Project Report
Project Report
of
Bachelor
In
Computer Application
(Session 2021-2024)
University of Rajasthan,
Jaipur
1
CERTIFICATE
This is to certify that this report embodies the original work done by Mr. Devendra Gautam
degree of
BACHELOR IN COMPUTERAPPLICATION
from
Jaipur affiliated to
Professor) RSSM,Jaipur
RSSM,Jaipur
2
ACKNOWLEDGEMENT
I would like to this opportunity in expressing my deepest gratitude to all those persons who in
one way or other helped me in making my endeavours a success. No words can reflect my
thankfulness and respect towards these people for their significant contribution in the completion of
this project.
First of all, we would like to acknowledge and thank our subject teacher ‘Mr. Sanjit Bhagat’of
computer faculty of RSSM, Jaipur for giving us an interesting topic to work on.
We therefore thank in particular to everyone who has helped us helped us build this project but we
would like to apologize in advance for my omission which may have inadvertently crept in.
-Thank you
Devendra Gautam
3
PREFACE
This basis for this research originally stemmed from my passion for developing better methods of
data storage and preservation. As the world moves further into the digital age, generating
vast amounts of data and born digital content, there will be a greater need to access legacy
How will we access this content? It is my passion to not only find out, but to develop tools to break
down barriers of accessibility for future generations. In truth, I could not have achieved my current
First of all, my parents, who supported me with love and understanding, and secondly, my committee
members, each of whom has provided patient advice and guidance throughout the research process.
4
TOPIC Page No.
1. INTRODUCTION 6-9
9. CONCLUSION 78-79
10.REFERNCE 79
5
1. INTRODUCTION
“ONLINE BOOK STORE” is an online book store technique. There is a database that is maintained
in which all the names of users with complete information Are stored.
In “ONLINE BOOK STORE” a user can use his/her store right online without any difficulty. He/she
has to register first for him/her to use.
People seeking registration are expected to contact the system administrator to submit their details.
Submitted with those in existing databases such as those as the Registrar of Persons, the people are
then registered as a User.
After registration, the User is assigned a secret User ID with which he/she can use to log into the
system and enjoy services provided by a system such as Store. If invalid/wrong details are submitted,
then the people are not allowed to login in Store.
1.1 OBJECTIVE
➢ Reviewing the existing/current login process.
➢ Coming up with an automated/online system.
➢ Implementing a an automated/online store system.
➢ Validating the system to ensure that only eligible Users are allowed to use Store.
1.2 SCOPE
➢ Secured login procedure.
➢ Providedifferent category books.
➢ Profiles can be modified.
➢ User can post their vision.
➢ Store is possible only with successful login of user.
➢ Inspection is performed on both user and admin.
➢ Suspected user can be reported against.
➢ Abused users can be verified and blocked if necessary.
➢ The scope of the project is that it will use the ID and password created by
user to register him/her in the store site, through this all the details of user are saved
database
6
1.3 PROBLEM DEFINITION
Online Book Store (OBS) also known as Store Website In which the user can use many types of
facilities, he or she can login into all types of devices through it. In online store, the user is given the
option of e-cart in which he or she can save the books of his/her choice. Online store site can work on
both private and public networks. In this, administrator can add new books and can also
make changes in them.
Online store is an electronic way of choosing her favourite a web driven application. Buying books
online is convenient and cost-effective way to add to your personal library with the growing number
of online bookstores, readers can find millions of books, both new and used, at discounted prices. In
this article, we will be looking at potential cost savings and deals that you can take
advantage of when buying books online
• Comparison Store -- One of the main advantages of buying books online is the
ability to compare prices and availability across different retailers. This allows you to
find the best deals and save money. Many online bookstores also offer free shipping, which
further adds to the cost savings
• Used Books – Buying used books is another great way to save money. Many online retailers
offer used books for a fraction of the books many vary, you can find a great deal on a book
that is just as a good as a new one.
• Deals And Discounts – Online bookstores often offer deals and discounts on books. These
can range from percentage off discounts to buy one get one free deal. Many bookstores also
offer loyalty programs and coupons to their customers.
• Bulk Purchases – If you are a frequent reader, buying books in bulk can save you a lot of
money. Many online bookstores offer discounts on bulk purchases which can add up
to significant savings
7
• 1.3.2 EXISTING SYSTEM WITH LIMITATION
➢ Low Reliability
➢ Poor security
➢ High costs
➢ Queueing
➢ Time factor was the greatest barrier to the successful completion of this exercise since it had to
be done within the semester.
➢ I also had financial constraints since all the activities involved were self-sponsored.
1.3.3SOLUTION OF PROBLEMS
➢ The system makes the overall project management much easier and flexible.
➢ There is no risk of data mismanagement at any level while the project development is under
process.
➢ It provides high level of security with different level of authentication.
➢ Users from any part of the world can make use of the system.
➢ New system will process accurate results.
➢ New system will be much better in performance as compared to existing one
8
1.3.5 SIGNIFICANCE OF THE PROJECT
➢ Provision of improved store services to the users through fast, timely and convenient online
store.
➢ Reduction of the costs of books during store time by playing the very many clerks employed
for the sake of the success of the manual system.
➢ Check to ensure that the users that are signed in are the only ones to allow buying. Fake users
are not allowed to buy
➢ Online book store (OBS) will require being very precise or cost cutting to produce an
effective election management system.
Therefore, crucial points that this (OBS) emphasizes on are listed below.
2. FEASIBILITY STUDY
The system has been tested for the feasibility in the following points:
1. Technical Feasibility
2. Economic Feasibility
3. Operational Feasibility
9
1. Technical Feasibility-: A study of resource availability that may affect the ability to achieve an
acceptable system. This evaluation determines whether the technology needed for the proposed
existing system is available or not. Can the work for the project be done with current
equipment existing software technology and available personnel? If new technology is needed,
what is the likelihood that it can be developed?
This is concerned with specifying equipment and software that will successfully satisfy the
user requirement. The technical needs of the system may include:
An important issue for the development of a project is the selection of suitable front-end and back-
end. When we decided to develop the project, we went through an extensive study to determine the
most suitable platform that suits the need of the Organization as well as helps in development of the
project.
2.Economic Feasibility-: Economic justification is generally the "Bottom Line “consideration for the
most system. Economic justification includes a broad range of concerns that includes cost
benefit analysis. In this weight the cost and the benefits associated with the candidate system and if it
suits the basis purpose of the organization i.e.., profit making, the project is making to the analysis
and design phase.
The financial and the economic questions during the preliminary investigation are verified to estimate
the following:
The cost of hardware and software for the class application being considered.
The proposed system will isethionate information, as a result the performance is improved which is
turn may be expected to provide increased profits.
The feasibility checks whether the system can be developed with the available funds. The Hospital
management System does not require enormous amount of money to be developed. This can be done
economically if planned judicially, so it is economically feasible. The cost of project depends upon
the number of man hours required.
1
3.Operational Feasibility -: It is mainly related to human organizations and political aspects. The
points to be considered are:
What new skills will be required? Do the existing staff members have these skills?
The system is operationally feasible as it very easy for the End Users to operate it.
3. SYSTEM ANALYSIS
After analysing the requirements of the task to be performed, the next step is to analyse the problem
and understand its context. The first activity in the phase is studying the existing system and other is
to understand the requirements and domain of the new system. Both the activities are equally
important, but the first activity serves as a basis of giving the functional specifications and
then successful design of the proposed system. Understanding the properties and requirements of a
new system is more difficult and requires creative thinking and understanding of existing running
system is also difficult, improper understanding of present system can lead diversion from solution.
Model Analysis
This document plays a vital role in the development of life cycle (SDLC) as it describes the complete
requirement of the system. It means for use by developers and will be the basic during testing phase.
Any changes made to the requirements in the future will have to go through formal change approval
process.
WATER FALL MODEL was being chosen because all requirements were known before hand and the
objective of our software development is the computerization/automation of an already
existing manual working system.
1
WATERFALL MODEL
12
3.1 Flow Chart
A flowchart is a graphical representation of a process. Each step-in process. Each step in the process
is represents by a different symbol and contains a short description of the process step. The flowchart
is linked with arrows showing the process flow direction.
Flow of data
Process
Conditions
Input/output
1
3.2 Entity Relationship Diagram:- An entity-relationship diagram (ERD) is a data modelling
technique that graphically illustrates an information system’s entities and the relationships between
those entities. An ERD is a conceptual and representational model of data used to represent the entity
framework infrastructure.
• Entities
• Relationships
• Attributes
1
AdminId Password
Perform
Admin
Email Add Book ViewProduct
Password
Sell
Delete Edit
Login Perform
User
ViewDetails
Purchase
Register
Name DOB Gender
Mobile
Registration
Address Conform
Password
Password
1
Steps involved in creating an ERD include:
Data Flow Diagram: - Data Flow Diagram is a graphical representation of flow of data throughout
the information system. Data Flow Diagram illustrate how data is processed by a system in terms of
inputs and outputs.
External Entity: - External entities are object outside the system, with which the
system communicates.
O/P
1
Dataflow
User
Management
Book Order
Management Management
Online
Book
Payment System Admin
Store
Management Management
Login
Management
1
Book Generate
Management Book Report
User Generate
Order Generate
Management Order Report
Online
Book
Store Generate
Book Store
Book Stock Report
Management
Check
Login
Admin Login Details
Management
1
Login
System Admin
To
System
Check Roles
Manage Payment Details
Of Access
Manage Report
1
3.4 Unified Modelling Language (UML)
To create a UML diagram for an online book store, you can include various diagrams like
class diagram, use case diagram, sequence diagram, collaboration diagram, state chart diagram,
activity diagram, component diagrams, and deployment diagram. Here are some key resources that
provide insights into these UML diagrams for an online bookshop:
➢ Class Diagram:
In software engineering, a class diagram in the Unified Modelling Language
(UML) is a type of static structure diagram that describes the structure of a
system by showing the system's classes, their attributes, operations(or
methods),and there lation ships among the classes. It explains which class
contains information
Admin User
+email
+AdminId +password
+password
+register()
+login() +login()
+AddnewBooks() +viewprofile()
+Edit/Updatebooks() +viewbooks()
+viewrusers() +selectbooks()
+viewbooks() +Contact()
+logout() +Feedback()
+payment()
+logout()
2
➢ Use Case Diagram:-
A use case diagram in the Unified Modeling Language (UML) is a type of behavioral
diagram defined by and created from a Use-case analysis. Its purpose is to present a
graphical overview of the functionality provided by a system in terms of actors, their
goals (represented as use cases), and any dependencies between those use cases. The
main purpose of a use case diagram is to show what system functions are performed
for which actor. Roles of the actors in the system can be depicted.
Registe
r
Login
viewprofile
viewbooks
Use selectboo
r k
Contact Us
Feedback
payment
logout
2
Login
Add New
Books
Edit/Delete
Admin
View Users
View Books
logout
2
These UML diagrams collectively provide a comprehensive view of an online book
store system's structure, behaviour, interactions, and deployment aspects. By
incorporating these different types of diagrams, you can effectively model and understand the
complexities of an online bookshop system.
Product Definition
The project's main goal is to develop an online book store where users can search for and
make purchases of books based on title, author, and subject. The user's chosen books
are displayed in a tabular format, and they can order them online using a debit card or credit
card. Instead of going to a bookstore and wasting time, the user can purchase a book
on this website. Many online book retailers. I'd like to create a comparable website
with.NET and SQL Server. An online book store is a web application that allows customers to
buy books online. Customers can search for a book by title or author using a web browser,
add it to their shopping cart, and then purchase it using a debit or credit card transaction. The
user can log in using his or her account information, or new customers can swiftly create an
account. They should include their full name, phone number, and shipping address. A user
can also provide feedback to a book by rating it on a scale of one to five. The books are
organized into several categories based on the subject matter, such as Action and
Adventure, Classics, Fantasy, Fiction, Non-fiction, Horror etc. Customers can shop
online for books at the Online Book Store using a web browser. A customer can create an
account, sign in, add items to a shopping cart, and make purchases using his or her
debit/credit card information. When compared to a regular user, the Administrator will have
more features. The Administrator can add, delete, and edit book data, and member
information, as well as confirm an order that has been placed. The Online Book Store is
built using the Master page, data sets, data grids, and user controls
2
Software and Hardware requirements
This brings us into understanding the entire system requirement analysis. During a
system development process, a blueprint of system's requirements will be created to
describe the following:
➢ User Requirements
a. The ability to accept orders over the internet.
b. Maintain a list of accounts for customers.
c. Provide the ability to search the master book catalogue.
d. Provide a number of search methods on that catalogue, including search by author,
search by title, search by ISBN number, and search by keyword.
e. Provide a secure means of allowing customers to pay by credit card.
f. Provide a secure means of allowing customers to pay via purchase order.
g. Provide a special kind of account that is preauthorized to pay via purchase order.
h. Provide electronic links between the web and database and the shipping fulfilment
system.
i. Maintain reviews of books, and allow anyone to upload review comments.
j. The system should run properly on all browsers.
➢ Functional Requirements
Functional requirements for an online bookstore can include various features
and functions that the system must perform. Based on the provided search results,
the functional requirements for an online bookstore can be summarized as follows:
a. Inventory Management:
1. Maintain data associated with the inventory, including the title, author, price, and
stock/quantity of each book.
2. Allow the manager to specify a stop-order for a book and update stock
quantities.
3. Notify the manager when books need to be reordered.
b. Customer Management:
2
1. Maintain records for customers, who can be either members or non-members,
with specific details such as a unique username, password, email address, and
postal address.
2. Allow customers and managers to log in and out of the system.
c. Order Processing:
d. User Interface:
1. Display available books in ascending alphabetical order by title, listing the title,
author, and price for each book.
2. Provide a search feature for users to search content/items by entering a query in
the search bar.
➢ Non-Functional Requirements.
Non-functional requirements for an online bookstore can be organized into several
categories:
a. Performance
b. Security
2
2. Authentication mechanisms to ensure authorized access to user accounts.
3. Encryption of data at rest and in transit.
c. Usability
d. Availability
e. Maintainability
➢ Specific Requirements
• Hardware Requirements:
1. CPU: Intel CORE i3 7th Gen
2. Memory: 4.00GB
3. Processor: Intel(R) Core (TM) i3-7100U CPU @2.40GHz 2.40 GHz
• Software Requirements:
1. Windows 10 Professional (64 bit).
2. Development Language: Visual Studio 2013
3. Database: SQL Server 2012 or above
4. Framework: 4.0 or above
2
4. SYSTEM DESIGN
4.1. Design
The design of an online bookstore system involves the architectural approach,
technology stack, data model, user interface, external interactions, functionality, security
measures, confidence in data, ease of maintenance, and scalability. This includes
developing a web- based system from scratch, utilizing design patterns and frameworks
such as Model-View- Controller (MVC) and Struts, and employing technologies like Java
Enterprise Edition (JEE), JavaScript Platform Standard Tag Library (JSTL), and hibernate for
database mapping. The system should manage data associated with books, customers,
and transactions, provide a user-friendly interface for browsing books and completing
transactions, and connect with external systems such as a credit/debit card processing
service. Security measures should be implemented to protect sensitive data, and the
system should be designed for ease of maintenance and future scalability.
2
SCREENSHOTS
28
29
3
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
5. TESTING
The completion of a system will be achieved only after it has been thoroughly tested. Though
this gives a feel the project is completed, there cannot be any project without going through
this stage. Hence in this stage it is decided whether the project can undergo the real
time environment execution without any break downs, therefore a package can be rejected
even at this stage.
Testing Methods
Software testing methods are traditionally divided into black box testing and white
box testing. These two approaches are used to describe the point of view that a test engineer
takes when designing test cases.
• Black Box Testing: - Black box testing treats the software as a “black box”, without
any knowledge of internal implementation. Black box testing methods include:
equivalence partitioning, boundary value analysis, all-pairs testing, fuzz testing,
model-based testing, traceability matrix, exploratory testing and specification-
based testing.
• White Box Testing: - White box testing, by contrast to black box testing, is when the
tester has access to the internal data structures and algorithms (and the code
that implement these). White box testing methods can also be used to evaluate
the completeness of a test suite that was created with black box methods. This allows
the software team to examine parts of a system that are rarely tested and ensures that
most important function points have been tested.
• Grey Box Testing: - Grey box testing involves having access to internal data
structure and algorithms for purposes of designing the test cases, but testing at
the user, or black-box level. Manipulating input data and formatting output do not
qualify as “grey box”, because the input and output are clearly outside of the “black-
box” that we are calling the system under test. This distinction is particularly
important when conducting integration testing between two modules of code written
by two different developers, where only the interfaces are exposed for test.
7
• Acceptance Testing: - Acceptance testing can mean one of two things. A smoke test
is used as an acceptance test prior to introducing a build to the main testing process.
Acceptance testing performed by the customer is known as user acceptance
testing (UAT).
• Regression Testing: - Regression testing is any type of software testing that seeks to
uncover software regression. Such regression occurs whenever software functionality
that was previously working correctly stops working as intended.
Typically, regressions occur as an unintended consequence of program changes.
Common methods of regression testing include re-running previously run tests
and checking whether previously fixed faults have re-emerged.
6. SYSTEM SECURITY
Introduction
The protection of computer-based resources that include hardware, software, data, procedures
and people against unauthorized use or natural Disaster is known as System Security. System
Security can be divided into four related issues:
• Security
• Integrity
• Privacy
• Confidentiality
➢ SYSTEM SECURITY refers to the technical innovations and procedures
applied to the hardware and operation systems to protect against deliberate or
accidental damage from a defined threat.
DATA SECURITY is the protection of data from loss, disclosure,
modification and destruction.
➢ SYSTEM INTEGRITY refers to the power functioning of hardware and
programs, appropriate physical security and safety against threats such as
eaves dropping and wiretapping.
➢ PRIVACY defines the rights of the user or organizations to determine
what information they are willing to share with or accept from others and how
the
7
organization can be protected against unwelcome, unfair or
excessive dissemination of information about it.
➢ CONFIDENTIALITY is a special status given to sensitive information in
a database to minimize the possible invasion of privacy. It is an attribute
of information that characterizes its need for protection.
SECURITY IN
SOFTWARE
System security refers to various validations on data in form of checks and controls to avoid
the system from failing. It is always important to ensure that only valid data is entered and
only valid operations are performed on the system. The system employees two types
of checks and controls:
CLIENT-SIDE
VALIDATION
Various client-side validations are used to ensure on the client side that only valid
data is entered. System security refers to various validations on data in form of checks and
controls to avoid the system refers to various validations on data in form of checks and
controls to avoid the system from failing. It is always important to ensure that only valid data
is entered and only valid operations are performed on the system. The system employees two
types of checks and controls:
Client-side validation saves server time and load to handle invalid data.
• JAVA NET BEANS in used to ensure those required fields are filled with
suitable data only. Maximum length of the fields of the forms are appropriately
defined.
• Forms cannot be submitted without filling up the mandatory data so that
manual mistakes of submitting empty fields that are mandatory data so that manual
mistakes of submitting empty fields that are mandatory can be sorted out at the client
side to save the server time and load.
• Tab-indexes are set according to the need and taking into account the ease of
user while working with the system.
7
SERVER-SIDE
VALIDATION
Some checks cannot be applied at client side. Server-side checks are necessary to save the
system from failing and intimating the user that some invalid operation has been performed or
the performed operation is restricted. System security refers to various validations on data in
form of checks and controls to avoid the system from failing. It is always important
to ensure that only valid data is entered and only valid operations are performed on the
system. The system employees two types of checks and controls:
• Server-side constraint has been imposed to check for the validity of primary key and
foreign key. A primary key value cannot be duplicated. Any attempt to duplicate the
primary value results into a message intimating the user about those values through
the forms using foreign key can be updated only of the existing foreign key values.
• User is intimating through appropriate messages about the successful operations
or exceptions occurring at server side.
• Using server-side validation, constraints on several restricted operations are imposed.
7. SYSTEM MAINTANCE
Maintains is the stage of the project when the theoretical design turned into a
working system. System security refers to various validations on data in form of checks and
controls to avoids the system from failing. It is always important to ensure that only
valid data is entered and only valid operations are performed on the system. The system
employees two types of checks and controls:
At this stage the main workload, the up heal and the major impact on the existing practices
shift to user department. If the implementation stage is not carefully planned and controlled, it
can cause chaos. Thus, it can be considered to be the most crucial stage in achieving a new
7
successful system and in giving the users confidence that the users confidence that the new
system will work and be effective.
The implementation view of software requirements presents the real worlds manifestation of
processing functions and information structure. In some cases, a physical representation
is developed as the first step in software design. However, most computer-based
systems are specified in a manner that dictates accommodation of certain implementation
details.
Once the planning has been completed, the major effort in the computer department is
to ensure that the programs in the system are working properly. System security refers
to various validations on data in form of checks and controls to avoid the system from failing.
It is always important to ensure that only valid operations are performed on the system.
The online bookstore can expand its product range to include other media such as
audio books, e-books, and magazines.
7
The system can also incorporate a recommendation engine that suggests books based on a
customer's purchase history.
The system can integrate with social media platforms to allow customers to share
their purchases and reviews with their friends and followers.
The online bookstore can develop a mobile application to allow customers to browse and
purchase books on their smart phones and tablets.
4. Personalization:
The system can incorporate personalization features that allow customers to create wish lists,
save their favourite books, and receive personalized recommendations.
The system can improve the user experience by incorporating features such as one-click
ordering, guest checkout, and real-time inventory update.
The system can integrate with third-party services such as shipping carriers and payment
gateways to streamline the order fulfilment process.
7. Data Analytics:
The system can incorporate data analytics tools to analyse customer behaviour, sales
trends, and inventory levels to optimize the business operations.
7
8. Artificial Intelligence:
In future we are going to add a new function to buy old books from our online book store
These points provide an overview of the potential future scope of an online bookstore project,
including expansion of product range, integration with social media, mobile application
development, personalization and improved user experience, integration with third-party
services, data analytics, and artificial intelligence.
9.CONCLUSION
As at now, the project is considered complete and working efficiently without any problem.
As mentioned above, the project has been hosted and it is being visited by users at
mybooksotre.in. Nevertheless, our concerns are still on the assertion that we need to improve
it a little more due to the fact that it was developed within the period of two
months. Of course, if a lot of time were to be given, then, we would have done something
much better than the current project. Though, we don't mean to say that the project is not
good, but rather should be developed to reach all certain level standards as per the
expectations of the users. This Online Book Store will manage the User’s information
by which User can login and store his/her Favourite books . The system will incorporate
all features of Store system.
It provides the tools for maintaining user’s data to Admin and it count total Overall, project is
very economical and flexible; new features and sub-modules can be added as per user
requirements.
7
10.REFERENCES
1. ASP .NET 4.0 Unleashed-Sam’s
2. Pro .Net Best Practices -lasher
3. ASP.NET tutorial for beginner Rs. (n. d.). Retrieved April 25, 2016, from
Websites:
1. http://asp.happycodings.com/sql/
2. http://www.w3schools.com/aspnet/default.asp
3. https://www.youtube.com/playlist?list=PL6n9fhu94yhXQS_p1i-HLIftB9Y7Vnxlo