = ex.Message;
}
finally
{
con.Close();
}
}
public void SuperAdminEdit(string sqlqry, ref string err, ref int aa)
{
try
{
cmd = new SqlCommand(sqlqry, con);
con.Open();
aa = cmd.ExecuteNonQuery();
if (aa > 0)
{
err = "Admin Profile Update Successfully";
}
41
}
catch (Exception ex)
{
err = ex.Message;
}
finally
{
con.Close();
}
}
// product review table details
public void ReviewSubmit(string productname, string emailid, string contactno, string
comment,string status, string rating, string review_date, ref string err, ref int aa)
{
try
{
cmd = new SqlCommand("insert into productreviewTB6 values(@b,@c,@d,@e,@f,@g,@h)",
con);
cmd.Parameters.AddWithValue("@b", productname);
cmd.Parameters.AddWithValue("@c", emailid);
cmd.Parameters.AddWithValue("@d", contactno);
cmd.Parameters.AddWithValue("@e", comment);
cmd.Parameters.AddWithValue("@f", status);
cmd.Parameters.AddWithValue("@g", rating);
cmd.Parameters.AddWithValue("@h", review_date);
con.Open();
aa = cmd.ExecuteNonQuery();
if (aa > 0)
{
err = "your comment successfully";
}
}
catch (Exception ex)
{
err = ex.Message;
}
finally
{
con.Close();
}
}
42
public class globalclass
{
public int id { get; set; }
public string productname { get; set; }
public string emailid { get; set; }
public string contactno{ get; set; }
public string comment { get; set; }
}
//email sending ends here
public object emptype { get; set; }
public object hnt_ques { get; set; }
public object hnt_ans { get; set; }
public void Adminreg(string p, string p_2, string p_3, string p_4, string p_5, string p_6, string p_7,
string p_8, string p_9, ref string eror, ref int ss)
{
throw new NotImplementedException();
}
}
43
TABLE CREATION:
create database cart222
CREATE TABLE registration (
[fname] [nvarchar](50) NULL,
[mno] [nvarchar](50) NULL,
[emailid] [nvarchar](50) NULL,
[sub] [nvarchar](50) NULL,
[ques] [nvarchar](500) NULL
) ON [PRIMARY]
CREATE TABLE empdetails2(
[empid] [nvarchar](20) NOT NULL,
[fname] [nvarchar](50) NULL,
[dob] [nvarchar](50) NULL,
[gender] [nvarchar](50) NULL,
[mstatus] [nvarchar](50) NULL,
[mno] [nvarchar](50) NULL,
[phone] [nvarchar](50) NULL,
[city] [nvarchar](50) NULL,
[address] [nvarchar](50) NULL,
[pincode] [nvarchar](50) NULL,
[emailid] [nvarchar](50) NULL,
[quali] [nvarchar](50) NULL,
[startdate] [nvarchar](50) NULL,
[enddate] [nvarchar](50) NULL,
[emptype] [nvarchar](50) NULL,
[hnt_ques] [nvarchar](50) NULL,
[hnt_ans] [nvarchar](50) NULL,
[pwd] [nvarchar](50) NULL,
CONSTRAINT [PK_empdetails2] PRIMARY KEY CLUSTERED
(
[empid] ASC
)WITH (PAD_INDEX = OFF, STATISTICS_NORECOMPUTE = OFF, IGNORE_DUP_KEY = OFF,
ALLOW_ROW_LOCKS = ON, ALLOW_PAGE_LOCKS = ON) ON [PRIMARY]
) ON [PRIMARY]
CREATE TABLE admindetails2(
[aid] [nvarchar](20) NOT NULL,
[fname] [nvarchar](50) NULL,
[dob] [nvarchar](50) NULL,
[gender] [nvarchar](50) NULL,
[mstatus] [nvarchar](50) NULL,
[mno] [nvarchar](50) NULL,
[phone] [nvarchar](50) NULL,
[city] [nvarchar](50) NULL,
[address] [nvarchar](50) NULL,
[pincode] [nvarchar](50) NULL,
[emailid] [nvarchar](50) NULL,
[quali] [nvarchar](50) NULL,
[startdate] [nvarchar](50) NULL,
[enddate] [nvarchar](50) NULL,
[emptype] [nvarchar](50) NULL,
[hnt_ques] [nvarchar](50) NULL,
[hnt_ans] [nvarchar](50) NULL,
[pwd] [nvarchar](50) NULL,
PRIMARY KEY CLUSTERED
(
[aid] ASC
44
)
CREATE TABLE admin_reg2(
[aid] [nvarchar](20) NOT NULL,
[aname] [nvarchar](50) NULL,
[amno] [nvarchar](50) NULL,
[aemailid] [nvarchar](50) NULL,
[pwd] [nvarchar](50) NULL
) ON [PRIMARY]
CREATE TABLE addpost223(
[add_serialno] [int] IDENTITY(1,1) NOT NULL,
[addid] [nvarchar](20) NOT NULL,
[add_title] [nvarchar](200) NOT NULL,
[add_industry] [nvarchar](200) NOT NULL,
[add_country] [nvarchar](50) NOT NULL,
[add_city] [nvarchar](350) NULL,
[add_photo] [nvarchar](50) NULL,
[add_address1] [nvarchar](350) NULL,
[add_description] [nvarchar](max) NULL,
[add_phone] [nvarchar](max) NULL,
[add_address2] [nvarchar](max) NULL,
[add_logo] [nvarchar](100) NULL,
[add_otherdetails] [nvarchar](350) NULL,
[add_approvaldate] [nvarchar](50) NULL,
[add_posteddate] [nvarchar](max) NULL,
[add_postedperson] [nvarchar](50) NULL,
[empid] [nvarchar](50) NOT NULL,
[status] [nvarchar](50) NULL,
[add_review] [nvarchar](50) NULL,
[add_company] [nvarchar](max) NULL,
[add_neewebsite] [nvarchar](50) NULL,
PRIMARY KEY CLUSTERED
(
[add_serialno] ASC
)WITH (PAD_INDEX = OFF, STATISTICS_NORECOMPUTE = OFF, IGNORE_DUP_KEY = OFF,
ALLOW_ROW_LOCKS = ON, ALLOW_PAGE_LOCKS = ON) ON [PRIMARY]
) ON [PRIMARY]
CREATE TABLE productpostTB191(
[s_no] [int] IDENTITY(1,1) NOT NULL,
[serial_no] [nvarchar](50) NOT NULL,
[product_name] [nvarchar](50) NOT NULL,
[about_product] [nvarchar](50) NOT NULL,
[person_name] [nvarchar](50) NOT NULL,
[contact_no] [nvarchar](50) NOT NULL,
[emailid] [nvarchar](50) NOT NULL,
[product_desp] [nvarchar](50) NOT NULL,
[city] [nvarchar](50) NOT NULL,
[product_quality] [nvarchar](50) NOT NULL,
[product_type] [nvarchar](50) NOT NULL,
[country_name] [nvarchar](50) NOT NULL,
[gurantee_period] [nvarchar](50) NOT NULL,
[product_categories] [nvarchar](50) NOT NULL,
[price_range] [nvarchar](50) NOT NULL,
[no_product] [nvarchar](50) NOT NULL,
[special_offer] [nvarchar](50) NOT NULL,
[photo] [nvarchar](50) NOT NULL,
[status] [nvarchar](50) NULL
) ON [PRIMARY]
45
Table Layout
Admin RegistrationTable
CUSTOMER DEATIL TABLE
46
PRODUCT POST TABLE
PRODUCT REVIEW TABLE:
47
CONTACTTABLE
48
Conclusion
The Internet has becomea major resourcein modern business, thus
electronic shopping has gained significance not only from the
entrepreneur’s but also from the customer’s point of view. Forthe
entrepreneur, electronic shopping generates new business opportunities
and for the customer, it makes comparative shoppingpossible. As per a
survey, mostconsumers ofonline stores are impulsive and usually make
a decisionto stay on a site within the first few seconds.“Websitedesign
is like a shop interior. If the shop looks pooror like hundreds of other
shops the customer is most likely to skip to the other site. Hence we
have designed the project to provide the user with easy
navigation, retrieval of data and necessary feedbackas much as possible.
In this project, the user is provided with an e-commerce web site that can be
used
to buy books online. To implement this as a web application we used
ASP.NET as the Technology. ASP.NET has several advantages such as
enhanced performance ,Scalability, built-in security and simplicity. To build
any web application using ASP.NET we need a programminglanguage suchas
C#, VB.NET, J# and so on. C#was the language used to build this application.
For the client browser to connect to the ASP.NET engine we used
Microsoft’s Internet Information Services (IIS) as the Web Server. ASP.NET
uses ADO.NET to interact with the databaseas it provides in-memory
caching that eliminates the need to contactthe databaseserver frequently and
it can easily deploy and maintain an ASP.NET application. MySQL was used
as back-end databasesince it is one ofthe most popularopensourcedatabases,
and it provides fastdataaccess, easy
Installation and simplicity.
A good shoppingcart design must be accompanied with user-friendly
shopping cart application logic. It should be convenient for the
customer to view the contents of their cart and to be able to remove or
add items to their cart. The shoppingcart application described in this
project provides a number of features that are designed to make the
customer more comfortable.
49
This project helps in understanding the creation of an interactive web
page and the technologies used to implement it. The design of the
projectwhich includes Data Model and Process Modelillustrates how
the database is built with different tables, how the data is accessed and
processedfromthe tables. The building of the projecthas given me a
preciseknowledge abouthow ASP.NET is used to develop a website,
how it connects to the databaseto access thedata and how the data and
web pages are modified to provide the user with a shoppingcart
application.
FUTURE ENHANCEMENTS
We can have a Website that will cover whole India giving details of Arts created
by persons.
The On Line Placement System website will have the prominent features
including:
 Providing online Placement Record through our site.
 Providing personalized inbox to the user.
 Providing video conferencing with the Artists
 Providing links to news which will elaborate more information about
them.
 Providing Ajax technology refreshing In our website.
.
50
REFERENCE AS PER THE WEBSITES:
1) www.firstmartshopping.com
2) www.w3cschools.com
3) www.flipkart.com
4) www.mysql.com
5) www.snapdeal.com
51

Contenu connexe

Tendances

e-commerce web development project report (Bookz report)
e-commerce web development project report (Bookz report)e-commerce web development project report (Bookz report)
e-commerce web development project report (Bookz report)Mudasir Ahmad Bhat
 
Report of e commerce website
Report of e commerce websiteReport of e commerce website
Report of e commerce websiteFarhan Anik
 
E-commerce documentation
E-commerce documentationE-commerce documentation
E-commerce documentationSohel Parvez
 
Mini project report_on_online_shopping
Mini project report_on_online_shoppingMini project report_on_online_shopping
Mini project report_on_online_shoppingSandeep Bittu
 
Deals made easy| Online Shopping Kart |Java,Jsp,JDBC
Deals made easy| Online Shopping Kart |Java,Jsp,JDBCDeals made easy| Online Shopping Kart |Java,Jsp,JDBC
Deals made easy| Online Shopping Kart |Java,Jsp,JDBCSaikiranReddy Sama
 
Project Report on Online shopping by Nawazish Anwar
Project Report on Online shopping by Nawazish AnwarProject Report on Online shopping by Nawazish Anwar
Project Report on Online shopping by Nawazish AnwarNawazish Raaz
 
[[Srs]] online shopping website for TYBSC IT
[[Srs]] online shopping website for TYBSC IT[[Srs]] online shopping website for TYBSC IT
[[Srs]] online shopping website for TYBSC ITYogeshDhamke2
 
Online shopping Report
Online shopping ReportOnline shopping Report
Online shopping ReportPragnya Dash
 
Placement Cell project
Placement Cell projectPlacement Cell project
Placement Cell projectManish Kumar
 
Web based online shopping system Presentation slide
Web based online shopping system Presentation  slideWeb based online shopping system Presentation  slide
Web based online shopping system Presentation slideRakibul Hasan Pranto
 
Online Shopping project report
Online Shopping project report Online Shopping project report
Online Shopping project report Surjeet Art
 
Software Requirement Specification on Online Purchasing System
Software Requirement Specification on Online Purchasing SystemSoftware Requirement Specification on Online Purchasing System
Software Requirement Specification on Online Purchasing Systemsabafarheen
 
Online shopping report-6 month project
Online shopping report-6 month projectOnline shopping report-6 month project
Online shopping report-6 month projectGinne yoffe
 
Student feedback system
Student feedback systemStudent feedback system
Student feedback systemshindept123
 
Onlineline shopping Yash Bazaar.com
Onlineline shopping Yash Bazaar.comOnlineline shopping Yash Bazaar.com
Onlineline shopping Yash Bazaar.comTmu
 
Online Shopping Full Project Presentation (20 slides)
Online Shopping Full Project Presentation (20 slides)Online Shopping Full Project Presentation (20 slides)
Online Shopping Full Project Presentation (20 slides)Krishna Mohan Shakya
 
online-shopping-documentation-srs for TYBSCIT sem 6
 online-shopping-documentation-srs for TYBSCIT sem 6 online-shopping-documentation-srs for TYBSCIT sem 6
online-shopping-documentation-srs for TYBSCIT sem 6YogeshDhamke2
 
Me project e-commerce- epgdim 14
Me project   e-commerce- epgdim 14Me project   e-commerce- epgdim 14
Me project e-commerce- epgdim 14HITESH BHARTI
 

Tendances (20)

e-commerce web development project report (Bookz report)
e-commerce web development project report (Bookz report)e-commerce web development project report (Bookz report)
e-commerce web development project report (Bookz report)
 
Online shopping
Online shoppingOnline shopping
Online shopping
 
Report of e commerce website
Report of e commerce websiteReport of e commerce website
Report of e commerce website
 
E-commerce documentation
E-commerce documentationE-commerce documentation
E-commerce documentation
 
Mini project report_on_online_shopping
Mini project report_on_online_shoppingMini project report_on_online_shopping
Mini project report_on_online_shopping
 
Deals made easy| Online Shopping Kart |Java,Jsp,JDBC
Deals made easy| Online Shopping Kart |Java,Jsp,JDBCDeals made easy| Online Shopping Kart |Java,Jsp,JDBC
Deals made easy| Online Shopping Kart |Java,Jsp,JDBC
 
Project Report on Online shopping by Nawazish Anwar
Project Report on Online shopping by Nawazish AnwarProject Report on Online shopping by Nawazish Anwar
Project Report on Online shopping by Nawazish Anwar
 
[[Srs]] online shopping website for TYBSC IT
[[Srs]] online shopping website for TYBSC IT[[Srs]] online shopping website for TYBSC IT
[[Srs]] online shopping website for TYBSC IT
 
Online shopping Report
Online shopping ReportOnline shopping Report
Online shopping Report
 
Placement Cell project
Placement Cell projectPlacement Cell project
Placement Cell project
 
Web based online shopping system Presentation slide
Web based online shopping system Presentation  slideWeb based online shopping system Presentation  slide
Web based online shopping system Presentation slide
 
Online shopping Project
Online shopping Project Online shopping Project
Online shopping Project
 
Online Shopping project report
Online Shopping project report Online Shopping project report
Online Shopping project report
 
Software Requirement Specification on Online Purchasing System
Software Requirement Specification on Online Purchasing SystemSoftware Requirement Specification on Online Purchasing System
Software Requirement Specification on Online Purchasing System
 
Online shopping report-6 month project
Online shopping report-6 month projectOnline shopping report-6 month project
Online shopping report-6 month project
 
Student feedback system
Student feedback systemStudent feedback system
Student feedback system
 
Onlineline shopping Yash Bazaar.com
Onlineline shopping Yash Bazaar.comOnlineline shopping Yash Bazaar.com
Onlineline shopping Yash Bazaar.com
 
Online Shopping Full Project Presentation (20 slides)
Online Shopping Full Project Presentation (20 slides)Online Shopping Full Project Presentation (20 slides)
Online Shopping Full Project Presentation (20 slides)
 
online-shopping-documentation-srs for TYBSCIT sem 6
 online-shopping-documentation-srs for TYBSCIT sem 6 online-shopping-documentation-srs for TYBSCIT sem 6
online-shopping-documentation-srs for TYBSCIT sem 6
 
Me project e-commerce- epgdim 14
Me project   e-commerce- epgdim 14Me project   e-commerce- epgdim 14
Me project e-commerce- epgdim 14
 

En vedette

презентация газета мозаика (1)
презентация газета мозаика (1)презентация газета мозаика (1)
презентация газета мозаика (1)Kate Ilichkina
 
1. konsep dasar dan kebijakan sosialisasi 2011
1. konsep dasar dan kebijakan   sosialisasi 20111. konsep dasar dan kebijakan   sosialisasi 2011
1. konsep dasar dan kebijakan sosialisasi 2011de depra
 
Licencje i cc
Licencje i ccLicencje i cc
Licencje i ccbartq178
 
Styrketrening pp
Styrketrening ppStyrketrening pp
Styrketrening ppkenturban
 
Marketing is King | ACCED-I Presentation, by Mandy Volpe
Marketing is King | ACCED-I Presentation, by Mandy VolpeMarketing is King | ACCED-I Presentation, by Mandy Volpe
Marketing is King | ACCED-I Presentation, by Mandy VolpeUnique Venues
 
What is DH? And What’s it Doing at the Claremont Colleges?
What is DH? And What’s it Doing at the Claremont Colleges?What is DH? And What’s it Doing at the Claremont Colleges?
What is DH? And What’s it Doing at the Claremont Colleges?Ashley Sanders, Ph.D.
 
It's made of ….
It's made of ….It's made of ….
It's made of ….kaetchen59
 
Marketing at Region 4
Marketing at Region 4Marketing at Region 4
Marketing at Region 4Unique Venues
 
Prezentacsia
PrezentacsiaPrezentacsia
Prezentacsiabaltagi0
 
Conference Centers in the Northeast United States
Conference Centers in the Northeast United StatesConference Centers in the Northeast United States
Conference Centers in the Northeast United StatesUnique Venues
 

En vedette (16)

A team 43 C
A team 43 CA team 43 C
A team 43 C
 
Events Get Social
Events Get SocialEvents Get Social
Events Get Social
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
презентация газета мозаика (1)
презентация газета мозаика (1)презентация газета мозаика (1)
презентация газета мозаика (1)
 
A team pdf
A team pdfA team pdf
A team pdf
 
1. konsep dasar dan kebijakan sosialisasi 2011
1. konsep dasar dan kebijakan   sosialisasi 20111. konsep dasar dan kebijakan   sosialisasi 2011
1. konsep dasar dan kebijakan sosialisasi 2011
 
Licencje i cc
Licencje i ccLicencje i cc
Licencje i cc
 
A team 43
A team 43A team 43
A team 43
 
Styrketrening pp
Styrketrening ppStyrketrening pp
Styrketrening pp
 
Marketing is King | ACCED-I Presentation, by Mandy Volpe
Marketing is King | ACCED-I Presentation, by Mandy VolpeMarketing is King | ACCED-I Presentation, by Mandy Volpe
Marketing is King | ACCED-I Presentation, by Mandy Volpe
 
What is DH? And What’s it Doing at the Claremont Colleges?
What is DH? And What’s it Doing at the Claremont Colleges?What is DH? And What’s it Doing at the Claremont Colleges?
What is DH? And What’s it Doing at the Claremont Colleges?
 
It's made of ….
It's made of ….It's made of ….
It's made of ….
 
CISA Course
CISA CourseCISA Course
CISA Course
 
Marketing at Region 4
Marketing at Region 4Marketing at Region 4
Marketing at Region 4
 
Prezentacsia
PrezentacsiaPrezentacsia
Prezentacsia
 
Conference Centers in the Northeast United States
Conference Centers in the Northeast United StatesConference Centers in the Northeast United States
Conference Centers in the Northeast United States
 

Similaire à online shopping

LEDU Education Ecosystem Whitepaper
LEDU Education Ecosystem WhitepaperLEDU Education Ecosystem Whitepaper
LEDU Education Ecosystem WhitepaperKristineMejia2
 
Netflix for the_360_billion_professional_development_market
Netflix for the_360_billion_professional_development_marketNetflix for the_360_billion_professional_development_market
Netflix for the_360_billion_professional_development_marketKristineMejia2
 
LEDU Education Ecosystem Whitepaper
LEDU Education Ecosystem WhitepaperLEDU Education Ecosystem Whitepaper
LEDU Education Ecosystem WhitepaperLEDU Token
 
E-commrce page.docx
E-commrce page.docxE-commrce page.docx
E-commrce page.docxAmitmAHI4
 
IRJET- Online Shopping System
IRJET-  	  Online Shopping SystemIRJET-  	  Online Shopping System
IRJET- Online Shopping SystemIRJET Journal
 
travel guidence.pdf
travel guidence.pdftravel guidence.pdf
travel guidence.pdfSRIDHAMCH
 
Analysis On The Tour Guide Robot
Analysis On The Tour Guide RobotAnalysis On The Tour Guide Robot
Analysis On The Tour Guide RobotJessica Lopez
 
The Field Of Machine Learning Essay
The Field Of Machine Learning EssayThe Field Of Machine Learning Essay
The Field Of Machine Learning EssayRobynn Dixon
 
Industrial training seminar ppt on asp.net
Industrial training seminar ppt on asp.netIndustrial training seminar ppt on asp.net
Industrial training seminar ppt on asp.netPankaj Kushwaha
 
Kirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics ProjectKirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics ProjectKirtesh Khandelwal
 
Working at Net Solutions
Working at Net SolutionsWorking at Net Solutions
Working at Net SolutionsNet Solutions
 
Protech (Computer Vision, Machine Learning, Deep Learning, Software Development)
Protech (Computer Vision, Machine Learning, Deep Learning, Software Development)Protech (Computer Vision, Machine Learning, Deep Learning, Software Development)
Protech (Computer Vision, Machine Learning, Deep Learning, Software Development)Dusko Rakin
 
Protech (Computer Vision, Machine Learning, Deep Learning, Image Processing, ...
Protech (Computer Vision, Machine Learning, Deep Learning, Image Processing, ...Protech (Computer Vision, Machine Learning, Deep Learning, Image Processing, ...
Protech (Computer Vision, Machine Learning, Deep Learning, Image Processing, ...Protech
 
Online insurance broker portal
Online insurance broker portalOnline insurance broker portal
Online insurance broker portalDurgesh Singh
 

Similaire à online shopping (20)

LEDU Education Ecosystem Whitepaper
LEDU Education Ecosystem WhitepaperLEDU Education Ecosystem Whitepaper
LEDU Education Ecosystem Whitepaper
 
Netflix for the_360_billion_professional_development_market
Netflix for the_360_billion_professional_development_marketNetflix for the_360_billion_professional_development_market
Netflix for the_360_billion_professional_development_market
 
LEDU Education Ecosystem Whitepaper
LEDU Education Ecosystem WhitepaperLEDU Education Ecosystem Whitepaper
LEDU Education Ecosystem Whitepaper
 
E-commrce page.docx
E-commrce page.docxE-commrce page.docx
E-commrce page.docx
 
online marketplace report
online marketplace reportonline marketplace report
online marketplace report
 
All In One Kart
All In One KartAll In One Kart
All In One Kart
 
Project Proposel Documentation
Project Proposel  DocumentationProject Proposel  Documentation
Project Proposel Documentation
 
IRJET- Online Shopping System
IRJET-  	  Online Shopping SystemIRJET-  	  Online Shopping System
IRJET- Online Shopping System
 
travel guidence.pdf
travel guidence.pdftravel guidence.pdf
travel guidence.pdf
 
Nextstepglobal Proposal
Nextstepglobal ProposalNextstepglobal Proposal
Nextstepglobal Proposal
 
Analysis On The Tour Guide Robot
Analysis On The Tour Guide RobotAnalysis On The Tour Guide Robot
Analysis On The Tour Guide Robot
 
The Field Of Machine Learning Essay
The Field Of Machine Learning EssayThe Field Of Machine Learning Essay
The Field Of Machine Learning Essay
 
Industrial training seminar ppt on asp.net
Industrial training seminar ppt on asp.netIndustrial training seminar ppt on asp.net
Industrial training seminar ppt on asp.net
 
Project report
Project report Project report
Project report
 
Kirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics ProjectKirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics Project
 
report
reportreport
report
 
Working at Net Solutions
Working at Net SolutionsWorking at Net Solutions
Working at Net Solutions
 
Protech (Computer Vision, Machine Learning, Deep Learning, Software Development)
Protech (Computer Vision, Machine Learning, Deep Learning, Software Development)Protech (Computer Vision, Machine Learning, Deep Learning, Software Development)
Protech (Computer Vision, Machine Learning, Deep Learning, Software Development)
 
Protech (Computer Vision, Machine Learning, Deep Learning, Image Processing, ...
Protech (Computer Vision, Machine Learning, Deep Learning, Image Processing, ...Protech (Computer Vision, Machine Learning, Deep Learning, Image Processing, ...
Protech (Computer Vision, Machine Learning, Deep Learning, Image Processing, ...
 
Online insurance broker portal
Online insurance broker portalOnline insurance broker portal
Online insurance broker portal
 

Dernier

Digital Gravity - Full-Scale SEO Services Preview
Digital Gravity - Full-Scale SEO Services PreviewDigital Gravity - Full-Scale SEO Services Preview
Digital Gravity - Full-Scale SEO Services PreviewDigital Gravity
 
Dhanuka Agritech Limited - Sales and Marketing Intern
Dhanuka Agritech Limited - Sales and Marketing InternDhanuka Agritech Limited - Sales and Marketing Intern
Dhanuka Agritech Limited - Sales and Marketing Internrisabhpandeyconnect
 
Digital Marketing Analytics: Driving Hotel Success (2016 May report)
Digital Marketing Analytics: Driving Hotel Success (2016 May report)Digital Marketing Analytics: Driving Hotel Success (2016 May report)
Digital Marketing Analytics: Driving Hotel Success (2016 May report)yaeyukimoto
 
Converting with Comedy: Research Parallels for CRO
Converting with Comedy: Research Parallels for CROConverting with Comedy: Research Parallels for CRO
Converting with Comedy: Research Parallels for CROVWO
 
Fashion-Marketing-1- Assaginment mid.pdf
Fashion-Marketing-1- Assaginment mid.pdfFashion-Marketing-1- Assaginment mid.pdf
Fashion-Marketing-1- Assaginment mid.pdfUttara University
 
Digital Marketing Services like SEO, SMM, SEM
Digital Marketing Services like SEO, SMM, SEMDigital Marketing Services like SEO, SMM, SEM
Digital Marketing Services like SEO, SMM, SEMNazal Digital
 
Cricket Playbook for Growth Marketers: Adjust x Glance report
Cricket Playbook for Growth Marketers: Adjust x Glance reportCricket Playbook for Growth Marketers: Adjust x Glance report
Cricket Playbook for Growth Marketers: Adjust x Glance reportSocial Samosa
 
Imposter Syndrome in Marketing & Why You're Not Alone
Imposter Syndrome in Marketing & Why You're Not AloneImposter Syndrome in Marketing & Why You're Not Alone
Imposter Syndrome in Marketing & Why You're Not AloneHerd
 
The Creative Marketing campaigns of WeRoad
The Creative Marketing campaigns of WeRoadThe Creative Marketing campaigns of WeRoad
The Creative Marketing campaigns of WeRoadFabio Bin
 
Ice Cream Brand Harmony Study - TINT Emotional Profiling Research
Ice Cream Brand Harmony Study - TINT Emotional Profiling ResearchIce Cream Brand Harmony Study - TINT Emotional Profiling Research
Ice Cream Brand Harmony Study - TINT Emotional Profiling ResearchTINT Marketing
 
A_B Testing Personalized Meditation Recommendations.pdf
A_B Testing Personalized Meditation Recommendations.pdfA_B Testing Personalized Meditation Recommendations.pdf
A_B Testing Personalized Meditation Recommendations.pdfVWO
 
scope in Digital Marketing & advertising
scope in Digital Marketing & advertisingscope in Digital Marketing & advertising
scope in Digital Marketing & advertisingKBS SHOP
 
Ppt regarding of Digital Marketing cours
Ppt regarding of Digital Marketing coursPpt regarding of Digital Marketing cours
Ppt regarding of Digital Marketing courstegveersingh09
 
Podvertise.fm - Podcast Advertising Marketplace - Startup Pitch Deck
Podvertise.fm - Podcast Advertising Marketplace - Startup Pitch DeckPodvertise.fm - Podcast Advertising Marketplace - Startup Pitch Deck
Podvertise.fm - Podcast Advertising Marketplace - Startup Pitch DeckNedko Nedkov
 
What's Happening with Your Microsoft Advertising's Search Campaigns? - Sophie...
What's Happening with Your Microsoft Advertising's Search Campaigns? - Sophie...What's Happening with Your Microsoft Advertising's Search Campaigns? - Sophie...
What's Happening with Your Microsoft Advertising's Search Campaigns? - Sophie...Sophie Logan
 
SVETLANA YONCHEVA Evolution of digital marketing.pdf
SVETLANA YONCHEVA Evolution of digital marketing.pdfSVETLANA YONCHEVA Evolution of digital marketing.pdf
SVETLANA YONCHEVA Evolution of digital marketing.pdfvikrs213
 
Snapshot of Consumer Behaviors of February 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of February 2024-EOLiSurvey (EN).pdfSnapshot of Consumer Behaviors of February 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of February 2024-EOLiSurvey (EN).pdfEastern Online-iSURVEY
 
The best Crypto Marketing Strategies pdf
The best Crypto Marketing Strategies pdfThe best Crypto Marketing Strategies pdf
The best Crypto Marketing Strategies pdfShifali roy
 
2024 Google SERP Features: New Strategies To Gain Visibility
2024 Google SERP Features: New Strategies To Gain Visibility2024 Google SERP Features: New Strategies To Gain Visibility
2024 Google SERP Features: New Strategies To Gain VisibilitySearch Engine Journal
 
Friends of Search '24 - Scaling SEO_ Lessons for All Types of Sites.pptx
Friends of Search '24 - Scaling SEO_ Lessons for All Types of Sites.pptxFriends of Search '24 - Scaling SEO_ Lessons for All Types of Sites.pptx
Friends of Search '24 - Scaling SEO_ Lessons for All Types of Sites.pptxGregory Edwards
 

Dernier (20)

Digital Gravity - Full-Scale SEO Services Preview
Digital Gravity - Full-Scale SEO Services PreviewDigital Gravity - Full-Scale SEO Services Preview
Digital Gravity - Full-Scale SEO Services Preview
 
Dhanuka Agritech Limited - Sales and Marketing Intern
Dhanuka Agritech Limited - Sales and Marketing InternDhanuka Agritech Limited - Sales and Marketing Intern
Dhanuka Agritech Limited - Sales and Marketing Intern
 
Digital Marketing Analytics: Driving Hotel Success (2016 May report)
Digital Marketing Analytics: Driving Hotel Success (2016 May report)Digital Marketing Analytics: Driving Hotel Success (2016 May report)
Digital Marketing Analytics: Driving Hotel Success (2016 May report)
 
Converting with Comedy: Research Parallels for CRO
Converting with Comedy: Research Parallels for CROConverting with Comedy: Research Parallels for CRO
Converting with Comedy: Research Parallels for CRO
 
Fashion-Marketing-1- Assaginment mid.pdf
Fashion-Marketing-1- Assaginment mid.pdfFashion-Marketing-1- Assaginment mid.pdf
Fashion-Marketing-1- Assaginment mid.pdf
 
Digital Marketing Services like SEO, SMM, SEM
Digital Marketing Services like SEO, SMM, SEMDigital Marketing Services like SEO, SMM, SEM
Digital Marketing Services like SEO, SMM, SEM
 
Cricket Playbook for Growth Marketers: Adjust x Glance report
Cricket Playbook for Growth Marketers: Adjust x Glance reportCricket Playbook for Growth Marketers: Adjust x Glance report
Cricket Playbook for Growth Marketers: Adjust x Glance report
 
Imposter Syndrome in Marketing & Why You're Not Alone
Imposter Syndrome in Marketing & Why You're Not AloneImposter Syndrome in Marketing & Why You're Not Alone
Imposter Syndrome in Marketing & Why You're Not Alone
 
The Creative Marketing campaigns of WeRoad
The Creative Marketing campaigns of WeRoadThe Creative Marketing campaigns of WeRoad
The Creative Marketing campaigns of WeRoad
 
Ice Cream Brand Harmony Study - TINT Emotional Profiling Research
Ice Cream Brand Harmony Study - TINT Emotional Profiling ResearchIce Cream Brand Harmony Study - TINT Emotional Profiling Research
Ice Cream Brand Harmony Study - TINT Emotional Profiling Research
 
A_B Testing Personalized Meditation Recommendations.pdf
A_B Testing Personalized Meditation Recommendations.pdfA_B Testing Personalized Meditation Recommendations.pdf
A_B Testing Personalized Meditation Recommendations.pdf
 
scope in Digital Marketing & advertising
scope in Digital Marketing & advertisingscope in Digital Marketing & advertising
scope in Digital Marketing & advertising
 
Ppt regarding of Digital Marketing cours
Ppt regarding of Digital Marketing coursPpt regarding of Digital Marketing cours
Ppt regarding of Digital Marketing cours
 
Podvertise.fm - Podcast Advertising Marketplace - Startup Pitch Deck
Podvertise.fm - Podcast Advertising Marketplace - Startup Pitch DeckPodvertise.fm - Podcast Advertising Marketplace - Startup Pitch Deck
Podvertise.fm - Podcast Advertising Marketplace - Startup Pitch Deck
 
What's Happening with Your Microsoft Advertising's Search Campaigns? - Sophie...
What's Happening with Your Microsoft Advertising's Search Campaigns? - Sophie...What's Happening with Your Microsoft Advertising's Search Campaigns? - Sophie...
What's Happening with Your Microsoft Advertising's Search Campaigns? - Sophie...
 
SVETLANA YONCHEVA Evolution of digital marketing.pdf
SVETLANA YONCHEVA Evolution of digital marketing.pdfSVETLANA YONCHEVA Evolution of digital marketing.pdf
SVETLANA YONCHEVA Evolution of digital marketing.pdf
 
Snapshot of Consumer Behaviors of February 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of February 2024-EOLiSurvey (EN).pdfSnapshot of Consumer Behaviors of February 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of February 2024-EOLiSurvey (EN).pdf
 
The best Crypto Marketing Strategies pdf
The best Crypto Marketing Strategies pdfThe best Crypto Marketing Strategies pdf
The best Crypto Marketing Strategies pdf
 
2024 Google SERP Features: New Strategies To Gain Visibility
2024 Google SERP Features: New Strategies To Gain Visibility2024 Google SERP Features: New Strategies To Gain Visibility
2024 Google SERP Features: New Strategies To Gain Visibility
 
Friends of Search '24 - Scaling SEO_ Lessons for All Types of Sites.pptx
Friends of Search '24 - Scaling SEO_ Lessons for All Types of Sites.pptxFriends of Search '24 - Scaling SEO_ Lessons for All Types of Sites.pptx
Friends of Search '24 - Scaling SEO_ Lessons for All Types of Sites.pptx
 

online shopping

  • 1. 1 A Project report on “22Cart.com ” A P J A K Technical University, Lucknow Bachelor of Technology In “Computer Science Engineering” 2015 -2016 Submitted By: Submitted To: Ankuj kumar(1233510002) Mr.Pawan Kumar Goel HOD(CS/IT) Shamli Institute of Engineering & Technology Shamli Village- Rajjak Nagar, 10KM,Milestone,Shamli – Kernal Road,Shamli-24776
  • 2. 2 Certificate This is to certify that Report entitled “22Cart.com ” which is submitted by Ankuj kumar (Roll no: 1233510002) has carried out the project work Summer Traning From CETPA INFOTECH PRIVATE LIMITED, NOIDA in partial fulfillment of the requirement for the award of degree B.Tech in Computer Science & Engineering Technology to SIET, Shamli Affiliated from A.P.J.K.T.U. University Lucknow. It is a record of the candidate own work carried out under the supervision of Mr. Pawan kumar Goel. The matter embodied in this thesis is original and has not been submitted for the award of any other degree. Approved By: Signature: Asso.Prof.Pawan Kumar Goel Head of Department of computer Science Engineering Shamli Institute of Engineering & Technology, Shamli
  • 3. 3 DECLARATION We hereby declare that this submission is our own work and that, to the best of our Knowledge and belief, it contains no material previously published or written by another personnor material which to a substantial extent has been accepted for the award of any other degree or diploma of the university or other institute of higher learning, Signature: Name: Ankuj Kumar Roll no: 1233510002
  • 4. 4 ACKNOWLEDGEMENT We are grateful to Mr.Anil Kumar Singh, (CETPA INFOTECH NOIDA) without his guidance and able support this project could never have been presented in preset form. We got several opportunities to work independently and experienced many new technologies, which We had only heard. We express our sincere thanks to my college, “SIET, SHAMLI” for providing us the opportunity to get this industrial exposure. We are also grateful our (HOD) Computer Science & Engineering “ Mr. Pawan Kumar Goel” to provide us the core and basic skills of this trade. We are also thankful to company staff, our parents & friends for their encouragement and help.
  • 5. 5 Abstract The business-to-consumeraspectof electronic commerce(Cartapplication)is the most visible business use of the World Wide Web. The primary goal of an e-commerce site is to sell goods and services online. This project deals with developing an e-commerce website (www.22cart.com) for Online Book Sale. It provides the user with a catalog of different books available for purchasein the store. In order to facilitate online purchase a shopping cart is provided to the user. The system is implemented using a 3- tier approach, with a backend database, a middle tier of Microsoft Internet Information Services (IIS) and ASP.NET, and a web browseras the front end client. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart application and also to know about the technologies used to develop suchan application
  • 6. 6 Contents: 1. Introduction……………………………………………………….7 2. Requirements…………………………………………………….10 (a) . SoftwareComponents………………………………..11 (b). HardwareComponents……………………………...12 3.Softwarerequirement specification(SRS)………....13. (a).SDLC……………………………………………………………….15 (b).problemanalysis…………………………………………….16 4. FEASIBILTY STUDY.....................................................19 5. About the Projects…………………………………………….21 6. Objective……………………………………………………………22 7. E-R Diagram cart application……………………………...24 8. Admin E-R Diagramically representation…………….26 9. Layout design of pages……………………………………..28 10. Login Panel ……………………………………………………..32 11. Testing……………………………………………………………..38 12. App Code …………………………………………………………41 13. Tables……………………………………………………………..46 14. Conclusion & Future Scope………………………………49 15.Reference………………………………………………………..50
  • 7. 7 Introduction: Cart Application, You are doing it. Your neighbour is doing it. Your aunt is doing it. Everyone you know and don’t know is doing it. Online shopping is like going to a mall during a holiday season. Every day there is some sale or the other going on. And just like the mall you have almost every imaginable item available. The online megastore, is one of the top e-commerce sites in India. Visited by thousands of people on a daily basis, Mega offers a massive collection of everything from electronics to baby clothing at some of the best prices thanks to various discounts available onsite. Cart Application offers expert, highly detailed and interactive descriptions for the products listed on the site. This is to help you make an informed buying decision. So whether you are looking for a new phone or a bed sheet, your job will be made easy. Cart Application offers expert, highly detailed and interactive descriptions for the products listed on the site. This is to help you make an informed buying decision. So whether you are looking for a new phone or a bed sheets, your job will be made easy. Also, Cart Application offers the compare option for the various listed products, especially electronics. You can compare two or more products in terms of their price, specifications and features.
  • 8. 8 About the Project: 22Cart Application offers expert, highly detailed and interactive descriptions for the products listed on the site. This is to help you make an informed buying decision. So whether you are looking for a new phone or a bed sheet, your job will be made easy. Also, Market plus offers the compare option for the various listed products, especially electronics. You can compare two or more products in terms of their price, specifications and features. 22Cart Application is your one-stop shop for all your needs. You can shop for your favorite books, apparel, footwear, jewellery, office supplies, movies, TV shows and games, lifestyle accessories, babycare products, toys, posters, sports and fitness products, mobile phones, laptops, cameras, music, health and beauty products, televisions, refrigerators, air-conditioners, washing machines, kitchen and home appliances, MP3 players, beauty and personal care, automotive products and home theater systems. Visit website : www.22cart.com
  • 9. 9 Objective: The manual aims to enhance the capacity of cooperatives and other self-help organizations to design projects that are appropriate to the needs of target groups, comprehensive in relation to the whole project cycle, and adequate for donors’ requirements. After studying this Project Design Manual, users should be able to: • Design good, inclusive and sustainable project proposals using the Project Cycle Management and the Logical Framework approachapplied to the context of cooperative development. • Understand and apply the core principles that should underlie any project in order for it to be viable and sustainable. • Develop a project idea on the basis of real needs and required resources, and transpose the idea into an implementation plan and budget. • Develop a monitoring and evaluation plan that incorporates a process forchecking and correcting project implementation, as well as the assessment of achievements. It also involves:  Ithelps to understand how to make web pages more effective by graphics.  Ithelps to providethe information to the users according to their level of interest.  This projectjudgethe interest of users.  Itawarethe users aboutthe currentlevel of coding and design.
  • 10. 10 Requirements: Hardware Compnents:  Processor : Intel Pentium3,corei-3 or above version  RAM : Min 1 GB  Hard disk : Min 200GB Front end tool: Visual basic:  Asp .NET with version 4.5 Framework is perfectly survived worldwide 1. The language is very simple object oriented and easy to learn. 2. It resulted in high performance. 3. It is robustand secure. 4. It is platform independent. 5. It is architectural neutral & portable
  • 11. 11 2. Software Requirements:  Front end : Microsoft visual studio 4 0r 4.5  Back end : MySql Server 2005, 2008 or above  Operating System : Windows 7,8,10 and above Back end tool: MySQL:  MySQL is an application tool provided by Microsoft.  Access makes it easy to users to work with database.  We can create tables; manipulate data with very less effort.  The form and report wizards can do the work of designing data entry, forms, reports and mailing tables for us.
  • 12. 12 A simple Layout design of Project:Home Cart Application is dedicated to 100% customer delight ensuring that everything from placing your order to delivering it right to your doorstep is smooth and hassle-free. When it comes to online transactions, Cart Application ensures that all credit/debit card and net banking transactions are done through secure and trusted gateways. All your bank details are safe and secure, and will not be shared with any third-party. Cart Application offers a cash on delivery option if you need an easier payment method and excellent after sales services too. If you have any issues with your purchase, the easy exchange and replacement policies comes to your rescue.
  • 13. 13 SYSTEM DEVELPOMENT LIFE CYCLE (SDLC) The Systems Development Life Cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project from an initial feasibility study through maintenance of the completed application. Various SDLC methodologies have been developed to guide the processes involved including the waterfall model (the original SDLC method). Documentation is crucial regardless of the type of model chosen or devised for any application, and is usually done in parallel with the development process. Some methods work better for specific types of projects, but in the final analysis, the most important factor for the success of a project may be how closely particular plan was followed. PROBLEM ANALYSIS Applications The main applications of the On Line Placement System is the ability of the website to properly show enroll the artists and manage information about them. The administrator
  • 14. 14 has the ability to change ,modify, view and delete the various details regarding the users and arts. The users have the ability to log in and post their queries and download arts. Challenges The challenges mainly lie in detecting attacks like viruses, hacking and also in the implementation of firewall. A virus can enter the system and can disrupt the working of the website. Hacking can be done by some people who want to access some restricted sections of the website (e.g. administrator’s area) and to modify or taper some aspects of the website. Scanning attacks may yield: (i) The method used by viruses to enter the system. (ii) The types of databaseallowed through a firewall. (iii) The paths or ways used by hackers to enter the system (iv) The loopholes remaining in the system (or website) which are used by attackers. (v) The server from where the viruses or hackers are gaining access to the system. (vi) The types of viruses able to affect the website. And with the implementation of firewall and other security mechanisms that are designed for it, the On Line Placement System Website safe and secure. REQUIREMENT ANALYSIS Goalof Thesis The goal of our thesis is to develop a website that can be used as an enrollment website with the features of interaction and problem solving. The whole project will be based on PHP with MYSQL as the database with certain security constraints added to it.
  • 15. 15 Our aim is also to implement the Administrator part in to the project so that the server or administrator himself can view, add, delete and modify. A. Administrator He has to see whether the website is working properly and whether the details available in the system are relevant and correct. He can view, add, modify, delete details. B. Database The database keeps all the records of all the users i.e. name,course, phone no.,dob, city, country,etc. For creating such records it takes the help of tables which is created in the MYSQL. The tables can have infinite entries of all the registered users as well as administrators. C. Clients Our aim will also to provide efficient way by which client can enter to see his profile, ask questions to his teacher and download softwares. D. Security Constraints There need to be certain constraints which have to be implemented on the database as well as on the administrator in order to work properly the whole system, suchas declaring the primary key, or such constraints in order to keep the database work properly. Some of such constraints are as follows: 1. Each user has a field called username which can be used to differentiate between different users. 2. The administrator has his own password known to no one else to access a unique page. 3. Only the administrator has the right to delete, modify users and questions. 4. Administrator has to first login to get access to myaccount part and modify some data available in the website.
  • 16. 16 5. A new user cannot have same username and password as of some already registered user. 6.When user or administrator click on logout the sessionof the user ends and he has to again login using his/her username and password to access the same functionality. 7. Checks are implemented so that the mandatory fields are filled by users when the user is entering some information in the system. 8. Latest firewalls and other antivirus and anti hacking modules are to be used with the website so as to protect the website from external attacks. FEASIBILTY STUDY From the inception of ideas for software system, until it is implemented and delivered to customer and even after that the system undergoes gradual developments and evaluations. The software is said to have life cycle composed ofseveral phases. At the feasibility stage, it is desirable that two or three different configuration will be pursed that satisfy the key technical requirement but which represent different level of ambition and cost. Feasibility is the determination of whether or not a project is worth doing. A feasibility study is carried out select a best system that mate performance requirements. The data collected during primary investigation examines system feasibilities that is likelihood that the system will be beneficial to the organization. Four tests for feasibility study are as follows:-  TechnicalFeasibility: This is concerned with specifying equipment and software that w ill successfully satisfy the use considerably, but might include  The feasibility to produceoutput in a given time becausesystem is fast enough to handle multiple users.
  • 17. 17  Responsetime under certain circumstances and ability to process a certain volume of transaction of a particular speed.  Feasibility to communicate data to distant location.  EconomicalFeasibility: Economic analysis is the most frequently used technique used for evaluating the effectiveness of a proposed system. More commonly known as cost/benefit analysis the procedureis to determine the benefits and savings that are expected from a proposedsystemand compared them with cost. Though the costof installing the system may appear high, it is one time investment. The resulting benefits is that automation results in turnaround time. The resulting cost/benefit ratio is favorable.  OperationalFeasibility: It is mainly related to human organizational as social aspects. The points to be considered are - The system interface is standard, user friendly and provides extensive help. Hence no special training is not required.  SocialFeasibility: Social feasibility is determination of whether a proposed project will be acceptable to people or not, So this project is totally Social and Feasible SYSTEM ANALYSIS The Analysis model: The analysis model must achieve three primary objectives:  To describe what the customer requires.  To establish the basis for the enhancement of a software design.  To define a set of requirements that can be validated once the software is completely enhanced. The main elements of the analysis model are briefly described below.
  • 18. 18  At the core of the model lies the data dictionary, which is a repository that contains descriptions of all the data objects consumed or produced by the software .Three different diagrams surround the core.  The entity relation diagram depicts relationships between data objects.  The data flow diagram provides an indication of how the data is transformed as they move through the system.  The state transition diagram indicates how the system behaves as a consequence of external events. DESIGN PHASE The design phase involves converting the informational, functional, and network requirements identified during the initiation and planning phases into unified design specifications that developers use to script programs during the development phase. Program designs are constructed in various ways. Using a top-downapproach, designers first identify and link major program components and interfaces, then expand design layouts as they identify and link smaller subsystems and connections. Using a bottom-up approach, designers first identify and link minor program components and interfaces, then expand design layouts as they identify and link larger systems and connections. Contemporary design techniques often use prototyping tools that build mock-up designs of items such as application screens, database layouts, and system architectures. End users, designers, developers, database managers, and network administrators should review and refine the prototyped designs in an iterative process until they agree on an acceptable design. Designers should carefully document completed designs. Detailed documentation enhances a programmer’s ability to develop programs and modify them after they are placed in production. The documentation also helps management ensure final programs are consistent with original goals and specifications. Organizations should create initial testing, conversion, implementation, and training plans during the design phase. Additionally, they should draft user, operator, and maintenance manuals.
  • 19. 19 For design of the website project: 1. First Database has to be designed which can be used to handle all the requirements of the users. 2. The basic structure of the website has to be designed. 3. The main template to be used for the website is designed. DATA FLOW DIAGRAM DATA FLOW DIAGRAM OF ONLINE PLACEMENT CELL MANAGEMENT SYSTEM Student Entries CreatesAdmin Student Database Request Form
  • 21. 21
  • 22. 22 .
  • 26. 26 TESTING Software testing Software testing is the process used to measure the quality of developed computer software. Usually, quality is constrained to such topics as correctness, completeness, security, but can also include more technical requirements as described under the ISO standard ISO 9126, such as capability, reliability, efficiency, portability, maintainability, compatibility, and usability. Testing is a process of technical investigation, performed on behalf of stakeholders, that is intended to reveal quality-related information about the product with respect to the context in which it is intended to operate .
  • 27. 27 White box, black box, and grey box testing White box and black box testing are terms used to describe the point of view that a test engineer takes when designing test cases. Black box testing treats the software as a black-box without any understanding as to how the internals behave. Thus, the tester inputs data and only sees the output from the test object. This level of testing usually requires thorough test cases to be provided to the tester who then can simply verify that for a given input, the output value (or behavior), is the same as the expected value specified in the test case. White box testing, however, is when the tester has access to the internal data structures, code, and algorithms. For this reason, unit testing and debugging can be classified as white-box testing and it usually requires writing code, or at a minimum, stepping through it, and thus requires more skill than the black-box tester. If the software in test is an interface or API of any sort, white-box testing is almost always required. In recent years the term grey box testing has come into common usage. This involves having access to internal data structures and algorithms for purposes of designing the test cases, but testing at the user, or black-box level. Manipulating input data and formatting output do not qualify as grey-box because the input and output are clearly outside of the black-box we are calling the software under test. This is particularly important when conducting integration testing between two modules of code written by two different developers, where only the interfaces are exposed for test. Grey box testing could be used in the context of testing a client-server environment when the tester has control over the input, inspects the value in a SQL database, and the output value, and then compares all three (the input, sql value, and output), to determine if the data got corrupt on the database insertion or retrieval.
  • 28. 28 Verification and Validation Software testing is used in association with verification and validation (V&V). Verification is the checking of or testing of items, including software, for conformance and consistency with an associated specification. Software testing is just one kind of verification, which also uses techniques such as reviews, inspections, and walkthroughs. Validation is the process of checking what has been specified is what the user actually wanted.  Verification: Have we built the software right? (i.e. does it match the specification).  Validation: Have we built the right software? (i.e. Is this what the customer wants?) Level of testing  Unit testing tests the minimal software component, or module. Each unit (basic component) of the software is tested to verify that the detailed design for the unit has been correctly implemented. In an Object-oriented environment, this is usually at the class level, and the minimal unit tests include the constructors and destructors.  Integration testing exposes defects in the interfaces and interaction between integrated components (modules). Progressively larger groups of tested software components corresponding to elements of the architectural design are integrated and tested until the software works as a system.  Functional testing tests at any level (class, module, interface, or system) for proper functionality as defined in the specification.  System testing tests a completely integrated system to verify that it meets its requirements.  System integration testing verifies that a system is integrated to any external or third party systems defined in the system requirements.  Acceptance testing can be conducted by the end-user, customer, or client to validate whether or not to accept the product. Acceptance testing may be performed as part of the hand-off process between any two phases of development.  Alpha testing is simulated or actual operational testing by potential users/customers or an independent test team at the developers' site. Alpha testing is often employed for off-the-shelf software as a form of internal acceptance testing, before the software goes to beta testing.
  • 29. 29  Beta testing comes after alpha testing. Versions of the software, known as beta versions, are released to a limited audience outside of the company. The software is released to groups of people so that further testing can ensure the product has few faults or bugs. Sometimes, beta versions are made available to the open public to increase the feedback field to a maximal number of future users. It should be noted that although both Alpha and Beta are referred to as testing it is in fact use immersion. The rigors that are applied are often unsystematic and many of the basic tenets of testing process are not used. The Alpha and Beta period provides insight into environmental and utilization conditions that can impact the software. After modifying software, either for a change in functionality or to fix defects, a regression test re-runs previously passing tests on the modified software to ensure that the modifications haven't unintentionally caused a regression of previous functionality. Regression testing can be performed at any or all of the above test levels. These regression tests are often automated. SMOKE TESTING Smoke testing is a term used in plumbing, woodwind repair, electronics, and computer software development. It refers to the first test made after repairs or first assembly to provide some assurance that the system under test will not catastrophically fail. After a smoke test proves that the pipes will not leak, the keys seal properly, the circuit will not burn, or the software will not crash outright, the assembly is ready for more stressful testing.  In plumbing, a smoke test forces actual smoke through newly plumbed pipes to find leaks, before water is allowed to flow through the pipes.  In woodwind instrument repair, a smoke test involves plugging one end of an instrument and blowing smoke into the other to test for leaks. (This test is no longer in common use)  In electronics, a smoke testing is the first time a circuit is attached to power, which will sometimes produce actual smoke if a design or wiring mistake has been made. IMPLEMENTATION PHASE The implementation phase involves installing approved applications into production environments. Primary tasks include announcing the implementation schedule, training end users, and installing the product. Additionally, organizations should input and verify data, configure and test system and security parameters, and conduct post-
  • 30. 30 implementation reviews. Management should circulate implementation schedules to all affected parties and should notify users of any implementation responsibilities. After organizations install a product, pre-existing data is manually input or electronically transferred to a new system. Verifying the accuracy of the input data and security configurations is a critical part of the implementation process. Organizations often run a new system in parallel with an old system until they verify the accuracy and reliability of the new system. Employees should document any programming, procedural, or configuration changes made during the verification process. For implementation of the website project: 1. The website can be installed on a computer or a server which has PHP and MYSQL installed in it. 2. The owners of the website are to be properly trained to use all the features of the website, giving details of each features of the website. 3. To show the accuracy of the website and conformance of the website to the requirements of the owners or users of the website. TEST PLAN The testing phase requires organizations to complete various tests to ensure the accuracy of programmed code, the inclusion of expected functionality, and the interoperability of applications and other network components. Thorough testing is critical to ensuring systems meet organizational and end-user requirements. Test plans created during initial project phases enhance an organization’s ability to create detailed tests. A bottom-up approachtests smaller components first and progressively adds and tests additional components and systems. A top-downapproachfirst tests major components
  • 31. 31 and connections and progressively tests smaller components and connections. Bottom-up tests often begin with functional (requirements based) testing. Functional tests should ensure that expected functional, security, and internal control features are present and operating properly. Testers then complete integration and end-to-end testing to ensure application and system components interact properly. Users then conduct acceptance tests to ensure systems meet defined acceptance criteria. Organizations should review and complete user, operator, and maintenance manuals during the testing phase. Additionally, they should finalize conversion, implementation, and training plans. For testing of the website: 1. All the features of the website are tested by running each function available in the website. 2. The results of the tests conducted on the website are analyzed properly.Only after getting satisfactory results of testing the website can be uploaded on the network i.e. internet. MAINTENANCE The maintenance phase involves making changes to hardware, software, and documentation to support its operational effectiveness. It includes making changes to improve a system’s performance, correct problems, enhance security, or address user requirements. To ensure modifications do not disrupt operations or degrade a system’s performance or security, organizations should establish appropriate change management procedures. Routine changes are not as complex as major modifications and can usually be implemented in the normal course of business. Routine change controls should include procedures for requesting, evaluating, approving, testing, installing, and documenting software modifications.Maintaining accurate, up-to-date hardware and software inventories is a critical part of all change management processes. Management should
  • 32. 32 carefully document all modifications to ensure accurate system inventories. Management should coordinate all technology related changes through an oversight committee and assign an appropriate party responsibility for administering software patch management programs. Quality assurance, security, audit, regulatory compliance, network, and end-user personnel should be appropriately included in change management processes. Risk and security review should be done whenever a system modification is implemented to ensure controls remain in place. For maintenance of the website: 1. The database has to be updated regularly according to new available information. 2. Redundant and false information must be removed from the database. 3. Newer version of Asp.Net and MYSQL can be used for up gradation of website and to improve the overall performance of the system.
  • 33. 33 APP CODE using System; using System.Collections.Generic; using System.Linq; using System.Web; using System.IO; using System.Data; using System.Data.SqlClient; using System.Configuration; public class GlobalClass { public SqlConnection con = null; public SqlDataAdapter da; private SqlCommand cmd; public GlobalClass() { con = new SqlConnection(ConfigurationManager.ConnectionStrings["cn"].ConnectionString); } public DataSet GetData(string sqlqry) { da = new SqlDataAdapter(sqlqry, con); DataSet ds = new DataSet(); da.Fill(ds); return ds; } public void SubmitAdmin(string fname, string dob, string gen, string mstatus, string mno, string phone, string city, string addres, string pin, string emailid, string qual, string sdate, string endate, string smpty, string ques, string ans, string pwd, ref string err, ref int aa) { try { string[] ss = Guid.NewGuid().ToString().Split('-'); cmd = new SqlCommand("insert into admindetails values(@a,@b,@c,@d,@e,@f,@g,@h,@i,@j,@j1,@k,@l,@m,@n,@o,@p,@q)", con); cmd.Parameters.AddWithValue("@a", "SCI" + ss[0]); cmd.Parameters.AddWithValue("@b", fname); cmd.Parameters.AddWithValue("@c", dob); cmd.Parameters.AddWithValue("@d", gen); cmd.Parameters.AddWithValue("@e", mstatus); cmd.Parameters.AddWithValue("@f", mno); cmd.Parameters.AddWithValue("@g", phone);
  • 34. 34 cmd.Parameters.AddWithValue("@h", city); cmd.Parameters.AddWithValue("@i", addres); cmd.Parameters.AddWithValue("@j", pin); cmd.Parameters.AddWithValue("@j1", emailid); cmd.Parameters.AddWithValue("@k", qual); cmd.Parameters.AddWithValue("@l", System.DateTime.Now.ToString()); cmd.Parameters.AddWithValue("@m", endate); cmd.Parameters.AddWithValue("@n", smpty); cmd.Parameters.AddWithValue("@o", ques); cmd.Parameters.AddWithValue("@p", ans); cmd.Parameters.AddWithValue("@q", pwd); con.Open(); aa = cmd.ExecuteNonQuery(); if (aa > 0) { err = "Admin Registration Complete Successfully,Please check the mail.."; } } catch (Exception ex) { err = ex.Message; } finally { con.Close(); } } //admin password changed public void adminpwdchange(string npwd, string emailid, string pwd, ref string errs, ref int aa) { try { string[] ss = Guid.NewGuid().ToString().Split('-'); cmd = new SqlCommand("update admindetails set pwd=@a where emailid=@b and pwd=@c", con); cmd.Parameters.AddWithValue("@a", npwd); cmd.Parameters.AddWithValue("@b", emailid); cmd.Parameters.AddWithValue("@c", pwd); con.Open(); aa = cmd.ExecuteNonQuery(); if (aa > 0) { errs = "Employer Account Password Changed Successfully"; } } catch (Exception ex) { errs = ex.Message;
  • 35. 35 } finally { con.Close(); } } public void EmpEdit(string fname, string dob, string gen, string mstatus, string mno, string phone, string city, string addres, string pin, string qual, string sdate, string endate, string smpty, string ques, string ans, string emailid, ref string err, ref int aa) { try { cmd = new SqlCommand("update empdetails set fname=@b,dob=@c,gender=@d,mstatus=@e,mno=@f,phone=@g,city=@h,address=@i,pincode=@j,q uali=@l,startdate=@m,enddate=@n,emptype=@o,hnt_ques=@p,hnt_ans=@q where emailid=@aa", con); cmd.Parameters.AddWithValue("@b", fname); cmd.Parameters.AddWithValue("@c", dob); cmd.Parameters.AddWithValue("@d", gen); cmd.Parameters.AddWithValue("@e", mstatus); cmd.Parameters.AddWithValue("@f", mno); cmd.Parameters.AddWithValue("@g", phone); cmd.Parameters.AddWithValue("@h", city); cmd.Parameters.AddWithValue("@i", addres); cmd.Parameters.AddWithValue("@j", pin); cmd.Parameters.AddWithValue("@l", qual); cmd.Parameters.AddWithValue("@m", sdate); cmd.Parameters.AddWithValue("@n", endate); cmd.Parameters.AddWithValue("@o", smpty); cmd.Parameters.AddWithValue("@p", ques); cmd.Parameters.AddWithValue("@q", ans); cmd.Parameters.AddWithValue("@aa", emailid); con.Open(); aa = cmd.ExecuteNonQuery(); if (aa > 0) { err = "Employee Profile Updated Successfully"; } } catch (Exception ex) { err = ex.Message; } finally { con.Close(); } }
  • 36. 36 public void AdminReg(string sqlqry, ref string err, ref int aa) { try { cmd = new SqlCommand(sqlqry, con); con.Open(); aa = cmd.ExecuteNonQuery(); if (aa > 0) { err = "Admin Registration Successfully"; } } catch (Exception ex) { err = ex.Message; } finally { con.Close(); } } public void AdminEdit(string sqlqry, ref string err,ref int aa) { try { cmd = new SqlCommand(sqlqry, con); con.Open(); aa = cmd.ExecuteNonQuery(); if (aa > 0) { err = "Admin Profile Update Successfully"; } } catch (Exception ex) { err = ex.Message; } finally { con.Close(); } } public void Delete(string sqlqry, ref string err) { try {
  • 37. 37 cmd.CommandText = sqlqry; int aa = cmd.ExecuteNonQuery(); if (aa > 0) { err = "Employee Registration Deleted Successfully"; } } catch (Exception ex) { err = ex.Message; } finally { con.Close(); } } public void emppwdchange(string npwd, string emailid, string pwd, ref string errs, ref int aa) { try { string[] ss = Guid.NewGuid().ToString().Split('-'); cmd = new SqlCommand("update empdetails set pwd=@a where emailid=@b and pwd=@c", con); cmd.Parameters.AddWithValue("@a", npwd); cmd.Parameters.AddWithValue("@b", emailid); cmd.Parameters.AddWithValue("@c", pwd); con.Open(); aa = cmd.ExecuteNonQuery(); if (aa > 0) { errs = "Employee Account Password Changed Successfully"; } } catch (Exception ex) { errs = ex.Message; } finally { con.Close(); } } public void Adminpwdchange(string npwd, string aid, string pwd, ref string errs, ref int aa) { try { string[] ss = Guid.NewGuid().ToString().Split('-'); cmd = new SqlCommand("update admin_reg set pwd=@a where aid=@b and pwd=@c", con); cmd.Parameters.AddWithValue("@a", npwd);
  • 38. 38 cmd.Parameters.AddWithValue("@b", aid); cmd.Parameters.AddWithValue("@c", pwd); con.Open(); aa = cmd.ExecuteNonQuery(); if (aa > 0) { errs = "Admin Account Password Changed Successfully"; } } catch (Exception ex) { errs = ex.Message; } finally { con.Close(); } } //employer add Products public void REgPostJobs(string seid, string pname, string abpro, string pername, string contname,string mailid, string prodes, string pcity, string proqual, string protype, string percountry, string gurantpp, string procate, string pricer, string nopro, string spoff, string imgg,string status,string date, ref string err, ref int aa) { try { cmd = new SqlCommand("insert into productpostTB19 values(@a,@b,@c,@d,@e,@x,@f,@g,@h,@i,@j,@k,@l,@m,@n,@o,@p,@z,@q)", con); cmd.Parameters.AddWithValue("@a", seid); cmd.Parameters.AddWithValue("@b", pname); cmd.Parameters.AddWithValue("@c", abpro); cmd.Parameters.AddWithValue("@d", pername); cmd.Parameters.AddWithValue("@e", contname); cmd.Parameters.AddWithValue("@x", mailid); cmd.Parameters.AddWithValue("@f", prodes); cmd.Parameters.AddWithValue("@g", pcity); cmd.Parameters.AddWithValue("@h", proqual); cmd.Parameters.AddWithValue("@i", protype); cmd.Parameters.AddWithValue("@j", percountry); cmd.Parameters.AddWithValue("@k", gurantpp); cmd.Parameters.AddWithValue("@l", procate); cmd.Parameters.AddWithValue("@m", pricer); cmd.Parameters.AddWithValue("@n", nopro); cmd.Parameters.AddWithValue("@o", spoff); cmd.Parameters.AddWithValue("@p", imgg); cmd.Parameters.AddWithValue("@z", status); cmd.Parameters.AddWithValue("@q", date);
  • 39. 39 con.Open(); aa = cmd.ExecuteNonQuery(); if (aa > 0) { err = "your job posted Successfully.."; } } catch (Exception ex) { err = ex.Message; } finally { con.Close(); } } public void REGUpdate(string eid, ref string err, ref int aa) { try { cmd = new SqlCommand("update regmaster set reg_approval=@b where empid=@a", con); cmd.Parameters.AddWithValue("@a", eid); cmd.Parameters.AddWithValue("@b", "Approved"); con.Open(); aa = cmd.ExecuteNonQuery(); if (aa > 0) { err = "Employee Resignation Approved Successfully"; } } catch (Exception ex) { err = ex.Message; } finally { con.Close(); } } //super admin details starts here public void SubmitSuperAdmin(string fname, string dob, string gen, string mstatus, string mno, string phone, string city, string addres, string pin, string emailid, string qual, string sdate, string endate, string smpty, string ques, string ans, string pwd, ref string err, ref int aa) { try
  • 40. 40 { string[] ss = Guid.NewGuid().ToString().Split('-'); cmd = new SqlCommand("insert into superadmindetails22 values(@a,@b,@c,@d,@e,@f,@g,@h,@i,@j,@j1,@k,@l,@m,@n,@o,@p,@q)", con); cmd.Parameters.AddWithValue("@a", "SCI" + ss[0]); cmd.Parameters.AddWithValue("@b", fname); cmd.Parameters.AddWithValue("@c", dob); cmd.Parameters.AddWithValue("@d", gen); cmd.Parameters.AddWithValue("@e", mstatus); cmd.Parameters.AddWithValue("@f", mno); cmd.Parameters.AddWithValue("@g", phone); cmd.Parameters.AddWithValue("@h", city); cmd.Parameters.AddWithValue("@i", addres); cmd.Parameters.AddWithValue("@j", pin); cmd.Parameters.AddWithValue("@j1", emailid); cmd.Parameters.AddWithValue("@k", qual); cmd.Parameters.AddWithValue("@l", System.DateTime.Now.ToString()); cmd.Parameters.AddWithValue("@m", endate); cmd.Parameters.AddWithValue("@n", smpty); cmd.Parameters.AddWithValue("@o", ques); cmd.Parameters.AddWithValue("@p", ans); cmd.Parameters.AddWithValue("@q", pwd); con.Open(); aa = cmd.ExecuteNonQuery(); if (aa > 0) { err = "Admin Registration Complete Successfully,Please check the mail.."; } } catch (Exception ex) { err = ex.Message; } finally { con.Close(); } } public void SuperAdminEdit(string sqlqry, ref string err, ref int aa) { try { cmd = new SqlCommand(sqlqry, con); con.Open(); aa = cmd.ExecuteNonQuery(); if (aa > 0) { err = "Admin Profile Update Successfully"; }
  • 41. 41 } catch (Exception ex) { err = ex.Message; } finally { con.Close(); } } // product review table details public void ReviewSubmit(string productname, string emailid, string contactno, string comment,string status, string rating, string review_date, ref string err, ref int aa) { try { cmd = new SqlCommand("insert into productreviewTB6 values(@b,@c,@d,@e,@f,@g,@h)", con); cmd.Parameters.AddWithValue("@b", productname); cmd.Parameters.AddWithValue("@c", emailid); cmd.Parameters.AddWithValue("@d", contactno); cmd.Parameters.AddWithValue("@e", comment); cmd.Parameters.AddWithValue("@f", status); cmd.Parameters.AddWithValue("@g", rating); cmd.Parameters.AddWithValue("@h", review_date); con.Open(); aa = cmd.ExecuteNonQuery(); if (aa > 0) { err = "your comment successfully"; } } catch (Exception ex) { err = ex.Message; } finally { con.Close(); } }
  • 42. 42 public class globalclass { public int id { get; set; } public string productname { get; set; } public string emailid { get; set; } public string contactno{ get; set; } public string comment { get; set; } } //email sending ends here public object emptype { get; set; } public object hnt_ques { get; set; } public object hnt_ans { get; set; } public void Adminreg(string p, string p_2, string p_3, string p_4, string p_5, string p_6, string p_7, string p_8, string p_9, ref string eror, ref int ss) { throw new NotImplementedException(); } }
  • 43. 43 TABLE CREATION: create database cart222 CREATE TABLE registration ( [fname] [nvarchar](50) NULL, [mno] [nvarchar](50) NULL, [emailid] [nvarchar](50) NULL, [sub] [nvarchar](50) NULL, [ques] [nvarchar](500) NULL ) ON [PRIMARY] CREATE TABLE empdetails2( [empid] [nvarchar](20) NOT NULL, [fname] [nvarchar](50) NULL, [dob] [nvarchar](50) NULL, [gender] [nvarchar](50) NULL, [mstatus] [nvarchar](50) NULL, [mno] [nvarchar](50) NULL, [phone] [nvarchar](50) NULL, [city] [nvarchar](50) NULL, [address] [nvarchar](50) NULL, [pincode] [nvarchar](50) NULL, [emailid] [nvarchar](50) NULL, [quali] [nvarchar](50) NULL, [startdate] [nvarchar](50) NULL, [enddate] [nvarchar](50) NULL, [emptype] [nvarchar](50) NULL, [hnt_ques] [nvarchar](50) NULL, [hnt_ans] [nvarchar](50) NULL, [pwd] [nvarchar](50) NULL, CONSTRAINT [PK_empdetails2] PRIMARY KEY CLUSTERED ( [empid] ASC )WITH (PAD_INDEX = OFF, STATISTICS_NORECOMPUTE = OFF, IGNORE_DUP_KEY = OFF, ALLOW_ROW_LOCKS = ON, ALLOW_PAGE_LOCKS = ON) ON [PRIMARY] ) ON [PRIMARY] CREATE TABLE admindetails2( [aid] [nvarchar](20) NOT NULL, [fname] [nvarchar](50) NULL, [dob] [nvarchar](50) NULL, [gender] [nvarchar](50) NULL, [mstatus] [nvarchar](50) NULL, [mno] [nvarchar](50) NULL, [phone] [nvarchar](50) NULL, [city] [nvarchar](50) NULL, [address] [nvarchar](50) NULL, [pincode] [nvarchar](50) NULL, [emailid] [nvarchar](50) NULL, [quali] [nvarchar](50) NULL, [startdate] [nvarchar](50) NULL, [enddate] [nvarchar](50) NULL, [emptype] [nvarchar](50) NULL, [hnt_ques] [nvarchar](50) NULL, [hnt_ans] [nvarchar](50) NULL, [pwd] [nvarchar](50) NULL, PRIMARY KEY CLUSTERED ( [aid] ASC
  • 44. 44 ) CREATE TABLE admin_reg2( [aid] [nvarchar](20) NOT NULL, [aname] [nvarchar](50) NULL, [amno] [nvarchar](50) NULL, [aemailid] [nvarchar](50) NULL, [pwd] [nvarchar](50) NULL ) ON [PRIMARY] CREATE TABLE addpost223( [add_serialno] [int] IDENTITY(1,1) NOT NULL, [addid] [nvarchar](20) NOT NULL, [add_title] [nvarchar](200) NOT NULL, [add_industry] [nvarchar](200) NOT NULL, [add_country] [nvarchar](50) NOT NULL, [add_city] [nvarchar](350) NULL, [add_photo] [nvarchar](50) NULL, [add_address1] [nvarchar](350) NULL, [add_description] [nvarchar](max) NULL, [add_phone] [nvarchar](max) NULL, [add_address2] [nvarchar](max) NULL, [add_logo] [nvarchar](100) NULL, [add_otherdetails] [nvarchar](350) NULL, [add_approvaldate] [nvarchar](50) NULL, [add_posteddate] [nvarchar](max) NULL, [add_postedperson] [nvarchar](50) NULL, [empid] [nvarchar](50) NOT NULL, [status] [nvarchar](50) NULL, [add_review] [nvarchar](50) NULL, [add_company] [nvarchar](max) NULL, [add_neewebsite] [nvarchar](50) NULL, PRIMARY KEY CLUSTERED ( [add_serialno] ASC )WITH (PAD_INDEX = OFF, STATISTICS_NORECOMPUTE = OFF, IGNORE_DUP_KEY = OFF, ALLOW_ROW_LOCKS = ON, ALLOW_PAGE_LOCKS = ON) ON [PRIMARY] ) ON [PRIMARY] CREATE TABLE productpostTB191( [s_no] [int] IDENTITY(1,1) NOT NULL, [serial_no] [nvarchar](50) NOT NULL, [product_name] [nvarchar](50) NOT NULL, [about_product] [nvarchar](50) NOT NULL, [person_name] [nvarchar](50) NOT NULL, [contact_no] [nvarchar](50) NOT NULL, [emailid] [nvarchar](50) NOT NULL, [product_desp] [nvarchar](50) NOT NULL, [city] [nvarchar](50) NOT NULL, [product_quality] [nvarchar](50) NOT NULL, [product_type] [nvarchar](50) NOT NULL, [country_name] [nvarchar](50) NOT NULL, [gurantee_period] [nvarchar](50) NOT NULL, [product_categories] [nvarchar](50) NOT NULL, [price_range] [nvarchar](50) NOT NULL, [no_product] [nvarchar](50) NOT NULL, [special_offer] [nvarchar](50) NOT NULL, [photo] [nvarchar](50) NOT NULL, [status] [nvarchar](50) NULL ) ON [PRIMARY]
  • 48. 48 Conclusion The Internet has becomea major resourcein modern business, thus electronic shopping has gained significance not only from the entrepreneur’s but also from the customer’s point of view. Forthe entrepreneur, electronic shopping generates new business opportunities and for the customer, it makes comparative shoppingpossible. As per a survey, mostconsumers ofonline stores are impulsive and usually make a decisionto stay on a site within the first few seconds.“Websitedesign is like a shop interior. If the shop looks pooror like hundreds of other shops the customer is most likely to skip to the other site. Hence we have designed the project to provide the user with easy navigation, retrieval of data and necessary feedbackas much as possible. In this project, the user is provided with an e-commerce web site that can be used to buy books online. To implement this as a web application we used ASP.NET as the Technology. ASP.NET has several advantages such as enhanced performance ,Scalability, built-in security and simplicity. To build any web application using ASP.NET we need a programminglanguage suchas C#, VB.NET, J# and so on. C#was the language used to build this application. For the client browser to connect to the ASP.NET engine we used Microsoft’s Internet Information Services (IIS) as the Web Server. ASP.NET uses ADO.NET to interact with the databaseas it provides in-memory caching that eliminates the need to contactthe databaseserver frequently and it can easily deploy and maintain an ASP.NET application. MySQL was used as back-end databasesince it is one ofthe most popularopensourcedatabases, and it provides fastdataaccess, easy Installation and simplicity. A good shoppingcart design must be accompanied with user-friendly shopping cart application logic. It should be convenient for the customer to view the contents of their cart and to be able to remove or add items to their cart. The shoppingcart application described in this project provides a number of features that are designed to make the customer more comfortable.
  • 49. 49 This project helps in understanding the creation of an interactive web page and the technologies used to implement it. The design of the projectwhich includes Data Model and Process Modelillustrates how the database is built with different tables, how the data is accessed and processedfromthe tables. The building of the projecthas given me a preciseknowledge abouthow ASP.NET is used to develop a website, how it connects to the databaseto access thedata and how the data and web pages are modified to provide the user with a shoppingcart application. FUTURE ENHANCEMENTS We can have a Website that will cover whole India giving details of Arts created by persons. The On Line Placement System website will have the prominent features including:  Providing online Placement Record through our site.  Providing personalized inbox to the user.  Providing video conferencing with the Artists  Providing links to news which will elaborate more information about them.  Providing Ajax technology refreshing In our website. .
  • 50. 50 REFERENCE AS PER THE WEBSITES: 1) www.firstmartshopping.com 2) www.w3cschools.com 3) www.flipkart.com 4) www.mysql.com 5) www.snapdeal.com
  • 51. 51