Big Mart App Development Guide
Big Mart App Development Guide
Each time you submit an assignment you must attach this statement as the cover page for both the
hard copy and the electronic version. If the statement is missing, your work will not be marked.
STUDENT DECLARATION
I have read and understood Pearson Edexcel Policy on Academic dishonesty and Plagiarism.
I can confirm the following details:
I confirm that this is my own work and that I have not plagiarized any part of it. I have also noted the
assessment criteria and pass mark for assignments.
Student Signature:
Submitted date:
LO1. Produce a Software Design Document by analyzing a business-related problem and deduce an
appropriate solution including a set of initial requirements.
LO2. Use design and development methodologies with tools and techniques associated with the
creation of a business application.
LO3. Work individually and as part of a team to plan and produce a functional business application
with support documentation.
LO4. Evaluate the performance of a business application against its Software Design Document and
initial requirements.
There are four parts based on the scenario. You are required to contextualize the task as per the given
scenario wherever possible.
Each student has to submit their assignment as guided in the assignment brief. The students are
guided what sort of information is to be produced to meet the targeted criteria. All the tasks need to
be done individually and the student has to produce an individual assignment
Scenario
You have been recently hired by a highly credible company in Nepal. Since you are joined recently
stakes are high on you. In the meantime a project comes by asking you to design an application that
requires you to manage an inventory on a shopping mall like Big Mart. Your system should be fully
functional as well as deployable on the server so that the application can be logged into and then
daily transactions be carried out. The transactions carried are categorized as follows:
1. Sales
a. Customer sales:
Customer sales should be able to create a customer and provide a named bill that is tax
valid. For this case you can use the TPIN number of the customer which can be
generally called a PAN number. Every transaction should be recorded in the database
along with the tax amount of the sales.
2. Inventory management:
a. Add item:
Item should be added to the inventory and a unique identifier of each item should be
given so that the code can be pasted on the item which can later be used to retrieve the
information of the item including price and quantity from the database.
items from ever dispatching to the customer. Our ambition is always to put the
customer satisfaction upfront and thrive to deliver the best product and experience a
customer can dream of.
3. Administration
a. User Creation:
Create a user so that the user often a sales boy or a salesgirl can log into and then
generate bills.
b. User Delete:
Whenever your employee leaves the office there should be some way to revoke or
delete the user account so that the credentials passed to the employee would no longer
Your application should be able to edit the information of the employee like address,
contact number which are changed often times while engaged in employment. d. Store
TPIN account:
Your application design should have some functions to save the user details on a
database. The data can be used whenever the user ask to bill to a particular customer
id. Remember you need to have the customer searchable through the TPIN number
and hence eliminate the time it takes to type all the detail while billing.
4. Reporting:
a. Daily Sales report:
Your application should be able to generate the daily sales record aggregating the data
from different sales counter through the store. The data report should contains all sales
from every employee that has billed to each and every individual customer. b. Monthly
sales report:
Your application should be able to generate the monthly sales data with quantity of
each item. This data thus can help the store to stock items that are more common and
hence push the business growth forward. Your report should act as a preliminary data
mining tool to give the store the basic insight on customer behavior regarding the
items you sell.
Your application should be able to generate monthly sales report based on specific
user. From here the store can learn which employee is performing the best and thus
can reward for further motivation.
Criteria:
Part 1 (LO1, LO2): Produce a Report including by analyzing a business related problem and
deduce a solution including a set of initial requirements & Use design and development
methodologies with tools and techniques associated with the creation of a business application:
● Explore a business- related problem and produce a well- defined Problem definition
Statement supported by a set of user and system requirements.
● Determine any areas of risk related to the successful completion of your application.
● Analyze a business- related problem using appropriate methods and produce a wellstructured
Software Design Document that defines a proposed solution and includes relevant details on
requirements, system analysis, system design, coding, testing and implementation.
● Research the use of software development tools and techniques and identify any that have
been selected for the development of this application.
● Compare the differences between the various software development tools and techniques
researched and justify your preferred selection as well as your preferred software
development methodology.
● Justify the tools and techniques chosen to realize a custom built website. Justify your
preferred selection of tools and techniques in deducing an appropriate solution to a business
related problem
Part 2 (LO3): Produce Presentation slides and show plan and produce a functional business
application with support documentation:
● Effectively reviews your business application, problem definition statement, proposed
solution and development strategy. Use this presentation as part of a peer-review and
document any feedback given.
● Develop a functional business application based on a specified business problem.
Part 3 (LO4): Evaluate the performance of a business application against its Software Design
Document and initial requirements:
● Review the performance of your business application against the Problem Definition Statement
and initial requirements.
● Analyze the factors that influence the performance of a business application and use them to
undertake a critical review of the design, development and testing stages of your application.
Conclude your review by reflectively discussing your previously identified risks.
● Critically evaluate the strengths and weaknesses of your business application and fully justify
opportunities for improvement and further development.
11
Tau Maya Gurung ((BTEC HND in Computing/ Third Semester)
Note: Please access HN Global for additional resources support and reading for this unit. For
further guidance and support on report writing please refer to the Study Skills Unit on HN Global.
Link to www.highernationals.com
12
Tau Maya Gurung ((BTEC HND in Computing/ Third Semester)
Other Recommendations:
I declare that all the work submitted for this assignment is my own work or, in the case of group
work, the work of myself and the other members of the group in which I worked, and that no part
of it has been copied from any source. I understand that if any part of the work submitted for this
assignment is found to be plagiarized, none of the work submitted will be allowed to count
towards the assessment of the assignment.
13
Tau Maya Gurung ((BTEC HND in Computing/ Third Semester)
14
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Table of Contents
Introduction..................................................................................................................................................3
Problem Statement...................................................................................................................................3
Why Is It So Hard to Write an Effective Problem Statement?.....................................................................3
Business Related Problem:.......................................................................................................................4
Employee performance:...............................................................................................................................4
Measurement:...............................................................................................................................................4
Poor Marketing:............................................................................................................................................4
Server Reliability:........................................................................................................................................4
Technical Problems:.....................................................................................................................................4
Security:.......................................................................................................................................................5
Operational Risk:..........................................................................................................................................5
Solutions for the problem faced on business:...........................................................................................5
Identifying verification:................................................................................................................................5
Generating targeted traffic:..........................................................................................................................6
Increasing trust with visitors:.......................................................................................................................6
Most Common Project Risks........................................................................................................................7
Other Types of Risks................................................................................................................................7
Description of Risk...................................................................................................................................7
Market Risk:.................................................................................................................................................7
Communication risk:....................................................................................................................................8
Resource risk:...............................................................................................................................................8
Technical risk:..............................................................................................................................................8
Customer risk:..............................................................................................................................................8
Maintenance risk:.........................................................................................................................................8
Ways to manage the risk...........................................................................................................................8
1. Planning:..........................................................................................................................................11
2. Requirement analysis:.....................................................................................................................11
3. Design:............................................................................................................................................12
4. Coding:............................................................................................................................................13
5. Testing:............................................................................................................................................13
Introduction:...........................................................................................................................................14
Iterative model:..........................................................................................................................................14
15
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Marketing Automation.............................................................................................................................110
Inventory Management.............................................................................................................................110
Creating Strong Subject Lines..................................................................................................................110
Product Recommendations.......................................................................................................................110
Conclusion:...........................................................................................................................................111
● P6 Review the performance of your business application against the Problem Definition Statement and
initial requirements:..................................................................................................................................112
• Hardware requirement:.........................................................................................................................112
• Software................................................................................................................................................112
• Test Detail (For Each Test):..................................................................................................................112
• Test level:..............................................................................................................................................112
• Test schedule:........................................................................................................................................117
• Test case................................................................................................................................................117
• Results compared to reality...................................................................................................................117
User Manual.........................................................................................................................................119
For Admin.................................................................................................................................................119
Application Complexity:..........................................................................................................................119
Application Design:..................................................................................................................................120
Application Testing:.................................................................................................................................120
The Capability to Identify Issues.............................................................................................................121
The infrastructure and components of the application service:................................................................121
The Network:............................................................................................................................................121
The dynamic IT environment: Virtualization and the cloud:...................................................................122
The web browser:.....................................................................................................................................122
People: Communication:..........................................................................................................................122
Lack of proactive monitoring:..................................................................................................................122
D3 Critically evaluate the strengths and weaknesses of your business....................................................122
application and fully justify opportunities for improvement and further development:..........................122
Conclusion:...............................................................................................................................................125
18
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Introduction
I have been employed by a highly reliable firm in Nepal. Recently, I entered, the stacks are heavy on me.
And I was asked to develop an application that would enable me to handle an inventory at a shopping
mall like Big Mart. Before beginning a project, it would be very useful for me to understand the business
model as well as the various types of risks inherent in the business process as well as the different
software methodologies that I will describe in this article.
dilemma often affects the long-term viability of a company. The following are illustrative examples of
the issues of busines.
Employee performance:
Employees who do not have inspiration, talent, diligence or ethical standards. For example, retail
locations with low customer loyalty due to poor management and staff that are not polite, supportive or
consistent.
Measurement:
A company that is unable to identify challenges when its metrics and benchmarks fail to detect
substantial underperformance. For example, a company that actively cuts unit costs without adequately
assessing output or product scores. This may result in a lack of consistency and a loss of brand
credibility and market share.
Poor Marketing:
Marketing is a very critical concept for online business success. But many online company owners do
not have a very well-planned or executed marketing strategy. Most internet company owners cannot rely
on search engines alone to send consumers and should instead have a range of marketing tactics, such as
ads, news releases, social networking and blogs. By providing contact details, privacy and security
information and quality customer support, the site needs to build customer trust.
Server Reliability:
Basically, no web host can handle 100% reliability or have uptime when the site is running. At this point,
much of the server will fail, and our website will go down with it. The explanation behind the collapse of
a web server or domain could be the fault of the site, whether it's because of too much traffic or
bandwidth use, or the site script doesn't like it. It's also known as the web host problem. The best
approach to this issue might be to periodically back up our website to our local machine or third party
servers, and to use a web host with good uptime efficiency.
Technical Problems:
It is normal if there is an issue with the company in technological systems. During online company start-
ups, we can see a lot of challenges. There could be a synchronization problem where the site owner is
attempting to run the script-coded data that the website executes, such as a form request or an application
that does not fit with the servers of the host provider. There could also be an issue with the coding of the
site or the programming of the script. It would be easier to identify and correct these problems as there is
more awareness of the site owner and his webmaster.
Security:
Security vulnerabilities can also cause a lot of problems on our pages. For eg, it can bring down
our web, it can destroy our online image, and it can also endanger our customer's secure details. It is very
risky to run a successful online business while protecting the information, particularly payments. There
has to be a very high level of protection on socket layers if web services make payments. Hacking issues
20
Amar Thapa ((BTEC HND in Computing/ Third Semester)
can be avoided by using unique, impenetrable login and passwords to enter the administrative portions of
our platform.
Operational Risk:
Understand the organizational essence of the capability you support and the threats to end-users, their
missions and their execution of the capabilities. Understanding the organizational need/mission (see
the System Engineering Guide's Concept Development theme) will allow you to understand the
seriousness of the risks and the effect they could have on end-users. This is a vital aspect of the risk
identification of real-world impacts that will occur if there is a risk during operational use. .
Typically, operational users are willing to accept some level of risk if they are able to accomplish
their mission (e.g., mission assurance), but you need to help users to understand the risks they are
accepting and to assess the options, balances, and alternatives available.
Identifying verification:
At first, we can look at the symbols of dubious actions and duties. Basically, this is due to especially
high value or massive requests, the identification of false phone numbers and email addresses, the
verification of zip codes and much more. Whereas submitting an authentication connection or code
while a customer is trying to sign up with a text message or email is truthful. As an automatic call,
the customer might also dial out with the purchase of COD when telling them to confirm the delivery
address.
21
Amar Thapa ((BTEC HND in Computing/ Third Semester)
22
Amar Thapa ((BTEC HND in Computing/ Third Semester)
(P2) Determine any areas of risk related to the successful completion of your
application:
The risk related to the successful completion of our application are as follows:
Strategic risks result from errors in strategy, such as choosing a technology that can’t be made to
work.
Operational risk includes risks from poor implementation and process problems such as
procurement, production, and distribution.
Market risks include competition, foreign exchange, commodity markets, and interest rate risk,
as well as liquidity and credit risks.
Legal risks arise from legal and regulatory obligations, including contract risks and litigation
brought against the organization.
Risks associated with external hazards, including storms, floods, and earthquakes; vandalism,
sabotage, and terrorism; labor strikes; and civil unrest.
Market Risk:
Before the execution of the application, we must carry out a thorough investigation of the consumer
requirements, recalling as a primary consideration that we do not build and dispatch an application that
23
Amar Thapa ((BTEC HND in Computing/ Third Semester)
is not needed on the market or requested by the customer. We need to discuss and understand the
demands of e-commerce in order to carry out predictive surveys.
Communication risk:
There should be continuous communication between the designer and the consumer for the progression
of the program. On these sides, if there is luxation in communications, we can't boost the submission. It
is notable that they are on a common track in the timeframe for improvement. More on the engineer
should have a good outlook on the final outcome, and the other user would be prompted by deadly
malfunctions.
Resource risk:
Asset dependency occurs when a lightweight program is subject to shared assets such as memory,
server, or gifted personnel as a scalable application that depends on the accessibility of these assets.
Stage dependence means that when programmers assemble an application, the highlights depend on the
stage. For example, the Android and IOS client apk document is special. In order to preserve a technical
gap from these types of blunders, we need to make the interface and logic code exceptional in order to
modify the interface part of the different operating systems.
Technical risk:
The most dangerous is a specialized threat, because the development of an android device is a
specialized task called coding by the developers. A part of the definition that is recalled for the special
hazard is an estimate that helps to outline the role that can be explained in order to avoid specialized
error later on the progress of the application. Stage should be chosen to such a degree that the
application can be carried out in a practicable manner, which should usually be steady and checked.
Testing can be done using various technologies so that we do not face the problems when the application
is submitted to the market.
Customer risk:
The database or the client itself is another threat when setting up the program. With regard to the
improvement of the application, we should have a good understanding of the needs of the consumer and
the customer prior to the progression of the undertaking. Commonly, because of the lack of specialized
expertise on the customer, the needs are not clearly indicated. Inappropriate evaluation of the client's
desires results in a lack of time which also affects the nature of the use transmitted.
Maintenance risk:
There are risks associated with the dispatch of a portable program. In this way, providing assistance
after discharge is the most important thing for the achievement of the piece. It is imperative that the
highlights of the product are constantly updated. Along these lines, the flexible application can obtain
new stage changes and provide assistance. In addition, this meets the changed needs of clients, who
need constant changes and consideration.
Ways to manage the risk
Success of the program relies entirely on the factor of how the threats are managed or addressed with the
tools. The approach to finding threats, assessing them and taking steps to keep them from turning into
major issues is called risk control in the software development process. This process usually involves
24
Amar Thapa ((BTEC HND in Computing/ Third Semester)
risk management and monitoring for the stable development of the system. In the risk evaluation, the
different threats that could be present in the environment are described, assessed and prioritized first.
Since organizing the various tactics, these strategies are applied and the threats are overcome in order to
achieve full control of the system.
on the project. But what happens if the risk has a good impact? For eg, is there a chance that live
sessions are so successful that we don't have enough time to do the demonstrations? This is a good
danger – something that will help the project and the business if it happens. In those situations, we want
to optimize the probability that the risk will unfold, not deter it from happening or pass the gain to
someone else!
Table: Milestone schedule for ‘Inventory Management System of Big mart (Shopping Mall)’
The table is a milestone timetable for our group. The tasks listed in the table are the most important
tasks for our project. Tasks that include preparing a project scope plan, discussing the budget,
gathering facts, preparing a financial report, etc.
The milestone schedules are essential to the contractor because they help to complete the project on
time. These date points will be a motivation for the participants of the working party. We will be able
to obtain correct reports from the activities we do as the projects are performed on schedule and
there will be no burden due to incompetence on the part of the staff at the outset or at the
implementation of the project. This will lead the project towards success and will also make a good
impression of the team. This can be a working spirit for the future works too.
26
Amar Thapa ((BTEC HND in Computing/ Third Semester)
(Reddy, N.D.)
Requirements Points
Sales Ought to have the option to make client deals, putting
away it through TPIN number creating the exchange
record including charge.
Inventory management Ought to have the option to include, alter and erase item.
Reporting Ready to produce every day and month to month deals
report, alongside worker deals report
3. Design:
27
Amar Thapa ((BTEC HND in Computing/ Third Semester)
The organization of the structure begins with the imaginary layout in the normal winding and includes
the construction plan, the rational configuration of the components, the structure of the actual object and
the last structure in the following spirals. In the midst of providing all the necessary details relating to
the stock organization, I have to make arrangements. To organize the undertaking first, I will render a
sorted blueprint, such as UML, Client case, etc, using the requisite Visio gadgets arranging program.
Description: If the user checkout, the user will go to the shopping center and calculate the total
price of the product. If the user checkout, the user will give payment by e-sewa.
Description: If the user views items, they will add to wish list and the customer will authenticate
the items. If the user will view the items, they will add the product to the wish list and the
customer will include the customer authentication.
28
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Description: If the web customer views the items, the server will authenticate the items. The
registered customer will make purchase and the payment will be from e-sewa.
4. Coding:
The Develop Arrangement means the age of the true programming stuff at each winding. In the
check winding, when the stuff is essentially conceived of and the scheme is being created, a POC
(Idea Verification) is being made right now to get an overview of the consumer. By then, in
subsequent spirals of higher clarity of parameters and set-up subtleties, the working model of the
item called "produce" is rendered with a modification amount. This fabrics are submitted to the
consumer for feedback.
5. Testing:
Right after all the preparation relating to the task is completed, then the effort is carried out through
the training stage where the unit tests, teamwork tests are carried out to find support for the
undertaking. Some evaluation is performed at the time of the organization, and some are in the
actual consumer situation.
29
Amar Thapa ((BTEC HND in Computing/ Third Semester)
(D1) Justify the tools and techniques chosen to realize a custom-built website. Justify
your preferred selection of tools and techniques in deducing an appropriate solution
to a business-related problem.
Introduction:
SDLC stands for the Lifecycle of Software Development. The life cycle of software development is a
life cycle, the main purpose of which is to create a high-quality product or software that satisfies user or
customer needs, that performs reliably and efficiently in the existing and anticipated information system
and technology facilities, and that is also not costly to sustain software. So, essentially, this life cycle
helps with every scenario and every action, from cost to quality to maintenance.
Iterative model:
The Iterative Model provides reference to earlier processes in which the variations are produced. The
final performance of the project was renewed at the conclusion of the Software Development Life Cycle
(SDLC) phase.
30
Amar Thapa ((BTEC HND in Computing/ Third Semester)
1. Requirement gathering & analysis: In this phase, requirements are gathered from customers and
check by an analyst whether requirements will fulfil or not. Analyst checks that need will achieve within
budget or not. After all of this, the software team skips to the next phase.
2. Design: In the design phase, team design the software by the different diagrams like Data Flow
diagram, activity diagram, class diagram, state transition diagram, etc.
3. Implementation: In the implementation, requirements are written in the coding language and
transformed into computer programmers which are called Software.
4. Testing: After completing the coding phase, software testing starts using different test methods. There
are many test methods, but the most common are white box, black box, and grey box test methods.
5. Deployment: After completing all the phases, software is deployed to its work environment.
6. Review: In this phase, after the product deployment, review phase is performed to check the behavior
and validity of the developed product. And if there are any error found then the process starts again from
the requirement gathering.
7. Maintenance: In the maintenance phase, after deployment of the software in the working
environment there may be some bugs, some errors or new updates are required. Maintenance involves
debugging and new addition options.
31
Amar Thapa ((BTEC HND in Computing/ Third Semester)
development and appraisal of programs. The next loop is design and implementation and subsequent
testing.
Planning
Risk Analysis
Engineering
Evaluation
Planning
The preparation process involves required processing where the consumer gathers and records
the necessary information. Documentation of code specification for the next step is made.
Risk Analysis
At this point the best solution for the risks involved is chosen, and testing is carried out through the
design of the model.
For example, it may be that the data access speed is too fast when accessing the information from a
remote server. A model of the data access subsystem can be used in order to solve the threat.
Engineering
Once the risk analysis is done, coding and testing are done.
Evaluation
Customer evaluates the developed system and plans for the next iteration.
32
Amar Thapa ((BTEC HND in Computing/ Third Semester)
The cost can be high as many iterations can take to achieve the final product in high time.
Many documentation works need to be done in order to systematically develop the process
Small projects in this design are not acceptable
There are many protocols that we need to follow, a question.
Agile Model
Agile is an Iterative or Incremental Process Combination. This design concentrates more on
versatility in the production of a service than on specifications. In Agile, a product is divided into
small progressive structures. It is not developed in one go as a full product. The features of each
building improve. The current design is based on previous features. For agile implementations
sprints are renamed. It takes 2-4 weeks for each sprint. The holder of the company reviews the
product at the start of each sprint and sends it to the consumer after its acceptance. Feedback
from clients is being drawn up for progress and the next sprint will be followed by his feedback
and enhancements. Tests are available.
Every Agile Method's main objective is to adjust and delete. In any case, the way each theory
characterizes the stages of product development is slightly different. In addition, the procedure of each
group can change, despite the fact that the objective is equivalent, depending on the particular
undertaking or circumstance. The whole life cycle of Agile software includes design, explosion, creation,
install, assembly and annuity.
33
Amar Thapa ((BTEC HND in Computing/ Third Semester)
This vision introduces the complete model of the Agile life cycle in the business. Any organization can
carry out projects simultaneously, record multiple sprints / presses in different product lines, and a
number of customers with a range of business needs, both internal and external.
• Requirements - Defines brand backlog, sprint backlog, user and stakeholder reviews criteria
for iteration
• Development -- Computer design and production on a given basis-
• Testing - Testing of QA, internal and external practice, production of documentation
• Delivery - Integration and production of the work iteration
• Feedback - Welcome and meet the requirements of the next version for consumers and
investors
While additional features can be added to the product backlog for the duration of the project, the rest of
the process will consist of repeating over and over again until all items in the product backlog are
fulfilled. The process stream thus is not a linear process but rather a chain.
Scrum: Scrum is an Agile sub-set. It is a lightweight and most commonly used model for agile
development.
A "system structure" is a specific set of procedures to be implemented so that a process is in line with the
framework. "Small" ensures that the complexity of the process is kept as small as possible to maximize
the amount of production time necessary to do beneficial work. (For example, the Scrum process system
includes the use of Sprints project loops, XP framework needs pairing coding, etc.)
A Scrum method is defined by common principles, procedures and three types of tasks, objects, and time
frames, as well as other agile systems. The following are defined, as well as other words used in Scrum.
35
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Scrum uses iterative and incremental practices mostly for managing complex software and product
development. Scrum increases productivity considerably and reduces time to advantages compared to
traditional waterfall methods.
An agile Scrum process benefits the organization by helping it to
36
Amar Thapa ((BTEC HND in Computing/ Third Semester)
37
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Name: Planner enters new contact into address book, so that one can contact the person later by postal or
electronic mail
Description: Planner enters standard contact information (first and last name, two street address lines,
city, state, zip / postal code, country, etc.) into contact-entry screen. One clicks “Save” to keep the data,
and “Cancel” to discard data and return to previous screen.
How to test: Tester enters and saves the data, finds the name in the address book, and clicks on it. One
sees a read-only view of the contact-entry screen, with all data previously entered.[ CITATION cpr \l
1033 ]
Advantages of Agile
• Customer satisfaction with the quick and consistent delivery of helpful technology.
• People and interactions are highlighted instead of processes and instruments. Continuous client,
designer and tester contact.
Disadvantages of Agile
• The commitment needed at the start of the life cycle of software development is difficult to assess in
the case of some deliverables of software, particularly those large ones.
• There is little focus on the need for design and documentation.
• If it is not clear to the consumer agent how much the final results we want, the plan can safely move
forward.
• Only senior programmers can take the kind of decisions required during the development phase. It thus
has no room for newbie programmers except in tandem with professional capital.
38
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Note that you can create more than one sprint, if you want to plan work several weeks in advance.
39
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Drag and drop issues from the Backlog onto your sprint.
Note that you can also add an issue to your sprint by editing the issue and updating the Sprint field.
Step 3: Start sprint
Once you've added issues to your sprint and the team is ready to work, you'll need to start the sprint.
You haven't started one already. If you want to have more than one active sprint at a time, try the Parallel
Sprints feature, and
40
Amar Thapa ((BTEC HND in Computing/ Third Semester)
The sprint is at the top of the backlog. If you want to start a planned sprint that is lower down, you'll
need to reorder your sprints to move it to the top.
To start a sprint
Go to the Backlog of your Scrum project.
Find the sprint that you want to start and click Start Sprint.
Update the Sprint name and add a Sprint goal if you want to, and select the Start date and End date for
the sprint.
41
Amar Thapa ((BTEC HND in Computing/ Third Semester)
During sprints, teams work together to complete the stories they committed to at the start of the sprint.
This typically requires a lot of collaboration, so we recommend doing team standup meetings every day,
so you know what everyone in the team is working on.
Step 5: Close the sprint
To close a sprint
Navigate to the Active sprints of your Scrum board.
If necessary, select the sprint you want to complete from the sprint drop-down.
Note that if you have multiple sprints in the Active sprints of your board, the 'Complete Sprint' button
will not appear until you select one of the sprints.
Click Complete Sprint. All completed issues will move out of Active sprints.
If the sprint has incomplete issues, you'll be asked to move them to one of the following:
The backlog
Any future sprint, or
A new sprint
WHEN SHOULD I MARK AN EPIC AS DONE?
Mark your epic as done whenever all work for the epic is complete. To make this easier, we recommend
coming up with a clear definition of done for your epic create it. Any stories linked to the epic don't have
to be complete to mark an epic as done.
42
Amar Thapa ((BTEC HND in Computing/ Third Semester)
• I demand that brand satisfaction be the most awesome product necessity, and that the relevant
programming be communicated early.
• Deft strategy embraces the changing needs even in the late development.
• Inclined to the least activities span from two or several weeks to several months. The
transport must be done with the good work scheduling.
• Create a situation that supports every person with their wants and desires and lead them to
complete their work.
• The main element of progress is well-working and reliable programming.
• Simplicity is important for the expansion of the calculation of the procedure not completed.
• Intimate and personal discussion is the most productive and successful technique for
transmitting data into and within a improvement group.
The entire software development process is divided into different stages in the "The Waterfall" strategy.
The result of one phase acts sequentially as the entry for the next phase. This means that each stage of
the development process only starts with the completion of the previous stage. The aquatic method is a
linear design process in which improvement is seen in the creation, study, layout, building, evaluation,
production / implementation and maintenance processes as being gradually backward (like a waterfall).
As shown in the waterfall method, the phase of software development in a linear sequential stream is
also known as a SDLC.
43
Amar Thapa ((BTEC HND in Computing/ Third Semester)
The developed code is thoroughly tested in the testing phase to prevent program errors.
Defects are logging in and re-tested as soon as they are patched. Error recording,
recovery, retrieval testing continues until the software is underway.
Deployment
44
Amar Thapa ((BTEC HND in Computing/ Third Semester)
During the delivery process, after signing off is received by the client, the produced
software is put into service.
Maintenance
The designers who undergo maintenance solve any problems in the production
environment.
A waterfall design is time consuming and cannot be used in short-term projects, as a new phase
cannot be started in this model until this continuous process is completed.
The waterfall model cannot be used in projects that have unpredictable demand or in which the
specification continues to change, as this model assumes that the criteria will remain clear in the
request selection and evaluation process and that any adjustment in the later phases will result in
higher costs, as the changes are needed in all phases.
45
Amar Thapa ((BTEC HND in Computing/ Third Semester)
When precisely when possible, the new system specifications are specified. Typically a number of users
who represent all the units and facets of the existing system are surveyed.
A first version of the new system was designed from the preliminary design. A basic concept design is
developed for the new system. The clients analyze carefully the first model and consider the strengths
and weakness, the inclusion and removal that should be made. This is typically the scaling-down
method, which gives an overview of the features of the finished product. The author receives and
analyzes user comments. Based on the comments provided from users, the first prototype has been
updated and a second device model has been developed.
The previous steps are iterated as often as possible before the users know that the model represents the
intended final product.
Based on the final prototype the final system is built. The final system will be thoroughly assessed and
tested. Routine maintenance is done constantly in order to prevent major failures and minimize
46
Amar Thapa ((BTEC HND in Computing/ Third Semester)
downtime. Some of most popular prototyping tools available include; Marvel App, Pencil Project, Adobe
XD, In Vision App etc.
Customers get a say in the product early on, increasing customer satisfaction.
Failure to detect functionality and errors is easy.
For possible, more complex projects, models can be recycled.
This emphasizes interaction between departments and dynamic design activities.
Consumers understand the working of the service better.
Quicker customer feedback gives a better understanding of client needs.
I. When contrast with traditional designing approaches such as spiral models and waterfalls, the
main drawback of this approach is that time and money are more time-consuming. Since the
model is most often rejected, it may not be seen by other businesses that this strategy has any
benefit.
II. In fact, it can be hard to demand customer feedback early in the development cycle. Another
challenge is that unreasonable demands for reform may be impossible to satisfy. Another concern
may emerge if the customer requests a quicker launch after seeing the model or if he does not
take an interest in teach service.[CITATION htt37 \l 1033 ]
47
Amar Thapa ((BTEC HND in Computing/ Third Semester)
48
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Fig of
home page
49
Amar Thapa ((BTEC HND in Computing/ Third Semester)
50
Amar Thapa ((BTEC HND in Computing/ Third Semester)
This involves the use of various technologies in the development of requirements, such as
brainstorming, evaluation of tasks, systematic analysis, application simulations, FAST, etc. The whole
organized project often outlines the key data, strategies for collecting them and then transforming them
into a streamlined final model. This phase includes the use of developer tools to allow user feedback
and model. This ensures that the data collected in the first stage are re-examined and checked. The
properties of the data set in this process are also defined and explained. The model and implementation
is optimized in this step. This involves the direct deployment of effective digital system methods and
data structures into the final operating material. In this phase, all necessary changes and enhancements
are also made. All interfaces between different modules created by individual teams must be properly
tested. Testing becomes simpler with efficient automated tools and sub-components. The approval test
is conducted by the client.
The advantages of the RAD Model are as follow
The use of recycled materials leads to increasing the work cycle time.
Customer feedback is received in the initial stages.
Using powerful development tools, quality products are improved over a relatively shorter
period of time.
The short version time scales make it easier to meet changing requirements.
The disadvantages of the RAD Model are as follows
Highly skilled technicians are required to use powerful and efficient tools.
The lack of reusable components that result in project failure.
51
Amar Thapa ((BTEC HND in Computing/ Third Semester)
In order to conclude the project on schedule, the team leader has to collaborate together
with programmers and clients.
Unable to modularize the systems appropriately, this model cannot be used.
The cost of using robotic tools and techniques may not surpass the entire budget of the
company for smaller projects, as in these situations.[CITATION htt38 \l 1033 ]
Errors or risks are identified Errors or risks are identified Customer interaction is
and rectified earlier. after the completion of needed more than other
stages. model.
System requirement
Items Requirements
52
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Requirements Points
Sales Ought to have the option to make client deals, putting
away it through TPIN number creating the exchange
record including charge.
Inventory management Ought to have the option to include, alter and erase item.
Reporting Ready to produce every day and month to month deals
report, alongside worker deals report
I have organized the client and framework prerequisites in the above table. Thus, in this area I will
talk about on the foundation of improvement cycle of use. For the improvement I pursue numerous
approaches like agile, spiral, cascade model, and so on every one of the philosophies can be use as
indicated by the size and time of the advancement of use. Be that as it may, for the advancement of
the stock administration I will utilize spiral methodologies.
Conclusion
Programming language is needed all over the world for running the business smoothly without facing
any problems. With the help of those language, software could be developed and also with the user
requirements are also possible. But while developing and conducting any research or project, there
may be risk so proper risk management should be followed to avoid those. This task includes about
programming language, SDLC (Software Development Lifecycle), Problems and solution of
business and also about risks managements.
53
Amar Thapa ((BTEC HND in Computing/ Third Semester)
(P3) Research the use of software development tools and techniques and identify any
that have been selected for the development of this application.
Introduction
Per applicant or customer should be able to make the right plans before beginning to develop the
program in order to get on with it smoothly. The specifications should be reviewed beforehand and the
step of developing the program should also be checked. In order to be properly prepared, various tools
and methodologies can be used and the coding component should be used in the program. Programming
languages are used to prepare the applications.
In this job, I am essentially going to write a detailed containing the tools and methodologies for
designing software that satisfies the framework specifications and develops with the requirements of the
customer. There are different kinds of techniques and software that can be used for this mission. But the
resources and technology that I will use in my project are programming language tools, software design,
UML diagrams, ER-Diagram, Database Software for recording detailed details, and some of the
frameworks that are essential.
Programming language:
A vocabulary or collection of grammatical rules to command a computer or a computer to perform some
particular activity is known as the programming language. High-level languages such as BSACI, C, C+
+, Pascal, and COBOL, and so on, are referred to as programming languages. There are essentially two
kinds of programming language, i.e. high-level programming language and low-level programming
language.
1) High-level programming language: A programming language which enables a programmer to
write programs which are more or less independent of a particular type of computer is known as
high level programming language. They are closer to human languages and additional machine
languages, so they are known as high level languages. The main merit of high level languages
over
low level languages is that they are much easier to read, write and maintain. By the end of the
day, each and every programs written in a high level language must be translated into machine
language by a complier or interpreter.
54
Amar Thapa ((BTEC HND in Computing/ Third Semester)
2) Low level programming languages: A programming language that contracts with a computer’s
hardware components and constraints is known as low-level language. It usually works to
manage a computer’s operational semantics and has no abstraction in reference to a computer. A
computer’s native language is also referred to the low level programming language. The two
popular examples of low level languages are machine language and assembly language.
UML Diagram:
The UML (United Modeling Language) diagram with the purpose of visually portraying the
scheme together with its key characters, functions, classes and behaviors is known as the UML
diagram. The key feature of the UML diagram is to better interpret, modify, preserve or record
machine information. The UML is recognized as the standard for modeling software development
by the Object Management Group (OMG).
55
Amar Thapa ((BTEC HND in Computing/ Third Semester)
2) UML diagram add the capability to describe a hierarchy and decay a software system into
components and sub-components.
3) UML diagram has been used as over-all drive modeling language in the arena of software
engineering.
4) UML diagram deliver both a more consistent way of modeling workflows as well as a wider range of
structures to recover readability and effectiveness.
Current UML standards call for 13 distinct diagram types: class, operation, object, use case, sequence,
set, state, variable, communication, composite structure, interaction description, timing, and
implementation. These diagrams are organized into two separate groups: structural diagrams and
behavioral diagrams or relationship diagrams.
56
Amar Thapa ((BTEC HND in Computing/ Third Semester)
• Composite Structure Diagram: Component UML diagrams can help break down the system into
smaller components when dealing with documentation of complex systems. It might
encompasses several departments or it might employ various kinds of technologies as it is hard to
depict the architecture of a system sometimes.
• Relationships among entertainers and use cases – spoke to utilizing straight bolts.
• Interaction Overview Diagram: Communication outline charts are a mix of action and
arrangement graphs. They model a grouping of activities and let you deconstruct progressively
complex associations into sensible events. You should utilize a similar documentation on
connection outline charts that you would see on an action graph.
• Timing Diagram: A planning graph is a kind of social or communication UML chart that centers
on forms that happen during a particular timeframe. They're an extraordinary case of a grouping
outline, with the exception of time is appeared to increment from left to directly rather than top
down.
• Communication Diagram: Correspondence outlines model the connections between objects in
succession. They depict both the static structure and the dynamic conduct of a framework. From
multiple points of view, a correspondence chart is a streamlined adaptation of a joint effort graph
presented in UML 2.0.
• State Diagram: State outline graphs, presently known as state machine charts and state graphs
portray the dynamic conduct of a framework in light of outside upgrades. State outlines are
particularly valuable in demonstrating responsive items whose states are activated by explicit
occasions.
ER Diagrams
The ER-Diagram (Entity Courting Diagram) indicates the relationship between the entities contained in
the database. In this case, an object is a knowledge factor. A group of comparable entities is referred to as
a set of entities and such entities have characteristics that describe their residences. The conceptual
structure of the database is explained by the use of the ER diagram bye, which defines the persons,
58
Amar Thapa ((BTEC HND in Computing/ Third Semester)
characteristics and displays the dating between them. Models use a given collection of symbols, such as
rectangles, diamonds, ovals and connecting lines, to symbolize the interconnection of persons,
relationships and their attributes. It is planned to use Peter Chen in 1987.
Advantage of Er-Diagram
"Conceptually it is quite simple: ERD is very simple, if we recognize about the relationship
among entities and attributes then we will without difficulty draw an ERD."
"Better visual illustration: As it is a diagrammatic representation of any logical structure of
databases, by using looking ERD, we can without problems understand relationship of entity
sets in databases."
Entity
An individual can be a person, location, event or object that is important to a given system. For example,
the school system can include pupils, teachers, main courses, subjects, fees and other topics. Entities are
represented by a rectangle in ER diagrams and called using singular nouns.
59
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Weak Entity
A weak entity is an entity which depends on the presence of another entity. More technically, it can be
described as an object that cannot be distinguished by its own attributes. It uses an international key,
together with the assigned key, to form the primary key. An object like an order item is a fine example of
this. The object of the order would have no value without the order, because it depends on the life of the
order.
Attribute
An attribute is a property, trait, or characteristic of a person, association, or other attribute. For eg, the
Inventory Item Name attribute is the Inventory Item attribute of the organization. An object should have
as many characteristics as it needs. In the meanwhile, attributes will also have their own special
attributes. For eg, the "customer address" attribute may have number, street, area, and state attributes.
They're called composite characteristics. Notice that certain top-level ER diagrams do not show
attributes for the sake of convenience. In those which do, however, attributes are expressed by oval
shapes.
Relationship
A partnership explains how people communicate with each other. For example, the "Carpenter" entity
can be linked to the "Bench" entity by the "Builds" or "Makes" relationship. Relationships are defined by
diamond forms and are labelled by verbs.
60
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Relationships
Relationships are represented by using an energetic or passive verb in the diamond that connects the
associated entities.
Connectivity’s
The relationships are written next to each entity box.
Relationships
Relationships are represented by an active or passive verb that connects the related entities.
Connectivity
Connectivity’s are indicated by symbols next to entities.2 vertical lines for 1.
• Cardinality indicates what number of occurrences of a substance identify with one occasion
of another element. Ordinarily is likewise firmly connected to cardinality. While cardinality
determines the events of a relationship, ordinarily portrays the relationship as either
obligatory or discretionary. At the end of the day, cardinality determines the most extreme
number of connections and cheerfulness indicates without a doubt the base number of
connections. There are numerous documentation styles that express cardinality.
61
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Database Software
The software or utility used to create, edit and manage database files and documents is known as
database software. This types of applications allow users to store data in the form of hierarchical tables,
columns and fields that can be accessed directly or by programmatic access. Database software is also
known as database management software (DBMS), but both concepts are not quite the same.
Most Database Management Software List
Below is a list of the most popular database management systems-
1. PHP MyAdmin: PhpMyAdmin is a free software tool written in PHP, intended to handle the
administration of MySQL over the Web. PhpMyAdmin supports a wide range of operations on
MySQL and Maria DB. Frequently used operations (managing databases, tables, columns, relations,
62
Amar Thapa ((BTEC HND in Computing/ Third Semester)
indexes, users, permissions, etc.) can be performed via the user interface, while you still have the
ability to directly execute any SQL statement.
2. Microsoft Access: Microsoft Access is a Database Management System (DBMS) from Microsoft
that combines the relational Microsoft Jet Database Engine with a graphical user interface and
software development tools. It is a member of the Microsoft Office suite of applications, included in
the professional and higher editions.
3. Microsoft SQL Server: Microsoft SQL Server is a relational database management system
developed by Microsoft. As a database server, it is a software product with the primary function of
storing and retrieving data as requested by other software applications—which may run either on the
same computer or on another computer across a network
4. MySQL: MySQL is the most popular Open Source Relational SQL Database Management System.
MySQL is one of the best RDBMS being used for developing various web-based software
applications. MySQL is developed, marketed and supported by MySQL AB, which is a Swedish
company. This tutorial will give you a quick start to MySQL and make you comfortable with MySQL
programming.
Conclusion:
After completing this mission, I'm here that a different coding scheme is used, and different database
software is used to record the data on your computer. With the benefit of careful planning and the use
of various methods and methodologies, there could be a proper implementation of applications that
could satisfy device and consumer specifications. ER-Diagram and UML Diagram are also essential
for software development.
(M2) Compare the differences between the various software development tools
and techniques researched and justify your preferred selection as well as your
preferred software development methodology.
Comparison of Software Development Tools & Techniques
I've already mentioned the methods and strategies for software creation that we can select from. In
this part, I will outline and compare these methods and techniques extensively. Tools that we will use
63
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Prototyping tools
Prototype is an early sample, model, or release of a product built to test a concept or process of the
product we are planning to work on in the future. They are considered to be the tools for
demonstration of our ideas, and in doing so can change the way we design. The tools that I discussed
was; Adobe XD and Pencil App. Let’s compare these two top picks:
Based on Adobe XD Pencil App
Best for Businesses of all sizes can use this It is an on-premise Graphical User
tool to design contents and show the Interface prototyping application
exact colors for creating wireframe and
mockups using built-in drawing
shape collections and several other
features
Looking into this find Adobe XD appropriate for Big Mart Application.
64
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Since we are working with C# with .NET Core MVC, we have to use Visual Studio as our IDE for
application development of Big Mart.
to
GitHub
Not just because GitHub contains more repositories or has trust by many users. There are lots of
reasons to use it. It is easy tool to use and can be used using console too (Command Prompt in
Windows & Terminal in Mac or Linux). We will use GitHub for this and will think about other
source control tools in the future.
Hence, using all these tools for development of Big Mart application.
Development Environment:
For the development environment of insurance company, I have chosen the following tools and
techniques:
We are working with C# with .NET Core MVC, we have to use Visual Studio as our IDE for
application development of Big Mart.
.Net was developed by Microsoft as a software framework in 2002. It is pronounced as dot net and
comprises various coding languages, libraries, and editors. You can build a wide array of applications
in the .Net framework. These are web applications, mobile applications, games, cloud, Internet of
Things (IoT), etc.
Dot Net features a huge library that contains lots of readymade pieces of code. We can categorize the
libraries as per various departments like encryption, security, database access, etc. The readymade
code offers support to both simple as well as complex data structures.
66
Amar Thapa ((BTEC HND in Computing/ Third Semester)
• The Visual Studio IDE is one of the most popular and best IDE web development options
available. It uses AI to learn from your edits as you code so it can finish your sentences – er,
lines of code.
• On top of that, you can collaborate with your team, live, when you’re editing and debugging.
You can also share servers, terminals, and comments.
• Visual Studio supports web, mobile, app, and game development, ASP.NET, Python, Node.js,
C++, Unity as well as support for Azure.
• You can also create development environments in the cloud and a lot more while being
available for Windows, Mac, Android, iOS, web, and in the cloud.
Justification
As I used the Pencil app for a prototyping tool, it's easy to construct a product model. We used built-
in elements such as url bar, buttons, windows, etc. So, the pencil app is very handy in its own way. I
used the visual studio with our IDE to create Big Mart applications. Then I stored all my data and
codes in the GitHub as GitHub has unrestricted public repositories. GitHub has a decent gui for the
user. So, these are the tools and techniques that I've used, and I've compared the various tools and
techniques for software creation.
67
Amar Thapa ((BTEC HND in Computing/ Third Semester)
68
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Part 2
69
Amar Thapa ((BTEC HND in Computing/ Third Semester)
70
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Tight Schedules
Project managers also face the burden of trying to execute the project faster than expected. This can
happen for a variety of reasons – lack of funding, inadequate preparation, or even technological glitches.
What the hell should you do? Often, the only thing you really need is more money. Project managers call
this tactic 'Crashing the Timeline' where more staff members are tagged on the crucial paths of the
project. This greatly decreases the time taken, but on the other hand, confusion can still be created if not
properly managed. But choosing the right engineers can be quite a challenge. This is where certain
businesses outsource the implementation of their applications to foreign suppliers for the period of
project. Alternatively, going offshore and building your own development team and scaling it
quickly, can also prove to be beneficial, especially in the long run. That being said, one must also be
aware of the risks in offshore software development, especially when engaging with the wrong partner.
Budget Changes
Budget changes are frequent occurrences, especially in software development projects. The common
cause for this to happen is 'scope creep.' Scope creep is when you launch your project with a collection
of straightforward, well-defined criteria, but as you reach the finish line, so many requirements are
introduced or removed that what you have left with is one huge mess.
Often times, the engineers may struggle to grasp the technical specifications of the project and
incorporate additional features in an effort to produce an improvised version of the original project. And
if the customer doesn't ask for it, they're left with a superior option, but with a larger price tag added to
it.
What the hell should you do?
Double-check if the staff is mindful of the exact project specifications. Talk to them about the change
management mechanism and how they can just focus with what has been authorised. If the list of
conditions continues to climb, it is time to take a step back and analyze which improvements will lead to
71
Amar Thapa ((BTEC HND in Computing/ Third Semester)
a positive result and which ones will not. The trick is to remain as true to the original aims and objectives
of the project as possible, without losing the consistency of the production.
Technical Difficulties
Data security, information privacy, large-scale system implementation, software integration, and
compliance are some areas where you are likely to run into unpredictable problems.
Poor Management
This may be a no-brainer, but it is sadly ignored in many initiatives. While many which blame budget
overshoots and time pressures for the failure of software programs, the real cause is often bad
management.
The right project manager would be able to plan plans effectively to ensure that the risks involved with
the project are minimized. Furthermore, by practicing good coordination with the staff, creating a solid
organizational structure and introducing elaborate documentation procedures, the number of projects that
fail can be substantially decreased.
Solutions For Business applications:
It's never easy to equip workers with the digital resources they need to deliver the best for a company. It
is not enough for solutions to be safe, stable, adaptable and resilient. They have to be easy to use. It is
also critical that the approach uses validated technology and be designed by professional staff.
Fingent will equip a company with the next generation business network. We also supported all kinds of
enterprises, using mobile technology, optimized the use of data, leveraged the strength of the Internet,
integrated corporate networks, and promoted their marketing with social media. Contact us now to
discuss how we can support your company to build on the new technologies.
Technology Consulting:
Fignent helps you adopt the right IT Strategy for your business, craft simple solutions to seamlessly
drive your business objectives. Furthermore, our delivery practices enable us to align our solutions
with your business objectives.
72
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Mobility:
Smartphones and tablet computing have created new business opportunities, especially by providing
personalized services to customers. Organizations are also utilizing the advantage of mobility to
connect with field agents and vendors better.
73
Amar Thapa ((BTEC HND in Computing/ Third Semester)
unsafe transit that happens on an unsafe Wi-Fi link. This kind of authentication is accomplished by
encryption and SSL (Secure Socket Layer) certificates, and if we forget to use the correct SSL
libraries, sensitive user details can be at risk.
Performance of App:
Customers hate when applications crash or slow down or hung up for a few seconds. As a result,
consumers will leave a one-star rating and a negative review of the app, leaving it. Mobile App
crashes can also cause problems like missing user data. Organizations need to understand Memory
Management, Software Lifecycle, Inadequate Testing, Network Management, Error State and
Exception Management when developing app creation strategies. The application success can be
hindered by the use of third-party service providers such as advertisement systems and analytics.
Monetization strategy:
Apps are now big business. Analysts have predicted that app-related sales would surpass more than $70
billion by 2017. (Source of the company: McKinsey & Company). In-app sales and in-app ads are things
that marketers should plan ahead of the introduction of the smartphone app. Intelligently structuring the
smartphone applications provides an enormous incentive to turn guests to customers. You can start
freemium applications where basic facilities are offered free of charge while all advanced features are
charged. The trick is to disperse the capabilities of the app in such a way that the user is leaning towards
the feeling of using the chargeable features. . This call-to-action should display intertwined functionality
that will eventually lead consumers to buy the whole kit.
There is no question that in-app advertising brings money, but will offend users if it is not well
implemented. Mobile advertisements enable software companies to make money without charging their
customers for money, eliminating the cost obstacle to buying the app, and promoting free downloads.
Mobile app providers' aim is to create a large user base and collect valuable information to sell to other
advertisers who pay to put targeted advertising in the mobile app.
We made a presentation as we were on the same team. The introduction involves the effective analysis of
our market application, the issue specification statement, the potential approach and the implementation
plan. The business application features are also available in the presentation. The presentation includes
the implementation of the problem statement. The function of the problem statement and the issue
relevant to the business application is also included. The presentation includes the various development
strategies that are essential for the business application. Finally, part of the inference is included
74
Amar Thapa ((BTEC HND in Computing/ Third Semester)
75
Amar Thapa ((BTEC HND in Computing/ Third Semester)
76
Amar Thapa ((BTEC HND in Computing/ Third Semester)
77
Amar Thapa ((BTEC HND in Computing/ Third Semester)
78
Amar Thapa ((BTEC HND in Computing/ Third Semester)
79
Amar Thapa ((BTEC HND in Computing/ Third Semester)
80
Amar Thapa ((BTEC HND in Computing/ Third Semester)
81
Amar Thapa ((BTEC HND in Computing/ Third Semester)
82
Amar Thapa ((BTEC HND in Computing/ Third Semester)
83
Amar Thapa ((BTEC HND in Computing/ Third Semester)
84
Amar Thapa ((BTEC HND in Computing/ Third Semester)
85
Amar Thapa ((BTEC HND in Computing/ Third Semester)
86
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Admin roles:
• Manage categories
• Manage orders
• Sales report management
Functional Description
1. Login
Use Case Name User Login into system
Actor User
Description User login into system and used it
Requirements Provides valid value of username and password
Pre-conditions User has login into systems
Post-conditions Login success and actor can use system
Basic flow Actor Action System Response
• User provides valid value of • System will display the
username interface suitable for each
• User provides valid value of account if the user logs in to
password the correct account
87
Amar Thapa ((BTEC HND in Computing/ Third Semester)
2. Logout
Use Case Name User log out of the system
Actor User
Description User can log out of the system after
use
Pre-conditions Actor has login into systems
Post-conditions Logout success
Basic flow Actor Action System Response
• User click “Logout” • System logs out the user
account and displays the
login layout
3. Create Account
Use Case Name Admin can create new account
Actor Admin
Description Admin want to create new account
Requirements The administrator selects the corresponding role for the account that
they want to create
Pre-conditions Actor has logged as Admin
Post-conditions Create a successful account
Basic flow Actor Action System Response
• Actor login system by admin • The system will save the new
account account created in the
• Administrator chooses the database
role they want to create
account
88
Amar Thapa ((BTEC HND in Computing/ Third Semester)
• Administrator provides
username
• Administrator provides
password
• Administrator provides
password again (must true
with previous)
• Administrator click Create
button when done
4. Order Item
Use Case Name Customer login to the web app
Actor Customer
Description Customer wants to order items
Requirements Actor selects the item
Pre-conditions Actor select the item and click the order option
Post-conditions Order successful
Basic flow Actor Action System Response
• Actor login to the system • The system will save the in
the database
• Actor selects the items
• Order the item
89
Amar Thapa ((BTEC HND in Computing/ Third Semester)
7. Payment Process
Use Case Name Customer login to the system
Actor Customer
Description Actor want to revoke damaged items
Requirements Customer wants to pay money.
Pre-conditions Customer click on check out option and fill up the form and click pay.
Post-conditions Payment Successful
Basic flow Actor Action System Response
• Actor login to the system • The system will record the
payment in the database.
• Admin selects the payment
option
90
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Here, I have built the prototype of An Inventory Management System of Big Mart. It defines how our
product is going to be it looks and User interfaces.
Prototype of Register page: It indues all the details we are going to make in a registration
form of our actual web-application.
Log In page: it describes the function, features and looks of login page.
91
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Home Page: Overall looks of Home Page where we can fit our logo navigation bar and
other essentials.
92
Amar Thapa ((BTEC HND in Computing/ Third Semester)
About Page: Gives detailing about what content we should write on the about page and its
looks.
93
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Add product page: Only Admin (manager) and employee has got access to this page.
94
Amar Thapa ((BTEC HND in Computing/ Third Semester)
M3 Interpret your peer- review feedback and identify opportunities not previously
considered.
Document Approval
The following Software Requirements Specification has been accepted and approved by the
following:
If we take the example of a product - lets say an app - a UX designer would not just be creating the
look, layout and colours of the app, but they would also be involved in the planning and workings of
95
Amar Thapa ((BTEC HND in Computing/ Third Semester)
the entire app. They would need to think about a range of issues potentially inside and out, for
example:
• Registration: How much information does the user need to provide? What format? Is registration
necessary to use the app? Should it connect to social media? Should the registration be on one page
or many? How does the user progress?)
• Using the app: Does the app auto-login? Does it require users to log in again? If so, does it pre-
fill the username field? Which keyboard layout should be used for any specific field? What
navigation should the app use? Does it remember where users left off on previous use of the app?
How much information should the app show on certain pages? What information should it hide?
Should content be refreshed automatically or manually? Why?
• Outside the app: Should the app send notifications? How often? Do the notifications link into a
specific page in the app? What about emails? Are users emailed reminders? If they haven’t given
their email address, should the app ask for it? When?
So a UX designer is almost trying less to fill the role of a visual designer and more like a once-
removed personal assistant. Their job is to facilitate the smoothest experience for the user, making
sure they are given what they need when they need it, that they are not interrupted when they don’t
need to be, that they don’t have to do more than is necessary. Typically, a UX designer needs to allow
the user to get done what they came to do, the less friction they have in trying to do that, the better a
UX designer has done their job.
96
Amar Thapa ((BTEC HND in Computing/ Third Semester)
• Marketing Report:
A marketing report, or sales analysis report, gives an overview of the state of the sales activities
within a company. It shows the different trends happening in the sales volume over a certain time,
but also analyzes the different steps of the sales funnel and the performance of sales executives. A
daily sales report is a management tool used by businesses, sales reps, and managers in order to
extract the most relevant daily sales data such as the number of closed deals, client conversations,
opportunities created, and many other sales-related KPIs.
Keeping our application into consideration, We have produced a website for Functional business
application. The Photos and description of our functional business application are as below:
Product Demo:
97
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Description: So, this is the home page of our business application. After opening the link of our
business application, you can see the logo of our Big Mart. You can see the search navigation bar.
Below it you can see the categories, big mart mall and vouchers combo box button. It also consists of
register and login button. After logging in the application, the name of the user will be shown in the
name section,
Description: After entering into the about page of Big Mart Departmental Store, we can see the
description of the Big Mart. In the description page, the background history of Big Mart Store is
available. And also the gallery of the Big Mart is included in the About page.
98
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Description: In the register section, the customer can register their account by signing their email
address, name, password, address and TPIN number as well. After registering the account of Big
Mart, the customer can have their own account with their information available.
99
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Description: In the login section, the customer have to login their account with their email address
and password that they have registered with. After logging into the account, the customer can see
their user account and their profile as well.
Description: If by chance, the customer forgets the password of their account, they can reset the
password of their account using their email as well. And after getting the new password, they can
login into their account.
Description: In the above screenshot, you can see that there is a confirmation to that they have forgot
their password, and they are asking for the confirmation. They can confirm from their email address.
100
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Description: In the above screenshot, there is a page of privacy policy. There is the description of the
legal terms and conditions and privacy policy of our Big Mart shopping online store with
interpretation and definitions.
Description: The above screenshot is the homepage of our Big Mart shopping application. There you
can see the home button and search navigation bar. There you can also find the register and login
button as well. And after that you can find there categories, Big Mart Mall and Vouchers combo box.
101
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Description: In the above screenshot, we can see that it is the categories of the electronic items or
electronic gadgets where mobile phones, laptop, camera and many more items are available.
102
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Description: In the above screenshot, we can see that there are laptops available of different brands
and different models. After that there is a button of Read More, where we can see the more
description of the product. And there is button of add to cart where you can add the product to cart.
Description: In the above screenshot, we can see that in the categories of electronics, it’s the laptop
categories. The laptop model is of Lenovo. There is also a sale going on and also discount offer as
well where we can use the code, DAKSHINA2000 to get Rs.2000 off.
103
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Description: In the above screenshot, we can see it’s the categories of Health and Beauty where
different beauty products and cream are shown in the picture. We can add the product to the cart.
Description: In the above screenshot, we can see that it is the categories of Grocery items where
drinks of different brands are available such as Coca-Cola, Fanta, Tuberg and many more. We can
add the product to the cart as well.
104
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Description: In the above screenshot, we can see that it is categories of grocery of snacks items where
different snacks items are available such as biscuits, chips, cookies and many more. The chips and
cookies are of different brands such as Lays, Kurkure, Little hearts and many more.
105
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Description: In the above screenshot, we can see that there is the page of clothing item of ladies.
There we can see the model, brand name, size, color, price and many more description of the clothes
are available in the page. We can add the clothes to the cart as well.
Description: After adding the product into the cart, we can manage the number of clothes. The total
amount of the product are shown in the box. After that we can go to the checkout button. Also there
is link where we can add any discount code that is available on the product.
106
Amar Thapa ((BTEC HND in Computing/ Third Semester)
107
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Description: After the shipping methods, we will go to the payment method, where we have to
include our email address, name, address, zip code, phone number and many more. After giving all
the information, the shipping and payment method will be completed.
107
108
Tau Maya
Amar Gurung
Thapa ((BTEC
((BTEC HNDHND in Computing/
in Computing/ Third
Third Semester)
Semester)
Description: In the above screenshot, we can see that there is the checkout system. After the shipping
method and the review and payments methods, there is the review where all the information of the
customer and the product are shown in the review section.
109
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Description: In the above screenshot, we can see that after the review and payment method, the
order is confirmed. After the order is confirmed, there is a button of continue shipping. After
clicking into the shipping box, the shipping and dispatching process will be continued.
110
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Description: Finally when we click on continue shipping button, the items and products that we have
ordered are shown with the details and description. The home page and register button are also
shown in the page. The search navigation bar is also available at the page, after clicking into that we
can search more items.
111
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Description: Use of Trello for project management. We have used the agile software development
methodology for developing Big Mart Inventory Management System.
Description: In the above screenshot, it is the evidence that we have made our application in
Visual Studio 2019. It is the model of edit.cshtml of our Big Mart Application.
112
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Description: In the above screenshot, we can see that it is the evidence of our Model View
Controller and we have made our Big Mart Application on the basis of MVC.
113
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Description: In the above screenshot, we can see that it is the evidence of our Pencil App. We have
made our prototype in Pencil App using different buttons, combo box, images and many more.
114
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Description: In the above screenshot, we can see that it is the evidence that we have used Git Hub
App to store, transfer and relocation of codes.
Description: In the above screenshot, we can see that, it is the evidence we have used SQL server.
We have made database diagram using SQL server.
115
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Description: In the above screenshot, we can see that, it is the evidence that we have used SQL
server for making tables and database tables.
116
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Description: In the above screenshot, we can see that we have used Visio Professional to make ER
Diagrams. We have used Visio Professional to make ERD of an Inventory management of a
shopping mall.
Artificial Intelligence
Artificial Intelligence will help you optimize your e-commerce platform. You will enhance the
user experience with AI technology for your customers. Your artificial intelligence marketing
campaign will hit future clients. It will boost successful customer traffic to your online store. You
will use AI for faster marketing drives and personalized marketing campaigns. You will gain
consumer approval for your company with this technology. It will even help you automate your
marketing efforts. You can reduce marketing time and improve marketing accuracy by using
automatic marketing strategies.
117
Amar Thapa ((BTEC HND in Computing/ Third Semester)
The following are the important applications of E-Commerce marketing, where elements of AI
are used:
Marketing Automation
With the aid of Artificial Intelligence, we will simplify all the marketing activities of your e-
commerce campaign. With AI, you can automate company practices such as lead generation and
integrated digital marketing services. You can also customize marketing content and create
customized AI automation deals for targeted customers.
Inventory Management
For any e-commerce site, maintaining the inventory is a tiresome job. Artificial intelligence can
manage and monitor your inventory level efficiently. AI can go through past sales trends,
forecast of changes in the market, supply issues to interpret the inventory requirements.
Product Recommendations
With the shopping activities of users, AI technology can suggest engaging recommendations to
each client. You can retain your customers by offering products that they like. Artificial
intelligence can help you in this regard. This tool can remember the purchase and search history
and browsing activities of users. With this understanding, AI can craft recommendations and
offers for your clients
118
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Conclusion:
Digital marketing is needed right now, when all companies have gone online. Nowadays, we
should skip ECommerce since most people enjoy online shopping. You may set up smart
marketing programs for artificial intelligence. With the utmost capability, this platform will assist
you in all your sales activities. We hope that the brief given above will help you learn about the
use of artificial intelligence in e-commerce.
119
Amar Thapa ((BTEC HND in Computing/ Third Semester)
• Hardware requirement:
Computer Hardware Dell i7
Client laptop
• Software
Software Visual Studio
Browser Chrome
• Test level:
1) Normal scenarios
2) Data validation.
3) Extremes of data.
• Test schedule:
• Testing: Function Test and Unit Test → 3 days
• Regression tests: Test all function and unit of the test case → 3 days
120
Amar Thapa ((BTEC HND in Computing/ Third Semester)
***Data to be recorded: Data given from system test plan will be record and will be
executed when the system process has no occurred error and run successfully.
• Test case
NO Test function Description
1 Login Log in into system
2 Logout Log out system
3 List Account by role List all account by role
4 Create Account Create new account
5 Change Password Change account’s password
8 List All Staff Show all workers
9 Search customers Search customers
10 Order Items Choose the items that they want
11 Transfer items Customer or other warehouse staff order their
needs
12 Payment Pay bill
13 List Category by Id Show all category
14 Manage Categories Manage categories
121
Amar Thapa ((BTEC HND in Computing/ Third Semester)
profile page
8 Order Select the item and add to Display list Display list Pass Successful
check out chosen item chosen item
122
Amar Thapa ((BTEC HND in Computing/ Third Semester)
11 Report Record all the sales Display sold Recorded in Pass Successful
items in database
admin
dashboard
and in
database
User Manual
For Admin
• List role accounts, except admin role.
• Create an account (Create Account) to follow the role. A staff account when newly
created in a locked state, cannot be logged in, they need to be trained by the staff full of
information and activated later, even admin cannot activate.
123
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Application Complexity:
Application complexity is one of the biggest factors impacting application performance. Today’s
applications and services, particularly those delivered via the Web, are a mosaic of components
sourced from multiple places: data center, cloud, third-party, et al. While the customer or
employee looking at a browser window sees a single application, multiple moving parts must
execute in the expected manner to deliver a great end-user experience. Maybe the Web server
and app server are running fine, but if the database is faltering, user experience will suffer. Being
able to measure and keep tabs on all those moving parts is the challenge and requires an APM
tool that can provide a view into the performance of all the parts, not just individual components.
As the saying goes, “The more moving parts, the more that can go wrong.”
Application Design:
One of the biggest impacts to application performance is caused by companies
outsourcing/subcontracting their application development outside of their company and their
quality control domain. Application quality and performance needs to be built into the
application platform and cannot be an afterthought or something that “we’ll fix later”. The
subpar app performance that is accepted in the development phase is bound to manifest itself in
the production stage. Modern APM solutions capture this poor performance, but can’t provide
the cure. The only way to prevent poor app performance is to expose your app development to
the rigorous quality controls and processes early on in the application lifecycle — and actually
fix them early in the cycle.
Application Testing:
Today's applications are often developed in simulation labs without testing performance on real-
world networks. Before applications are deployed, transport across today's highly distributed
network architectures should be monitored and optimized. Agile release cycles — the reality is
that less than
124
Amar Thapa ((BTEC HND in Computing/ Third Semester)
5% of developers performance test their code before it is pushed to production. The “make it
work” over “make it perform” mantra is one of the biggest factors that impacts application
performance today. Most organizations don't have the time, resource or budget to replicate
production environments in test for every agile release, this is why a growing trend of customers
have started to test in production out of working hours. When you consider that the codebase of
an application changes several times per month, you can begin to understand why performance
anti-patterns and bottlenecks make their way into production.
Without a doubt, third-party web components are among the biggest factors impacting web
application performance today. To deliver the functions and features online visitors expect,
websites and web applications are actually a composite of your own resources plus numerous
third-party web components. These include content delivery networks (CDNs), site search
functions, shopping cart and payment processing functions, ad networks, multiple social network
connections, ratings and reviews for gathering feedback and web analytics. Today, the average
website includes components from eight or more different hosts, and a slowdown for any one
service can degrade performance for an entire website or web application. If anything goes
wrong (and inevitably it will), only one party will get the blame: you, as the primary website
owner. Organizations leveraging third-party web components must adopt an end-user focused
approach to APM, in order to better identify and fix performance problems associated with third-
party services beyond one’s own firewall.
125
Amar Thapa ((BTEC HND in Computing/ Third Semester)
The Network:
Network latency and bandwidth is king for any application that isn't local (remote workforce,
customer facing website, web applications, etc.). Monitoring network bandwidth and web
application performance from multiple locations helps isolate the problem to the network tier.
The network on which the application is used impacts performance tremendously, especially for
mobile and cloud. Inconsistent bandwidth, high jitter, increased latency and packet loss all work
to degrade application performance. While you might not be able to control mobile or most cloud
networks, you can build and test apps with these network conditions in mind. This gives
organizations the best chance to optimize app performance before the network impacts are felt by
users.
126
Amar Thapa ((BTEC HND in Computing/ Third Semester)
People: Communication:
My vote goes to “a failure to communicate.” Not to steal from Jack Nicholson in A Few Good
Men. There are many good technologies out there, but as APM has evolved to become more than
an introverted, single-domain discipline, sharing information effectively will require an
investment in dialog. This will include next-step process awareness, so that key stakeholders are
identified and know who each other are, and clear avenues for optimizing their collective
insights. But it also requires, in many organizations, a cultural and often a political shift to
promote a willingness to step beyond traditional boundaries and ways of working. As it matures,
social media should also help. But no single technology will count more to promote effective
APM than a revitalized and intelligent willingness to communicate across roles. Without it, most
technology investments are wasted, or at least poorly optimized.
(Anon., 2020)
127
Amar Thapa ((BTEC HND in Computing/ Third Semester)
In today’s world, it is completely impossible to run a successful business without the proper use
of inventory management system. In most firms, inventory control system management refers to
the ways logistics are handled in the company. Inventory control system management is nothing
but management of logistics and the process of eliminating general competences in the company.
It refers to the processes of how the different suppliers and the whole network thereof are
managed. The overall aim of inventory control system management is to produce effective and
efficient operations. The value of inventory control system management goes up all the even
more in retail chain organizations. This is due to the fact that every retail chain organization
works with a number of suppliers at any given point in time. All retail firms have to make a
conscious effort to integrate the logistics, distribution activities with the suppliers, and the
manufacturer’s overall efforts.
Characterizing the quality and shortcoming of my project I need to explain the open doors for
additional improvement and advancement. As I have built up the application for managing an
inventory on a shopping mall like Big Mart, I ought to know that creating and releasing it won't
be a superior choice for application. The application ought to be screen and as a designer of the
application I should make further improvement and advancement with respect to the application.
128
Amar Thapa ((BTEC HND in Computing/ Third Semester)
Customer care features: Must add this feature for solving customers problem and
helping them to shop smartly. This also helps to get some feedbacks on the weakness of
your application and knowledge about the difficulty faced by the user so you can amend
your application according need of your customers.
We likewise need to remember that what will occur if the created application
circulates around the web or the huge information are travel by the application. In this
way, we need to guarantee that the created application can adapt to the immense measure
of information that will be sent to it and the application foundation can likewise
strengthen all the connected web browsers of devices such as mobile, desktop tab etc.
Language conversion option features should be added so that people can choose
their preferable language which helps them to shop smarter and less chances of incorrect
inventory and misunderstanding the products.
Consistently, the latest kind of attacker and hacker is taking a stab at cracking the
application. When an application creates, it stores touchy details about the customer and
the item that should be safe. Therefore, I need to make a day-by-day trial of the request
for information security. As a major part of the application has lost its relevance to the
customer due to lack of research, insufficient programming and inevitable frustration of
the client and lack of certainty.
More on I need to incorporate the application to the smartphone base and the
cloud base all allowing them greater protection to the application opening to provide
access to administration applications require, for example, Cleanser or REST, SQL
databases and JMS message transport, and so on.
129
Amar Thapa ((BTEC HND in Computing/ Third Semester)
At the same time as the application is developed and released for marketing and
promotion of a shop on the web marketplace (building it as an e-commerce platform), I
need to ensure that the application is profoundly sensitive or not. As the application will
be used by the different amounts of the client, the aim of which is that the application can
respond immediately to the client. In this respect, I need to ensure that the application
must have the opportunity to conform to the tempo, engagement and relevance of the
information provided.
Conclusion:
At the end of the day, we can infer that we made our Big Mart Application using Visual Studio
2019. Me, like Bhuvan Subedi and Bijay Pokhrel, were on the same squad, and we have our
application as a team member. We looked at a business-related issue and created a well-defined
problem description statement backed by consumer and device specifications. We also identified
areas of concern relevant to the satisfactory execution of our submission. We evaluated the
business-related dilemma using acceptable approaches. We also justified our approach and
compared it to the software development tools and the approaches we have researched. We've
been researching the use of software creation methods and techniques. We contrasted the
variations between the different technical tools for software creation. We also produced a
structured presentation that efficiently evaluates our company application. We've created a
practical business framework focused on a basic software design document. We analyzed new
perspectives, innovations or possible changes to our method. We checked the results of our
business application against the issue specification argument. We evaluated the factors that affect
the success of the company application and used them to conduct a critical analysis of the design,
implementation and testing phases of our application. We have also assessed objectively the
strengths and weaknesses of our market application and have justified opportunities for change
and further growth.
130
Amar Thapa ((BTEC HND in Computing/ Third Semester)
References
(n.d.). Retrieved from softwaretestinghelp: https://www.softwaretestinghelp.com/software-
development-life-cycle-sdlc/
(n.d.). Retrieved from tutorialspoint: https://www.tutorialspoint.com/sdlc/sdlc_agile_model.htm
(n.d.). Retrieved from cprime: https://www.cprime.com/resources/what-is-agile-what-is-scrum/
(n.d.). Retrieved from smartsheet: https://www.smartsheet.com/understanding-agile-software-
development-lifecycle-and-process-workflow
(n.d.). Retrieved from searchcio.techtarget:
https://searchcio.techtarget.com/definition/Prototyping-Model
(n.d.). Retrieved from geeksforgeeks: https://www.geeksforgeeks.org/software-engineering-
rapid-application-development-model-rad/
PROJECT-MANAGEMENT.COM. (2020, OCTOBER 7). Retrieved from PROJECT-
MANAGEMENT.COM : risk related to the successful completion of your application.
admin, 2019. [Online]
Available at: https://intelicle.com/7-risks-of-e-commerce-business/
131
Amar Thapa ((BTEC HND in Computing/ Third Semester)
132
Amar Thapa ((BTEC HND in Computing/ Third Semester)