Download - Doc Handicraft (1)docs
-
8/12/2019 Doc Handicraft (1)docs
1/63
1
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
1.INTRODUCTION1.1 PROJECT OVERVIEW
The purpose of our project titled, ONLINE HANDICRAFT MARKETING
MANAGEMENT, is a web application project, which include PHP, HTML,
JavaScript and Ajax. Most of the Handcrafter could not get desired price for their
product and most case a broker or a third party will get most benefit than the actual
producer. Also a large area of marketing handicraft product is depending on
foreigners but unfortunately our Govt. Could not provide an online sale of such
product to a reach of worldwide so that any foreigner can shop the most traditional art
from their country. The project entitled ONLINE HANDICRAFT MARKETING
MANAGMENT is a website whichprovides a high quality online service and a best
place to meet both for the Producers and Consumers. It helps Ordinary Customers to
buy high quality product from the Producers. Bidding is also possible through this
site. User can request for a product, so they can purchase crafts on their demand. It
also has.
MODULAR DESCRIPTION
A module is logically separate part of a program. It is a program unit that is
discreet and identifiable with respect to compiling and loading. A system is
considered to modular if it consists of discrete components so that each component
can be implemented separately and a change to one component has minimal impact
on other components. Modularity is clearly a desirable property in a system.
Modularity helps in system debuggingisolating the system problems to component
is easier if the system is modular.
In system repair or changing a part of the system is easy as it affect few other
parts and system building. A modular system can easily built by putting its modules
together.
The main modules are:
1. Admin2. Handcrafters3. Agencies4. Users
-
8/12/2019 Doc Handicraft (1)docs
2/63
2
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
Module 1: Admin
Admin is an authorized person and he is in full control of the overall system.
The administrator can:
a) Agency Managementb) online bidding Approvec) Publish productsd) Event castinge) View insight/feedbackf) Process loan requestg) Process withdrawalh) Logini) Change password
Module 2: Handcrafters
The Handcrafter is the one who is registered in the system for selling his
product through this application. He can perform the following functions:
a) Registrationb) Loginc) Changing passwordd) Managing producte) Bidding Requestf) View approval statusesg) View preordersh) Sales statusi) Withdraw money to bank
j) Change bank detailsk) View Upcoming Events/ training program
-
8/12/2019 Doc Handicraft (1)docs
3/63
3
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
Module 3: Agency
The Agency is the intermediate between handicrafts and users. He can
purchase handicrafts from Handcrafters. These products are buying through this
application. He can perform the following functions:
a) Loginb) Change passwordc) Manage handcrafterd) Product managemente) View order infof) Manage shippingg) View Upcoming Events/ training program
Module 4: User
The user is the consumer of handicrafts they buy, bid and view products thatare uploaded to our network. Also user can view all the events that are organized by
our firm. Also pre request for a product to a particular handcrafter.
a) Registerb) Loginc) Manage profiled) Buy, bid Products and pay using carde) Gift product to anotherf) View productg) View order /delivery statush) Pre request to a producti) View Upcoming Events/ training program
j) Feedback, Report
-
8/12/2019 Doc Handicraft (1)docs
4/63
4
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
1.2 ABOUT THE ORGANIZATION
IPSR GROUP-An Overview
Information Technology or IT is finding applications in every walk of life
today-communications, industry, education, business, etc, and enhancing life in ways
unimaginable a few decades back. Harnessing this power of IT to user in huge
benefits is the IPSR group, a young firm of dynamic, creative and future-focused IT
professionals. The IPSR group is a provider of total IT services-IT Training, Website
Development, Software Development and Hardware sales and service. Born out of the
strategic vision of a new academicians and entrepreneurs, the IPSR group has carved
a niche for itself in the field of IT services, through qualitative and innovative work.
Based in Kottayam, IPSR has recently expanded their services to the North Kerala
region with the inauguration of the Regional Office at Kozhikode and administrative
officers in Kannur.
IPSR -The Training Wing
Institute of Professional Studies Research (IPSR), the training division of the
IPSR Group is an info-management institute owned by Self Employers Service
Society(SESS)and promoted by members of Kerala Vyapari Vyavasai EKopana
Samithi(KVVES),an organization of industrialists and businessmen of Kerala.
KVVES has a statewide network of over 10 lakh members and 1400 regional centers,
which provides valuable backing to the organization. Eminent academicians and
industrialists from all parts of India and abroad are on the panel of policy-making
bodies of IPSR, strive, value-based modules in high-end courses of today, armed with
a faculty and infrastructure that meet global industry standards.
IPSR Solutions Limited-The IT Company
IPSR Solutions Ltd., the first Public Limited IT Company in Kottayam, is
IPSR Group's development arm. The company focuses on Software Development,
Web Based Applications, Hardware & Networking Solutions and Technical
Consultancy. Manned by a team of dynamic professionals, IPSR Solutions Ltd is
committed to understanding client needs and providing comprehensive solutions that
are in sync with latest technologies. IPSR's clients include companies and
organizations from various sectors like banking, manufacturing, retail, etc.
-
8/12/2019 Doc Handicraft (1)docs
5/63
5
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
2.SYSTEM STUDY AND ANALYSISSYSTEM ANALYSIS
System Analysis is the process of gathering and interpreting facts, diagnosingthe problems and using the information to recommend improvements on the system.
System analysis is a problem solving activity that requires intensive communication
between system user and system developers. System analysis or study is an important
phase of any system development process. The system is viewed on a whole and
inputs to the system are identified. The output from the organization is travel through
various phases of the processing of inputs.
The system is viewed as a whole and inputs to the system are in defined the
output from the system are traced through the various data are collected on available
files.
Description points and transaction held by the present system. Based on
analysis, a cost or benefit analysis are considered, cost of the system is calculated on
the basis of analysis made on the solution is given as a proposal. The proposal is then
weighed with the existing system analytically and the best on is selected. The
proposal is presented to the user request and suitable changes are made. This is a loop
that ends as the user is satisfied with the proposal. After all, this proposal becomes a
biometric passports are to speed up clearance through immigration and the prevention
of identity fraud.
A detailed study of these processes must be made by the various techniques
like interviews, questionnaires, etc. The data collected by these sources must be
scrutinized to arrive to a conclusion .The conclusion is an understanding of how the
system functions. This system is called the existing system. Now, the existing system
is subject to close study and the problem areas are identified. The designer now
functions on a problem solver and tires to sort out the difficulties that weighed with
the existing faces. The solutions an given on a proposal. The proposal is then
weighed with the existing system analytically and the best one is selected. The
proposal is presented to the user for any endorsement by the user. The proposal is
reviewed on user request and suitable changes that made. This is a loop that ends as
soon as the user in satisfied with the proposal.
SYSTEM STUDY
-
8/12/2019 Doc Handicraft (1)docs
6/63
6
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
The major activities in the system study are studying the ways an organization
currently retrieving and processing data to produce information. It involves the study
of various operation performed by the system and their relationship within and outside
the system. The system study is usually done on the basic approaches of
understanding the problem or user requirements. To understand the user requirements
the analyst communicates with the user or customer and studies the basic
requirements of the user the study of the existing system was necessary to carry out
the preliminary investigation. The major methods in the system study are
1. Interviewing persons
2. Questionnaire
3. Observing the current system
4. Gather documents currently in use
5. Discussion
The existing system is a semi manual system, less user friendly and time taken
for processing data is very large.
EXISTING SYSTEM
A handicraft, sometimes more precisely expressed as artisanal handicraft,
is any of a wide variety of types of work where useful and decorative objects are
made completely by hand or by using only simple tools. It is a traditional main sector
of craft, The main problem faced by many handcrafters are the unavailability of a
centralized market of their product. If there is many stores they act as a mediator, that
is they buys products form handcrafter and sales the product in market but most case
handcrafter will not get the desired price they desire. Also if there any foreigners need
to buy handcraft they must visit the store. A very important thing in this field is
handicrafts are arts good product must have a great movements in market if a product
has a huge demand in market there is a chance to conduct a auction for that particular
product so that the handcrafter can make a desired price. Government supports
handcrafters for their welfare and rehabilitation but most of the group will not utilize
this type of projects, the right thing is most of them didnt know the favors that Govt.
offers.
-
8/12/2019 Doc Handicraft (1)docs
7/63
7
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
2.2 PROPOSED SYSTEM AND ADVANTAGES
The proposed system is a very flexible online marketing bidding management
application for Handcrafters and Govt. this is a web based application that offers a
wide range of operations such as, an online market, the handicraft product upload
straight to the online store and ordinary users can view and buy their desired one.
Through this a handcrafter gets his payment straight to his account that registered
with this web application and later they can transfer to their bank account so there is
no need for an inter mediate to sell their product also handcrafters will never cheated.
The provision budding section will produce better output rare products. Reach of
product in worldwide will lead to a better marketing, it lead more profit for
handcrafters.
Advantages
global reach of handicraft product Bidding for demanding product Pre request provision Improved user interface and designs All transactions done through the automated system No need for additional calculation Administrations can create a wide range of reports for analysis Insight management allows knowing the current trend and moves of product.
-
8/12/2019 Doc Handicraft (1)docs
8/63
8
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
2.3 FEASIBILITY STUDY
An initial investigation culminates in a proposal that determine whether an
ultimate system is feasible. When a proposed system is made and approved it initiates
a feasibility study. The purpose of the feasibility study is to identify various candidate
systems and evaluates whether they are feasible by considering technical, economical
and operational feasibility and to recommend to best candidate system.
The feasibility of such a program is listed in a simulated environment. Once
all features are working property in a simulated environment, we can implement in a
real platform.
During product engineering, we consider following types of feasibility:
2.3.1 Technology and System Feasibility
A study of function, performance and constraints that may affects the ability to
achieve an acceptable system. The assessment is based on an outline design of system
requirement in terms of input, Processes, Output, Fields, Programs, and Procedures.
This can be quantified in terms of volumes of data trends, frequency of updating etc in
order to estimate whether the new system will perform adequately or not. Technical
feasibility identifies whether the proposed system can be developed with the
existing technologies and available hardware and software resources. As part of
the technical feasibility of the system , the following points are to be
emphasized.
2.3.2. Operational Feasibility
Proposed projects are beneficial only if they can be turned into information
systems that will meet the operating requirements of the organization. This test of
feasibility asks if the system will work when it is developed and installed. This project
satisfies all the operational conditions. The project is found to work well on
installation , All types of users can operate the system without any difficulty.
User interfaces are designed in such a way that even ordinary users without
having much knowledge in computer technology can easily operate the system .
The access time of data is considerably low and the operation is less time
consuming . Traders can by their product from the organization or online. The
operation is labor free and less time consuming. The consumers can view and buy
desired products easily.
-
8/12/2019 Doc Handicraft (1)docs
9/63
9
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
2.3.3 Economic Feasibility
An evaluation of development cost weighted against the ultimate income or
the benefit derived from the developed system or product. Economic feasibility of a
system means that the cost incurred in developing and implementing a system
should not be higher than the financial benefits obtained by the users. During
the economic feasibility study the following points were investigated.
The cost to conduct a full system investigation The cost of hardware and software for the application being developed. The benefits derived by the users in terms of time , effort, accuracy of
information , better decision making. Etc are quantified and compared.
The cost incurred by the user in making use of the application isdetermined.
On examining all these factors it is found that the system is
economically feasible.
2.3.4 Legal Feasibility
A determination of any infringement, violation or liability that could result
from the development of the system. An evolution of alternative approaches to the
development of the system or product.
A feasibility study is not warranted systems, in which economic justification is
obvious, technical risk is low, few legal problems are expected and no reasonable
alternative exists. However, if any of the preceding conditions fail, a study of that area
should be conducted.
Economic justification include a broad range of concerns that include cost-
benefit analysis, long-term corporate income strategies, impact on other profit
concerns or products, cost of resources needed for development and potential market
growth.
Technical feasibility is frequently the most difficult area to assess at the stage
of the product engineering process. It is essential that the process of analysis and
definition be conducted in parallel with an assessment of technical feasibility. The
considerations that are normally associated with technical feasibility are development
risk, resource availability and technology.
-
8/12/2019 Doc Handicraft (1)docs
10/63
10
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
Legal feasibility encompasses a broad range of concerns that include contracts
and liability.
The feasibility study may be documented as a separate report to upper
management and include as an appendix to the system specification to assess content
reliability and by upper management to assess project status ONLINE
HANDICRAFT MARKETING MANAGEMENT is feasible in all respects. The
given system can be developed under optimal expenses with the available hardware
and software. Besides it is good economic to invest in such a kind of software from
the users point of view as the benefits weigh the costs. The resources needed to run
the above project should be less in cost and highly reliable so that there might be no
hanging and minimal level of expense to implement the software. This project is
developed with the help of Dream viewer, PHP, MySQL, JavaScript and Ajax.
-
8/12/2019 Doc Handicraft (1)docs
11/63
11
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
2.4 SYSTEM SPECIFICATION
Key information for programming, testing and implementing the project. The major
document produced by the system analysis at the end of the system study stage. It provides
complete details of the analysts proposed solution to the problem outlined in terms of
references. This is the description of the proposed new computer system in great detail, it
specified how the system would do it, and the machinery needed the costs and benefits
expected for the project. The system specification describes the hardware and software
specification used to develop the application.
Hardware Requirements:-
Pentium-IV(Processor). 256 MB Ram 512 KB Cache Memory Hard disk 10 GB Microsoft Compatible 101 or more Key Board
Software Requirements: -
Operating System : Windows 95/98/XP with MS-office Programming languages : PHP 5 Scripting languages : JavaScript, Ajax Web-Technology : Dreamweaver
Back-End : MYSQL
Web Server : Apache
-
8/12/2019 Doc Handicraft (1)docs
12/63
12
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
2.5 SOFTWARE DESCRIPTION
2.5.1 PHP
Introduction
PHP is a computer scripting language originally designed for producing dynamic
web pages. It is used for, server-side scripting language but can be used from a command line
interface or in standalone graphical applications.
While PHP was originally created by Rasmus Lerdorf in 1995, the main
implementation of PHP is now produced by the PHP group and serves as the de facto
standard for PHP License; the free software foundation considers it to be free software.
PHP is a widely-used general-purpose scripting language that is especially suited
for web development and can be embedded into HTML. It generally runs on a web browser,
taking PHP code as its input and creating web pages as output. It can be deployed on most
web servers and on almost every operating system and platform free of change. PHP is
installed on more than 20 million websites and 1 million web servers. It is also the most
popular Apache module among computers using Apache as web server. The most recent
major release of PHP was the versions 5.2.6 on May 1, 2008.
History
PHP originally stood for Personal Home Page. It began in 1994 as a set of
Common Gateway Interface binaries written in the C programming language by
Danish/Greenlandic programmer Rasmus Lerdorf. Lerdorf initially created these Personal
Home Page tools to replace a small set of Perl scripts he had been using to maintain his
Personal Home Page. The tools used to perform tasks such as displaying his resume and
recording how much traffic his page was receiving. He combined these binaries with his form
interpreter to create PHP/F1, which had more functionality; PHP/F1 included a large C
implementation and could communicate with databases enabling the building of simple,
dynamic web applications. He released PHP publically on June 8, 1995 to accelerate bug
location and improving the code. This release was named PHP version 2 and already had the
basic functionality that PHP has today. This included Perl-like variables, form handling and
the ability to embed HTML. The syntax was similar to Perl but was more limited, simpler and
less consistent.
Zee Suraski and Andy Gutmans, two Israeli developers at the TechnionIT,
rewrote the parser in 1997 and formed the base PHP 3, changing the languages, name to the
recursive initialize PHP: Hypertext Preprocessor. The development team officially released
-
8/12/2019 Doc Handicraft (1)docs
13/63
13
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
PHP/F1 2 in November 1997 after months of beta testing. Afterwards, public testing of PHP
3 began, and the official launch came in June 1998. Suraski and Gutmans then started a new
rewrite of PHPs core, producing the Zend Engine in 1999. They also founded Zend
Technologies in Ramat Gan, Israel which manages the development of PHP.
On May 22, 2000 PHP 4, powered by the Zend Engine 1.0, was released. On
July 13, 2004, PHP 5 was released, powered by the new Zend Engines.
PHP 5 included new features such as improved support for object-oriented
programming, the PHP data objects extension (which defines a lightweight and consistent
interface for accessing databases), and numerous performance enhancements. The most
recent update released by the PHP group is for the older PHP version 4 code branch. As of
January 2008, this branch is up to version 4.4.8 PHP 4 is no longer under active development
but will be supported by security updates until August 8, 2008.
In 2008, PHP 5 becomes the only stable version under development. Late static
binding has been missing from PHP and will be added in version 5.3. Alongside PHP 5, PHP
6 is also under active development. Major changes include the removal of register globals,
magic quotes and safe modes.
PHP does not have complete native support for Unicode or multibyte string;
Unicode support will be included in PHP 6. Many high profile open source projects cased to
supports PHP 4 in new code as of February 5, 2008, due to the Go PHP5 initiative, provided
by a consortium of PHP developers promoting the transition from PHP 4 to PHP 5.
It runs both 32-bit and 64-bit environments, but on Windows the only official
distribution is 32-bit, requiring Windows 32-bit compatibility mode to be enabled using 11s
in a 62-bit Windows environment. There is a third-party distribution available for 64-bit
Windows.
Usage
PHP is a general-purpose scripting language that is especially suited for the web
development. PHP generally runs on a web server, taking PHP code as its input and creating
web pages as outputs. It can be used for command-line scripting and client-side GUI
operating systems and platforms, and can be used with many relational database management
systems. It is available free of charge, and the PHP group provides the complete source code
for users to builds, customize and extend for their own use.
PHP primarily act as a filter, taking input from a file or stream containing text
and/or PHP instructions and outputs another stream of data; most commonly the output will
be HTML. It can automatically detect the language of the user. From PHP 4, the PHP parser
-
8/12/2019 Doc Handicraft (1)docs
14/63
14
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
compiles input to produce byte codes for processing by Zend Engine, giving improved
performance over its interpreter predecessor.
Originally designed to create dynamic web pages, PHPs main focus is on
server-side scripting, and it is similar to other server-side scripting languages that provides
dynamic content from a web server to a client, such as Microsoft ASP.NET system, Sun
Microsystemss Java Server Pages and mod-perl. PHP has also attracted the development of
many frameworks that provide building blocks and a design structure to promote Rapid
Application Development (RAD). Some of these include CakePHP, PRADO, Symphony and
Zend framework, offering features similar to other web application framework. As of April
2007, over 20 million internet domains were hosted on servers with PHP installed and PHP
was recorded as the most popular Apache module.
Syntax
PHP only parses code within its delimiters; anything outside its delimiters is send
directly to the output and is not parsed by PHP. The most common delimiters are , which are open and close delimiters respectively. and
delimiters are also available. Short tags (
-
8/12/2019 Doc Handicraft (1)docs
15/63
15
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
Polymorphism: As the name suggest one name multiple form, Polymorphism is theway of providing the different functionality by the functions having the same name
based on the signatures of the methods.
Dynamic binding: Sometimes we don't have the knowledge of objects about theirspecific types while writing our code. It is the way of providing the maximum
functionality to a program about the specific type at runtime.
As the languages like Objective C, C++ fulfils the above four characteristics yet
they are not fully object oriented languages because they are structured as well as object
oriented languages. But in case of java, it is a fully Object Oriented language because object
is at the outer most level of data structure in java. No stand alone methods, constants, and
variables are there in java. Everything in java is object even the primitive data types can also
be converted into object by using the wrapper.
Data Types
PHP store whole numbers in a platform-dependent range. This range is typically
that of 32-bit signed integers. Unsigned integers are converted to signed values in certain
situations; this behavior is different from other programming languages. Integer variables can
be assigned using decimal (positive and negative), octal and hexadecimal notations. Real
numbers are also stored in a platform-specific range.
They can be specified using floating point notation, or two forms of scientific
notation. PHP has a native Boolean type that is similar to native Boolean types in Java and
C++. Using Boolean type conversation rules, non-zero values are interpreted as true and zero
as false, as in Perl and C++. The null data type is NULL. Variables of the resource type
represent reference to resource from external sources. These are typically created by
functions from a particular extension, and can be processed by functions from the same
extension; examples include file, image and database resources. Array can contain elements
of any type that PHP can handle, including resources, objects, and even other arrays. Order is
preserved in lists of values and in hashes with both keys and values, and the two can be
intermingled. PHP also supports strings, which can be single quotes, double quotes or
heredoc syntax.
-
8/12/2019 Doc Handicraft (1)docs
16/63
16
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
2.5.2 MYSQL
MySQL is an open source Relational Database Management System. MySQL is very
fast reliable and flexible Database Management System. It provides a very high performance
and it is multi threaded and multi user Relational Database management system.
MySQL is one of the most popular relational database Management System on the
web. The MySQL Database has become the world's most popular open source Database,
because it is free and available on almost all the platforms. The MySQL can run on Unix,
window, and Mac OS. MySQL is used for the internet applications as it provides good speed
and is very secure. MySQL was developed to manage large volumes of data at very high
speed to overcome the problems of existing solutions. MySQL can be used for verity ofapplications but it is mostly used for the web applications on the internet. MySQL, the most
popular Open Source SQL database management system, is developed, distributed, and
supported by Oracle Corporation. MySQL offers standard database driver connectivity for
using MySQL with applications and tools that are compatible with industry standards ODBC
and JDBC. Any system that works with ODBC or JDBC can use MySQL.
This software is developed for general use in a variety of information management
applications. It is not developed or intended for use in any inherently dangerous applications,
including applications which may create a risk of personal injury. If you use this software in
dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup,
redundancy, and other measures to ensure the safe use of this software.
MySQL is a database management system. A database is a structured collection of data.
It may be anything. MySQL is a relational database management system.
A relational database stores data in separate tables rather than putting all the data in
one. The MySQL Server design is multi-layered with independent modules. Many of the
world's largest and fastest-growing organizations use MySQL to save time and money
powering their high-volume Web sites, critical business systems, and packaged software.
MySQL is a key part of LAMP (Linux, Apache, MySQL, PHP /Perl/ Python), the fast-
growing open source enterprise software stack. More and more companies are using LAMP
as an alternative to expensive proprietary software stacks because of its lower cost and
freedom from platform lock-in.
-
8/12/2019 Doc Handicraft (1)docs
17/63
17
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
The features of MySQL server are:
A very fast thread-based memory allocation system.Very fast joins using an optimized one-sweep multi-join.In-memory hash tables, which are used as temporary tables.SQL functions are implemented using a highly optimized class library and should be
as fast as possible. Usually there is no memory allocation at all after query
initialization.
The best and the most-used database in the world for online applications.Available and affordable for all. MySQL command line tool is very powerful and can be used to run SQL queries
against database.Continuously improved while remaining fast, secure and reliable.Fun to use and improve.MySQL is very Lightweight application
2.5.3 MACROMEDIA DREAMWEAVER 8
Macromedia Dreamweaver is one of the most popular web-design programs in the
industry. It allows you to develop professional websites and its user-friendly interface, tools
and features have made it the must-have package for web designers.
Dreamweaver uses both Cascading Style Sheets (CSS) and Hyper Text Markup
Language (HTML) and it has good code-editing support features that will help you to write
the CSS and HTML. Alongside writing the code, you can use the visual layout tools to build
your sites and make them look exceptional.
Macromedia Dreamweaver 8 offers the most comprehensive set of tools available for
building dynamic and accessible web applications. Dreamweaver 8 makes it faster and easier
than ever to build accessible forms. Using the Accessibility preferences, Dreamweaver 8
prompts designers and developers to add elements that make a form accessible to users with
disabilities, such as labels, access keys, and a tab index for form objects.
Features:
Developers can use it with the server technology of their choice to build powerful netapplications.
Cross-Browser Validation. Improved Workflow.
-
8/12/2019 Doc Handicraft (1)docs
18/63
18
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
3.SYSTEM DESIGNDesign is the second phase in the system development life cycle. Software design is the
first of the three technical activities in the software development process such as design, code
writing and testing.
During this phase, the analyst schedules design activities, works with the user to
determine the various data inputs to the system, plans how data will flow through the system,
designs required outputs and writes program specifications. Again the analysts activities
focus on solving a users problem in logical terms.
During this second step, analysts employ a variety of tools such as data flow diagrams,
entity-relationship diagrams, data dictionaries and Gantt chart.
The systems design converts the theoretical solution introduced by the feasibility study
into a logical reality. During design the analyst:
Draws a model of the new system, using data flow and entity-relationshipdiagrams.
Develop methods for collecting and inputting data. Defines the detailed data requirements with a data dictionary. Writes program specifications. Specifies control techniques for the systems outputs, databases and inputs. Identifies and orders any hardware or software that the system will need.
In the physical design phase, necessary software is developed to accept input from the
user, to perform necessary calculations through the manipulation of data stored in the
databases to produce the appropriate result.
-
8/12/2019 Doc Handicraft (1)docs
19/63
19
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
3.1 OUTPUT DESIGNOutput design is an ongoing activity almost from the beginning of the project.
Computer output is the most important and direct source of information to the user. Output
design is a process that involves designing necessary outputs that have to be given to various
users according to their requirements. Efficient output design should improve the systems
relationship with the user and help in decision making .The system has got the capability to
display standard screen layouts. These layouts should be designed around the output
requirements and they must be designed with utmost care and details in the screen layouts
must be simple, descriptive and clear to the user.
While designing a systems output, the analyst must make several independent
decisions. Every system produces some kind of reports. No matter what is the content of the
report. The following guidelines can be applied to any report.
The information should be clear, accurate, concise and restricted to relevantdata.
Reports should have titles, date and descriptive headings for columns of data,numbered pages and so on. If printed, they should also appear on standard size
of paper.
The reports contents should be in a logical arrangement so that user can easilylocate what they need.
The report should come on an output medium that best suits the users needs.
-
8/12/2019 Doc Handicraft (1)docs
20/63
20
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
3.2 INPUT DESIGNInput design is the process of converting user oriented input into a computer based
format. The data flow diagram indicates logical data flows, data stores source and
destinations. Input data are collected and organized into a group of numbered data. Once
identified appropriate input data media are selected for processing.
The goal of input design is to make data entry as easy and free from errors as much as
possible. Proper data validation checking is exercised to correct the mistakes made during
data entry.
3.3 DATABASE DESIGNA database is a collection of interrelated data stored with minimum redundancy to
serve users more quickly and efficiently. The general objective of a database is to make
information access easy, quick, inexpensive, integrated and shared by different applications
and users. Database design is an important yet sometimes overlooked part of the application
development lifecycle. An accurate and up-to-date data model can serve as an important
reference tool for Database Administrators, developers, and other members of jointapplication development team
Effective database designers will keep in mind the principles of normalizationwhile they design a database.
Normalization is a database design approach that seeks the following four objectives:
Minimization of data redundancy, Minimization of data restructuring, Minimization of I/O by reduction of transaction sizes, and Enforcement of referential integrity.
The concepts and techniques used when designing an effective database includes:
An entityis a logical collection of things that are relevant to r database. The physical
counterpart of an entity is a database table
An attribute is a descriptive or quantitative characteristic of an entity. The physical
counterpart of an attribute is a database column (or field).
A primary key is an attribute (or combination of attributes) that uniquely identifies
each instance of an entity. A primary key cannot be null and the value assigned to a primary
key should not change over time. A primary key also needs to be efficient. For example, a
-
8/12/2019 Doc Handicraft (1)docs
21/63
21
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
primary key that is associated with an INTEGER data type will be more efficient than one
that is associated with a CHAR data type.
A relationship is a logical link between two entities. A relationship represents a
business rule and can be expressed as a verb phrase.
The second type of relationship is the "many-to-many" relationship. In a "many-to-
many" relationship, many instances of one entity relate to many instances of the other entity.
"Many-to-many" relationships need to be resolved in order to avoid data redundancy. "Many-
to-many" relationships may be resolved by creating an intermediate entity known as a cross-
reference (or XREF) entity.
A "foreign key" exists when the primary key of a parent entity exists in a child
entity. A foreign key requires that values must be present in the parent entity before like
values may be inserted in the child entity.
3.3.1 NORMALISATIONNormalization is the process of taking data from a problem and reducing it to a set of
relations while ensuring data integrity and eliminating data redundancy
Data integrity - all of the data in the database are consistent, and satisfy all integrityconstraints.
Data redundancy - if data in the database can be found in two different locations(direct redundancy) or if data can be calculated from other data items (indirect
redundancy) then the data is said to contain redundancy.
Data should only be stored once and avoid storing data that can be calculated from other data
already held in the database. During the process of normalization redundancy must be
removed, but not at the expense of breaking data integrity rules.
If redundancy exists in the database then problems can arise when the database is in normal
operation:
When data is inserted the data must be duplicated correctly in all places where there isredundancy. For instance, if two tables exist for in a database, and both tables contain
the employee name, then creating a new employee entry requires that both tables be
updated with the employee name.
-
8/12/2019 Doc Handicraft (1)docs
22/63
22
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
When data is modified in the database, if the data being changed has redundancy, thenall versions of the redundant data must be updated simultaneously. So in the employee
example a change to the employee name must happen in both tables simultaneously.
The removal of redundancy helps to prevent insertion, deletion, and update errors, since the
data is only available in one attribute of one table in the database.
The data in the database can be considered to be in one of a number of `normal forms'.
Basically the normal form of the data indicates how much redundancy is in that data. The
normal forms have a strict ordering:
1. 1stNormal Form2. 2ndNormal Form3. 3rdNormal Form4. BCNF
There are other normal forms, such as 4th and 5th normal forms. They are rarely utilised in
system design and are not considered further here.
To be in a particular form requires that the data meets the criteria to also be in all normal
forms before that form. Thus to be in 2ndnormal form the data must meet the criteria for both
2ndnormal form and 1stnormal form. The higher the form the more redundancy has been
eliminated.
-
8/12/2019 Doc Handicraft (1)docs
23/63
23
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
1. Table Name : Login
Description : To store login detail
Primary key : id
Field name Data type Size Constraints Description
Id INTEGER 10 PRIMARY KEY Id of login
Username VARCHAR 20 NOTNULL User name
Password VARCHAR 20 NOT NULL Password
Role VARCHAR 30 NOT NULL Role
Status VARCHAR 10 NOT NULL Status
2. Table Name : Agency_profile
Description : To store Agency_details
Primary key : Id_Agency
FOREIGN KEY:Id_login
Field name Data type Size Constraints Description
Id_agency INTEGER 10 PRIMARY KEY Agency id
Id_login INTEGER 10 FOREIGN KEY Login id
Name VARCHAR 30 NOT NULL Agency name
Address VARCHAR 100 NOT NULL Agency address
Pin INTEGER 10 NOT NULL Agency place pincode
Email VARCHAR 20 NOT NULL Agency email
Phone INTEGER 15 NOT NULL Agency phone number
Mobile INTEGER 15 NOT NULL Agency mobile number
-
8/12/2019 Doc Handicraft (1)docs
24/63
24
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
3. Table Name : user_profile
Description : To store user_details
Primary key : Id_user
FOREIGN KEY:Id_login
Field name Data type Size Constraints Description
Id_user INTEGER 10 PRIMARY KEY User id
Id_login INTEGER 10 FOREIGN KEY Login id
Name VARCHAR 30 NOT NULL Name of user
Gender VARCHAR 10 NOT NULL Users gender
Age INT 3 NOT NULL Age
Address VARCHAR 100 NOT NULL User address
Pin INTEGER 10 NOT NULL User place pin codeCountry VARCHAR 30 NOT NULL Users country
Email VARCHAR 20 NOT NULL User email
Phone INTEGER 15 NOT NULL phone number
Mobile INTEGER 15 NOT NULL User mobile number
4. Table Name : Handicraft_profile
Description : To store handicraft detail
Primary key : Id_hnd
FOREIGN KEY:Id_login
Field name Data type Size Constraints Description
Id_hnd INTEGER 10 PRIMARY KEY Handicraft id
Id_login INTEGER 10 FOREIGN KEY Login id
Name VARCHAR 30 NOT NULL Handcrafters name
Gender VARCHAR 30 NOT NULL Gender of handcrafter
Age INTEGER 3 NOT NULL Age
Address VARCHAR 100 NOT NULL Handcrafters address
District VARCHAR 30 NOT NULL District
Pin INTEGER 10 NOT NULL Handcrafters place pincode
Email VARCHAR 20 NOT NULL Handcrafters email
Mobile INTEGER 15 NOT NULL Handcrafters mobilenumber
Accno INTEGER 30 NOT NULL HandcraftersAcc. no
Bank details VAECHAR 30 NOTNULL Handcrafters bankdetails
-
8/12/2019 Doc Handicraft (1)docs
25/63
25
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
Turn over INTEGER 10 NOT NULL Annual turn over
Acct balance INTEGER 20 NOTNULL Handcrafters acctbalance
Types of craft VARCHAR 20 NOTNULL Handcrafters productdetails
Types ofproduction
VARCHAR 20 NOTNULL Handcrafters productiondetails
5. Table Name : ORDER
Description : To store ORDER details
Primary key : Id_OD
FOREIGN KEY: id_prd,id_user
Field name Data type Size Constraints Description
Id_od INTEGER 10 PRIMARY KEY User id OF order
Id_prd INTEGER 10 FOREIGN KEY Id of product
Id_user INTEGER 30 FOREIGN KEY Id of user
No_item INTEGER 10 NOT NULL No of item
Date DATE NOT NULL Order date
Total_amount INTEGER 20 NOT NULL total amount
6.Table Name : bidding
Description : To store bidding details
Primary key : Id_bid
FOREIGN KEY:Id_user,id_prd,id_agency
Field name Data type Size Constraints DescriptionId_bid INTEGER 10 PRIMARY KEY Bidding id
Id_agency INTEGER 10 FOREIGN KEY Agency id
Id_prd INTEGER 10 FOREING KEY Product id
Id_user INTEGER 10 FOREING KEY USERS id
date DATE NOT NULL Bidding date
Time DATE NOT NULL Bidding time
Starting price INTRGER 10 NOT NULL Bidding start price
Current price INTEGER 10 NOT NULL Current price of bidding
-
8/12/2019 Doc Handicraft (1)docs
26/63
26
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
7.Table Name : cart
Description : To store temporary shopping info
Primary key : Id_cart
FOREIGN KEY:userid, pid,
Field name Data type Size Constraints Description
Id INTEGER 10 PRIMARY KEY Id of cart
Pid INTEGER 10 FOREIGN KEY Id of product
Userid INTEGER 30 FOREIGN KEY Id of user
Count INTEGER 3 NOT NULL Quantity
Date DATE NOT NULL Date added
Total amount INTEGER 20 NOT NULL Payment data amount
8. Table Name : delivery
Description : To store temporary shopping info
Primary key : Id
FOREIGN KEY:userid, pid,Field name Data type Size Constraints Description
Id INTEGER 10 PRIMARY KEY Id of cart
Pid INTEGER 10 FOREIGN KEY Id of product
Userid INTEGER 30 FOREIGN KEY Id of user
Date DATE NOT NULL Date added
Address VARCHAR 100 NOT NULL User address
Pin INTEGER 10 NOT NULL User place pin code
Country VARCHAR 30 NOT NULL Users country
Email VARCHAR 20 NOT NULL User email
mobile INTEGER 15 NOT NULL Mobile number
Track id VARCHAR 25 NOT NULL Shipping id
Dispatch VARCHAR 50 NOTNULL Dispatch status
-
8/12/2019 Doc Handicraft (1)docs
27/63
27
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
9. Table Name : Event
Description : To store event information
Primary key : Id
Field name Data type Size Constraints Description
Id INTEGER 10 PRIMARY KEY Id of event
Date DATE NOT NULL Date of event
Time DATE NOT NULL Time of event
Info VARCHAR 2000 NOT NULL Event info
Title VARCHAR 300 NOTNULL Title
Place VARCHAR 300 NOTNULL Place of event
Type VARCHAR 50 NOTNULL Event type
10. Table Name : Product details
Description : To store product information
Primary key : Id
FOREIGN KEY:hdct_id,Agent id
Field name Data type Size Constraints Description
Id INTEGER 10 PRIMARYKEY
Id of product
Hdct_id INTEGER 10 FOREIGN KEY Id of uploaded handcrafter
Agent id INTEGER 10 FOREIGN KEY Id of corresponding agent
Date DATE NOTNULL Date uploaded
Name VARCHAR 100 NOTNULL Name of product
Info VARHCAR 200 NOTNULL Description
Type VARCHAR 50 NOTNULL Product type
Count INTEGER 5 NOTNULL Count of item
Image VARCHAR 100 NOTNULL Location of images
Price INTEGER 10 NOTNULL Price of item
Status VARCHARR 50 NOTNULL Status of product
-
8/12/2019 Doc Handicraft (1)docs
28/63
-
8/12/2019 Doc Handicraft (1)docs
29/63
29
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
13. Table Name : pre request
Description : store the pre request form the user
Primary key : Id
FOREIGN KEY: user id
Field name Data type Size Constraints Description
Id INTEGER 10 PRIMARY KEY Id pre request
User id INTEGER 10 FOREIGN KEY Requested user id
Date DATE NOTNULL Date of request
Name VARCHAR 100 NOTNULL Name of applicant
Message VARHCAR 2000 NOTNULL Message to handcrafter
Status VARCHAR 30 NOTNULL Status form handcrafter
14. Table Name: withdrawal
Description: store the withdrawal request
Primary key: Id
FOREIGN KEY: hcid
Field name Data type Size Constraints Description
Id INTEGER 10 PRIMARY KEY Id withdraw requestHcid INTEGER 10 FOREIGN KEY Requested handcrafter id
Date DATE NOTNULL Date of request
Amount INTEGER 10 NOTNULL Withdrawal amount
Status VARCHAR 20 NOTNULL Status of withdrawal
-
8/12/2019 Doc Handicraft (1)docs
30/63
30
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
3.4 DATA FLOW DIAGRAMData Flow Diagram (DFD) isan important tool used by system analyst. DFD provide
an overview of what data a system would process, What transformation of data are done,
what files are used and where the results flow. The graphical representation of the systemmakes it a good communication tool between the user and the analyst.
Analysis model help us to understand the relationship between different components
in the design. Analysis model shows the user clearly how a system will function. This is the
first technical representation of the system.
The analysis modeling must achieve three primary objectives.
To establish a basis for creation of software design.
To describe what the user requires. To define set of requirements that can be validated once the software us build.A data flow diagram is a graphical technique that depicts information flow and
transforms that are applied as data move from input to output. The DFD is used to represent
increasing information flow and functional details. A level 0 DFD also called fundamental
system model represents the entire software elements as single bubble with input and output
indicated by incoming and outgoing arrow respectively.
Data Flow Notations
Process
-
8/12/2019 Doc Handicraft (1)docs
31/63
31
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
Processes represent activities in which data is manipulated by being stored or retrieved
or transformed in some way. A circle represents it. The process will show the data
transformation or change. Data coming into a process must be worked-on or
transformed in some way. Thus all process my have an input and output.
External Entities
External entities represent the sources of data that enter the system or the recipients of data
that leave the system. They can be duplicated, one or more times on the diagram to
avoid line crossing. Data Stores
Data stores represent stores of data within the system. Data stores may be long-term
files such as sales ledgers, or may be short-term accumulations: For example batches
of documents that are waiting to be processed. Each data store should be given areference followed by an arbitrary number.
Data FlowA data flow shows the flow of information from its source to its destination. A line
represents a data flow, with arrowheads showing the direction of flow. Information
always flows to or from a process and may be written, verbal or electronic. Each data
flow may be referenced by the processes or data stores at its head and tail, or by adescription of its contents.
-
8/12/2019 Doc Handicraft (1)docs
32/63
32
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
Context diagram for ONLINE HANDICRAFT MARKETING MANAGEMENT
Level 1 DFD for admin
-
8/12/2019 Doc Handicraft (1)docs
33/63
33
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
Level 1 DFD for Agency
-
8/12/2019 Doc Handicraft (1)docs
34/63
34
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
Level 1 for handcrafters
-
8/12/2019 Doc Handicraft (1)docs
35/63
35
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
Level 1 DFD for User
-
8/12/2019 Doc Handicraft (1)docs
36/63
36
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
Level 2 DFD for Admin
-
8/12/2019 Doc Handicraft (1)docs
37/63
37
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
Level 2 DFD for Agency
-
8/12/2019 Doc Handicraft (1)docs
38/63
38
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
Level 2 DFD for Handcrafter
-
8/12/2019 Doc Handicraft (1)docs
39/63
39
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
Level 2 DFD for User
-
8/12/2019 Doc Handicraft (1)docs
40/63
40
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
-
8/12/2019 Doc Handicraft (1)docs
41/63
41
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
3.5 SYSTEM FLOW CHART
-
8/12/2019 Doc Handicraft (1)docs
42/63
42
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
3.6 STRUCTURE CHART
-
8/12/2019 Doc Handicraft (1)docs
43/63
43
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
3.7 MENU TREE
-
8/12/2019 Doc Handicraft (1)docs
44/63
44
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
4.SYSTEM CODING
-
8/12/2019 Doc Handicraft (1)docs
45/63
45
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
$res=$ob->execute("SELECT `Id` FROM `user_loging` WHERE
`User_name`='$username';");$loginId= mysql_fetch_row($res);
/*Inserting details to user_profile table*/
$res=$ob->execute("INSERT INTO `base_table`.`user_profile` (`Id_login`, `Name`,
`Gender`, `Age`, `Address`, `Pin`, `Country`, `Email`, `Phone`, `Mobile`) VALUES
('$loginId[0]', '$name', '$gender', $age, '$address', '$pin', '$country', '$email', '$phone',
'$mobile');");
return $res;
}
/*-end of function insert-user_profile()-*/
}
/*This class containg the details of Handicrafters insertin functions*/
class insert_Handicraft
{
/*This Function insert value from form handicraft_register */
public function
insert_profile($name,$gender,$age,$username,$password,$address,$pin,$district,$email,$mo
bile,$turnover,$acountNo,$typeOfCraft,$typeOfProduct,$bankdtls)
{
$ob=new dbase();
/*Inserting login details to login table */
$res=$ob->execute("INSERT INTO `base_table`.`user_loging` (`User_name`,
`Password`, `Role`, `Status`) VALUES ('$username', '$password', 'HANDCRAFTER',
'ACTIVE');");
/*Selecting the id form login table to use in user_profile table*/
-
8/12/2019 Doc Handicraft (1)docs
46/63
46
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
$res=$ob->execute("SELECT `Id` FROM `user_loging` WHERE
`User_name`='$username';");
$loginId= mysql_fetch_row($res);
/*Inserting details to handicraft_profile table*/$res=$ob->execute("INSERT INTO `base_table`.`handicrfter_profile` (`Id_login`, `Name`,
`Gender`, `Age`, `Address`, `District`, `Pin`, `Email`, `Mobile`, `Tp_crft`, `Tp_prdcn`,
`Turn_over`, `Bank_dtls`, `Acc_no`) VALUES ('$loginId[0]', '$name', '$gender', '$age',
'$address', '$district', '$pin', '$email', '$mobile', '$typeOfCraft', '$typeOfProduct', '$turnover',
'$bankdtls', '$acountNo');");
return $res;
}/*-End of function insert-profile-()-*/
public function insert_product($uid,$agid,$d,$pname,$des,$type,$pho,$price,$qty)
{
$ob=new dbase();
$ob->execute("insert into
product_dtls(Id_hdct,agent_id,Date,Name,Info,Type,Image,Price)values($uid,$agid,'$d','$pna
me','$des','$type','$pho','$price')");
}
public function request_loan($amount,$hid,$dat)
{
$ob=new dbase();
$res=$ob->execute("select name from handicrfter_profile where
id_login='$hid'");
$hname= mysql_fetch_row($res);
$ob->execute("INSERT INTO `base_table`.`loan` (`u_id`, `name`, `date`,
`amount`, `status`) VALUES ('$hid', '$hname[0]', '$dat', '$amount', 'PENDING');");
}
}
/*This class containg the details of Agency insertin functions*/class insert_Admin
-
8/12/2019 Doc Handicraft (1)docs
47/63
47
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
{
/*This Function insert value from form Agency_register */
public function
insert_profile($name,$username,$password,$address,$district,$pin,$email,$phone,$mobile){
$ob=new dbase();
/*Inserting login details to login table */
$res=$ob->execute("INSERT INTO `base_table`.`user_loging` (`User_name`,
`Password`, `Role`, `Status`) VALUES ('$username', '$password', 'AGENCY', 'ACTIVE');");
/*Selecting the id form login table to use Agency_profile
table*/
$res=$ob->execute("SELECT `Id` FROM `user_loging` WHERE
`User_name`='$username';");
$loginId= mysql_fetch_row($res);
/*Inserting details to Agency_profile table*/
echo $q="INSERT INTO `base_table`.`agency_profile`
(`Id_login`, `Name`, `Address`, `district`, `Pin`, `Email`, `Phone`, `Mobile`) VALUES
($loginId[0], '$name', '$address', '$district', '$pin', '$email', '$phone', '$mobile')";
$res=$ob->execute("");
return $res;
}
/*-End of function insert-profile-()-*/
/*Inserting event to table */
public function insert_event($title,$date,$info,$place,$type,$time){
$ob=new dbase();
-
8/12/2019 Doc Handicraft (1)docs
48/63
-
8/12/2019 Doc Handicraft (1)docs
49/63
-
8/12/2019 Doc Handicraft (1)docs
50/63
-
8/12/2019 Doc Handicraft (1)docs
51/63
51
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
Login
User Name
Password
Not Yet Registerd ?
User,Handicrafter
Categories
-
8/12/2019 Doc Handicraft (1)docs
52/63
52
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
Category 1
Category 2
Category 3
Category 4
Category 5
Category 6
Category 7
Category 8
Category 9
Category 10
Category 11
Category 12
Category 13
-
8/12/2019 Doc Handicraft (1)docs
53/63
53
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
previous next
Donec imperdiet
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Donec imperdiet, metus ac
cursus auctor, arcu felis ornare dui.
-
8/12/2019 Doc Handicraft (1)docs
54/63
-
8/12/2019 Doc Handicraft (1)docs
55/63
55
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
2010 Shop Around. Design by Chocotemplates.com
-
8/12/2019 Doc Handicraft (1)docs
56/63
-
8/12/2019 Doc Handicraft (1)docs
57/63
57
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
execution and resultant data collection and evaluation. A software testing strategy should be
flexible enough to promote a customized testing approach. At the same time, it must be rigid
enough to promote reasonable planning and management tracking as the project progresses.
The project manager, software engineers and testing specialists develop a strategy for
software testing. The general characteristics of software testing strategies are :
White Box Testing
White box testing strategy deals with the internal logic and structure of the code.
White box testing is also called as glass, structural, open box or clears box testing. The tests
written based on the white box testing strategy incorporate coverage of the code written,
branches, paths, statements and internal logic of the code etc.
In order to implement white box testing, the tester has to deal with the code and hence
is needed to possess knowledge of coding and logic i.e. internal working of the code. White
box test also needs the tester to look into the code and find out which unit/statement/chunk of
the code is malfunctioning.
Black box Testing
Black Box Testing is not a type of testing; it instead is a testing strategy, which does
not need any knowledge of internal design or code etc. As the name "black box" suggests, no
knowledge of internal logic or code structure is required. The types of testing under this
strategy are totally based/focused on the testing for requirements and functionality of the
work product/software application. Black box testing is sometimes also called as "Opaque
Testing", "Functional/Behavioral Testing" and "Closed Box Testing".
The base of the Black box testing strategy lies in the selection of appropriate data as
per functionality and testing it against the functional specifications in order to check for
normal and abnormal behavior of the system.
-
8/12/2019 Doc Handicraft (1)docs
58/63
58
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
6. SYSTEM IMPLEMENTATION
The implementation is the final and important phase. It involves user training, system
testing in order to ensure successful running of the proposed system. Once the system design
phase is over, the next stage is to implement and monitors the operation of the system to
ensure that it continues the work effectively and efficiently.
The three main phases in implementation take place in series. These are the initial
installation, the test of the system as a whole and evaluation maintenance and control of the
system. The implementation plan and action to implement should be bound closely together.
The implementation plan is a function of line management at least as far as key decision or
alternative plans are concerned.
The implementation plan was to convert the existing clerical files to the computer.
The implementation plan listed all sub tasks so that individuals in the organization may be
assigned specific responsibilities.
The installation of the new system that is bound to replace the current one may
require a major revision of computer facilities as well as completely new after space. Space
planning took into account the space occupied by the people, space by equipment and the
movement of people and equipment in the working investment. After conduction the initial
testing the system is loaded on the client offices computer. Some of the user employees in
this case are selected. These users are trained first and they run the system. A detailed
documentation is prepared to this set of employees. There may be slight modifications to
meet the organization.
After all modifications specified by the users in the documentation are made, the
computer system is run along with manual system. Even though this kind of parallel run
make extra burden to the employees and management, the system is run in parallel for the
sake of checking reliability and efficiency. After this document, which compares the result of
the manual system with those of the computerized is prepared. If there is any modifications
are made as needed.
A procedure is developed for delivering instructions and forms to supervisors for
coordination and integrating the proposal with other parts of the organization, and for
working out of problems with people involved. This procedure also helped for evaluation of
hardware and software. A program was developed to emphasis the nature and goals of the
-
8/12/2019 Doc Handicraft (1)docs
59/63
59
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
new system on the management and the support personnel and train operation personnel in
their new tasks.
In the case of management many of whom participated in the development of the
system short seminars were given. Particular attention was paid to the training of end users.
The training sessions were aimed at giving the user staff the specific skills required in their
new jobs. They were given practical training to have a thorough understanding of what the
new system is like and how it behaves.
Education involved creating the right atmosphere and motivation of user staff. It
explained the need for changes and helped to overcome the resentment caused by the feeling
that computers took away the responsibility from individual departments.
Various measures have been taken by department officials in order to find suitable
solutions by the following issues:
About the skill to be acquired. Reduction of man power in department About the new form having all required option.
-
8/12/2019 Doc Handicraft (1)docs
60/63
60
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
7. SYSTEM MAINTENANCE
The term maintenance is used to describe the software engineering activities that
occur following the delivery of a software product to the customer. The maintenance phase
of the software lifecycle is the time period in which software performs useful work. We
may define maintenance by describing four activities that are undertaken after a program
is released for use. During the use of any large program, errors will occur and be reported
to the developer. The process that includes the diagnosis and correction of one or more
error is called corrective maintenance. Thus problem correction involves modification and
revalidation of software to corrective maintenance.
The second activity that contributes to a definition of maintenance occurs
because of the rapid change that is encountered in every aspect of computing. An activity
that modifies software to properly interface with a changing environment is adaptive
maintenance. The third activity occurs when a software package is successful. As software
is used recommendations for new capabilities, modifications to existing function and
general enhancements are received from users. To satisfy request in this category,perfective maintenance is performed. The fourth and last maintenance activity occurs
when software is changed to improve future maintainability or reliability or to provide
activities including correcting, coding and design, updating, documentation and test data
and upgrading user support. Maintenance means restoring something to its original
conditions. In contrast, enhancements mean adding or modifying or re execution.
-
8/12/2019 Doc Handicraft (1)docs
61/63
61
B.Sc Computer Science ,UIT Yeroor 2011-2014
ONLINE HANDICRAFT MARKETING
8. SYSTEM SECURITY
System Securityencompasses measures taken throughout the application's life-cycle
to prevent exceptions in the security policy of an application or the
underlying system (vulnerabilities) through flaws in the design, development, deployment,
upgrade, or maintenance of the application.
Applications only control the use of resources granted to them, and
not which resources are granted to them. They, in turn, determine the use of these resources
by users of the application through application security.
Open Web Application Security Project (OWASP) and Web Application Security
Consortium (WASC) updates on the latest threats which impair web based applications. This
aids developers, security testers and architects to focus on better design and mitigation
strategy. OWASP Top 10 has become an industrial norm in assessing Web Applications.
Threat. A negative effect. Vulnerability. A weakness that makes a threat possible. Attack (or exploit). An action taken to harm an asset. Countermeasure. A safeguard that addresses a threat and mitigates risk.
Security testing techniques scour for vulnerabilities or security holes in applications. These
vulnerabilities leave applications open to exploitation. Ideally, security testing is
implemented throughout the entire software development life cycle (SDLC) so that
vulnerabilities may be addressed in a timely and thorough manner. Unfortunately, testing is
often conducted as an afterthought at the end of the development cycle.
ONLINE HANDICRAFTS MARKETING MANAGEMENT is secured by means of
providing password protection for every type of users. It is also less vulnerable to external
attacks by using php for its development. Non repudiations are avoided by logging all
activities of users.
-
8/12/2019 Doc Handicraft (1)docs
62/63
-
8/12/2019 Doc Handicraft (1)docs
63/63