KEMBAR78
Project Report | PDF | Software Testing | Use Case
0% found this document useful (0 votes)
53 views79 pages

Project Report

The document is a project report for an 'Online Book Store' submitted by Devendra Gautam to the University of Rajasthan as part of his Bachelor in Computer Application degree. It outlines the project's objectives, feasibility studies, system analysis, design, and testing processes, emphasizing the need for an automated online system for book purchasing. The report also includes acknowledgments, a certificate of originality, and a detailed table of contents covering various aspects of the project.

Uploaded by

gajneshpvt09
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views79 pages

Project Report

The document is a project report for an 'Online Book Store' submitted by Devendra Gautam to the University of Rajasthan as part of his Bachelor in Computer Application degree. It outlines the project's objectives, feasibility studies, system analysis, design, and testing processes, emphasizing the need for an automated online system for book purchasing. The report also includes acknowledgments, a certificate of originality, and a detailed table of contents covering various aspects of the project.

Uploaded by

gajneshpvt09
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 79

PROJECT REPORT ON

“ONLINE BOOK STORE”


Submitted to

University Of Rajasthan, Jaipur


In Partial fulfilment of the requirement

for the award of the degree

of

Bachelor
In

Computer Application

(Session 2021-2024)

Submitted By: Guided By:

Devendra Gautam Mr. Sanjit Bhagat

Rajasthan Swayat Shashan PG Mahavidyalaya

Tonk Road, Jaipur

University of Rajasthan,

Jaipur

1
CERTIFICATE

This is to certify that this report embodies the original work done by Mr. Devendra Gautam

during the project training as a partial fulfilment of the award of the

degree of

BACHELOR IN COMPUTERAPPLICATION

from

Rajasthan SwayatShasanPG Mahavidyalaya,

Jaipur affiliated to

University of Rajasthan Jaipur.

DR. B.M. SHARMA Mr. SANJIT

BHAGAT Principal (Assistant

Professor) RSSM,Jaipur

RSSM,Jaipur

2
ACKNOWLEDGEMENT

I would like to this opportunity in expressing my deepest gratitude to all those persons who in

one way or other helped me in making my endeavours a success. No words can reflect my

thankfulness and respect towards these people for their significant contribution in the completion of

this project.

First of all, we would like to acknowledge and thank our subject teacher ‘Mr. Sanjit Bhagat’of

computer faculty of RSSM, Jaipur for giving us an interesting topic to work on.

We therefore thank in particular to everyone who has helped us helped us build this project but we

would like to apologize in advance for my omission which may have inadvertently crept in.

-Thank you

Devendra Gautam

3
PREFACE
This basis for this research originally stemmed from my passion for developing better methods of

data storage and preservation. As the world moves further into the digital age, generating

vast amounts of data and born digital content, there will be a greater need to access legacy

materials created with outdated technology.

How will we access this content? It is my passion to not only find out, but to develop tools to break

down barriers of accessibility for future generations. In truth, I could not have achieved my current

level of success without a strong support group.

First of all, my parents, who supported me with love and understanding, and secondly, my committee

members, each of whom has provided patient advice and guidance throughout the research process.

Thank you all for your unwavering support.

4
TOPIC Page No.
1. INTRODUCTION 6-9

1.1 Objective of the project

1.2 Scope of the project


1.3 Problem Definition

2. FEASIBILITY STUDY 9-11

2.1 Technical feasibility


2.2 Economic feasibility

2.3 Operational feasibility


3. SYSTEM ANALYSIS 11-26

3.1 Flow chart


3.2 Entity relationship diagram

3.3 Data flow diagram

3.4 Unified modeling language


3.5 System Requirements and Specification
4. SYSTEM DESIGN 26-71

5. SYSTEM TESTING 72-73

6. SYSTEM SECURITY 73-75

7. SYSTEM MAINTENANCE 75-76

8. FUTURE SCOPE OF THE PROJECT 76-78

9. CONCLUSION 78-79

10.REFERNCE 79

5
1. INTRODUCTION
“ONLINE BOOK STORE” is an online book store technique. There is a database that is maintained
in which all the names of users with complete information Are stored.

In “ONLINE BOOK STORE” a user can use his/her store right online without any difficulty. He/she
has to register first for him/her to use.

People seeking registration are expected to contact the system administrator to submit their details.
Submitted with those in existing databases such as those as the Registrar of Persons, the people are
then registered as a User.

After registration, the User is assigned a secret User ID with which he/she can use to log into the
system and enjoy services provided by a system such as Store. If invalid/wrong details are submitted,
then the people are not allowed to login in Store.

1.1 OBJECTIVE
➢ Reviewing the existing/current login process.
➢ Coming up with an automated/online system.
➢ Implementing a an automated/online store system.
➢ Validating the system to ensure that only eligible Users are allowed to use Store.

1.2 SCOPE
➢ Secured login procedure.
➢ Providedifferent category books.
➢ Profiles can be modified.
➢ User can post their vision.
➢ Store is possible only with successful login of user.
➢ Inspection is performed on both user and admin.
➢ Suspected user can be reported against.
➢ Abused users can be verified and blocked if necessary.
➢ The scope of the project is that it will use the ID and password created by
user to register him/her in the store site, through this all the details of user are saved
database

6
1.3 PROBLEM DEFINITION

1.3.1 SYSTEM STUDY

Online Book Store (OBS) also known as Store Website In which the user can use many types of
facilities, he or she can login into all types of devices through it. In online store, the user is given the
option of e-cart in which he or she can save the books of his/her choice. Online store site can work on
both private and public networks. In this, administrator can add new books and can also
make changes in them.

Online store is an electronic way of choosing her favourite a web driven application. Buying books
online is convenient and cost-effective way to add to your personal library with the growing number
of online bookstores, readers can find millions of books, both new and used, at discounted prices. In
this article, we will be looking at potential cost savings and deals that you can take
advantage of when buying books online

There is some Ways to define online store

• Comparison Store -- One of the main advantages of buying books online is the
ability to compare prices and availability across different retailers. This allows you to
find the best deals and save money. Many online bookstores also offer free shipping, which
further adds to the cost savings
• Used Books – Buying used books is another great way to save money. Many online retailers
offer used books for a fraction of the books many vary, you can find a great deal on a book
that is just as a good as a new one.
• Deals And Discounts – Online bookstores often offer deals and discounts on books. These
can range from percentage off discounts to buy one get one free deal. Many bookstores also
offer loyalty programs and coupons to their customers.
• Bulk Purchases – If you are a frequent reader, buying books in bulk can save you a lot of
money. Many online bookstores offer discounts on bulk purchases which can add up
to significant savings

7
• 1.3.2 EXISTING SYSTEM WITH LIMITATION
➢ Low Reliability
➢ Poor security
➢ High costs
➢ Queueing
➢ Time factor was the greatest barrier to the successful completion of this exercise since it had to
be done within the semester.
➢ I also had financial constraints since all the activities involved were self-sponsored.

1.3.3SOLUTION OF PROBLEMS

➢ The system makes the overall project management much easier and flexible.
➢ There is no risk of data mismanagement at any level while the project development is under
process.
➢ It provides high level of security with different level of authentication.
➢ Users from any part of the world can make use of the system.
➢ New system will process accurate results.
➢ New system will be much better in performance as compared to existing one

1.3.4 PROPOSED SYSTEM WITH OBJECTIVES

➢ Project is related to online Bookstore system.


➢ The project maintains two levels of users: -
• Admin Level
• User Level
➢ Main facilities available in this project are: -
▪ Maintaining user’s identification.
▪ Providing online store management.
▪ Providing updating of user’s information.
▪ Provide user information to SYSTEM ADMINISTRACTOR.
▪ SYSTEM ADMINISTRACTOR maintains the Complete information of user.
▪ User can purchasebooks from any part of India.

8
1.3.5 SIGNIFICANCE OF THE PROJECT

The main purposes of OBS include:

➢ Provision of improved store services to the users through fast, timely and convenient online
store.
➢ Reduction of the costs of books during store time by playing the very many clerks employed
for the sake of the success of the manual system.
➢ Check to ensure that the users that are signed in are the only ones to allow buying. Fake users
are not allowed to buy
➢ Online book store (OBS) will require being very precise or cost cutting to produce an
effective election management system.

Therefore, crucial points that this (OBS) emphasizes on are listed below.

➢ Require a smaller number of staffs during the online shopping.


➢ This system is a lot easier to independently moderate the online store and subsequently
reinforce its transparency and fairness.
➢ Less capital, less effort, and less labour intensive, as the primary cost and effort will
focus primarily on creating, managing, and running a secure online portal.
➢ Increased number of users as individual will find it easier and more convenient to store,
especially those abroad.

2. FEASIBILITY STUDY

“FEASIBILITY STUDY” is a test of system according to its works ability, impact of


the organization, ability to meet needs and effective use of the resources. Feasibility Study is
conducted once the problem is clearly understood. It is a high-level version of the entire system
analysis and design process. The objective is to determine quickly at a minimum expense if the
problem is worth solving.

The system has been tested for the feasibility in the following points:

1. Technical Feasibility
2. Economic Feasibility
3. Operational Feasibility

9
1. Technical Feasibility-: A study of resource availability that may affect the ability to achieve an
acceptable system. This evaluation determines whether the technology needed for the proposed
existing system is available or not. Can the work for the project be done with current
equipment existing software technology and available personnel? If new technology is needed,
what is the likelihood that it can be developed?

This is concerned with specifying equipment and software that will successfully satisfy the
user requirement. The technical needs of the system may include:

Front-end and Back-end selection:

An important issue for the development of a project is the selection of suitable front-end and back-
end. When we decided to develop the project, we went through an extensive study to determine the
most suitable platform that suits the need of the Organization as well as helps in development of the
project.

2.Economic Feasibility-: Economic justification is generally the "Bottom Line “consideration for the
most system. Economic justification includes a broad range of concerns that includes cost
benefit analysis. In this weight the cost and the benefits associated with the candidate system and if it
suits the basis purpose of the organization i.e.., profit making, the project is making to the analysis
and design phase.

The financial and the economic questions during the preliminary investigation are verified to estimate
the following:

The cost to conduct a full system investigation.

The cost of hardware and software for the class application being considered.

The benefits in the form of reduced cost.

The proposed system will isethionate information, as a result the performance is improved which is
turn may be expected to provide increased profits.

The feasibility checks whether the system can be developed with the available funds. The Hospital
management System does not require enormous amount of money to be developed. This can be done
economically if planned judicially, so it is economically feasible. The cost of project depends upon
the number of man hours required.

1
3.Operational Feasibility -: It is mainly related to human organizations and political aspects. The
points to be considered are:

What changes Will be brought with the system?

What organizations structured are disturbed?

What new skills will be required? Do the existing staff members have these skills?

If not, can they be trained in due course of time?

The system is operationally feasible as it very easy for the End Users to operate it.

It only needs basic information about Windows platform.

3. SYSTEM ANALYSIS
After analysing the requirements of the task to be performed, the next step is to analyse the problem
and understand its context. The first activity in the phase is studying the existing system and other is
to understand the requirements and domain of the new system. Both the activities are equally
important, but the first activity serves as a basis of giving the functional specifications and
then successful design of the proposed system. Understanding the properties and requirements of a
new system is more difficult and requires creative thinking and understanding of existing running
system is also difficult, improper understanding of present system can lead diversion from solution.

Model Analysis

This document plays a vital role in the development of life cycle (SDLC) as it describes the complete
requirement of the system. It means for use by developers and will be the basic during testing phase.
Any changes made to the requirements in the future will have to go through formal change approval
process.

WATER FALL MODEL was being chosen because all requirements were known before hand and the
objective of our software development is the computerization/automation of an already
existing manual working system.

1
WATERFALL MODEL

12
3.1 Flow Chart

A flowchart is a graphical representation of a process. Each step-in process. Each step in the process
is represents by a different symbol and contains a short description of the process step. The flowchart
is linked with arrows showing the process flow direction.

Symbols used in Flowchart

Start and End

Flow of data

Process

Conditions

Input/output

1
3.2 Entity Relationship Diagram:- An entity-relationship diagram (ERD) is a data modelling
technique that graphically illustrates an information system’s entities and the relationships between
those entities. An ERD is a conceptual and representational model of data used to represent the entity
framework infrastructure.

The elements of an ERD are:

• Entities
• Relationships
• Attributes

1
AdminId Password

Perform

Admin
Email Add Book ViewProduct

Password
Sell
Delete Edit

Login Perform
User

ViewDetails

ViewBook Contact About Feedback

Purchase
Register
Name DOB Gender

Mobile
Registration

Email

Address Conform
Password
Password

1
Steps involved in creating an ERD include:

• Identifying and defining the entities


• Determining all interactions between the entities
• Analysing the name of interactions/determining the cardinality of the relationships.

3.3 Data Flow Diagram

Data Flow Diagram: - Data Flow Diagram is a graphical representation of flow of data throughout
the information system. Data Flow Diagram illustrate how data is processed by a system in terms of
inputs and outputs.

Name Notation Role:

Process: - Transform incoming data flow to output data flow.

Data Store: - Repositories od data in the system.

Dataflow: - Are pipelines through which packets of information flow.

External Entity: - External entities are object outside the system, with which the
system communicates.

Name Notation Role

Process Transforms I/P data flow


to

O/P

Data Store Repositories of

Data in the system

1
Dataflow

Pipelines through Dataflow are which

Packets of information flow

External Entity External entities are the

Objects outside System,

With which the system

User
Management

Book Order
Management Management
Online
Book
Payment System Admin
Store
Management Management

Login
Management

Zero Level DFD Online Book Store

1
Book Generate
Management Book Report

User Generate

Management User Report

Order Generate
Management Order Report
Online
Book
Store Generate
Book Store
Book Stock Report
Management

Check
Login
Admin Login Details
Management

System Admin Generate


Management System Admin Report

First Level DFD Online Book Store

1
Login
System Admin
To
System

Manage Book Details


Check
Credentials Manage User Details

Manage Book Stock Detail

Manage Order Details

Check Roles
Manage Payment Details
Of Access

Manage Delivery Details

Manage Report

Manage Admin Permission


Manage
Modules
Manage Roles of Admin

Manage System Admin

Second Level DFD Online Book Store

1
3.4 Unified Modelling Language (UML)

To create a UML diagram for an online book store, you can include various diagrams like
class diagram, use case diagram, sequence diagram, collaboration diagram, state chart diagram,
activity diagram, component diagrams, and deployment diagram. Here are some key resources that
provide insights into these UML diagrams for an online bookshop:

Here we define two types of UML diagram according to our project

➢ Class Diagram:
In software engineering, a class diagram in the Unified Modelling Language
(UML) is a type of static structure diagram that describes the structure of a
system by showing the system's classes, their attributes, operations(or
methods),and there lation ships among the classes. It explains which class
contains information

Admin User

+email
+AdminId +password
+password
+register()
+login() +login()
+AddnewBooks() +viewprofile()
+Edit/Updatebooks() +viewbooks()
+viewrusers() +selectbooks()
+viewbooks() +Contact()
+logout() +Feedback()
+payment()
+logout()

2
➢ Use Case Diagram:-
A use case diagram in the Unified Modeling Language (UML) is a type of behavioral
diagram defined by and created from a Use-case analysis. Its purpose is to present a
graphical overview of the functionality provided by a system in terms of actors, their
goals (represented as use cases), and any dependencies between those use cases. The
main purpose of a use case diagram is to show what system functions are performed
for which actor. Roles of the actors in the system can be depicted.

Registe
r

Login

viewprofile

viewbooks

Use selectboo
r k

Contact Us

Feedback

payment

logout

2
Login

Add New
Books

Edit/Delete

Admin

View Users

View Books

logout

2
These UML diagrams collectively provide a comprehensive view of an online book
store system's structure, behaviour, interactions, and deployment aspects. By
incorporating these different types of diagrams, you can effectively model and understand the
complexities of an online bookshop system.

3.5 SYSTEM REQUIREMENTS AND SPECIFICATIONS

Product Definition
The project's main goal is to develop an online book store where users can search for and
make purchases of books based on title, author, and subject. The user's chosen books
are displayed in a tabular format, and they can order them online using a debit card or credit
card. Instead of going to a bookstore and wasting time, the user can purchase a book
on this website. Many online book retailers. I'd like to create a comparable website
with.NET and SQL Server. An online book store is a web application that allows customers to
buy books online. Customers can search for a book by title or author using a web browser,
add it to their shopping cart, and then purchase it using a debit or credit card transaction. The
user can log in using his or her account information, or new customers can swiftly create an
account. They should include their full name, phone number, and shipping address. A user
can also provide feedback to a book by rating it on a scale of one to five. The books are
organized into several categories based on the subject matter, such as Action and
Adventure, Classics, Fantasy, Fiction, Non-fiction, Horror etc. Customers can shop
online for books at the Online Book Store using a web browser. A customer can create an
account, sign in, add items to a shopping cart, and make purchases using his or her
debit/credit card information. When compared to a regular user, the Administrator will have
more features. The Administrator can add, delete, and edit book data, and member
information, as well as confirm an order that has been placed. The Online Book Store is
built using the Master page, data sets, data grids, and user controls

2
Software and Hardware requirements
This brings us into understanding the entire system requirement analysis. During a
system development process, a blueprint of system's requirements will be created to
describe the following:
➢ User Requirements
a. The ability to accept orders over the internet.
b. Maintain a list of accounts for customers.
c. Provide the ability to search the master book catalogue.
d. Provide a number of search methods on that catalogue, including search by author,
search by title, search by ISBN number, and search by keyword.
e. Provide a secure means of allowing customers to pay by credit card.
f. Provide a secure means of allowing customers to pay via purchase order.
g. Provide a special kind of account that is preauthorized to pay via purchase order.
h. Provide electronic links between the web and database and the shipping fulfilment
system.
i. Maintain reviews of books, and allow anyone to upload review comments.
j. The system should run properly on all browsers.

➢ Functional Requirements
Functional requirements for an online bookstore can include various features
and functions that the system must perform. Based on the provided search results,
the functional requirements for an online bookstore can be summarized as follows:

a. Inventory Management:
1. Maintain data associated with the inventory, including the title, author, price, and
stock/quantity of each book.
2. Allow the manager to specify a stop-order for a book and update stock
quantities.
3. Notify the manager when books need to be reordered.

b. Customer Management:

2
1. Maintain records for customers, who can be either members or non-members,
with specific details such as a unique username, password, email address, and
postal address.
2. Allow customers and managers to log in and out of the system.

c. Order Processing:

1. Accept orders over the Internet.


2. Provide a secure means of allowing customers to pay by credit card or
via purchase order.
3. Maintain reviews of books and allow anyone to upload review comments.

d. User Interface:

1. Display available books in ascending alphabetical order by title, listing the title,
author, and price for each book.
2. Provide a search feature for users to search content/items by entering a query in
the search bar.

➢ Non-Functional Requirements.
Non-functional requirements for an online bookstore can be organized into several
categories:

a. Performance

1. Response times should meet expectations during peak traffic periods.


2. Scalability to handle increased load without degrading performance.
3. Efficient searching and filtering capabilities within large databases.

b. Security

1. Secure transmission of sensitive data, such as payment information and personal


details.

2
2. Authentication mechanisms to ensure authorized access to user accounts.
3. Encryption of data at rest and in transit.

c. Usability

1. Intuitive navigation throughout the site.


2. Clear and concise display of product information.
3. Accessibility compliance for individuals with disabilities.

d. Availability

1. High uptime percentage to minimize downtimes.


2. Redundancy measures to prevent single point failures.
3. Backups and disaster recovery plans.

e. Maintainability

1. Modular design for easy maintenance and updates.


2. Code documentation and commenting standards.
3. Regular testing procedures.

➢ Specific Requirements
• Hardware Requirements:
1. CPU: Intel CORE i3 7th Gen
2. Memory: 4.00GB
3. Processor: Intel(R) Core (TM) i3-7100U CPU @2.40GHz 2.40 GHz
• Software Requirements:
1. Windows 10 Professional (64 bit).
2. Development Language: Visual Studio 2013
3. Database: SQL Server 2012 or above
4. Framework: 4.0 or above

2
4. SYSTEM DESIGN
4.1. Design
The design of an online bookstore system involves the architectural approach,
technology stack, data model, user interface, external interactions, functionality, security
measures, confidence in data, ease of maintenance, and scalability. This includes
developing a web- based system from scratch, utilizing design patterns and frameworks
such as Model-View- Controller (MVC) and Struts, and employing technologies like Java
Enterprise Edition (JEE), JavaScript Platform Standard Tag Library (JSTL), and hibernate for
database mapping. The system should manage data associated with books, customers,
and transactions, provide a user-friendly interface for browsing books and completing
transactions, and connect with external systems such as a credit/debit card processing
service. Security measures should be implemented to protect sensitive data, and the
system should be designed for ease of maintenance and future scalability.

a. The design architecture for the system


b. Making a desirable hardware and software selection
c. Designing input and output flow
d. Converting raw data into a physical model
e. Converting desired processes and actions into codes.
Amongst many other things, the design phase also includes how the system interacts with
other sub-systems, components and units. So, in this project we use the following tools for the
design of our system:
a. Microsoft Visual Studio 2013
b. Microsoft SQL Server 2012
c. Microsoft Internet Information Services (IIS) Express
d. C# language library
Java scripting language library

2
SCREENSHOTS

28
29
3
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
5. TESTING
The completion of a system will be achieved only after it has been thoroughly tested. Though
this gives a feel the project is completed, there cannot be any project without going through
this stage. Hence in this stage it is decided whether the project can undergo the real
time environment execution without any break downs, therefore a package can be rejected
even at this stage.

Testing Methods

Software testing methods are traditionally divided into black box testing and white
box testing. These two approaches are used to describe the point of view that a test engineer
takes when designing test cases.

• Black Box Testing: - Black box testing treats the software as a “black box”, without
any knowledge of internal implementation. Black box testing methods include:
equivalence partitioning, boundary value analysis, all-pairs testing, fuzz testing,
model-based testing, traceability matrix, exploratory testing and specification-
based testing.

• White Box Testing: - White box testing, by contrast to black box testing, is when the
tester has access to the internal data structures and algorithms (and the code
that implement these). White box testing methods can also be used to evaluate
the completeness of a test suite that was created with black box methods. This allows
the software team to examine parts of a system that are rarely tested and ensures that
most important function points have been tested.

• Grey Box Testing: - Grey box testing involves having access to internal data
structure and algorithms for purposes of designing the test cases, but testing at
the user, or black-box level. Manipulating input data and formatting output do not
qualify as “grey box”, because the input and output are clearly outside of the “black-
box” that we are calling the system under test. This distinction is particularly
important when conducting integration testing between two modules of code written
by two different developers, where only the interfaces are exposed for test.

7
• Acceptance Testing: - Acceptance testing can mean one of two things. A smoke test
is used as an acceptance test prior to introducing a build to the main testing process.
Acceptance testing performed by the customer is known as user acceptance
testing (UAT).

• Regression Testing: - Regression testing is any type of software testing that seeks to
uncover software regression. Such regression occurs whenever software functionality
that was previously working correctly stops working as intended.
Typically, regressions occur as an unintended consequence of program changes.
Common methods of regression testing include re-running previously run tests
and checking whether previously fixed faults have re-emerged.

6. SYSTEM SECURITY
Introduction

The protection of computer-based resources that include hardware, software, data, procedures
and people against unauthorized use or natural Disaster is known as System Security. System
Security can be divided into four related issues:

• Security
• Integrity
• Privacy
• Confidentiality
➢ SYSTEM SECURITY refers to the technical innovations and procedures
applied to the hardware and operation systems to protect against deliberate or
accidental damage from a defined threat.
DATA SECURITY is the protection of data from loss, disclosure,
modification and destruction.
➢ SYSTEM INTEGRITY refers to the power functioning of hardware and
programs, appropriate physical security and safety against threats such as
eaves dropping and wiretapping.
➢ PRIVACY defines the rights of the user or organizations to determine
what information they are willing to share with or accept from others and how
the

7
organization can be protected against unwelcome, unfair or
excessive dissemination of information about it.
➢ CONFIDENTIALITY is a special status given to sensitive information in
a database to minimize the possible invasion of privacy. It is an attribute
of information that characterizes its need for protection.

SECURITY IN
SOFTWARE

System security refers to various validations on data in form of checks and controls to avoid
the system from failing. It is always important to ensure that only valid data is entered and
only valid operations are performed on the system. The system employees two types
of checks and controls:

CLIENT-SIDE
VALIDATION

Various client-side validations are used to ensure on the client side that only valid
data is entered. System security refers to various validations on data in form of checks and
controls to avoid the system refers to various validations on data in form of checks and
controls to avoid the system from failing. It is always important to ensure that only valid data
is entered and only valid operations are performed on the system. The system employees two
types of checks and controls:

Client-side validation saves server time and load to handle invalid data.

Some checks imposed are:

• JAVA NET BEANS in used to ensure those required fields are filled with
suitable data only. Maximum length of the fields of the forms are appropriately
defined.
• Forms cannot be submitted without filling up the mandatory data so that
manual mistakes of submitting empty fields that are mandatory data so that manual
mistakes of submitting empty fields that are mandatory can be sorted out at the client
side to save the server time and load.
• Tab-indexes are set according to the need and taking into account the ease of
user while working with the system.
7
SERVER-SIDE
VALIDATION

Some checks cannot be applied at client side. Server-side checks are necessary to save the
system from failing and intimating the user that some invalid operation has been performed or
the performed operation is restricted. System security refers to various validations on data in
form of checks and controls to avoid the system from failing. It is always important
to ensure that only valid data is entered and only valid operations are performed on the
system. The system employees two types of checks and controls:

Some of the server-side checks imposed is:

• Server-side constraint has been imposed to check for the validity of primary key and
foreign key. A primary key value cannot be duplicated. Any attempt to duplicate the
primary value results into a message intimating the user about those values through
the forms using foreign key can be updated only of the existing foreign key values.
• User is intimating through appropriate messages about the successful operations
or exceptions occurring at server side.
• Using server-side validation, constraints on several restricted operations are imposed.

7. SYSTEM MAINTANCE
Maintains is the stage of the project when the theoretical design turned into a
working system. System security refers to various validations on data in form of checks and
controls to avoids the system from failing. It is always important to ensure that only
valid data is entered and only valid operations are performed on the system. The system
employees two types of checks and controls:

At this stage the main workload, the up heal and the major impact on the existing practices
shift to user department. If the implementation stage is not carefully planned and controlled, it
can cause chaos. Thus, it can be considered to be the most crucial stage in achieving a new

7
successful system and in giving the users confidence that the users confidence that the new
system will work and be effective.

The implementation view of software requirements presents the real worlds manifestation of
processing functions and information structure. In some cases, a physical representation
is developed as the first step in software design. However, most computer-based
systems are specified in a manner that dictates accommodation of certain implementation
details.

Implementation involves careful planning, investigation of current system and constraints on


implementation, design of methods to achieve the changeover, training of staff in the
changeover procedures and evaluation of changeover methods. The first task is
the implementation planning i.e. deciding the methods and time scale to be adopted.

Once the planning has been completed, the major effort in the computer department is
to ensure that the programs in the system are working properly. System security refers
to various validations on data in form of checks and controls to avoid the system from failing.
It is always important to ensure that only valid operations are performed on the system.

The main step of implementation includes:

1. Installing client machine.


2. Installing the software in the client machine.
3. Training the operational staff.

8. FUTURE SCOPE OF PROJECT


Well, the future of this project lies in the hand of our users. The future scope of an online
bookstore project includes several aspects, as outlined in the provided search results. These
include:

1. Expansion of Product Range:

The online bookstore can expand its product range to include other media such as
audio books, e-books, and magazines.

7
The system can also incorporate a recommendation engine that suggests books based on a
customer's purchase history.

2. Integration with Social Media:

The system can integrate with social media platforms to allow customers to share
their purchases and reviews with their friends and followers.

3. Mobile Application Development:

The online bookstore can develop a mobile application to allow customers to browse and
purchase books on their smart phones and tablets.

4. Personalization:

The system can incorporate personalization features that allow customers to create wish lists,
save their favourite books, and receive personalized recommendations.

5. Improved User Experience:

The system can improve the user experience by incorporating features such as one-click
ordering, guest checkout, and real-time inventory update.

6. Integration with Third-Party Services:

The system can integrate with third-party services such as shipping carriers and payment
gateways to streamline the order fulfilment process.

7. Data Analytics:

The system can incorporate data analytics tools to analyse customer behaviour, sales
trends, and inventory levels to optimize the business operations.

7
8. Artificial Intelligence:

The system can incorporate artificial intelligence (AI) technologies such as


natural language processing (NLP) and machine learning (ML) to improve search
results, recommendations, and customer service.

9. Adding Used Books Function:

In future we are going to add a new function to buy old books from our online book store

These points provide an overview of the potential future scope of an online bookstore project,
including expansion of product range, integration with social media, mobile application
development, personalization and improved user experience, integration with third-party
services, data analytics, and artificial intelligence.

9.CONCLUSION
As at now, the project is considered complete and working efficiently without any problem.
As mentioned above, the project has been hosted and it is being visited by users at
mybooksotre.in. Nevertheless, our concerns are still on the assertion that we need to improve
it a little more due to the fact that it was developed within the period of two
months. Of course, if a lot of time were to be given, then, we would have done something
much better than the current project. Though, we don't mean to say that the project is not
good, but rather should be developed to reach all certain level standards as per the
expectations of the users. This Online Book Store will manage the User’s information
by which User can login and store his/her Favourite books . The system will incorporate
all features of Store system.

It provides the tools for maintaining user’s data to Admin and it count total Overall, project is
very economical and flexible; new features and sub-modules can be added as per user
requirements.

7
10.REFERENCES
1. ASP .NET 4.0 Unleashed-Sam’s
2. Pro .Net Best Practices -lasher
3. ASP.NET tutorial for beginner Rs. (n. d.). Retrieved April 25, 2016, from

Websites:

1. http://asp.happycodings.com/sql/
2. http://www.w3schools.com/aspnet/default.asp
3. https://www.youtube.com/playlist?list=PL6n9fhu94yhXQS_p1i-HLIftB9Y7Vnxlo

You might also like