+ All Categories
Home > Documents > DDTS Certificate

DDTS Certificate

Date post: 30-May-2018
Category:
Upload: ameenlaserkhan
View: 219 times
Download: 0 times
Share this document with a friend

of 52

Transcript
  • 8/9/2019 DDTS Certificate

    1/52

    ABSTRACT

    This project work deals with ONLINE GARMENT ADVETISING. This

    project developed by using PHP as front end and MYSQL as a back-end. These project

    aims at saving time and improving of the various modules that were involved .

    The modules involves in this project are:

    o Administrator

    o Men

    o Women

    o Kids

    o Accessories.

    The need for computerization was to make advertise for a garment

    company to attract world wide customers.This also helps in the elimination of clerical

    error, which is naturally due to huge volume of work.

    1

  • 8/9/2019 DDTS Certificate

    2/52

    1. INTRODUCTION

    The Online garment advertising is a large web project executed for an American

    garment company. The project consists of various modules like admin and price

    knowing. The team of programmers employed to undertake this module consists of three

    Component Developers, a Photoshop designer and one Relational Database

    Administrator. The component developers are responsible for creating/deploying all

    COM components using PHP or Hypertext Preprocessor software as well as creating the

    HTML pages using the Dreamweaver components. The DBA is responsible for

    maintaining and troubleshooting all database-related issues like privilege control,

    granting access to network users and internet users, maintaining security logs,

    supervising inter-server database connectivity, administering the Web Server and

    controlling access to the Web Server (IIS machine).

    The Online garment advertising module mainly deals with advertising products

    through the internet. Products like Mens wear, Womens wear, kids wear & accessories

    are advertised in the site. The web application will retrieve product information from the

    database and display it required number of items per page, with images, pricing

    information . Users will sign into the website with a userid and password. They can

    choose the required model and color of their choice. They will choose the product of their

    choice and know their price details

    2

  • 8/9/2019 DDTS Certificate

    3/52

    1.1 Problem Definition

    The Online garment advertising is one of the web page development project. Themain aim of this project is to make a business through online all over the world by sitting

    in one place. This web page is developed for the American garment company. They

    decided to market their product all over the world. Through online they will give theadvertisement for their product and make the customers to purchase it. The company

    contains apparels for mens, womens, kids wears etc...

    The client side was designed in attractive and interactive manner. When the customer

    open the website the Homepage will be displayed. In home page there will be a sign inoption for a registered user. The new user can also register by registration option in thepage. The guest is also allowed to view the web site without registration but he cant

    view any price details of products without registration. He is allowed only to surf

    through the website. The links to the other pages are available in the home page.

    The Homepage has a link to categories of a product displayed in it. For each productavailable in the Homepage has different categories and it also has different products. This

    products and categories are fetched from the database. They are stored in database by the

    administrator. The products which are available in the store are inserted in the database.

    This website gives information to the user on a wide vision .The user can see the

    various models available for various persons by simply select the model.The end useralso know the various colours available in the model by right side colour menu.The

    registered user can also know the price of various models according to their register

    information.The two types of end users are ASI/PPAI or RETAILER.The websiteretrieve data about the price according to the end user category .

    The admin section is used by the administrator for adding product details in the

    database. It is maintained by the administrator only. The administrator has the separateuserid and password, so no one can enter in to the admin section. The administrator will

    add the product prices

    3

  • 8/9/2019 DDTS Certificate

    4/52

    1.2Company Profile

    History

    Experience counts more than anything else in the offshore outsourced health care

    services market" say our numerous clients. And it is our steadfast commitment backedby our years of experience in Offshore Outsourcing that has helped them reap rich

    dividends. Nittany is now the largest provider of offshore outsourced services in the

    medical billing and collections service space. We understand the rules of the billing andcollections business across geographies and medical specialties, and are constantly fine-

    tuning our systems, processes and people to stay on top of our accounts. We understand

    that, as part of your providers' revenue cycle our role must extend well beyond meremanpower arbitrage. Fast turnaround times, high quality levels, constant innovation must

    all come together to ensure that your practise makes More Money Faster. Something onour

    Product and Services

    CLAIM ADMINISTRATION SERVICES Track record: Pioneer in third-partyclaim administration services Adjudicated both employer based insurance plans and

    commercial schemes in the US Provided administration services for plans across multiple

    states in the US Services: Claim processing Stop Loss Management Customer ServicesNetwork Management File Management Information Services Speciality: We provide

    adjudication services on all third party or proprietary platforms. Clients can also choose

    to offer adjudication services on our in-house software package. The software is builtaround a rule-based engine that can be customized to suit the regulations of different riskcarriers and their products. It also enables knowledge-based edits and extensive reporting

    systems to track provider contracts and claim histories. The software has extensive

    reporting features and supports all federal and state reporting as well. Special features ofthe software include flexible fee schedule setup, automated EOB design and extensive

    security against data abuse through audit trails and restricted access provisions .

    Other Information

    Nittany Outsourcing Services Pvt Ltd, 141 Old Mahabalipuram Road,

    Kottivakam, Chennai 600041 INDIA. Phone : 91-44-24541581 Fax : 91-44-24540867

    4

  • 8/9/2019 DDTS Certificate

    5/52

    2. PROJECT DESCRIPTION

    The project entitled Online garment advertising is one of the web application

    projects. The main aim of this project is to enable the customer to know the variousmodels available in the garments through online.

    The following are the modules of the project. It has two sections of modules in aproject.

    1. Admin section

    2. Client section

    Project Modules:

    Admin section:

    The admin section is used by the administrator of this website. He willmaintain it by the use of following modules.

    Admin login:

    Admin login module is used by administrator to login to the admin section

    of website. He will register with a name and password for logging in. After the

    registration completed he will be provided with the userid and password. It will behis id and password. He is given the id and password for the protection and

    maintenance of the website. He is responsible for the errors and non availability

    of products in the store.

    Price Details:

    Price details is the main module in the admin section. In this section theadministrator will add the price of products available in the garment. There aretwo sections available in the price module. They are for retailers and whole salers.

    5

  • 8/9/2019 DDTS Certificate

    6/52

    Client section:

    The client section is used by the clients whose browse this website. They

    will browse through the modules available in this section. The modules a

    1. Men;

    Gkwc 6ukIn this men module we can have lot of models for menswear.And we have lot of colours in every model.The available colours in every

    model is in the right hand side.When the client move the mouse over the various

    colours the available model are also change in the appropriate colour.The

    customer download the product and model for their various usages.

    2. Women:

    In this women module we can have lot of models for womens wear.And

    we have lot of colours in every model.The available colours in every model is in

    the right hand side.When the client move the mouse over the various colours theavailable model are also change in the appropriate colour.The customer download

    the product and model for their various usages.

    3. Kids:

    In this kids module we can have lot of models for kids wear.And we have

    lot of colours in every model.The available colours in every model is in the righthand side.When the client move the mouse over the various colours the available

    model are also change in the appropriate colour.The customer download the

    product and model for various usages.

    4.Accessories:

    In this accessories module we can have lot of models like bags,caps and

    blankets..And we have lot of colours in every model.The available colours in

    every model is in the right hand side. available model are also change in theappropriate colour.The customer download the product and model for various

    usages.

    6

  • 8/9/2019 DDTS Certificate

    7/52

    3. SYSTEM ANALYSIS

    System Analysis is an activity that encompasses of the tasks that are collectivelycalled Computer System Engineering. Data are collected to be used in the complete

    system further for the decision-making. The basic requirements are checked out

    according to the given subject. The emphasis is on identifying what is needed from the

    system, not how the system will achieve its goals. Thus in the system analysis part it isthat the complete working moves from the logical to the physical aspect of the complete

    life cycle.

    System analysis refers to the process examining the situation of an organization

    with theview of improving it through better procedures and methods. It is a process of

    gathering and interpreting facts, diagnosing problems, and using the information torecommend improvements to the system.

    3.1 Requirement Analysis

    Analysis gathers the requirements for the system. This stage includes a detailed

    study of the business needs of the organization. Options for changing the business

    process may be considered. Design focuses on high level design like, what programs are

    needed and how are they going to interact, low-level design (how the individual programs

    are going to work), interface design (what are the interfaces going to look like) and data

    design (what data will be required). During these phases, the software's overall structure

    is defined. Analysis and Design are very crucial in the whole development cycle. Any

    glitch in the design phase could be very expensive to solve in the later stage of the

    software development. Much care is taken during this phase. The logical system of the

    product is developed in this phase.

    7

  • 8/9/2019 DDTS Certificate

    8/52

    In this phase, the development team visits the studies their official requirements.

    They investigate the need for possible software automation in the given system. By the

    end of the feasibility study, the team furnishes a document that holds the different

    specific recommendations for the candidate system. It also includes the personnel

    assignments, costs, project schedule, and target dates. The requirements gathering process

    is intensified and focused specially on software. To understand the nature of the

    program(s) to be built, the system engineer ("analyst") must understand the information

    domain for the software, as well as required function, behavior, performance and

    interfacing. The essential purpose of this phase is to find the need and to define the

    problem that needs to be solved.

    Requirement analysis is one of the first and foremost part of system developmentlife cycle. It is very important too as company has to prove the feasibility of proposed

    system.

    Project Preliminary Investigation

    A request to receive requirements from user can be made for many site, in anycase user can enter the daily discharge. The data will save correctly is the preliminary

    investigation.

    Determination of the System Requirement:

    At the heart of the system analysis is a detailed understanding of all-important

    facts of the project which are under investigation. Analyst, working closely with theclient and user, must study the projects requirement to answer these key questions-

    1. What is being done2. How is being do

    3. How frequently does it occur?

    8

  • 8/9/2019 DDTS Certificate

    9/52

    3.1 Existing System:

    This system is what we have at present? Using this system we have to make our

    proposed system. Before designing we must know about our current system. What is its

    scope and if it has some limitations, then we must describe them in details. So that user

    can understand each and every thing in detail. In this project the current system is done

    manually and the marketing is done with in a country only.

    In the fastly growing world because of globalisation and computerization the

    world market become very small.Every company want the very popular advertising

    media.Which Cover and reach the world wide customers.The existing system are

    newspapers and television.The advertisements are reach to the small region of peoples.In

    existing system the customers canot see the all models and colours available in the

    company.

    And the customers canot know what are the offeref for whole buyers and retail

    buyers in the existing system.The main brawback of the existing systen is time

    consuming.And the existing systen is not much interactive.

    Drawbacks of the Existing System

    Time Consuming.

    Advanced search mode not available

    Not interactive

    9

  • 8/9/2019 DDTS Certificate

    10/52

    3.2 Proposed System:

    Design phase follows analysis of the system. But before starting the design we

    should have a model of proposed system. We attempt to evolve a system, which will be

    evaluated during implementation, and testing phase. The proposed system of our project

    is to make it computerized and to market the products all over the world.

    The new technology is used the internet as a advertising media.These website

    reach the maximum number of customers in the world.The customers know/see the

    various colours and models available in the garment from their home by simply click the

    computer button.There are various type of customers and the whole saler expect offer

    from the company .So the we provide two types of prices for whole buyer and retail

    buyer.

    The proposed system is very user friendly and interactive.The data is retrieve

    Very fast from the data base.So we know that the proposed system is mostly better then

    the exixting system.

    Advantages of Proposed System:

    Reach maximum number of customers in the world.

    Customer directly see the various models and colors available.

    Customer know the various prices for retailers and whole saler.

    User friendly and interactive.

    10

  • 8/9/2019 DDTS Certificate

    11/52

    Feasibility Study

    A feasibility study is carried out to select the best system that meets theperformance requirements. This entails identification, description and evaluation

    of candidate systems and selection of the best system from the job. It proposes

    one or more feasible conceptual solution that gives an idea of what the new

    system will. It also indicates what are required by the system and what output will

    be produced.

    Consideration of Candidate System

    In todays business, there is more demand for computer services than there

    are resources available to meet the demand. The demand is made up of the

    following:

    Operations of existing system

    Maintenance that focuses on patching programs often representing over 50

    percent of maintenance.

    Enhancements that involve major modifications in program structure or equipment

    Requests from candidate system

    All these demands require resources-human, financial, and technological. Thus

    the basic problem is to match the demands for services with the available

    resources.

    11

  • 8/9/2019 DDTS Certificate

    12/52

    Technical Feasibility

    Technical feasibility centers on the existing computer system (hardware,

    software etc) and to what extent it can support the proposed addition. This

    involves financial considerations to accommodate technical enhancements. If the

    budget is a serious constraint then the project is judged not feasible. On careful

    observation it it concluded that the necessary equipment and technology exists to

    do what is suggested. The technical guarantees of accuracy, Reliability, access

    power and data security is also available. The system can also be developed if the

    new technology is required. Hence the system is found to be technically feasible.

    Economic Feasibility

    Economic analysis is the most frequently used method for evaluating the

    effectiveness of a candidate system. More commonly known as cost/benefit

    analysis the procedure is to determine the benefits and savings that are expected

    from a candidate system and compare them with the costs. if the benefit

    outweighs the costs, then the decision is made to design and implement the

    system. Otherwise further justification or alterations in the proposed system will

    have to be made if it is to have a chance of being approved. This is an ongoing

    effort that improves in accuracy at each phase of the system life cycle.

    In the proposed site the financial value of benefits cannot be calculated. However

    the system entails the following benefits:

    User can access the data on net.

    Completing jobs in few hours.

    Producing reports with no errors.

    More satisfied customers.

    12

  • 8/9/2019 DDTS Certificate

    13/52

    3.3 Data Flow Diagrams

    13

    User

    Sign Up

    New User 1

    Validate

    No

    Yes

    Collections Search

    Kids WearMens Wear

    Females Wear

    Accessories

    Children

    Price retailerPrice whole sale

    Database 1

  • 8/9/2019 DDTS Certificate

    14/52

    3.4 Data Dictionary:

    DATABASE: mvsport;

    Table: useradmin

    Table: mv_members_asi;

    Table: mv_members_retail;

    14

  • 8/9/2019 DDTS Certificate

    15/52

    Table: mv_price_asi;

    Table: mv_price_retail;

    15

  • 8/9/2019 DDTS Certificate

    16/52

    4. SYSTEM CONFIGURATION

    System Configuration:

    The basic software and hardware requirements for the project include the following: -

    4.1 On the Server side

    Hardware Requirements:

    Processor : Intel Pentium Xeon Processor.

    RAM : 1024 MB RAM.

    Hard Disk : Seagate HDD 80 GB 7200RPM.

    Floppy Drive : 1.44 MB.

    Monitor : 14 Color Monitor.

    Peripheral : Mouse, Keyboard, UPS.

    Printer : Laser Printer.

    4.1 On the Client side

    Hardware Requirement:

    Processor : Any Pentium based client preferably Pentium IV.

    Memory : 128MB DRAM, DDR-266.

    Storage : 512MB (possibly 1GB) NAND SLC type flash memory.

    16

  • 8/9/2019 DDTS Certificate

    17/52

    4.2 On the Server side

    Software Requirements:

    OPERATING SYSTEM : Microsoft Windows 2000 Advanced Server.

    PHP : Is a widely-used Open Sourc scripting language.

    APACHE : Web Server version is 1.3.31

    MYSQL : Database Server version is 5.0.21. or above

    4.2 On the Client side

    Software Requirement:

    Browser : Internet Explorer is required.

    Operating System : Microsoft Windows 2000 Advanced Server .

    17

  • 8/9/2019 DDTS Certificate

    18/52

    5.SOFTWARE DESCRIPTION

    OPEN SOURCE

    Open source usually refers to the software that is released with source code undera license that ensures that derivative works will also be available as source code, protects

    certain rights of the original authors, and prohibits restrictions on how the software can

    be used or who can use it.Open source doesn't just mean access to the source code. The distribution terms of

    open-source software must comply with the following criteria:

    1. Free Redistribution:

    The license shall not restrict any party from selling or giving away the software as

    a component of an aggregate software distribution containing programs from several

    different sources. The license shall not require a royalty or other fee for such sale.

    2. Source Code:

    The program must include source code, and must allow distribution in source

    code as well as compiled form. Where some form of a product is not distributed with

    source code, there must be a well-publicized means of obtaining the source code forno more than a reasonable reproduction cost preferably, downloading via the Internet

    without charge. The source code must be the preferred form in which a programmer

    would modify the program. Deliberately obfuscated source code is not allowed.

    Intermediate forms such as the output of a preprocessor or translator are not allowed.

    3. Derived Works:

    The license must allow modifications and derived works, and must allow them to

    be distributed under the same terms as the license of the original software.

    18

  • 8/9/2019 DDTS Certificate

    19/52

    4. Integrity of The Authors Source Code:

    The license may restrict source-code from being distributed in modified form

    only if the license allows the distribution of "patch files" with the source code for

    the purpose of modifying the program at build time. The license must explicitly

    permit distribution of software built from modified source code. The license may

    require derived works to carry a different name or version number from the

    original software.

    5. No Discriminations Against Persons or Groups:

    The license must not discriminate against any person or group of persons.

    6. No Discrimination Against Field of Endeavour:

    The license must not restrict anyone from making use of the program in a

    specific field of endeavor. For example, it may not restrict the program from

    being used in a business, or from being used for genetic research.

    7. Distribution of License:

    The rights attached to the program must apply to all to whom the program is

    redistributed without the need for execution of an additional license by those

    parties.

    8. License Must Not Be Specific to a Product:

    The rights attached to the program must not depend on the programs being

    part of a particular software distribution. If the program is extracted from that

    distribution and used or distributed within terms of the programs license, all

    19

  • 8/9/2019 DDTS Certificate

    20/52

    parties to whom the program is redistributed should have the same rights as those

    that are granted in conjunction with the original software distribution.

    9. License Must Not Restrict Other Software:

    The license must not place restrictions on other software that is distributed

    along with the licensed software. For example, the license must not insist that all

    other programs distributed on the same medium must be open-source software.

    10. License Must Be technology-Neutral:

    No provision of the license may be predicated on any individual technology or

    style of interface.

    PHP

    PHP stands for Hypertext Preprocessor. The initials 'PHP' originally meant

    Personal Home Page. The Open Source community renamed it Hypertext Processor, inkeeping with the recursive acronym tradition. Its simplicity in comparison to its elderbrother Perl, leads some aficionados to nickname it People Hate Perl.

    Page contents can be generated automatically in PHP. In short, this means that

    certain parts of your pages are produced by a program that can write HTML. So you canbe sure that the resulting contents can be read by any browser that understands HTML;

    you need not worry about that. You can also interact with a database, such as MySQL, an

    open source professional database management system. Today, the Apache/PHP/MySQLtrio forms one of the most popular professional Web platforms in the world.

    Another important feature of PHP as a server-side scripting language is its ability

    to receive and process HTTP requests containing data collected from a HTML form. This

    way, you can easily update a database with the collected data or return customized

    information adapted to the user input.

    20

  • 8/9/2019 DDTS Certificate

    21/52

    Session management is another of PHP's strengths since it helps you to identify

    your users from one page to another. Visit tracking or customizing systems can quickly

    become exciting applications.

    PHP is a so-called server-side scripting language, which means that a PHP

    program is interpreted on a server, unlike JavaScript, which is a client-side language, i.e.one interpreted by the browser. The concept of active pages was born with the advent of

    the ASP technology created by Microsoft. They are a mixture of the usual HTML

    elements and the tags that enclose the program code. The advantage is that, in a HTMLeditor, a script remains plainly visible for the Web designer, while still containing all the

    processing logic used by the programmer.

    So the development of dynamic pages calls for several different skills: Those of a designer, who creates the static page (a template) in any HTML editor

    Those of a programmer, who writes the program delineated by specific tags.

    This code is made up of two main types:

    The treatments, which are generally located at the beginning of the files. They

    describe all the actual functions.

    The display instructions, which write the results of the procedures in the HTML

    code using instructions such as print or echo.

    PHP (recursive acronym for "PHP: Hypertext Preprocessor") is a widely-used Open

    Source general-purpose scripting language that is especially suited for Web development

    and can be embedded into HTML.

    Notice how this is different from a script written in other languages like Perl or C --

    instead of writing a program with lots of commands to output HTML, you write an

    HTML script with some embedded code to do something (in this case, output

    some text). The PHP code is enclosed in special start and end tags that allow you to jump

    into and out of "PHP mode".

    What distinguishes PHP from something like client-side JavaScript is that the

    code is executed on the server. If you were to have a script similar to the above on your

    server, the client would receive the results of running that script, with no way of

    determining what the underlying code may be. You can even configure your web server

    21

  • 8/9/2019 DDTS Certificate

    22/52

    to process all your HTML files with PHP, and then there's really no way that users can

    tell what you have up your sleeve.

    Benefits of getting open source:

    Full protection of your investment

    Make custom modification to satisfy your specific needs

    Can be used on your local server without internet connection

    No monthly fee payments

    Open Source package includes:

    100% PHP open source

    No encrypted files

    Comprehensive comments

    Installation script and Guide

    Developer Guide

    Database structure diagram

    Speed ofDevelopment

    Because PHP allows you to separate HTML code from scripted elements, you

    will notice a significant decrease in development time on many projects. In manyinstances, you will be able to separate the coding stage of a project from the design and

    build stages. Not only can this make life easier for you as a programmer, it also can

    remove obstacles that stand in the way of effective and flexible design.

    PHP Is Open Source

    To many people, "open source" simply means free, which is, of course, a benefit

    in itself. To quote from the official PHP site at http://www.php.net/: This may sound a little

    foreign to all you folks coming from a non-UNIX background, but PHP doesn't costanything. You can use it for commercial and/or non-commercial use all you want. You

    can give it to your friends, print it out and hang it on your wall or eat it for lunch.

    22

    http://www.php.net/http://www.php.net/
  • 8/9/2019 DDTS Certificate

    23/52

    Welcome to the world of Open Source software! Smile, be happy, the world is good. For

    the full legalese, see the official license. Well-maintained open source projects offer users

    additional benefits, though. You benefit from an accessible and committed communitywho offer a wealth of experience in the subject. Chances are that any problem you

    encounter in your coding can be answered swiftly and easily with a little research. If that

    fails, a question sent to a mailing list can yield an intelligent, authoritative response.

    You also can be sure that bugs will be addressed as they are found, and that new

    features will be made available as the need is defined. You will not have to wait for thenext commercial release before taking advantage of improvements. There is no vested

    interest in a particular server product or operating system. You are free to make choices

    that suit your needs or those of your clients, secure that your code will run whatever you

    decide.

    PerformanceBecause of the powerful Zend engine, PHP4 compares well with ASP in

    benchmark tests, beating it in some tests. Compiled PHP leaves ASP far behind.

    PortabilityPHP is designed to run on many operating systems and to cooperate with many

    servers and databases. You can build for a UNIX environment and shift your work to NT

    without a problem. You can test a project with Personal Web Server and install it on aUNIX system running on PHP as an Apache module

    Apache Web ServerApache is the most widely used HTTP-server in the world today. It surpasses all

    free and commercial competitors on the market, and provides a myriad of features; more

    than the nearest competitor could give you on a UNIX variant. It is also the most usedweb server for a Linux system. A web server like Apache, in its simplest function, is

    software that displays and serves HTML pages hosted on a server to a client browser that

    understands the HTML code. Mixed with third party modules and programs, it can

    become powerful software, which will provide strong and useful services to a clientbrowser.

    Once you have DNS correctly setup and your server has access to the Internet,you'll need to configure Apache to accept surfers wanting to access your Web site. The

    Apache web server is a highly scalable product capable of running on many platforms

    and serving thousands of pages a minute. It provides a stable and secure environment forthe host server, and is the industry leader in the web server market. The server package

    comes bundled with most Linux distributions and only requires little configuration

    changes (if any) to be up and serving pages immediately. If you're serious about your

    web development and its a fully dynamic hosting environment you need, then Apache,

    23

  • 8/9/2019 DDTS Certificate

    24/52

    PHP and MySQL are perfectly suited together, and are also provided with most

    distributions.

    MySQL

    MySQL is a multithread, multi-user SQL database management system(DBMS)

    which has, according to MySQL AB, more than 10 million installations. The basic

    program runs as a server providing multi-user access to a number of databases.

    It was originally financed in a similar fashion to the JBoss model, MySQL was

    owned and sponsored by a single for-profit firm, the Swedish company MySQL AB,

    which holds the copyright to most of the codebase. The projects source code is available

    under terms of the GNU General Public License, as well as under a variety of proprietary

    agreements.

    Libraries for accessing MySQL databases are available in all major programming

    languages with language specific APIs. In addition, an ODBC interface called MyODBC

    allows additional programming languages that support the ODBC interface to

    communicate with a MySQL database, such as ASP or ColdFusion. The MySQL server

    and official libraries are mostly implemented in ANSI C/ANSI C++.

    The MySQL Web site provides the latest information about MySQL software and

    MySQL AB.

    MySQL is a database management system.

    A database is a structured collection of data. It may be anything from a simple

    shopping list to a picture gallery or the vast amounts of information in a corporate

    network. To add, access, and process data stored in a computer database, you

    need a database management system such as MySQL Server. Since computers are

    very good at handling large amounts of data, database management systems play

    24

    http://www.php.net/http://www.mysql.com/http://www.php.net/http://www.mysql.com/
  • 8/9/2019 DDTS Certificate

    25/52

    a central role in computing, as standalone utilities, or as parts of other

    applications.

    MySQL is a relational database management system.

    A relational database stores data in separate tables rather than putting all the data

    in one big storeroom. This adds speed and flexibility. The SQL part of MySQL

    stands for Structured Query Language. SQL is the most common standardized

    language used to access databases and is defined by the ANSI/ISO SQL Standard.

    The SQL standard has been evolving since 1986 and several versions exist. In this

    manual, SQL-92 refers to the standard released in 1992, SQL:1999 refers to

    the standard released in 1999, and SQL:2003 refers to the current version of the

    standard. We use the phrase the SQL standard to mean the current version of

    the SQL Standard at any time.

    MySQL software is Open Source.

    Open Source means that it is possible for anyone to use and modify the software.

    Anybody can download the MySQL software from the Internet and use it without

    paying anything. If you wish, you may study the source code and change it to suit

    your needs. The MySQL software uses the GPL (GNU General Public License),

    to define what you may and may not do with the software in different situations.

    If you feel uncomfortable with the GPL or need to embed MySQL code into a

    commercial application, you can buy a commercially licensed version from us.

    See the MySQL Licensing Overview for more information .

    The MySQL Database Server is very fast, reliable, and easy to use.

    If that is what you are looking for, you should give it a try. MySQL Server also

    has a practical set of features developed in close cooperation with our users. You

    can find a performance comparison of MySQL Server with other database

    managers on our benchmark page.

    25

  • 8/9/2019 DDTS Certificate

    26/52

    The MySQL Database Software is a client/server system that consists of a multi-

    threaded SQL server that supports different backends, several different client

    programs and libraries, administrative tools, and a wide range of application

    programming interfaces (APIs).

    We also provide MySQL Server as an embedded multi-threaded library that you

    can link into your application to get a smaller, faster, easier-to-manage standalone

    product.

    A large amount of contributed MySQL software is available. It is very likely that

    your favorite application or language supports the MySQL Database Server.

    The following table lists some examples of operating system file-size limits. This is

    only a rough guide and is not intended to be definitive. For the most up-to-date

    information, be sure to check the documentation specific to your operating system.

    Operating System File-size Limit

    Linux 2.2-Intel 32-bit 2GB (LFS: 4GB)

    Linux 2.4+ (using ext3 filesystem) 4TB

    Solaris 9/10 16TB

    NetWare w/NSS file system 8TB

    Win32 w/ FAT/FAT32 2GB/4GB

    Win32 w/ NTFS 2TB (possibly larger)

    MacOS X w/ HFS+ 2TB

    Uses of MySQL

    MySQL is a popular for web applications and acts as the database component of

    the LAMP, MAMP, WAMP and XAMPP platforms (Linux/Mac/Windows-Apache-MySQL-PHP/Perl/Python), and for open-source bug tracking tools like Bugzilla. Its

    popularity for use with web applications is closely tied to the popularity of PHP and on

    Rails, which are often combined with MySQL. PHP and MySQL are essential

    26

  • 8/9/2019 DDTS Certificate

    27/52

    components for running popular content management systems such as Joomla!,

    WordPress, Google, EBay and Drupal. Wikipedia runs on Media Wiki software, which is

    written in PHP and uses a MySQL database.

    PhpMyAdmin

    phpMyAdmin is software used for creating and maintaining MySQL databases.You can access your MySQL account using phpMyAdmin.Once you successfully logged

    in, a phpMyAdmin screen appear as shown below.are

    Creating a table in your database

    The left-hand frame in phpMyAdmin is used for navigation, when you log in,

    you'll see the database you created displaying in this area. Tables will also show up under

    each database once they are created.

    Click on the database you created in the navigation frame and a new window will

    appear on the right hand side.

    27

  • 8/9/2019 DDTS Certificate

    28/52

    We will now create the first table in the database, called "details". This is done by

    using the Create new table feature. The name of the new table is typed into the Name:

    field, and the number of columns in the table into Fields:. Please note that when you

    create your own databases and tables, it's wise to plan them out carefully to allow for

    growth - this exercise is only meant to help you to familiarize with basic

    php/MySQL/phpMyAdmin functions.

    After you click Go a screen similar to the following should appear. Notice that the

    table title will now also appear under the database name in the left hand navigation frame.

    We now need to enter the names and attributes of our table fields. Enter the

    following information:

    Field Type Length

    id int 6

    name char 100

    28

  • 8/9/2019 DDTS Certificate

    29/52

    telephone char 50

    birthday char 50

    The Length value indicates the maximum allowable length of characters for input.

    There are many different values that can be set for Type; view further documentation

    here. The Types specified in this example aren't the most efficient, but just used for the

    purposes of this exercise. The "id" field, which will be used as a Primary key for this

    table, has been set to auto increment, saving you from having to having to type in the

    next number in sequence when you input records.

    Once you've entered all the values, click Save. A screen similar to the following will

    appear.

    You've done it - the table is now created! You'll notice that the corresponding

    SQL command for creating these fields is also displayed. While you don't really need to

    know this for the purposes of this exercise, it doesn't hurt to get familiar with the lingo

    over time.

    29

    http://www.mysql.com/doc/en/String_types.htmlhttp://www.mysql.com/doc/en/String_types.htmlhttp://www.mysql.com/doc/en/String_types.htmlhttp://www.mysql.com/doc/en/String_types.html
  • 8/9/2019 DDTS Certificate

    30/52

    Also on this page, you'll see many other options - explore these later on once you

    are familiar with the way everything is working.

    Java Script

    JavaScript is a compact, object-based scripting language for developing client and

    server Internet applications. Netscape Navigator interprets JavaScript statements

    embedded in an HTML page, and LiveWire enables you to create server-based

    applications similar to Common Gateway Interface (CGI) programs.

    JavaScript is Netscape's cross-platform, object-based scripting language for client andserver applications. There are two types of JavaScript:

    Navigator JavaScript, also called client-side JavaScript

    LiveWire JavaScript, also called server-side JavaScript

    JavaScript in Navigator

    Netscape Navigator 2.0 (and later versions) can interpret JavaScript statements

    embedded in an HTML page. When Navigator requests such a page, the server sends the

    full content of the document, including HTML and JavaScript statements, over the

    network to the client. The Navigator then displays the HTML and executes the

    JavaScript, producing the results that the user sees.

    JavaScript, the language

    Client and server JavaScript differ in numerous ways, but they have the

    following elements in common:

    Keywords, statement syntax, and grammar

    Rules for expressions, variables, and literals

    Underlying object model (although Navigator and LiveWire have different object

    frameworks)

    Built-in objects and functions

    30

  • 8/9/2019 DDTS Certificate

    31/52

    AjaxHistory of Ajax

    Ajax is a concept a way of making the web more interactive, and as such was never

    really created or introduced. In fact, the concept existed much before it became popular.

    However, the term was coined in 2005, by Jesse James Garrett, founder of adaptive Path.With the introduction of the iframe element in HTML by Internet Explorer in 1996,

    web developers can now asynchronously load another web page in a section of a

    currently loaded page. By using an iframe with zero dimensions, you could use an iframeto load content from another page, extract the relevant parts and inject it into your own

    page, all in the background.

    In 1999, the new XMLHttpRequest ActiveX control was developed by Microsoft forInternet Explorer. The new object can asynchronously load pages, from any website as

    desired by the developer. As of now, this is available in all major browsers such as

    Firefox, Safari and Opera.In 2006, this control was standardized by the World Wide Web consortium (W3C), in

    a draft specification. As a result, once finalized, any new browser that plans to follow

    web standards will have to support this object.

    Ajax, which is sometimes referred to as Asynchronous JavaScript and XML, is an

    exciting technology that has been taking the Web development world by storm. Ajax has

    been largely spurred on by some innovative uses of the technology by Google with Gmail(http://mail.google.com) and Google Maps (http://maps.google.com).

    The idea behind Ajax is that you can send requests to a server, as you normally do;but instead of refreshing the entire page, you use JavaScript to update only a portion of

    the page. As a result, Web applications arent constantly forcing users to wait for entirely

    new pages to be loaded in their browsers; the application feels more like a desktop

    program.

    A good example of this is Googles Gmail application. To compose a new message,

    you type the first few letters of the email address into a form. After you type the first fewletters, a new window prompts you to select from a list of email addresses of people you

    have already emailed. In the background, Gmail is using Ajax to grab the list of emailaddresses from the server and present this listwithout sending a new HTML page to the

    browser. Ajax offers you a fantastic way of providing a more dynamic experience for

    your users.

    31

    http://maps.google.com/http://maps.google.com/
  • 8/9/2019 DDTS Certificate

    32/52

    Ajax is not a singular new technology, but instead a combination of a range of

    technologies. These include the following:

    HTML

    CSs

    6. DESIGN AND DEVELOPMENT

    Database Designing is major factor to achieve a high level of efficiency in

    development of any application. Improper database designing may leads to unexpectedresults. So database designing is a crucial phase. Efficiency of presented work is totally

    depends on database designed for the application because all the functionality provided

    by this application is a output of query executed on developed database of application.

    Various table developed for successfully implement this scenario is shown below:

    6.1 DATABASE DESIGN:

    DATABASE: mvsport;

    Table: useradmin

    Table: mv_members_asi;

    32

  • 8/9/2019 DDTS Certificate

    33/52

    Table: mv_members_retail;

    Table: mv_price_asi;

    33

  • 8/9/2019 DDTS Certificate

    34/52

    Table: mv_price_retail:

    34

  • 8/9/2019 DDTS Certificate

    35/52

    6.2 Architectural Design

    35

    Admin

    Price for

    Asi

    costomer

    Price for

    Retail

    customerLogin

  • 8/9/2019 DDTS Certificate

    36/52

    s

    36

    Forget

    password

  • 8/9/2019 DDTS Certificate

    37/52

    37

  • 8/9/2019 DDTS Certificate

    38/52

    7. IMPLEMENTATION AND TESTING

    Software Testing is the process of executing a program or system with the intent

    of finding errors. Or, it involves any activity aimed at evaluating an attribute or

    capability of a program or system and determining that it meets its required results

    Software is not unlike other physical processes where inputs are received and outputs are

    produced. Where software differs is in the manner in which it fails. Most physical

    systems fail in a fixed (and reasonably small) set of ways. By contrast, software can fail

    in many bizarre ways. Detecting all of the different failure modes for software is

    generally infeasible

    Unlike most physical systems, most of the defects in software are design errors,

    not manufacturing defects. Software does not suffer from corrosion, wear-and-tear --

    generally it will not change until upgrades, or until obsolescence. So once the software is

    shipped, the design defects -- or bugs -- will be buried in and remain latent untilactivation

    Software bugs will almost always exist in any software module with moderate

    size: not because programmers are careless or irresponsible, but because the complexity

    of software is generally intractable -- and humans have only limited ability to manage

    complexity. It is also true that for any complex systems, design defects can never be

    completely ruled out.

    Discovering the design defects in software is equally difficult, for the same reason

    of complexity. Because software and any digital systems are not continuous, testing

    boundary values are not sufficient to guarantee correctness. All the possible values need

    to be tested and verified, but complete testing is infeasible. Exhaustively testing a simple

    program to add only two integer inputs of 32-bits (yielding 2^64 distinct test cases)

    38

  • 8/9/2019 DDTS Certificate

    39/52

    would take hundreds of years, even if tests were performed at a rate of thousands per

    second

    Obviously, for a realistic software module, the complexity can be far beyond the

    example mentioned here. If inputs from the real world are involved, the problem will get

    worse, because timing and unpredictable environmental effects and human interactions

    are all possible input parameters under consideration.

    The testing activities are done in all phases of the lifecycle in an iterative software

    development approach. However, the emphasis on testing activities varies in different

    phases. This procedure explains the focus of testing in inception, elaboration,

    construction and transition phases. In the inception phase most of requirements capturing

    is done and the test plan is developed. In elaboration phase most of design is developed,

    and test cases are developed. Construction phase mainly focuses on development of

    components and units, and unit testing is the focus in this phase. Transition phase is about

    deploying software in the user community and most of the system testing and acceptance

    testing is done in this phase.

    7.1 Purpose

    The main purposes of this procedure are:

    To carry out comprehensive testing of the system/product and its individual

    components in order to ensure that the developed system/product conforms to the user

    requirements/ design.

    To verify the proper integration of all components of the software.

    To verify that all requirements have been correctly implemented.

    To identify and ensure defects are addressed prior to the deployment of the software.

    39

  • 8/9/2019 DDTS Certificate

    40/52

    7.2 Test Planning

    Initial test plan addresses system test planning, and over the elaboration,

    construction and transition phases this plan is updated to cater other testing requirements

    of these phases, like, unit & integration testing.

    The test Plan must contain the following

    Scope of testing

    Methodology to be used for testing

    Types of tests to be carried out

    Resource & system requirements

    A tentative Test Schedule

    Identification of various forms to be used to record test cases and test results

    Testing is usually performed for the following purposes:

    To improve quality.

    Quality means the conformance to the specified design requirement. Being

    correct, the minimum requirement of quality, means performing as required under

    specified circumstances. Debugging, a narrow view of software testing, is performed

    heavily to find out design defects by the programmer. The imperfection of human

    nature makes it almost impossible to make a moderately complex program correct the

    40

  • 8/9/2019 DDTS Certificate

    41/52

    first time. Finding the problems and get them fixed, is the purpose of debugging in

    programming phase.

    For Verification & Validation (V&V)

    Just as topic Verification and Validation indicated, another important purpose of

    testing is verification and validation (V&V). Testing can serve as metrics. It is

    heavily used as a tool in the V&V process. Testers can make claims based on

    interpretations of the testing results, which either the product works under certain

    situations, or it does not work. We can also compare the quality among different

    products under the same specification, based on results from the same test.

    7.3 Testing Methods Used For Project

    There is a plethora of testing methods and testing techniques, serving multiple

    purposes in different life cycle phases. Classified by purpose, software testing can be

    divided into:

    correctness testing, performance testing, reliability testing and security testing.

    Classified by life-cycle phase, software testing can be classified into the following

    categories: requirements phase testing, design phase testing, program phase testing,

    evaluating test results, installation phase testing, acceptance testing and maintenance

    testing. By scope, software testing can be categorized as follows: unit testing, component

    testing, integration testing, and system testing

    Correctness testing

    Correctness is the minimum requirement of software, the essential purpose

    of testing. Correctness testing will need some type of oracle, to tell the right

    behavior from the wrong one. The tester may or may not know the inside details

    41

  • 8/9/2019 DDTS Certificate

    42/52

    of the software module under test, e.g. control flow, data flow, etc. Therefore,

    either a white-box point of view or black-box point of view can be taken in testing

    software. We must note that the black-box and white-box ideas are not limited in

    correctness testing only.

    Black-box testing

    The black-box approach is a testing method in which test data are derived

    from the specified functional requirements without regard to the final program

    structure It is also termed data-driven, input/output driven or requirements-based

    testing. Because only the functionality of the software module is of concern, black

    box testing also mainly refers to functional testing -- a testing method emphasized

    on executing the functions and examination of their input and output data. The

    tester treats the software under test as a black box -- only the inputs, outputs and

    specification are visible, and the functionality is determined by observing the

    outputs to corresponding inputs. In testing, various inputs are exercised and the

    outputs are compared against specification to validate the correctness. All test

    cases are derived from the specification. No implementation details of the code

    are considered.

    It is obvious that the more we have covered in the input space, the more

    problems we will find and therefore we will be more confident about the qualityof the software. Ideally we would be tempted to exhaustively test the input space.

    But as stated above, exhaustively testing the combinations of valid inputs will be

    impossible for most of the programs, let alone considering invalid inputs, timing,

    sequence, and resource variables. Combinatorial explosion is the major roadblock

    in functional testing. To make things worse, we can never be sure whether the

    42

  • 8/9/2019 DDTS Certificate

    43/52

    specification is either correct or complete. Due to limitations of the language used

    in the specifications (usually natural language), ambiguity is often inevitable.

    Even if we use some type of formal or restricted language, we may still fail to

    write down all the possible cases in the specification. Sometimes, the

    specification itself becomes an intractable problem: it is not possible to specify

    precisely every situation that can be encountered using limited words.

    And people can seldom specify clearly what they want -- they usually can

    tell whether a prototype is, or is not, what they want after they have been finished.

    Specification problems contributes approximately 30 percent of all bugs in

    software.

    The research in black-box testing mainly focuses on how to maximize the

    effectiveness of testing with minimum cost, usually the number of test cases. It is

    not possible to exhaust the input space, but it is possible to exhaustively test a

    subset of the input space. Partitioning is one of the common techniques. If we

    have partitioned the input space and assume all the input values in a partition is

    equivalent, then we only need to test one representative value in each partition to

    sufficiently cover the whole input space. Domain testing partitions the input

    domain into regions, and consider the input values in each domain an equivalent

    class. Domains can be exhaustively tested and covered by selecting a

    representative value(s) in each domain. Boundary values are of special interest.

    Experience shows that test cases that explore boundary conditions have a higher

    payoff than test cases that do not. Boundary value analysis requires one or more

    boundary values selected as representative test cases. The difficulties with domain

    testing are that incorrect domain definitions in the specification can not be

    efficiently discovered.

    Good partitioning requires knowledge of the software structure. A good

    testing plan will not only contain black-box testing, but also white-box

    approaches, and combinations of the two.

    43

  • 8/9/2019 DDTS Certificate

    44/52

    White-box testing

    Contrary to black-box testing, software is viewed as a white-box, or glass-box in white-box testing, as the structure and flow of the software under test are

    visible to the tester. Testing plans are made according to the details of the

    software implementation, such as programming language, logic, and styles. Testcases are derived from the program structure. White-box testing is also called

    glass-box testing, logic-driven testing or design-based testing.

    There are many techniques available in white-box testing, because the

    problem of intractability is eased by specific knowledge and attention on the

    structure of the software under test. The intention of exhausting some aspect of

    the software is still strong in white-box testing, and some degree of exhaustion

    can be achieved, such as executing each line of code at least once (statement

    coverage), traverse every branch statements (branch coverage), or cover all the

    possible combinations of true and false condition predicates (Multiple condition

    coverage).

    Control-flow testing, loop testing, and data-flow testing, all maps the

    corresponding flow structure of the software into a directed graph. Test cases are

    carefully selected based on the criterion that all the nodes or paths are covered or

    traversed at least once. By doing so we may discover unnecessary "dead" code --

    code that is of no use, or never get executed at all, which can not be discovered by

    functional testing.

    In mutation testing, the original program code is perturbed and many

    mutated programs are created, each contains one fault. Each faulty version of the

    program is called a mutant. Test data are selected based on the effectiveness of

    failing the mutants. The more mutants a test case can kill, the better the test case

    is considered. The problem with mutation testing is that it is too computationally

    expensive to use. The boundary between black-box approach and white-box

    44

  • 8/9/2019 DDTS Certificate

    45/52

    approach is not clear-cut. Many testing strategies mentioned above, may not be

    safely classified into black-box testing or white-box testing.

    It is also true for transaction-flow testing, syntax testing, finite-state

    testing, and many other testing strategies not discussed in this text. One reason is

    that all the above techniques will need some knowledge of the specification of the

    software under test. Another reason is that the idea of specification itself is broad

    -- it may contain any requirement including the structure, programming language,

    and programming style as part of the specification content.

    We may be reluctant to consider random testing as a testing technique.

    The test case selection is simple and straightforward: they are randomly chosen.

    Study in indicates that random testing is more cost effective for many programs.

    Some very subtle errors can be discovered with low cost. And it is also not

    inferior in coverage than other carefully designed testing techniques. One can also

    obtain reliability estimate using random testing results based on operational

    profiles. Effectively combining random testing with other testing techniques may

    yield more powerful and cost-effective testing strategies.

    Performance testing

    Not all software systems have specifications on performance explicitly.

    But every system will have implicit performance requirements. The software

    should not take infinite time or infinite resource to execute. "Performance bugs"

    sometimes are used to refer to those design problems in software that cause the

    system performance to degrade.

    45

  • 8/9/2019 DDTS Certificate

    46/52

    Performance has always been a great concern and a driving force of

    computer evolution. Performance evaluation of a software system usually

    includes: resource usage, throughput, stimulus-response time and queue lengths

    detailing the average or maximum number of tasks waiting to be serviced by

    selected resources. Typical resources that need to be considered include network

    bandwidth requirements, CPU cycles, disk space, disk access operations, and

    memory usage. The goal of performance testing can be performance bottleneck

    identification, performance comparison and evaluation, etc. The typical method of

    doing performance testing is using a benchmark -- a program, workload or trace

    designed to be representative of the typical system usage.

    Reliability testing

    Software reliability refers to the probability of failure-free operation of a

    system. It is related to many aspects of software, including the testing process.

    Directly estimating software reliability by quantifying its related factors can be

    difficult. Testing is an effective sampling method to measure software reliability.

    Guided by the operational profile, software testing (usually black-box testing) can

    be used to obtain failure data, and an estimation model can be further used to

    analyze the data to estimate the present reliability and predict future reliability.

    Therefore, based on the estimation, the developers can decide whether to

    release the software, and the users can decide whether to adopt and use the

    software. Risk of using software can also be assessed based on reliability

    information. advocates that the primary goal of testing should be to measure the

    dependability of tested software.

    46

  • 8/9/2019 DDTS Certificate

    47/52

    There is agreement on the intuitive meaning of dependable software: it

    does not fail in unexpected or catastrophic ways. Robustness testing and stress

    testing are variances of reliability testing based on this simple criterion.

    The robustness of a software component is the degree to which it can

    function correctly in the presence of exceptional inputs or stressful environmental

    conditions. Robustness testing differs with correctness testing in the sense that the

    functional correctness of the software is not of concern. It only watches for

    robustness problems such as machine crashes, process hangs or abnormal

    termination. The oracle is relatively simple, therefore robustness testing can be

    made more portable and scalable than correctness testing. This research has drawn

    more and more interests recently, most of which uses commercial operating

    systems as their target, such as the work in.

    Stress testing, or load testing, is often used to test the whole system rather

    than the software alone. In such tests the software or system are exercised with or

    beyond the specified limits. Typical stress includes resource exhaustion, bursts of

    activities, and sustained high loads.

    Security testing

    Software quality, reliability and security are tightly coupled. Flaws in

    software can be exploited by intruders to open security holes. With the

    development of the Internet, software security problems are becoming even more

    severe.

    47

  • 8/9/2019 DDTS Certificate

    48/52

    Many critical software applications and services have integrated security

    measures against malicious attacks. The purpose of security testing of these

    systems include identifying and removing software flaws that may potentially

    lead to security violations, and validating the effectiveness of security measures.

    Simulated security attacks can be performed to find vulnerabilities.

    7.4 How the Project Is Implemented

    A crucial phase in the system life cycle is the successful implementation

    of the new system design. The change to make a web based application took place

    in phased manner. First the system was used to enter, validate and store the

    different types of data in the database used by the systems. The static data were

    also entered in the directory files. The comparison testified to the reliability, speed

    and accuracy of the web based system.

    There are three types of implementation

    1. Implementation of a web based application to replace a window based

    application The problems encountered are converting files, training users ,creating accurate files, and verifying printouts for integrity.

    2. Implementation of a modified application to replace an existing one using

    the same computer. This type of conversion is relatively easy to handle

    provided there are no major changes in the fi

    Conversion means changing from one system to another. The objective is to

    put tested system into operation while holding costs, risks, and personnel irritation

    to a minimum. Conversion should be exciting because it is the last step before the

    candidate system begins to show result. Unfortunately the results of conversion

    have been chaotic and traumatic for many firms. Unforeseen difficulties crop up

    as the system breaks down, data files are damaged and tempers grow short. The

    training package is frequently not complete and people are trying to figure out

    48

  • 8/9/2019 DDTS Certificate

    49/52

    what to do. Much of this steams of poor planning at all. Let us examine the steps

    that preceded conversion.

    Creating Test files.

    Training the operating staff.

    Installing terminals and hardware.

    Creating Test files:s

    The best method for gaining control of the conversion is to use well-

    planned test files for testing all new programs. Before testing live data, test are

    created on the old system, copied over to the new system, and used for initial test

    of each program. The test file offers the following:

    Predictable results

    Previously determined output results to check with a sampling of different

    types of records.

    User Training

    It focuses on two factors:

    User capabilities

    Nature of the system being installed

    The user may range from nave to sophisticated users .Nave users have fear

    towards exposure to new system. Therefore formal user training is required with

    some training aids like:

    User manual

    User-friendly screen

    Data dictionary

    49

  • 8/9/2019 DDTS Certificate

    50/52

    Proper flow of system

    8.CONCLUSION

    This ONLINE GARMENT ADVERTISING websi te i s

    success fully completed.It is devel oped as a highly user interaction website.so the end user who have low computer literal

    also easily acess the website.It is used advertise the appropriate

    garment company world wide and used to increase the sales of

    the garment.The end users from all over the world can see the

    var ious model s, co lours, and p ri ces o f the produc ts in the

    company.We can extend shopping cart too in this website.

    This website is really better then the all other advertising

    media l ike news papers and telev is ions .Because they only

    reached to the particular region people but this website reach all

    people around the world.It also save the valuiable t ime of the

    valuable customers

    50

  • 8/9/2019 DDTS Certificate

    51/52

    BIBLIOGRAPHY AND REFERENCES

    Books

    PHP/MySQL Programming for the Absolute Beginner

    Web Database Applications with PHP and MySQL

    LEARNING PHP 5

    Java Script for the World Wide Web

    Websites

    www.php.net

    www.hotscripts.com

    www.zend.com/php5

    www.w3schools.com

    www.dynamicdrive.com

    ANNEXURE

    51

    http://www.php.net/http://www.hotscripts.com/http://www.zend.com/php5http://www.w3schools.com/http://www.dynamicdrive.com/http://www.php.net/http://www.hotscripts.com/http://www.zend.com/php5http://www.w3schools.com/http://www.dynamicdrive.com/
  • 8/9/2019 DDTS Certificate

    52/52

    Screen Interfaces:


Recommended