0% found this document useful (0 votes)
38 views133 pages

Big Mart App Development Guide

The document outlines an assignment for a BTEC HND in Computing focused on developing a business application for inventory management at a shopping mall like Big Mart. It details the requirements for the application, including sales management, inventory control, user administration, and reporting functionalities, along with the assessment criteria for evaluating the project. Students must produce a Software Design Document, implement the application, and evaluate its performance against initial requirements.

Uploaded by

ansuhorizon2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views133 pages

Big Mart App Development Guide

The document outlines an assignment for a BTEC HND in Computing focused on developing a business application for inventory management at a shopping mall like Big Mart. It details the requirements for the application, including sales management, inventory control, user administration, and reporting functionalities, along with the assessment criteria for evaluating the project. Students must produce a Software Design Document, implement the application, and evaluate its performance against initial requirements.

Uploaded by

ansuhorizon2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

lOMoARcPSD|44259030

Application Development final

Critical thinking (Kathmandu Institute of Technology)

Scan to open on Studocu

Studocu is not sponsored or endorsed by any college or university


Downloaded by ansu horizon ([email protected])
lOMoARcPSD|44259030

1/1/2020 Application Development


Amar Thapa

BTEC HND in Computing/Third Semester

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Each time you submit an assignment you must attach this statement as the cover page for both the
hard copy and the electronic version. If the statement is missing, your work will not be marked.

STUDENT DECLARATION
I have read and understood Pearson Edexcel Policy on Academic dishonesty and Plagiarism.
I can confirm the following details:

Programme / Qualification Name: BTEC HND in Business/Computing


Student ID / Registration Number:

Name: Amar Thapa

Centre Name: ISMT


Module Name: Application Development
Module Leader: Mahesh GC

I confirm that this is my own work and that I have not plagiarized any part of it. I have also noted the
assessment criteria and pass mark for assignments.

Student Signature:

Submitted date:

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

INTERNATIONAL SCHOOL OF MANAGEMENT AND TECHNOLOGY NEPAL

BTEC HND in Computing

Unit 30: Application Development


Unit Code: H/615/1670 Session/Year: Sept 2018
Assessment No: 01

Assignment Launch Date: 20 Jan 2020


Due Date: Part 1 :5th March 2020
Part 2 and 3: 18th March 2020

Assignment Title: Big Mart Application


Teacher Name: Maheshwor GC Iv’s Name :

Student Name: Pearson RegNo: Final Grade:

Unit Learning Outcomes targeted in this assignment

LO1. Produce a Software Design Document by analyzing a business-related problem and deduce an
appropriate solution including a set of initial requirements.
LO2. Use design and development methodologies with tools and techniques associated with the
creation of a business application.
LO3. Work individually and as part of a team to plan and produce a functional business application
with support documentation.
LO4. Evaluate the performance of a business application against its Software Design Document and
initial requirements.

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

There are four parts based on the scenario. You are required to contextualize the task as per the given
scenario wherever possible.
Each student has to submit their assignment as guided in the assignment brief. The students are
guided what sort of information is to be produced to meet the targeted criteria. All the tasks need to
be done individually and the student has to produce an individual assignment

Scenario

You have been recently hired by a highly credible company in Nepal. Since you are joined recently
stakes are high on you. In the meantime a project comes by asking you to design an application that
requires you to manage an inventory on a shopping mall like Big Mart. Your system should be fully
functional as well as deployable on the server so that the application can be logged into and then
daily transactions be carried out. The transactions carried are categorized as follows:

1. Sales
a. Customer sales:
Customer sales should be able to create a customer and provide a named bill that is tax
valid. For this case you can use the TPIN number of the customer which can be
generally called a PAN number. Every transaction should be recorded in the database
along with the tax amount of the sales.

2. Inventory management:
a. Add item:
Item should be added to the inventory and a unique identifier of each item should be
given so that the code can be pasted on the item which can later be used to retrieve the
information of the item including price and quantity from the database.

b. Transfer Item to another warehouse:


There are several BigMart stores through the country. The problem is that sometimes
an item needs to be transferred from one store to the other. In such scenario your
software application must have provision to transfer the item from one warehouse to
the other warehouse.

c. Revoke damaged and expired items:


There are cases when your item is expired or has been damaged. In such case your
application should be able to revoke such item to be unsalable and thus prevent the

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

items from ever dispatching to the customer. Our ambition is always to put the
customer satisfaction upfront and thrive to deliver the best product and experience a
customer can dream of.

3. Administration
a. User Creation:
Create a user so that the user often a sales boy or a salesgirl can log into and then
generate bills.

b. User Delete:
Whenever your employee leaves the office there should be some way to revoke or

delete the user account so that the credentials passed to the employee would no longer

work. c. User Edit:

Your application should be able to edit the information of the employee like address,

contact number which are changed often times while engaged in employment. d. Store

TPIN account:

Your application design should have some functions to save the user details on a
database. The data can be used whenever the user ask to bill to a particular customer
id. Remember you need to have the customer searchable through the TPIN number
and hence eliminate the time it takes to type all the detail while billing.

4. Reporting:
a. Daily Sales report:
Your application should be able to generate the daily sales record aggregating the data
from different sales counter through the store. The data report should contains all sales
from every employee that has billed to each and every individual customer. b. Monthly
sales report:

Your application should be able to generate the monthly sales data with quantity of
each item. This data thus can help the store to stock items that are more common and
hence push the business growth forward. Your report should act as a preliminary data
mining tool to give the store the basic insight on customer behavior regarding the
items you sell.

c. Employee specific sales report:

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Your application should be able to generate monthly sales report based on specific
user. From here the store can learn which employee is performing the best and thus
can reward for further motivation.

Criteria:

This assignment should include the following things:

1. Documentation regarding the project and the solution you purpose.


2. UML diagrams for the classes you require.
3. Implementation on .net based web application.
4. Strictly follow the object oriented paradigm.
5. Strictly follow MVC (Model, View, and Controller) design of software programming.
6. Database design should be as per the classes you define.
Based on the context above, complete the followings.

Part 1 (LO1, LO2): Produce a Report including by analyzing a business related problem and
deduce a solution including a set of initial requirements & Use design and development
methodologies with tools and techniques associated with the creation of a business application:
● Explore a business- related problem and produce a well- defined Problem definition
Statement supported by a set of user and system requirements.
● Determine any areas of risk related to the successful completion of your application.
● Analyze a business- related problem using appropriate methods and produce a wellstructured
Software Design Document that defines a proposed solution and includes relevant details on
requirements, system analysis, system design, coding, testing and implementation.
● Research the use of software development tools and techniques and identify any that have
been selected for the development of this application.
● Compare the differences between the various software development tools and techniques
researched and justify your preferred selection as well as your preferred software
development methodology.
● Justify the tools and techniques chosen to realize a custom built website. Justify your
preferred selection of tools and techniques in deducing an appropriate solution to a business
related problem

Part 2 (LO3): Produce Presentation slides and show plan and produce a functional business
application with support documentation:
● Effectively reviews your business application, problem definition statement, proposed
solution and development strategy. Use this presentation as part of a peer-review and
document any feedback given.
● Develop a functional business application based on a specified business problem.

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

● Develop a functional business application based on a specific Software Design Document


with supportive evidence of using the preferred tools, techniques and methodologies.
● Evaluate any new insights, ideas or potential improvements to your system and justify the
reasons why you have chosen to include (or not to include) them as part of this business
application.

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Part 3 (LO4): Evaluate the performance of a business application against its Software Design
Document and initial requirements:
● Review the performance of your business application against the Problem Definition Statement
and initial requirements.
● Analyze the factors that influence the performance of a business application and use them to
undertake a critical review of the design, development and testing stages of your application.
Conclude your review by reflectively discussing your previously identified risks.
● Critically evaluate the strengths and weaknesses of your business application and fully justify
opportunities for improvement and further development.

Pass Merit Distinction

LO1 Produce a Software Design Document by analyzing a LO1 & LO2


business-related problem and deduce an appropriate solution
including a set of initial requirements
P1 Explore a business- related M1 Analyze a D1 Justify your solution
business- related problem and produce a well- to a business-related
problem using appropriate defined Problem problem and your
definition methods and produce a wellStatement preferred software
supported by a set of structured Software Design user development
and system requirements. Document that defines methodology, by
a proposed solution and includes
comparing between the
P2 Determine any areas of risk relevant details on
various software
requirements, related to the successful system
development tools and
analysis, system design, completion of your
techniques researched.
application. Coding, testing and implementation.

LO2 Use design and development methodologies with tools and


techniques associated with the creation of a business
application

P3 Research the use of M2 Compare the differences


software development tools between the various software
and techniques and identify development tools and
any that have been selected techniques researched and
for the development of this justify your preferred
application. selection as well as your
preferred software
development methodology.

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

11
Tau Maya Gurung ((BTEC HND in Computing/ Third Semester)

Application Development 2020

LO3 Work individually and as part of a team to plan and


produce a functional business application with support
documentation
M3 Interpret your peer-
review
D2 Evaluate any new
P4 Create a formal presentation feedback insights, ideas or potential
and identify that effectively reviews your improvements to your
opportunities not previously business application, system and justify the
problem considered. definition statement, proposed reasons why you have
solution and development M4 Develop a functional chosen to include (or not
strategy. Use this presentation as business application to include) them as part of
based on a part of a peer- review and specific this business application.
Software Design document any feedback given. Document
with supportive evidence of using the preferred
P5 Develop a functional tools, techniques and
business application with methodologies.
support documentation based on a specified
business problem.
LO4 Evaluate the performance of a business application against its Software Design Document
and initial requirements.
M5 Analyze the factors that
influence the performance of
P6 Review the performance of D3 Critically evaluate the
a business application and use
your business application strengths and weaknesses
them to undertake a critical
against the Problem of your business
review of the design,
Definition Statement and application and fully justify
development and testing
initial requirements. opportunities for
stages of your application.
Conclude your review by improvement and further
reflectively discussing your development.
previously identified risks.

Mention all the grades awarded in this assignments:

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Note: Please access HN Global for additional resources support and reading for this unit. For
further guidance and support on report writing please refer to the Study Skills Unit on HN Global.
Link to www.highernationals.com

12
Tau Maya Gurung ((BTEC HND in Computing/ Third Semester)

Application Development 2020

Other Recommendations:

✔ It should be the student’s own work – plagiarism is unacceptable.


✔ Clarity of expression and structure are important features.
✔ Your work should be submitted as a well presented, word-processed document with headers and
footers, and headings and subheadings, both in hard and soft copies.
✔ You are expected to undertake research on this subject using books from the Library, and
resources available on the Internet.
✔ Any sources of information should be listed as references at the end of your document and these
sources should be referenced within the text of your document using APA referencing style
✔ Your report should be illustrated with screen-prints, images, tables, charts and/or graphics.
✔ All assignments must be typed in Times New Roman, size 12, 1½ spacing.

I declare that all the work submitted for this assignment is my own work or, in the case of group
work, the work of myself and the other members of the group in which I worked, and that no part
of it has been copied from any source. I understand that if any part of the work submitted for this
assignment is found to be plagiarized, none of the work submitted will be allowed to count
towards the assessment of the assignment.

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Assignment Prepared By: Signature: Date: 10 Jan, 2020


Maheshwor GC

Brief Checked By: Date:


Dhruba Babu Joshi Signature:

13
Tau Maya Gurung ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

14
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Table of Contents
Introduction..................................................................................................................................................3
Problem Statement...................................................................................................................................3
Why Is It So Hard to Write an Effective Problem Statement?.....................................................................3
Business Related Problem:.......................................................................................................................4
Employee performance:...............................................................................................................................4
Measurement:...............................................................................................................................................4
Poor Marketing:............................................................................................................................................4
Server Reliability:........................................................................................................................................4
Technical Problems:.....................................................................................................................................4
Security:.......................................................................................................................................................5
Operational Risk:..........................................................................................................................................5
Solutions for the problem faced on business:...........................................................................................5
Identifying verification:................................................................................................................................5
Generating targeted traffic:..........................................................................................................................6
Increasing trust with visitors:.......................................................................................................................6
Most Common Project Risks........................................................................................................................7
Other Types of Risks................................................................................................................................7
Description of Risk...................................................................................................................................7
Market Risk:.................................................................................................................................................7
Communication risk:....................................................................................................................................8
Resource risk:...............................................................................................................................................8
Technical risk:..............................................................................................................................................8
Customer risk:..............................................................................................................................................8
Maintenance risk:.........................................................................................................................................8
Ways to manage the risk...........................................................................................................................8
1. Planning:..........................................................................................................................................11
2. Requirement analysis:.....................................................................................................................11
3. Design:............................................................................................................................................12
4. Coding:............................................................................................................................................13
5. Testing:............................................................................................................................................13
Introduction:...........................................................................................................................................14
Iterative model:..........................................................................................................................................14

15
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Two examples of iterative model:..........................................................................................................15


Spiral SDLC Model:...................................................................................................................................15
Agile Model............................................................................................................................................17
Agile Software Development Lifecycle.................................................................................................18
WHAT ARE THE SCRUM REQUIREMENTS?..................................................................................21
Agile Process Work................................................................................................................................22
Agile Manifesto......................................................................................................................................23
Sprint......................................................................................................................................................23
Steps to create sprint..............................................................................................................................23
Prototype made from Pencil app............................................................................................................33
Software development tools and techniques:.........................................................................................38
Programming language:.............................................................................................................................38
Software Design Methodology...............................................................................................................39
ER Diagrams..............................................................................................................................................43
The components features of ER-diagram:..............................................................................................43
Entity..........................................................................................................................................................43
Weak Entity................................................................................................................................................44
Attribute.....................................................................................................................................................44
Relationship..............................................................................................................................................44
Entity and attributes...................................................................................................................................44
Relationships..............................................................................................................................................45
Connectivity’s.............................................................................................................................................45
Crow’s foot notation:..............................................................................................................................45
Entity and attributes...................................................................................................................................45
Relationships..............................................................................................................................................45
Connectivity...............................................................................................................................................45
Database Software..................................................................................................................................46
Conclusion:.............................................................................................................................................47
Comparison of Software Development Tools & Techniques.................................................................48
Prototyping tools........................................................................................................................................48
IDE (Integrated Development Environment).............................................................................................48
Version control tool....................................................................................................................................49
Development Environment:...................................................................................................................50
Dot net for frontend f.................................................................................................................................50
16
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

As IDE Visual studio:.................................................................................................................................51


Problem In busines application:.............................................................................................................55
Tight Schedules..........................................................................................................................................55
Budget Changes..........................................................................................................................................55
Technical Difficulties.................................................................................................................................56
Poor Management......................................................................................................................................56
Solutions For Business applications:......................................................................................................56
Technology Consulting:.............................................................................................................................56
Enterprise Packaged Application:..............................................................................................................57
Custom Application Development:............................................................................................................57
Mobility:.....................................................................................................................................................57
Data Analytics and Visualization:..............................................................................................................57
Development strategy of application:........................................................................................................57
Enhancing data security:............................................................................................................................57
Performance of App:..................................................................................................................................58
Monetization strategy:................................................................................................................................58
P5 Develop a functional business application based on a specified business problem:............................67
Prototype:...............................................................................................................................................67
1. Login..............................................................................................................................................67
2. Logout............................................................................................................................................68
3. Create Account...............................................................................................................................68
4. Order Item......................................................................................................................................69
M3 Interpret your peer- review feedback and identify opportunities not previously considered..............77
Document Approval...................................................................................................................................77
As I am the lead UX-UI Designer of my team.......................................................................................78
Opportunities not considered previously:..............................................................................................79
• Employee Management Checklist:..........................................................................................................79
• Marketing Report:....................................................................................................................................79
Product demo and photo.....................................................................................................................79
Product Demo:........................................................................................................................................80
Evidence of using the pretend tools, Techniques and methodologies..................................................101
Personalized shopping experience...........................................................................................................109
Artificial Intelligence...............................................................................................................................109
Creating Strong Subject Lines:.................................................................................................................110
17
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Marketing Automation.............................................................................................................................110
Inventory Management.............................................................................................................................110
Creating Strong Subject Lines..................................................................................................................110
Product Recommendations.......................................................................................................................110
Conclusion:...........................................................................................................................................111
● P6 Review the performance of your business application against the Problem Definition Statement and
initial requirements:..................................................................................................................................112
• Hardware requirement:.........................................................................................................................112
• Software................................................................................................................................................112
• Test Detail (For Each Test):..................................................................................................................112
• Test level:..............................................................................................................................................112
• Test schedule:........................................................................................................................................117
• Test case................................................................................................................................................117
• Results compared to reality...................................................................................................................117
User Manual.........................................................................................................................................119
For Admin.................................................................................................................................................119
Application Complexity:..........................................................................................................................119
Application Design:..................................................................................................................................120
Application Testing:.................................................................................................................................120
The Capability to Identify Issues.............................................................................................................121
The infrastructure and components of the application service:................................................................121
The Network:............................................................................................................................................121
The dynamic IT environment: Virtualization and the cloud:...................................................................122
The web browser:.....................................................................................................................................122
People: Communication:..........................................................................................................................122
Lack of proactive monitoring:..................................................................................................................122
D3 Critically evaluate the strengths and weaknesses of your business....................................................122
application and fully justify opportunities for improvement and further development:..........................122
Conclusion:...............................................................................................................................................125

18
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Introduction
I have been employed by a highly reliable firm in Nepal. Recently, I entered, the stacks are heavy on me.
And I was asked to develop an application that would enable me to handle an inventory at a shopping
mall like Big Mart. Before beginning a project, it would be very useful for me to understand the business
model as well as the various types of risks inherent in the business process as well as the different
software methodologies that I will describe in this article.

(P1) Explore a business-related problem and produce a well-defined Problem


Definition Statement supported by a set of user and system requirements.
Problem Statement
The issue is the assertion of concern, the situation to be changed, the challenge to be overcome, or the
alarming question that arises in theory or in reality, which leads to the need for substantive clarification
and intentional inquiry.

Why Is It So Hard to Write an Effective Problem Statement?


One of the complexities of writing a big dilemma statement is the distractions that can come from a
multitude of outlets.
 The symptoms associated with the condition add to the mystery as you attempt to explain the
problem. For example, coming to the doctor's office and saying, "Doctor, I have pain in the back
of my thigh down to the lower part of my leg! I need you to heal my knee!" It is only after a
thoughtful assessment that the doctor determines that the concern lies with your sciatic nerve and
that it originates in your lower back.
 Solutions are always an early concern when struggling with a crisis. When faced with a dilemma,
alleviating the pain as soon as possible is a normal, almost reflexive, action. However, it is highly
important to stop rushing to solutions before a deep understanding of the current situation is
reached.
 The quest for the causes of your pain is a normal response that must also be stopped when first
explaining the issue. Establishing root cause may be part of the investigation process that
follows, but should be reserved for the proper period in the life cycle of the problem-solving
system.
 The quest for the causes of your pain is a normal response that must also be stopped when first
explaining the issue. Establishing root cause may be part of the investigation process that
follows, but should be reserved for the proper period in the life cycle of the problem-solving
system.
The quest for the causes of your pain is a normal response that must also be stopped when first
explaining the issue. Establishing root cause may be part of the investigation process that follows, but
should be reserved for the proper period in the life cycle of the problem-solving system.
Business Related Problem:
Business issues are existing or long-term difficulties and issues faced by a company. These will prevent a
company from implementing its strategy and achieving its objectives. In certain situations, the market
19
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

dilemma often affects the long-term viability of a company. The following are illustrative examples of
the issues of busines.

Employee performance:
Employees who do not have inspiration, talent, diligence or ethical standards. For example, retail
locations with low customer loyalty due to poor management and staff that are not polite, supportive or
consistent.

Measurement:
A company that is unable to identify challenges when its metrics and benchmarks fail to detect
substantial underperformance. For example, a company that actively cuts unit costs without adequately
assessing output or product scores. This may result in a lack of consistency and a loss of brand
credibility and market share.

Poor Marketing:
Marketing is a very critical concept for online business success. But many online company owners do
not have a very well-planned or executed marketing strategy. Most internet company owners cannot rely
on search engines alone to send consumers and should instead have a range of marketing tactics, such as
ads, news releases, social networking and blogs. By providing contact details, privacy and security
information and quality customer support, the site needs to build customer trust.

Server Reliability:
Basically, no web host can handle 100% reliability or have uptime when the site is running. At this point,
much of the server will fail, and our website will go down with it. The explanation behind the collapse of
a web server or domain could be the fault of the site, whether it's because of too much traffic or
bandwidth use, or the site script doesn't like it. It's also known as the web host problem. The best
approach to this issue might be to periodically back up our website to our local machine or third party
servers, and to use a web host with good uptime efficiency.

Technical Problems:
It is normal if there is an issue with the company in technological systems. During online company start-
ups, we can see a lot of challenges. There could be a synchronization problem where the site owner is
attempting to run the script-coded data that the website executes, such as a form request or an application
that does not fit with the servers of the host provider. There could also be an issue with the coding of the
site or the programming of the script. It would be easier to identify and correct these problems as there is
more awareness of the site owner and his webmaster.

Security:
Security vulnerabilities can also cause a lot of problems on our pages. For eg, it can bring down
our web, it can destroy our online image, and it can also endanger our customer's secure details. It is very
risky to run a successful online business while protecting the information, particularly payments. There
has to be a very high level of protection on socket layers if web services make payments. Hacking issues
20
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

can be avoided by using unique, impenetrable login and passwords to enter the administrative portions of
our platform.

Operational Risk:
Understand the organizational essence of the capability you support and the threats to end-users, their
missions and their execution of the capabilities. Understanding the organizational need/mission (see
the System Engineering Guide's Concept Development theme) will allow you to understand the
seriousness of the risks and the effect they could have on end-users. This is a vital aspect of the risk
identification of real-world impacts that will occur if there is a risk during operational use. .
Typically, operational users are willing to accept some level of risk if they are able to accomplish
their mission (e.g., mission assurance), but you need to help users to understand the risks they are
accepting and to assess the options, balances, and alternatives available.

Solutions for the problem faced on business:

Identifying verification:
At first, we can look at the symbols of dubious actions and duties. Basically, this is due to especially
high value or massive requests, the identification of false phone numbers and email addresses, the
verification of zip codes and much more. Whereas submitting an authentication connection or code
while a customer is trying to sign up with a text message or email is truthful. As an automatic call,
the customer might also dial out with the purchase of COD when telling them to confirm the delivery
address.

21
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Finding right product to sell:


The big challenge or concern is that we don't have the right thing to market. We will not be able to
expand our company until we chose the right product. For eg, we can see that Amazon is taking over the
e-commerce environment with a large amount of n=online product catalogs. From all over the world,
their platform and performance offerings have made it easy for sellers to meet paying customers.

Generating targeted traffic:


Today, we can see that digital marketing platforms are changing. We can no longer depend on only one
kind of channel to push traffic to their online store. They can easily use SEO, PPC, twitter, social, ad
show, telephone, re-targeting, shopping engines and affiliates to help push eligible traffic to their online
stores. When their viewer is paying attention, they ought to be visible.

Conducting through research into competitors:


There are also ways to make us better than our rivals, such as focusing on improving a strategy and
allowing us to shine more than others. We should use social media sites and blogs to promote goods. By
investing in promotional deals, it lets us build more online exposure and contributes to more clients. We
should carry out analysis to figure out which goods are more in demand. We can also delete obsolete
products. At the end of the day, consumer experiences that reach over and beyond offer a way to keep
ahead of our rivals.

Increasing trust with visitors:


We should post our address, phone number, photos of our employees, customer testimonials and badges
on our websites to win the interest of our guests. We're supposed to add a live chat feature to the website.
The next step that aims to win the interest of travelers is to create blogs. We should still keep customer
service a priority over benefit. We should also always note that maintaining a current client is always
better than finding a new one. Loyalty services should also be developed. The customer must buy the
points from us and they cannot be sold to other firms.

22
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

(P2) Determine any areas of risk related to the successful completion of your
application:
The risk related to the successful completion of our application are as follows:

Most Common Project Risks


 Cost risk, typically escalation of project costs due to poor cost estimating accuracy and scope
creep.
 Schedule risk, the risk that activities will take longer than expected. Slippages in schedule
typically increase costs and, also, delay the receipt of project benefits, with a possible loss of
competitive advantage.
 Performance risk, the risk that the project will fail to produce results consistent with project
specifications.
Other Types of Risks
There are many other types of risks of concern to projects. These risks can result in cost, schedule, or
performance problems and create other types of adverse consequences for the organization. For example:
 Governance risk relates to board and management performance with regard to ethics,
community stewardship, and company reputation.

 Strategic risks result from errors in strategy, such as choosing a technology that can’t be made to
work.

 Operational risk includes risks from poor implementation and process problems such as
procurement, production, and distribution.

 Market risks include competition, foreign exchange, commodity markets, and interest rate risk,
as well as liquidity and credit risks.

 Legal risks arise from legal and regulatory obligations, including contract risks and litigation
brought against the organization.

 Risks associated with external hazards, including storms, floods, and earthquakes; vandalism,
sabotage, and terrorism; labor strikes; and civil unrest.

[ CITATION PRO20 \l 1033 ]


Description of Risk

Market Risk:
Before the execution of the application, we must carry out a thorough investigation of the consumer
requirements, recalling as a primary consideration that we do not build and dispatch an application that
23
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

is not needed on the market or requested by the customer. We need to discuss and understand the
demands of e-commerce in order to carry out predictive surveys.

Communication risk:
There should be continuous communication between the designer and the consumer for the progression
of the program. On these sides, if there is luxation in communications, we can't boost the submission. It
is notable that they are on a common track in the timeframe for improvement. More on the engineer
should have a good outlook on the final outcome, and the other user would be prompted by deadly
malfunctions.

Resource risk:
Asset dependency occurs when a lightweight program is subject to shared assets such as memory,
server, or gifted personnel as a scalable application that depends on the accessibility of these assets.
Stage dependence means that when programmers assemble an application, the highlights depend on the
stage. For example, the Android and IOS client apk document is special. In order to preserve a technical
gap from these types of blunders, we need to make the interface and logic code exceptional in order to
modify the interface part of the different operating systems.

Technical risk:
The most dangerous is a specialized threat, because the development of an android device is a
specialized task called coding by the developers. A part of the definition that is recalled for the special
hazard is an estimate that helps to outline the role that can be explained in order to avoid specialized
error later on the progress of the application. Stage should be chosen to such a degree that the
application can be carried out in a practicable manner, which should usually be steady and checked.
Testing can be done using various technologies so that we do not face the problems when the application
is submitted to the market.

Customer risk:
The database or the client itself is another threat when setting up the program. With regard to the
improvement of the application, we should have a good understanding of the needs of the consumer and
the customer prior to the progression of the undertaking. Commonly, because of the lack of specialized
expertise on the customer, the needs are not clearly indicated. Inappropriate evaluation of the client's
desires results in a lack of time which also affects the nature of the use transmitted.

Maintenance risk:
There are risks associated with the dispatch of a portable program. In this way, providing assistance
after discharge is the most important thing for the achievement of the piece. It is imperative that the
highlights of the product are constantly updated. Along these lines, the flexible application can obtain
new stage changes and provide assistance. In addition, this meets the changed needs of clients, who
need constant changes and consideration.
Ways to manage the risk
Success of the program relies entirely on the factor of how the threats are managed or addressed with the
tools. The approach to finding threats, assessing them and taking steps to keep them from turning into
major issues is called risk control in the software development process. This process usually involves
24
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

risk management and monitoring for the stable development of the system. In the risk evaluation, the
different threats that could be present in the environment are described, assessed and prioritized first.
Since organizing the various tactics, these strategies are applied and the threats are overcome in order to
achieve full control of the system.

1. Accept the Risk


Accepting the risk means that while you've recognized it and logged it into the risk assessment database,
you don't take any action. You just agree that this could happen and try to live with it if it does.
This is a safe approach to use with very minor threats – risks that can have no effect on the project if
they happen and can be quickly addressed whether or when they occur. It might take a lot of time to
develop an alternative risk management plan or to take steps to deal with the risk, so it is always easier to
use your money to do little about minor risks.

2. Avoid the Risk


You may also totally adjust your plans to escape the danger. This is a smart approach because the risk
has a potentially significant effect on the project. For eg, if January is when the business Finance staff is
busy making corporate accounts, putting them all through a training course in January to learn a new
method isn't going to be a smart idea. There is a possibility that the accounts will not be finished. It is
more likely, though, that there is a great risk that they will be able to use the new model, as they will all
be too busy in January to participate or take part in the training, even though they take part in the
workshops. Instead, it will be best to absolutely skip January for preparation.

3. Transfer the Risk


Transfer is a risk control technique that is not used too much and appears to be most popular in
initiatives where there are many stakeholders. Essentially, you're transferring the effect and risk
assessment to someone else. For example, if you have a third party hired to write your software code,
you may pass the possibility that there would be mistakes in the code. They would then be responsible
for handling this risk, perhaps by additional preparation.
Shift plans are normally written into project contracts.

4. Mitigate the Risk


Risk assessment is perhaps the most popular risk mitigation strategy used in risk management. It is both
the simplest to grasp and the easiest to execute. What prevention means is that you minimize the effect
of the danger so that, if it does exist, the dilemma it causes is smaller and simpler to solve.

5. Exploit the Risk


Acceptance, prevention, transference and reduction are very useful where the risk has a negative effect
25
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

on the project. But what happens if the risk has a good impact? For eg, is there a chance that live
sessions are so successful that we don't have enough time to do the demonstrations? This is a good
danger – something that will help the project and the business if it happens. In those situations, we want
to optimize the probability that the risk will unfold, not deter it from happening or pass the gain to
someone else!

Table: Milestone schedule for ‘Inventory Management System of Big mart (Shopping Mall)’

Activities of Milestone Dates

Prepare project scope document 1/5/2020

Budget discussion 3/5/2020

Gather information 6/5/2020

Prepare financial report 8/5/2020

Application Demo(prototype) 10/5/2020

Development Phase 12/5/2020

Testing Phase 20/5/2020

Deployment Period 21/5/2020

Product Launch 25/5/2020(version 1)

The table is a milestone timetable for our group. The tasks listed in the table are the most important
tasks for our project. Tasks that include preparing a project scope plan, discussing the budget,
gathering facts, preparing a financial report, etc.
The milestone schedules are essential to the contractor because they help to complete the project on
time. These date points will be a motivation for the participants of the working party. We will be able
to obtain correct reports from the activities we do as the projects are performed on schedule and
there will be no burden due to incompetence on the part of the staff at the outset or at the
implementation of the project. This will lead the project towards success and will also make a good
impression of the team. This can be a working spirit for the future works too.

26
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

(Reddy, N.D.)

(M1) Analyze a business-related problem using appropriate methods and produce a


well-structured Software Design Document that defines a proposed solution and
includes relevant details on requirements, system analysis, system design, coding,
testing and implementation.
1. Planning:
In the arrangement of the nimble model accomplices and backers are known, by then the knowledge
of security related items is gathered to make the effort function less complicated and faster. What's
more, what's the essence of the assignment being spoken about right now?
2. Requirement analysis:
In the masterminding point, the necessary elements are gathered and, a while after, those
necessities are examined as to how those necessities are arranged in the essential evaluation for
the undertaking. The analyzer carries out detailed analysis of the undertaking with the aim that it
does not raise a question at a later date. In order to increase the risk of developing an application
for a stock company, I must first establish ordinary contact with the client in order to find the true
needs of the client. From the standard communication with the client, I have found a bit of the
client's need for the stock organization framework, for example:

Requirements Points
Sales Ought to have the option to make client deals, putting
away it through TPIN number creating the exchange
record including charge.

Inventory management Ought to have the option to include, alter and erase item.
Reporting Ready to produce every day and month to month deals
report, alongside worker deals report

3. Design:

27
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

The organization of the structure begins with the imaginary layout in the normal winding and includes
the construction plan, the rational configuration of the components, the structure of the actual object and
the last structure in the following spirals. In the midst of providing all the necessary details relating to
the stock organization, I have to make arrangements. To organize the undertaking first, I will render a
sorted blueprint, such as UML, Client case, etc, using the requisite Visio gadgets arranging program.

Description: If the user checkout, the user will go to the shopping center and calculate the total
price of the product. If the user checkout, the user will give payment by e-sewa.

Description: If the user views items, they will add to wish list and the customer will authenticate
the items. If the user will view the items, they will add the product to the wish list and the
customer will include the customer authentication.

28
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Description: If the web customer views the items, the server will authenticate the items. The
registered customer will make purchase and the payment will be from e-sewa.

4. Coding:
The Develop Arrangement means the age of the true programming stuff at each winding. In the
check winding, when the stuff is essentially conceived of and the scheme is being created, a POC
(Idea Verification) is being made right now to get an overview of the consumer. By then, in
subsequent spirals of higher clarity of parameters and set-up subtleties, the working model of the
item called "produce" is rendered with a modification amount. This fabrics are submitted to the
consumer for feedback.
5. Testing:
Right after all the preparation relating to the task is completed, then the effort is carried out through
the training stage where the unit tests, teamwork tests are carried out to find support for the
undertaking. Some evaluation is performed at the time of the organization, and some are in the
actual consumer situation.

29
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

(D1) Justify the tools and techniques chosen to realize a custom-built website. Justify
your preferred selection of tools and techniques in deducing an appropriate solution
to a business-related problem.
Introduction:
SDLC stands for the Lifecycle of Software Development. The life cycle of software development is a
life cycle, the main purpose of which is to create a high-quality product or software that satisfies user or
customer needs, that performs reliably and efficiently in the existing and anticipated information system
and technology facilities, and that is also not costly to sustain software. So, essentially, this life cycle
helps with every scenario and every action, from cost to quality to maintenance.

Iterative model:
The Iterative Model provides reference to earlier processes in which the variations are produced. The
final performance of the project was renewed at the conclusion of the Software Development Life Cycle
(SDLC) phase.

The various phases of Iterative model are as follows:

30
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

1. Requirement gathering & analysis: In this phase, requirements are gathered from customers and
check by an analyst whether requirements will fulfil or not. Analyst checks that need will achieve within
budget or not. After all of this, the software team skips to the next phase.
2. Design: In the design phase, team design the software by the different diagrams like Data Flow
diagram, activity diagram, class diagram, state transition diagram, etc.
3. Implementation: In the implementation, requirements are written in the coding language and
transformed into computer programmers which are called Software.
4. Testing: After completing the coding phase, software testing starts using different test methods. There
are many test methods, but the most common are white box, black box, and grey box test methods.
5. Deployment: After completing all the phases, software is deployed to its work environment.
6. Review: In this phase, after the product deployment, review phase is performed to check the behavior
and validity of the developed product. And if there are any error found then the process starts again from
the requirement gathering.
7. Maintenance: In the maintenance phase, after deployment of the software in the working
environment there may be some bugs, some errors or new updates are required. Maintenance involves
debugging and new addition options.

Advantage (Pros) of Iterative Model:


1. Testing and debugging during smaller iteration is easy.
2. A Parallel development can plan.
3. It is easily acceptable to ever-changing needs of the project.
4. Risks are identified and resolved during iteration.
5. Limited time spent on documentation and extra time on designing.

Disadvantage (Cons) of Iterative Model:


1. It is not suitable for smaller projects.
2. More Resources may be required.
3. Design can be changed again and again because of imperfect requirements.
4. Requirement changes can cause over budget.
5. Project completion date not confirmed because of changing requirements.

Two examples of iterative model:

Spiral SDLC Model:


The iterations obey spiral template stages. The design loops are the phase of the SDLC process, i.e. an
internal loop consisting of the selection and evaluation of criteria after the scheduling, risk analysis,

31
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

development and appraisal of programs. The next loop is design and implementation and subsequent
testing.

Fig: Spiral SDLC Model


Spiral Model has four phases:

 Planning
 Risk Analysis
 Engineering
 Evaluation
 Planning

The preparation process involves required processing where the consumer gathers and records
the necessary information. Documentation of code specification for the next step is made.

 Risk Analysis
At this point the best solution for the risks involved is chosen, and testing is carried out through the
design of the model.
For example, it may be that the data access speed is too fast when accessing the information from a
remote server. A model of the data access subsystem can be used in order to solve the threat.

 Engineering
Once the risk analysis is done, coding and testing are done.

 Evaluation
Customer evaluates the developed system and plans for the next iteration.

32
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Advantages of Spiral Model:


 When new requirements are met, we will be able to include them in the next consumer release.
 In the next iteration some change or alteration of the functions can be made.
 Customers are very happy because they take into account both their requests and suggestions.
 Risk management can easily be done because we work for the product continuously and
repeatedly.

Disadvantages of Spiral Model:

 The cost can be high as many iterations can take to achieve the final product in high time.
 Many documentation works need to be done in order to systematically develop the process
 Small projects in this design are not acceptable
 There are many protocols that we need to follow, a question.

[CITATION htt39 \l 1033 ]

Agile Model
Agile is an Iterative or Incremental Process Combination. This design concentrates more on
versatility in the production of a service than on specifications. In Agile, a product is divided into
small progressive structures. It is not developed in one go as a full product. The features of each
building improve. The current design is based on previous features. For agile implementations
sprints are renamed. It takes 2-4 weeks for each sprint. The holder of the company reviews the
product at the start of each sprint and sends it to the consumer after its acceptance. Feedback
from clients is being drawn up for progress and the next sprint will be followed by his feedback
and enhancements. Tests are available.

Every Agile Method's main objective is to adjust and delete. In any case, the way each theory
characterizes the stages of product development is slightly different. In addition, the procedure of each
group can change, despite the fact that the objective is equivalent, depending on the particular
undertaking or circumstance. The whole life cycle of Agile software includes design, explosion, creation,
install, assembly and annuity.

33
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

The Agile Process Flow


• Concept - Projects are scheduled and assigned priority
• Inception - The group must identify participants and provide support to address the initial
conditions and specifications.
• Iteration/Construction - The development team aims to produce software based on testing
and input criteria.
• Release - Quality Assurance (QA) check, internal and external training, documents and final
production launch
• Production - Ongoing support of the software
• Retirement - End of life activities, such as customer and migration notices

This vision introduces the complete model of the Agile life cycle in the business. Any organization can
carry out projects simultaneously, record multiple sprints / presses in different product lines, and a
number of customers with a range of business needs, both internal and external.

Agile Software Development Lifecycle

The Agile Iteration Workflow


The iterative method dominates the Agile software development lifecycle. Every revision leads to the
next piece of the puzzle of software development-work code and supporting components, such as client
reports-as long as the final product is completed. Every iteration usually takes between 2 and 4 weeks
and has a fixed period of completion. Despite its time-limited nature, the cycle of iteration is methodical
and the range of each iteration is as broad as the time allocated requires.
During the Agile development process, multiple iterations will be performed and their workflow will be
accompanied by each one. It is critical during a redesign for consumers and company partners to provide
input so that the apps meet their requirements.

The following can be visualized as a standard iteration phase flow:


34
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

• Requirements - Defines brand backlog, sprint backlog, user and stakeholder reviews criteria
for iteration
• Development -- Computer design and production on a given basis-
• Testing - Testing of QA, internal and external practice, production of documentation
• Delivery - Integration and production of the work iteration
• Feedback - Welcome and meet the requirements of the next version for consumers and
investors

While additional features can be added to the product backlog for the duration of the project, the rest of
the process will consist of repeating over and over again until all items in the product backlog are
fulfilled. The process stream thus is not a linear process but rather a chain.

Scrum: Scrum is an Agile sub-set. It is a lightweight and most commonly used model for agile
development.

A "system structure" is a specific set of procedures to be implemented so that a process is in line with the
framework. "Small" ensures that the complexity of the process is kept as small as possible to maximize
the amount of production time necessary to do beneficial work. (For example, the Scrum process system
includes the use of Sprints project loops, XP framework needs pairing coding, etc.)
A Scrum method is defined by common principles, procedures and three types of tasks, objects, and time
frames, as well as other agile systems. The following are defined, as well as other words used in Scrum.

35
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Scrum uses iterative and incremental practices mostly for managing complex software and product
development. Scrum increases productivity considerably and reduces time to advantages compared to
traditional waterfall methods.
An agile Scrum process benefits the organization by helping it to

• Increase the quality of the deliverables


• Cope better with change (and expect the changes)
• Provide better estimates while spending less time creating them
• Be more in control of the project schedule and state

36
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

WHAT ARE THE SCRUM REQUIREMENTS?


Scrum does not just specify what the form specifications are, it simply says they are stored in the Product
Backlog, usually called' Product Backlog Objects' or short' PBIs.' Given the time-boxed nature of a
sprint, we can also deduce that each set will take a much less time than the sprint length. Many Scrum
projects use the "XP" approach to define a feature program as a "User Story" (User Story), though a
subset uses the earlier "User Event" definition. The majority of users would look here to identify the
three fairly common criteria contained in Product Backlogs.
Example of SCRUM
The User Story describes a feature in the context of a plot. The product owner generally writes user
stories and is responsible for the product owner. The format is not standardized, but usually has a name,
certain descriptive text, references to external documents and the way the implementation is tested. For
example, the following can resemble a story:

37
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Name: Planner enters new contact into address book, so that one can contact the person later by postal or
electronic mail
Description: Planner enters standard contact information (first and last name, two street address lines,
city, state, zip / postal code, country, etc.) into contact-entry screen. One clicks “Save” to keep the data,
and “Cancel” to discard data and return to previous screen.
How to test: Tester enters and saves the data, finds the name in the address book, and clicks on it. One
sees a read-only view of the contact-entry screen, with all data previously entered.[ CITATION cpr \l
1033 ]

Advantages of Agile

• Customer satisfaction with the quick and consistent delivery of helpful technology.

• People and interactions are highlighted instead of processes and instruments. Continuous client,
designer and tester contact.

• Technology for working is often delivered (weeks rather than months).

• Face-to-face discussion is the best kind of communication.

Entrepreneurs and entrepreneurs collaborate together, regularly and successfully.

• A constant attention to exceptional design and technical excellence.

• Constant modification for changing conditions.

• Even late changes to requests are welcome

Disadvantages of Agile

• The commitment needed at the start of the life cycle of software development is difficult to assess in
the case of some deliverables of software, particularly those large ones.
• There is little focus on the need for design and documentation.
• If it is not clear to the consumer agent how much the final results we want, the plan can safely move
forward.
• Only senior programmers can take the kind of decisions required during the development phase. It thus
has no room for newbie programmers except in tandem with professional capital.

38
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Agile Process Work


There are advantages and disadvantages, as with any technique (read the benefits and disadvantages of
Agile). For cases where clients and project partners can provide feedback, responsive code parts are
needed immediately, consistency is necessary for changing needs and the group will be able to co-locate
and communicate efficiently. Like any change, it can be overwhelming to integrate Agile processes in
your business. The following are four projects that contribute to the adoption of the Agile Workflow:
Daily Meetings- Host consistent or daily stand-up meetings to maintain open communication, hold
workers accountable, and keep each iteration moving forward.
Live Demonstrations - Provide live demonstrations of the final product of each iteration to
demonstrate progress
Share Feedback - Receive feedback from stakeholders and clients and share it with the whole
team before the next iteration starts.
Remain Agile - Make feedback-based modifications to your method to guarantee that every
iteration improves the last[ CITATION sma \l 1033 ]
Agile Manifesto
 Individuals and interactions over processes and tools.
 Working software over comprehensive documentation.
 Customer collaboration over contract negotiation.
 Responding to change over following a plan.
Sprint
A sprint is a fixed time period where teams complete work from their product backlog. Sprints are
usually one, two, or four weeks long. At the end of the sprint, a team will typically have built and
implemented a working product increment.
Steps to create sprint
Step 1: Create a sprint
Go to the Backlog of your Scrum project.
Click the Create Sprint button at the top of the backlog.

Note that you can create more than one sprint, if you want to plan work several weeks in advance.

39
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Step 2: Fill your sprint with stories from the backlog


Once you've created your sprint, you'll need to fill it with issues. Before you do this, make sure you sit
down with your team and discuss what work you'd like to commit to doing. Ensure you add enough
work for everyone in the team.
To add stories to your sprints
Navigate to the Backlog.

Drag and drop issues from the Backlog onto your sprint.

Note that you can also add an issue to your sprint by editing the issue and updating the Sprint field.
Step 3: Start sprint
Once you've added issues to your sprint and the team is ready to work, you'll need to start the sprint.

Note, you can only start a sprint, if:

You haven't started one already. If you want to have more than one active sprint at a time, try the Parallel
Sprints feature, and

40
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

The sprint is at the top of the backlog. If you want to start a planned sprint that is lower down, you'll
need to reorder your sprints to move it to the top.

To start a sprint
Go to the Backlog of your Scrum project.

Find the sprint that you want to start and click Start Sprint.

Update the Sprint name and add a Sprint goal if you want to, and select the Start date and End date for
the sprint.

HOW LONG SHOULD OUR SPRINTS BE?


If you're not sure how long your sprints should be, we recommend 2 weeks - that's long enough to get
something accomplished, but not so long that the team isn't getting regular feedback.
Step 4: Monitor your team's progress
During the sprint, you'll probably want to monitor the team's progress. One way of doing this is by
viewing the Sprint Report.

WHAT SHOULD WE BE DOING DURING OUR SPRINTS?

41
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

During sprints, teams work together to complete the stories they committed to at the start of the sprint.
This typically requires a lot of collaboration, so we recommend doing team standup meetings every day,
so you know what everyone in the team is working on.
Step 5: Close the sprint
To close a sprint
Navigate to the Active sprints of your Scrum board.
If necessary, select the sprint you want to complete from the sprint drop-down.
Note that if you have multiple sprints in the Active sprints of your board, the 'Complete Sprint' button
will not appear until you select one of the sprints.

Click Complete Sprint. All completed issues will move out of Active sprints.

If the sprint has incomplete issues, you'll be asked to move them to one of the following:
The backlog
Any future sprint, or
A new sprint
WHEN SHOULD I MARK AN EPIC AS DONE?
Mark your epic as done whenever all work for the epic is complete. To make this easier, we recommend
coming up with a clear definition of done for your epic create it. Any stories linked to the epic don't have
to be complete to mark an epic as done.
42
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Four fundamental belief of Agile (Agile Manifesto):

• People and Interactions over Processes and Tools.


• Working Software over Comprehensive Documentation.
• Client Collaboration over Contract Negotiation.
• Reacting to Change Over Following a Plan.

Standards of Agile strategy:

• I demand that brand satisfaction be the most awesome product necessity, and that the relevant
programming be communicated early.
• Deft strategy embraces the changing needs even in the late development.
• Inclined to the least activities span from two or several weeks to several months. The
transport must be done with the good work scheduling.
• Create a situation that supports every person with their wants and desires and lead them to
complete their work.
• The main element of progress is well-working and reliable programming.
• Simplicity is important for the expansion of the calculation of the procedure not completed.
• Intimate and personal discussion is the most productive and successful technique for
transmitting data into and within a improvement group.

I. Waterfall SDLC Model

The entire software development process is divided into different stages in the "The Waterfall" strategy.
The result of one phase acts sequentially as the entry for the next phase. This means that each stage of
the development process only starts with the completion of the previous stage. The aquatic method is a
linear design process in which improvement is seen in the creation, study, layout, building, evaluation,
production / implementation and maintenance processes as being gradually backward (like a waterfall).
As shown in the waterfall method, the phase of software development in a linear sequential stream is
also known as a SDLC.

43
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Fig: Waterfall SDLC Model


 Requirement gathering and analysis is done
Only the system design will begin after the specification is freeze. In this respect, the
generated SRS report is the output for the appropriate process and serves as the system
design input.
 Design System
Documentation serving as a reference for the next stage is generated in the architecture and
design of the system design program. Coding and execution.
 Implementation
Coding is completed and the created code is the source for the next step i.e. checking. The
deployment stage.
 Testing

The developed code is thoroughly tested in the testing phase to prevent program errors.
Defects are logging in and re-tested as soon as they are patched. Error recording,
recovery, retrieval testing continues until the software is underway.

 Deployment

44
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

During the delivery process, after signing off is received by the client, the produced
software is put into service.

 Maintenance
The designers who undergo maintenance solve any problems in the production
environment.

Advantages of Waterfall Model:


 The Waterfall method is the simple model, which is easy to understand and which takes place
step by step in all phases.
 Each phase of deliverables is well defined, so that there is no complexity and the project is
easily handled.

Disadvantages of Waterfall Model:

 A waterfall design is time consuming and cannot be used in short-term projects, as a new phase
cannot be started in this model until this continuous process is completed.
 The waterfall model cannot be used in projects that have unpredictable demand or in which the
specification continues to change, as this model assumes that the criteria will remain clear in the
request selection and evaluation process and that any adjustment in the later phases will result in
higher costs, as the changes are needed in all phases.

II. Prototyping SDLC Model


The prototyping process is a system development approach in which a concept is designed,
evaluated and then reworked as required to achieve an acceptable result that makes the complete
system or service. This model works well in situations where not all specifications of the plan are
well defined in advance. This is an iterative process between developers and users with trial and
errors. For example, Marvelapp, Pencil, In vision etc.

45
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Fig: Prototyping SDLC Model

When precisely when possible, the new system specifications are specified. Typically a number of users
who represent all the units and facets of the existing system are surveyed.

A first version of the new system was designed from the preliminary design. A basic concept design is
developed for the new system. The clients analyze carefully the first model and consider the strengths
and weakness, the inclusion and removal that should be made. This is typically the scaling-down
method, which gives an overview of the features of the finished product. The author receives and
analyzes user comments. Based on the comments provided from users, the first prototype has been
updated and a second device model has been developed.

The second model is tested in the same way as the first.

The previous steps are iterated as often as possible before the users know that the model represents the
intended final product.

Based on the final prototype the final system is built. The final system will be thoroughly assessed and
tested. Routine maintenance is done constantly in order to prevent major failures and minimize
46
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

downtime. Some of most popular prototyping tools available include; Marvel App, Pencil Project, Adobe
XD, In Vision App etc.

Advantages of Prototyping Model:

 Customers get a say in the product early on, increasing customer satisfaction.
 Failure to detect functionality and errors is easy.
 For possible, more complex projects, models can be recycled.
 This emphasizes interaction between departments and dynamic design activities.
 Consumers understand the working of the service better.
 Quicker customer feedback gives a better understanding of client needs.

Disadvantages of Prototyping Model:

I. When contrast with traditional designing approaches such as spiral models and waterfalls, the
main drawback of this approach is that time and money are more time-consuming. Since the
model is most often rejected, it may not be seen by other businesses that this strategy has any
benefit.
II. In fact, it can be hard to demand customer feedback early in the development cycle. Another
challenge is that unreasonable demands for reform may be impossible to satisfy. Another concern
may emerge if the customer requests a quicker launch after seeing the model or if he does not
take an interest in teach service.[CITATION htt37 \l 1033 ]
47
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

48
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Prototype made from Pencil app

Fig of
home page

49
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Fig of student profile

III. RAD SDLC Model


The RAD model is based on experimental or iterative design without a specific plan. The RAD
model is a fast software development. The technology itself includes the scheduling required for
product development.
Rapid development of software is based on the selection of customers’ needs by seminars and
focus groups, early concepts testing using iterative framework, re-use of current models
(constructors), continuing implementation and fast delivery. Rapid product creation.

50
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Fig: RAD Description

This involves the use of various technologies in the development of requirements, such as
brainstorming, evaluation of tasks, systematic analysis, application simulations, FAST, etc. The whole
organized project often outlines the key data, strategies for collecting them and then transforming them
into a streamlined final model. This phase includes the use of developer tools to allow user feedback
and model. This ensures that the data collected in the first stage are re-examined and checked. The
properties of the data set in this process are also defined and explained. The model and implementation
is optimized in this step. This involves the direct deployment of effective digital system methods and
data structures into the final operating material. In this phase, all necessary changes and enhancements
are also made. All interfaces between different modules created by individual teams must be properly
tested. Testing becomes simpler with efficient automated tools and sub-components. The approval test
is conducted by the client.
The advantages of the RAD Model are as follow
 The use of recycled materials leads to increasing the work cycle time.
 Customer feedback is received in the initial stages.
 Using powerful development tools, quality products are improved over a relatively shorter
period of time.
 The short version time scales make it easier to meet changing requirements.
The disadvantages of the RAD Model are as follows
 Highly skilled technicians are required to use powerful and efficient tools.
 The lack of reusable components that result in project failure.

51
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

 In order to conclude the project on schedule, the team leader has to collaborate together
with programmers and clients.
 Unable to modularize the systems appropriately, this model cannot be used.
 The cost of using robotic tools and techniques may not surpass the entire budget of the
company for smaller projects, as in these situations.[CITATION htt38 \l 1033 ]

Difference between Agile, Waterfall and Spiral Models


Spiral Waterfall Agile
It works in Works in sequential method. Main principal of agile
evolutionary method model is to achieve
agility by removing
unnecessary activities
that waste time and effort

Errors or risks are identified Errors or risks are identified Customer interaction is
and rectified earlier. after the completion of needed more than other
stages. model.

It is adopted by developer. It is adopted by customer. It is adopted by developer.


It is applicable for large It is applicable for small It is applicable for large
project. project. project dividing them into
smaller part.

Flexibility to change in Flexibility to change in Code can be change in the


model is not difficult. model is difficult. middle of the project.

User and system requirement:


For the application advancement of the stock administration I will utilize android studio confirming
through Firebase continuously database. Getting all the possibility of the client I have sent this table
as the customer necessity that should be satisfy.

System requirement
Items Requirements

52
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Hardware Memory of 4GB RAM or more


-Monitor resolution of 1024x768 or higher.
-intel Pentium 4 or AMD Athlon 2 GHz (or faster)
-1 GB (or more) available hard disk space.
Software Visual Studio 2019
- Visual Studio SDK 3.0
Operating system Windows 10

Requirements Points
Sales Ought to have the option to make client deals, putting
away it through TPIN number creating the exchange
record including charge.

Inventory management Ought to have the option to include, alter and erase item.
Reporting Ready to produce every day and month to month deals
report, alongside worker deals report

I have organized the client and framework prerequisites in the above table. Thus, in this area I will
talk about on the foundation of improvement cycle of use. For the improvement I pursue numerous
approaches like agile, spiral, cascade model, and so on every one of the philosophies can be use as
indicated by the size and time of the advancement of use. Be that as it may, for the advancement of
the stock administration I will utilize spiral methodologies.

Conclusion
Programming language is needed all over the world for running the business smoothly without facing
any problems. With the help of those language, software could be developed and also with the user
requirements are also possible. But while developing and conducting any research or project, there
may be risk so proper risk management should be followed to avoid those. This task includes about
programming language, SDLC (Software Development Lifecycle), Problems and solution of
business and also about risks managements.

53
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

(P3) Research the use of software development tools and techniques and identify any
that have been selected for the development of this application.
Introduction
Per applicant or customer should be able to make the right plans before beginning to develop the
program in order to get on with it smoothly. The specifications should be reviewed beforehand and the
step of developing the program should also be checked. In order to be properly prepared, various tools
and methodologies can be used and the coding component should be used in the program. Programming
languages are used to prepare the applications.
In this job, I am essentially going to write a detailed containing the tools and methodologies for
designing software that satisfies the framework specifications and develops with the requirements of the
customer. There are different kinds of techniques and software that can be used for this mission. But the
resources and technology that I will use in my project are programming language tools, software design,
UML diagrams, ER-Diagram, Database Software for recording detailed details, and some of the
frameworks that are essential.

Software development tools and techniques:


A program that automates some of the work involved in the administration, programming, scripting,
checking, evaluation or maintenance of other systems is known as a software tool. For individual
programmers, there are resources available that vary in size and scope from basic aids and end users to
sophisticated tools that can support multiple software projects at the same time.

Programming language:
A vocabulary or collection of grammatical rules to command a computer or a computer to perform some
particular activity is known as the programming language. High-level languages such as BSACI, C, C+
+, Pascal, and COBOL, and so on, are referred to as programming languages. There are essentially two
kinds of programming language, i.e. high-level programming language and low-level programming
language.
1) High-level programming language: A programming language which enables a programmer to
write programs which are more or less independent of a particular type of computer is known as
high level programming language. They are closer to human languages and additional machine
languages, so they are known as high level languages. The main merit of high level languages
over

low level languages is that they are much easier to read, write and maintain. By the end of the
day, each and every programs written in a high level language must be translated into machine
language by a complier or interpreter.

54
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

2) Low level programming languages: A programming language that contracts with a computer’s
hardware components and constraints is known as low-level language. It usually works to
manage a computer’s operational semantics and has no abstraction in reference to a computer. A
computer’s native language is also referred to the low level programming language. The two
popular examples of low level languages are machine language and assembly language.

Software Design Methodology


The software design approach may be organized as a software design phase component and a software
design representation or a diagrammatic component. Generally speaking, the architecture process is
always forced by the current hardware configuration, the implementation language and much others.
There are many resources that a program may have designed, such as:
Waterfall Model: Waterfall model is one of the most traditional and sequential choice among all
model. Though it is seen as one of the oldest and outdated method, this is very useful to
understand the history and structure of waterfall to better appreciate the flexibility of more
modern technologies. With this approach, there is lack of flexibility which means that what is
decided by the customer and developer at the beginning must be seen through. It should any
progressions should be committed or errors tended to close to the end arranges, the Waterfall
strategy for the most part requires a full restart.
Agile Model: when waterfall model was not satisfied and started to grow frustration, the agile
methodology was developed. The need to produce software faster and to accommodate change,
this approach was designed. Agile is well equipped to handle the complexity and variability
unlike waterfall and variability is involved in development projects. Basically, agile focus on
team strengths and efficiency along with internal feedback from various departments and clients.

UML Diagram:

The UML (United Modeling Language) diagram with the purpose of visually portraying the
scheme together with its key characters, functions, classes and behaviors is known as the UML
diagram. The key feature of the UML diagram is to better interpret, modify, preserve or record
machine information. The UML is recognized as the standard for modeling software development
by the Object Management Group (OMG).

Uses of UML Diagram


1) UML diagram improve integration between structural models like class diagrams and behavior models
like activity diagrams.

55
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

2) UML diagram add the capability to describe a hierarchy and decay a software system into
components and sub-components.
3) UML diagram has been used as over-all drive modeling language in the arena of software
engineering.
4) UML diagram deliver both a more consistent way of modeling workflows as well as a wider range of
structures to recover readability and effectiveness.

Types of UML Diagrams

Current UML standards call for 13 distinct diagram types: class, operation, object, use case, sequence,
set, state, variable, communication, composite structure, interaction description, timing, and
implementation. These diagrams are organized into two separate groups: structural diagrams and
behavioral diagrams or relationship diagrams.

Structural UML diagram


• Class diagram
• Package diagram
• Object diagram
• Component diagram
• Composite structure diagram
• Deployment diagram

Structural UML Diagrams


• Class Diagram: The backbone of almost every object-oriented method that includes UML is
known as class diagrams. Class diagrams illustrate the static structure of a program.
• Package Diagram: The subsets of class diagrams but developers sometimes treat them as a
separate technique is known as package diagrams. They usually organize elements of a system
into related groups to minimize dependencies between packages.
• Object Diagram: The static structure of a system that explains at a particular time is known as
object diagram. Object diagram can be used to test class diagrams for accuracy.

56
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

• Composite Structure Diagram: Component UML diagrams can help break down the system into
smaller components when dealing with documentation of complex systems. It might
encompasses several departments or it might employ various kinds of technologies as it is hard to
depict the architecture of a system sometimes.

Behavioral UML Diagrams


• Activity Diagram: Action charts delineate the dynamic idea of a framework by demonstrating the
progression of control from action to movement. An action speaks to a procedure on some class
in the framework that outcomes in an adjustment in the condition of the framework. Commonly,
movement charts are utilized to show work process or business forms and interior activity.
• Sequence UML Diagram: Arrangement charts are presumably the most significant UML outlines
among the software engineering network as well as configuration level models for business
application improvement. Recently, they have gotten well known in delineating business forms,
due to their outwardly plain as day nature.
• Use Case Diagram: A foundation some portion of the framework is the practical prerequisites that
the framework satisfies. Use Case outlines are utilized to break down the framework's significant
level necessities. These necessities are communicated through various use cases. We notice three
principle parts of this UML chart:
57
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

• Functional necessities – spoke to as use cases; an action word portraying an activity


• Actors – they communicate with the framework; an on-screen character can be an individual, an
association or an inward or outer application

• Relationships among entertainers and use cases – spoke to utilizing straight bolts.

• Interaction Overview Diagram: Communication outline charts are a mix of action and
arrangement graphs. They model a grouping of activities and let you deconstruct progressively
complex associations into sensible events. You should utilize a similar documentation on
connection outline charts that you would see on an action graph.
• Timing Diagram: A planning graph is a kind of social or communication UML chart that centers
on forms that happen during a particular timeframe. They're an extraordinary case of a grouping
outline, with the exception of time is appeared to increment from left to directly rather than top
down.
• Communication Diagram: Correspondence outlines model the connections between objects in
succession. They depict both the static structure and the dynamic conduct of a framework. From
multiple points of view, a correspondence chart is a streamlined adaptation of a joint effort graph
presented in UML 2.0.
• State Diagram: State outline graphs, presently known as state machine charts and state graphs
portray the dynamic conduct of a framework in light of outside upgrades. State outlines are
particularly valuable in demonstrating responsive items whose states are activated by explicit
occasions.

ER Diagrams
The ER-Diagram (Entity Courting Diagram) indicates the relationship between the entities contained in
the database. In this case, an object is a knowledge factor. A group of comparable entities is referred to as
a set of entities and such entities have characteristics that describe their residences. The conceptual
structure of the database is explained by the use of the ER diagram bye, which defines the persons,
58
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

characteristics and displays the dating between them. Models use a given collection of symbols, such as
rectangles, diamonds, ovals and connecting lines, to symbolize the interconnection of persons,
relationships and their attributes. It is planned to use Peter Chen in 1987.

Advantage of Er-Diagram
 "Conceptually it is quite simple: ERD is very simple, if we recognize about the relationship
among entities and attributes then we will without difficulty draw an ERD."
 "Better visual illustration: As it is a diagrammatic representation of any logical structure of
databases, by using looking ERD, we can without problems understand relationship of entity
sets in databases."

The components features of ER-diagram:

Entity
An individual can be a person, location, event or object that is important to a given system. For example,
the school system can include pupils, teachers, main courses, subjects, fees and other topics. Entities are
represented by a rectangle in ER diagrams and called using singular nouns.

59
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Weak Entity
A weak entity is an entity which depends on the presence of another entity. More technically, it can be
described as an object that cannot be distinguished by its own attributes. It uses an international key,
together with the assigned key, to form the primary key. An object like an order item is a fine example of
this. The object of the order would have no value without the order, because it depends on the life of the
order.

Attribute
An attribute is a property, trait, or characteristic of a person, association, or other attribute. For eg, the
Inventory Item Name attribute is the Inventory Item attribute of the organization. An object should have
as many characteristics as it needs. In the meanwhile, attributes will also have their own special
attributes. For eg, the "customer address" attribute may have number, street, area, and state attributes.
They're called composite characteristics. Notice that certain top-level ER diagrams do not show
attributes for the sake of convenience. In those which do, however, attributes are expressed by oval
shapes.

Relationship
A partnership explains how people communicate with each other. For example, the "Carpenter" entity
can be linked to the "Bench" entity by the "Builds" or "Makes" relationship. Relationships are defined by
diamond forms and are labelled by verbs.

Entity and attributes.


Entities are represented by way of a rectangle with its name in block letters. While attributes are
represented by way of an oval.

60
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Relationships
Relationships are represented by using an energetic or passive verb in the diamond that connects the
associated entities.

Connectivity’s
The relationships are written next to each entity box.

Crow’s foot notation:

Entity and attributes


Entities are represented by a rectangle with its name in capital letters. While entities are also
written in rectangle just below entities.

Relationships
Relationships are represented by an active or passive verb that connects the related entities.

Connectivity
Connectivity’s are indicated by symbols next to entities.2 vertical lines for 1.

• Cardinality indicates what number of occurrences of a substance identify with one occasion
of another element. Ordinarily is likewise firmly connected to cardinality. While cardinality
determines the events of a relationship, ordinarily portrays the relationship as either
obligatory or discretionary. At the end of the day, cardinality determines the most extreme
number of connections and cheerfulness indicates without a doubt the base number of
connections. There are numerous documentation styles that express cardinality.

61
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Information Engineering Style

Database Software
The software or utility used to create, edit and manage database files and documents is known as
database software. This types of applications allow users to store data in the form of hierarchical tables,
columns and fields that can be accessed directly or by programmatic access. Database software is also
known as database management software (DBMS), but both concepts are not quite the same.
Most Database Management Software List
Below is a list of the most popular database management systems-
1. PHP MyAdmin: PhpMyAdmin is a free software tool written in PHP, intended to handle the
administration of MySQL over the Web. PhpMyAdmin supports a wide range of operations on
MySQL and Maria DB. Frequently used operations (managing databases, tables, columns, relations,
62
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

indexes, users, permissions, etc.) can be performed via the user interface, while you still have the
ability to directly execute any SQL statement.
2. Microsoft Access: Microsoft Access is a Database Management System (DBMS) from Microsoft
that combines the relational Microsoft Jet Database Engine with a graphical user interface and
software development tools. It is a member of the Microsoft Office suite of applications, included in
the professional and higher editions.
3. Microsoft SQL Server: Microsoft SQL Server is a relational database management system
developed by Microsoft. As a database server, it is a software product with the primary function of
storing and retrieving data as requested by other software applications—which may run either on the
same computer or on another computer across a network
4. MySQL: MySQL is the most popular Open Source Relational SQL Database Management System.
MySQL is one of the best RDBMS being used for developing various web-based software
applications. MySQL is developed, marketed and supported by MySQL AB, which is a Swedish
company. This tutorial will give you a quick start to MySQL and make you comfortable with MySQL
programming.

Conclusion:
After completing this mission, I'm here that a different coding scheme is used, and different database
software is used to record the data on your computer. With the benefit of careful planning and the use
of various methods and methodologies, there could be a proper implementation of applications that
could satisfy device and consumer specifications. ER-Diagram and UML Diagram are also essential
for software development.

(M2) Compare the differences between the various software development tools
and techniques researched and justify your preferred selection as well as your
preferred software development methodology.
Comparison of Software Development Tools & Techniques
I've already mentioned the methods and strategies for software creation that we can select from. In
this part, I will outline and compare these methods and techniques extensively. Tools that we will use

63
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

to build an application include: prototyping tools, Integrated Production Environment, interfaces,


database tools and source management tools.
Let’s summarize all these tools and options available:

Prototyping tools
Prototype is an early sample, model, or release of a product built to test a concept or process of the
product we are planning to work on in the future. They are considered to be the tools for
demonstration of our ideas, and in doing so can change the way we design. The tools that I discussed
was; Adobe XD and Pencil App. Let’s compare these two top picks:
Based on Adobe XD Pencil App
Best for Businesses of all sizes can use this It is an on-premise Graphical User
tool to design contents and show the Interface prototyping application
exact colors for creating wireframe and
mockups using built-in drawing
shape collections and several other
features

Animation Animation features can be shown in Animation is not available


our prototype

Collaboration Collaborating and inviting other Collaboration is not possible


users to view or edit prototype is
possible
Design Colors can be used but buttons and Design is mostly colorless but we
predefined functions are not can use in-built elements like; url
available bar, buttons, window etc.

Looking into this find Adobe XD appropriate for Big Mart Application.

IDE (Integrated Development Environment)


A software application which offers comprehensive facilities to computer programmers for software
development is termed as integrated development environment. This too consists of at least a source
code editor, build automation tools and a debugger. Let’s compare IDEs; Visual Studio and Visual
Studio:
Based on Visual Studio Visual Studio Code
Weight of application It is heavy weighted It is light weight application
application

64
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Primary use It is primarily used in .NET It is for HTML5, PHP,


development JavaScript, Python, NodeJS
and so on

OS Compatibility It is available for Mac and It is available in all three OS


Windows but not for Linux

Languages supported It supports JavaScript, It has support for languages


HTML, like; JavaScript, HTML,
CSS, JSON etc. Other CSS, TypeScript, Python,
C/C++ and several other
languages include; Python, languages through the use of
PHP, C# with ASP.NET, extensions
Razor, TypeScript and so on

Since we are working with C# with .NET Core MVC, we have to use Visual Studio as our IDE for
application development of Big Mart.

Version control tool


Source control tool is a category of software tools that help a software team manage changes to
source code over time. We can manage the changes of application files, computer programs,
documents, large websites, and other collections of information. It is also called version control tool.
Let’s compare two source control tools; GitHub and Bitbucket:
Based on GitHub Bitbucket
Private repositories GitHub provides unlimited Bitbucket provides
public repositories but unlimited free private
repositories
limited
(5) private repositories
User Interface GitHub provides good user Bitbucket also has UI tool
interface
Users 40 million users use GitHub 10 million users use
Bitbucket
No. of repositories There are 57 million+ There are 28 million+
repositories in GitHub repositories in Bitbucket
Price It is expensive as compared It is cheaper than Bitbucket
65
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

to
GitHub

Not just because GitHub contains more repositories or has trust by many users. There are lots of
reasons to use it. It is easy tool to use and can be used using console too (Command Prompt in
Windows & Terminal in Mac or Linux). We will use GitHub for this and will think about other
source control tools in the future.

Hence, using all these tools for development of Big Mart application.

Development Environment:
For the development environment of insurance company, I have chosen the following tools and
techniques:

We are working with C# with .NET Core MVC, we have to use Visual Studio as our IDE for
application development of Big Mart.

Dot net for frontend f

.Net was developed by Microsoft as a software framework in 2002. It is pronounced as dot net and
comprises various coding languages, libraries, and editors. You can build a wide array of applications
in the .Net framework. These are web applications, mobile applications, games, cloud, Internet of
Things (IoT), etc.

Dot Net features a huge library that contains lots of readymade pieces of code. We can categorize the
libraries as per various departments like encryption, security, database access, etc. The readymade
code offers support to both simple as well as complex data structures.

I am using .Net because reasons are given below:

❖ Earlier .Net was not an open source


❖ .Net is not limited to Windows
❖ The Main Programming Languages of .Net
❖ Dot Net more secure than Java
❖ Dot Net is a Big Umbrella

66
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

As IDE Visual studio:


We used Visual studio as an IDE for making application development of BigMart. Because reason
are as below:

• The Visual Studio IDE is one of the most popular and best IDE web development options
available. It uses AI to learn from your edits as you code so it can finish your sentences – er,
lines of code.
• On top of that, you can collaborate with your team, live, when you’re editing and debugging.
You can also share servers, terminals, and comments.
• Visual Studio supports web, mobile, app, and game development, ASP.NET, Python, Node.js,
C++, Unity as well as support for Azure.
• You can also create development environments in the cloud and a lot more while being
available for Windows, Mac, Android, iOS, web, and in the cloud.

Justification
As I used the Pencil app for a prototyping tool, it's easy to construct a product model. We used built-
in elements such as url bar, buttons, windows, etc. So, the pencil app is very handy in its own way. I
used the visual studio with our IDE to create Big Mart applications. Then I stored all my data and
codes in the GitHub as GitHub has unrestricted public repositories. GitHub has a decent gui for the
user. So, these are the tools and techniques that I've used, and I've compared the various tools and
techniques for software creation.

67
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

68
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Part 2

69
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

70
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

P4 Effectively reviews your business application, problem definition statement,


proposed solution and development strategy. Use this presentation as part of a
peer-review and document any feedback given:

Problem In busines application:


Any company aims to simplify its operations and achieve its goals in a more efficient, quicker and
cheaper way. Having accomplished these objectives, the corporation enjoys benefits over its rivals and
earns capital for further growth.
Businesses use a range of technologies to achieve their goals, including portals, CRM/ERP applications,
cloud platforms and smartphone applications. However, apps are much less often used relative to others,
even though they are the most effective resource for some tasks.

Tight Schedules
Project managers also face the burden of trying to execute the project faster than expected. This can
happen for a variety of reasons – lack of funding, inadequate preparation, or even technological glitches.
What the hell should you do? Often, the only thing you really need is more money. Project managers call
this tactic 'Crashing the Timeline' where more staff members are tagged on the crucial paths of the
project. This greatly decreases the time taken, but on the other hand, confusion can still be created if not
properly managed. But choosing the right engineers can be quite a challenge. This is where certain
businesses outsource the implementation of their applications to foreign suppliers for the period of
project. Alternatively, going offshore and building your own development team and scaling it
quickly, can also prove to be beneficial, especially in the long run. That being said, one must also be
aware of the risks in offshore software development, especially when engaging with the wrong partner.

Budget Changes
Budget changes are frequent occurrences, especially in software development projects. The common
cause for this to happen is 'scope creep.' Scope creep is when you launch your project with a collection
of straightforward, well-defined criteria, but as you reach the finish line, so many requirements are
introduced or removed that what you have left with is one huge mess.
Often times, the engineers may struggle to grasp the technical specifications of the project and
incorporate additional features in an effort to produce an improvised version of the original project. And
if the customer doesn't ask for it, they're left with a superior option, but with a larger price tag added to
it.
What the hell should you do?
Double-check if the staff is mindful of the exact project specifications. Talk to them about the change
management mechanism and how they can just focus with what has been authorised. If the list of
conditions continues to climb, it is time to take a step back and analyze which improvements will lead to

71
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

a positive result and which ones will not. The trick is to remain as true to the original aims and objectives
of the project as possible, without losing the consistency of the production.

Technical Difficulties
Data security, information privacy, large-scale system implementation, software integration, and
compliance are some areas where you are likely to run into unpredictable problems.

What should you do?


Benefit assessment plays a key part in such situations. Identifying technological risks in software
development programs, their effects, remediation and tracking, becomes a top priority. You should start
by defining and reporting the controls currently in place to handle the threats found. The risks left after
these safeguards, also known as residual risks, must be considered in the design of your strategies. These
tactics are referred to as risk reduction strategies.
Risk reduction can entail one or more of the following – passing the risk to a third entity, funding it,
completely ignoring it, or embracing it. Developing the best plans would better mitigate risks to an
optimal standard. At the end of the day, the objective is to minimize the threats to the extent that the
expense of mitigation outweighs the future gain.

Poor Management
This may be a no-brainer, but it is sadly ignored in many initiatives. While many which blame budget
overshoots and time pressures for the failure of software programs, the real cause is often bad
management.
The right project manager would be able to plan plans effectively to ensure that the risks involved with
the project are minimized. Furthermore, by practicing good coordination with the staff, creating a solid
organizational structure and introducing elaborate documentation procedures, the number of projects that
fail can be substantially decreased.
Solutions For Business applications:
It's never easy to equip workers with the digital resources they need to deliver the best for a company. It
is not enough for solutions to be safe, stable, adaptable and resilient. They have to be easy to use. It is
also critical that the approach uses validated technology and be designed by professional staff.
Fingent will equip a company with the next generation business network. We also supported all kinds of
enterprises, using mobile technology, optimized the use of data, leveraged the strength of the Internet,
integrated corporate networks, and promoted their marketing with social media. Contact us now to
discuss how we can support your company to build on the new technologies.

Technology Consulting:
Fignent helps you adopt the right IT Strategy for your business, craft simple solutions to seamlessly
drive your business objectives. Furthermore, our delivery practices enable us to align our solutions
with your business objectives.

72
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Enterprise Packaged Application:


Fingent’s enterprise application development solutions can help you to achieve tremendous
competitive advantage. We can help to leverage an industry standard software platform as a
springboard for creating advanced, technology-driven business solutions.

Custom Application Development:


Custom software has become a leading source of competitive advantage for companies of all sizes.
Fingent can help you build custom software that aligns with your business, increasing productivity
and cutting costs.

Mobility:
Smartphones and tablet computing have created new business opportunities, especially by providing
personalized services to customers. Organizations are also utilizing the advantage of mobility to
connect with field agents and vendors better.

Data Analytics and Visualization:


Business is awash in data. The volume, variety, and velocity of business data make it challenging for
a business to take advantage of the data at their disposal. Fingent can help you gather actionable
insights from this data and help you make more informed decisions.

Development strategy of application:


Communication has become swift as mobile apps are fast, visually amusing, interactive and can be
easily integrated other mobile features. Smartphones have changed the life forever. The number of
consumers accessing information via smartphones, tablets and wearable has been increasing with
time. People prefer a mobile app for storing and managing data, on-line shopping, socialising,
navigating etc.

Enhancing data security:


The irony is that people do not worry about data protection and privacy when using smartphones,
making it important for developers to take measures rather than take action after data leakage. Any
security problems in mobile app creation can include unsafe data storage, inadequate server side
controls, accidental data leakage, broken cryptography, etc. Companies operating with cash and
classified documents stop a cloud-based environment due to security violations. When using cloud-
based development tools, it is important to know what kind of data and customer security
mechanisms, procedures and practices are used in service provider data centers. Any of the programs
that deal with sensitive user details are connected back to the cloud. So, you need to take care of any

73
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

unsafe transit that happens on an unsafe Wi-Fi link. This kind of authentication is accomplished by
encryption and SSL (Secure Socket Layer) certificates, and if we forget to use the correct SSL
libraries, sensitive user details can be at risk.

Performance of App:
Customers hate when applications crash or slow down or hung up for a few seconds. As a result,
consumers will leave a one-star rating and a negative review of the app, leaving it. Mobile App
crashes can also cause problems like missing user data. Organizations need to understand Memory
Management, Software Lifecycle, Inadequate Testing, Network Management, Error State and
Exception Management when developing app creation strategies. The application success can be
hindered by the use of third-party service providers such as advertisement systems and analytics.

Monetization strategy:
Apps are now big business. Analysts have predicted that app-related sales would surpass more than $70
billion by 2017. (Source of the company: McKinsey & Company). In-app sales and in-app ads are things
that marketers should plan ahead of the introduction of the smartphone app. Intelligently structuring the
smartphone applications provides an enormous incentive to turn guests to customers. You can start
freemium applications where basic facilities are offered free of charge while all advanced features are
charged. The trick is to disperse the capabilities of the app in such a way that the user is leaning towards
the feeling of using the chargeable features. . This call-to-action should display intertwined functionality
that will eventually lead consumers to buy the whole kit.
There is no question that in-app advertising brings money, but will offend users if it is not well
implemented. Mobile advertisements enable software companies to make money without charging their
customers for money, eliminating the cost obstacle to buying the app, and promoting free downloads.
Mobile app providers' aim is to create a large user base and collect valuable information to sell to other
advertisers who pay to put targeted advertising in the mobile app.
We made a presentation as we were on the same team. The introduction involves the effective analysis of
our market application, the issue specification statement, the potential approach and the implementation
plan. The business application features are also available in the presentation. The presentation includes
the implementation of the problem statement. The function of the problem statement and the issue
relevant to the business application is also included. The presentation includes the various development
strategies that are essential for the business application. Finally, part of the inference is included

74
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

75
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

76
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

77
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

78
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

79
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

80
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

81
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

82
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

83
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

84
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

85
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

86
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

P5 Develop a functional business application based on a specified business


problem:
Prototype:
A prototype is an early sample, model, or release of a product built to test a concept or process. It is a
term used in a variety of contexts, including semantics, design, electronics, and software
programming. A prototype is generally used to evaluate a new design to enhance precision by system
analysts and users.

Admin roles:

• List role accounts, except admin role.


• Create an account (Create Account) to follow the role.
• Change the password (Change Password) of the user, to avoid wrong input, the password is
entered twice to check.
• Manage weekly sales report. Staff roles:

• Manage categories
• Manage orders
• Sales report management

• Revoke damaged and expired items


• Transfer Item to another warehouse

Functional Description

1. Login
Use Case Name User Login into system
Actor User
Description User login into system and used it
Requirements Provides valid value of username and password
Pre-conditions User has login into systems
Post-conditions Login success and actor can use system
Basic flow Actor Action System Response
• User provides valid value of • System will display the
username interface suitable for each
• User provides valid value of account if the user logs in to
password the correct account

87
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

• User click “Login” • System will show Error


message if invalid
username or password

2. Logout
Use Case Name User log out of the system
Actor User
Description User can log out of the system after
use
Pre-conditions Actor has login into systems
Post-conditions Logout success
Basic flow Actor Action System Response
• User click “Logout” • System logs out the user
account and displays the
login layout

3. Create Account
Use Case Name Admin can create new account
Actor Admin
Description Admin want to create new account
Requirements The administrator selects the corresponding role for the account that
they want to create
Pre-conditions Actor has logged as Admin
Post-conditions Create a successful account
Basic flow Actor Action System Response
• Actor login system by admin • The system will save the new
account account created in the
• Administrator chooses the database
role they want to create
account
88
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

• Administrator provides
username
• Administrator provides
password
• Administrator provides
password again (must true
with previous)
• Administrator click Create
button when done

4. Order Item
Use Case Name Customer login to the web app
Actor Customer
Description Customer wants to order items
Requirements Actor selects the item
Pre-conditions Actor select the item and click the order option
Post-conditions Order successful
Basic flow Actor Action System Response
• Actor login to the system • The system will save the in
the database
• Actor selects the items
• Order the item

5. Transfer item to ware house


Use Case Name Staff login to the web app
Actor Staff
Description Actor want to transfer item to warehouse
Requirements Admin select the items that needs to be transferred to another
warehouse.
Pre-conditions Actor select the item and click the order option
Post-conditions Order Successful

89
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Basic flow Actor Action System Response


• Actor login to the system • The system will save the in
• the database
Admin selects the item

Order the item

6. Revoke damaged and expired items


Use Case Name System itself staff needs to login
Actor System and staff
Description Actor want to revoke damaged items
Requirements Actor must be commanded to remove expired item. Staff wants to
remove damaged items.
Pre-conditions System itself remove the repaired one and staff select the damaged items.
Post-conditions Removed successfully
Basic flow Actor Action System Response
• Actor login to the system • The system will remove the
items from the database
• Admin selects the damaged
and expired item

7. Payment Process
Use Case Name Customer login to the system
Actor Customer
Description Actor want to revoke damaged items
Requirements Customer wants to pay money.
Pre-conditions Customer click on check out option and fill up the form and click pay.
Post-conditions Payment Successful
Basic flow Actor Action System Response
• Actor login to the system • The system will record the
payment in the database.
• Admin selects the payment
option

90
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Here, I have built the prototype of An Inventory Management System of Big Mart. It defines how our
product is going to be it looks and User interfaces.

Prototype of Register page: It indues all the details we are going to make in a registration
form of our actual web-application.

Log In page: it describes the function, features and looks of login page.

91
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Home Page: Overall looks of Home Page where we can fit our logo navigation bar and
other essentials.

92
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

About Page: Gives detailing about what content we should write on the about page and its
looks.

The privacy policy page:

93
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Add product page: Only Admin (manager) and employee has got access to this page.

94
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

M3 Interpret your peer- review feedback and identify opportunities not previously
considered.

Document Approval
The following Software Requirements Specification has been accepted and approved by the
following:

Printed Name Title Date

Amar Thapa Lead Software Engineer 19/6/2020

Bhuvan Subedi Lead QA Engineer 18/6/2020

Project Manager/ lead UX- 19/6/2020


BIjay Pokhrel UI
Designer

As I am the lead UX-UI Designer of my team.


Talking about UX. User experience (UX) design is commonly defined as the process to design
experiences and interactions with a digital or physical product that is useful, easy, and enjoyable.
User interface design (UI) is commonly defined as the process of designing the visual look of the
product and the functionality of the interaction.

If we take the example of a product - lets say an app - a UX designer would not just be creating the
look, layout and colours of the app, but they would also be involved in the planning and workings of
95
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

the entire app. They would need to think about a range of issues potentially inside and out, for
example:

• Registration: How much information does the user need to provide? What format? Is registration
necessary to use the app? Should it connect to social media? Should the registration be on one page
or many? How does the user progress?)

• Using the app: Does the app auto-login? Does it require users to log in again? If so, does it pre-
fill the username field? Which keyboard layout should be used for any specific field? What
navigation should the app use? Does it remember where users left off on previous use of the app?
How much information should the app show on certain pages? What information should it hide?
Should content be refreshed automatically or manually? Why?

• Outside the app: Should the app send notifications? How often? Do the notifications link into a
specific page in the app? What about emails? Are users emailed reminders? If they haven’t given
their email address, should the app ask for it? When?

So a UX designer is almost trying less to fill the role of a visual designer and more like a once-
removed personal assistant. Their job is to facilitate the smoothest experience for the user, making
sure they are given what they need when they need it, that they are not interrupted when they don’t
need to be, that they don’t have to do more than is necessary. Typically, a UX designer needs to allow
the user to get done what they came to do, the less friction they have in trying to do that, the better a
UX designer has done their job.

Opportunities not considered previously:

• Employee Management Checklist:


The functional business application should be able to generate monthly sales report based on specific
user. From here the store can learn which employee is performing the best and thus can reward for
further motivation. Employee Management Checklist for Shopping Centers, Grouped Residential
Apartments, Big Retail Stores, etc. provides the basic tasks should be done on a daily basis in these
places

96
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

• Marketing Report:
A marketing report, or sales analysis report, gives an overview of the state of the sales activities
within a company. It shows the different trends happening in the sales volume over a certain time,
but also analyzes the different steps of the sales funnel and the performance of sales executives. A
daily sales report is a management tool used by businesses, sales reps, and managers in order to
extract the most relevant daily sales data such as the number of closed deals, client conversations,
opportunities created, and many other sales-related KPIs.

M(4) Develop a functional business application based on a specific Software Design


Document with supportive evidence of using the preferred tools, techniques and
methodologies:
Big Mart is one of Nepal's leading shopping applications. It consists of the aims of supplying consumers
with reliable and new facilities. The objective of the application is to have a high quality product and to
handle and store products.
The Mart has been inspired to promote their company as a trending tactic via the internet. That's why
they hired me to work with the developer to design the company's website.

Keeping our application into consideration, We have produced a website for Functional business
application. The Photos and description of our functional business application are as below:

Product demo and photo.

Product Demo:

97
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Description: So, this is the home page of our business application. After opening the link of our
business application, you can see the logo of our Big Mart. You can see the search navigation bar.

Below it you can see the categories, big mart mall and vouchers combo box button. It also consists of
register and login button. After logging in the application, the name of the user will be shown in the
name section,

Description: After entering into the about page of Big Mart Departmental Store, we can see the
description of the Big Mart. In the description page, the background history of Big Mart Store is
available. And also the gallery of the Big Mart is included in the About page.

98
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Description: In the register section, the customer can register their account by signing their email
address, name, password, address and TPIN number as well. After registering the account of Big
Mart, the customer can have their own account with their information available.

99
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Description: In the login section, the customer have to login their account with their email address
and password that they have registered with. After logging into the account, the customer can see
their user account and their profile as well.

Description: If by chance, the customer forgets the password of their account, they can reset the
password of their account using their email as well. And after getting the new password, they can
login into their account.

Description: In the above screenshot, you can see that there is a confirmation to that they have forgot
their password, and they are asking for the confirmation. They can confirm from their email address.

100
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Description: In the above screenshot, there is a page of privacy policy. There is the description of the
legal terms and conditions and privacy policy of our Big Mart shopping online store with
interpretation and definitions.

Description: The above screenshot is the homepage of our Big Mart shopping application. There you
can see the home button and search navigation bar. There you can also find the register and login
button as well. And after that you can find there categories, Big Mart Mall and Vouchers combo box.

101
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Description: In the above screenshot, we can see that it is the categories of the electronic items or
electronic gadgets where mobile phones, laptop, camera and many more items are available.

102
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Description: In the above screenshot, we can see that there are laptops available of different brands
and different models. After that there is a button of Read More, where we can see the more
description of the product. And there is button of add to cart where you can add the product to cart.

Description: In the above screenshot, we can see that in the categories of electronics, it’s the laptop
categories. The laptop model is of Lenovo. There is also a sale going on and also discount offer as
well where we can use the code, DAKSHINA2000 to get Rs.2000 off.

103
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Description: In the above screenshot, we can see it’s the categories of Health and Beauty where
different beauty products and cream are shown in the picture. We can add the product to the cart.

Description: In the above screenshot, we can see that it is the categories of Grocery items where
drinks of different brands are available such as Coca-Cola, Fanta, Tuberg and many more. We can
add the product to the cart as well.

104
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Description: In the above screenshot, we can see that it is categories of grocery of snacks items where
different snacks items are available such as biscuits, chips, cookies and many more. The chips and
cookies are of different brands such as Lays, Kurkure, Little hearts and many more.

105
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Description: In the above screenshot, we can see that there is the page of clothing item of ladies.
There we can see the model, brand name, size, color, price and many more description of the clothes
are available in the page. We can add the clothes to the cart as well.

Description: After adding the product into the cart, we can manage the number of clothes. The total
amount of the product are shown in the box. After that we can go to the checkout button. Also there
is link where we can add any discount code that is available on the product.

106
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

107
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Development 2020

Description: After the shipping methods, we will go to the payment method, where we have to
include our email address, name, address, zip code, phone number and many more. After giving all
the information, the shipping and payment method will be completed.

107
108
Tau Maya
Amar Gurung
Thapa ((BTEC
((BTEC HNDHND in Computing/
in Computing/ Third
Third Semester)
Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Description: In the above screenshot, we can see that there is the checkout system. After the shipping
method and the review and payments methods, there is the review where all the information of the
customer and the product are shown in the review section.

109
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Description: In the above screenshot, we can see that after the review and payment method, the
order is confirmed. After the order is confirmed, there is a button of continue shipping. After
clicking into the shipping box, the shipping and dispatching process will be continued.

110
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Description: Finally when we click on continue shipping button, the items and products that we have
ordered are shown with the details and description. The home page and register button are also
shown in the page. The search navigation bar is also available at the page, after clicking into that we
can search more items.

Evidence of using the pretend tools, Techniques and methodologies

111
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Description: Use of Trello for project management. We have used the agile software development
methodology for developing Big Mart Inventory Management System.

Description: In the above screenshot, it is the evidence that we have made our application in
Visual Studio 2019. It is the model of edit.cshtml of our Big Mart Application.

112
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Description: In the above screenshot, we can see that it is the evidence of our Model View
Controller and we have made our Big Mart Application on the basis of MVC.

113
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Description: In the above screenshot, we can see that it is the evidence of our Pencil App. We have
made our prototype in Pencil App using different buttons, combo box, images and many more.

114
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Description: In the above screenshot, we can see that it is the evidence that we have used Git Hub
App to store, transfer and relocation of codes.

Description: In the above screenshot, we can see that, it is the evidence we have used SQL server.
We have made database diagram using SQL server.

115
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Description: In the above screenshot, we can see that, it is the evidence that we have used SQL
server for making tables and database tables.

116
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Description: In the above screenshot, we can see that we have used Visio Professional to make ER
Diagrams. We have used Visio Professional to make ERD of an Inventory management of a
shopping mall.

D (2) Evaluate any new insights, ideas or potential improvements to your


system and justify the reasons why you have chosen to include (or not to
include) them as part of this business application:
Ecommerce is creating a theme right now. Your success in online business depends on the kind
of marketing approach you use. The brand approach is now evolving with the consumer in mind.
Intelligent digital ads should be adopted by a company to meet the exact crowd. With the help of
artificial intelligence, you can enhance your company. This brief would address the factors in e-
commerce that can be improved with artificial intelligence.

Personalized shopping experience.


Almost half of the retail operations are now online. Achieving new clients to an online site is a
difficult job. Customizing your e-commerce website for customer interest will increase user
experience with the platform. Customer expectations play a key part in the digital marketing
campaign. User experience with the brand can be enhanced as it is customized by customers. To
provide your future customers an improved customer experience, you need to recognise their
likes. This can be achieved by capturing the online habits of the customer. Artificial intelligence
can provide the client's web data with valuable ideas for targeted marketing.

Artificial Intelligence
Artificial Intelligence will help you optimize your e-commerce platform. You will enhance the
user experience with AI technology for your customers. Your artificial intelligence marketing
campaign will hit future clients. It will boost successful customer traffic to your online store. You
will use AI for faster marketing drives and personalized marketing campaigns. You will gain
consumer approval for your company with this technology. It will even help you automate your
marketing efforts. You can reduce marketing time and improve marketing accuracy by using
automatic marketing strategies.

117
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

The following are the important applications of E-Commerce marketing, where elements of AI
are used:

Creating Strong Subject Lines:


Subject lines are the authors of the text. With Artificial Intelligence, you can build enticing and
entertaining subject lines. Core applications available in the AI elements will create catchy topics
for your E-commerce marketing strategy.

Marketing Automation
With the aid of Artificial Intelligence, we will simplify all the marketing activities of your e-
commerce campaign. With AI, you can automate company practices such as lead generation and
integrated digital marketing services. You can also customize marketing content and create
customized AI automation deals for targeted customers.

Inventory Management
For any e-commerce site, maintaining the inventory is a tiresome job. Artificial intelligence can
manage and monitor your inventory level efficiently. AI can go through past sales trends,
forecast of changes in the market, supply issues to interpret the inventory requirements.

Creating Strong Subject Lines


Subject lines are the impression creators of your text. You can create engaging and attractive
subject lines with Artificial intelligence. The core applications available in the elements of AI can
generate catchy subject lines for your E-commerce marketing strategy.

Product Recommendations
With the shopping activities of users, AI technology can suggest engaging recommendations to
each client. You can retain your customers by offering products that they like. Artificial
intelligence can help you in this regard. This tool can remember the purchase and search history
and browsing activities of users. With this understanding, AI can craft recommendations and
offers for your clients

118
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Conclusion:
Digital marketing is needed right now, when all companies have gone online. Nowadays, we
should skip ECommerce since most people enjoy online shopping. You may set up smart
marketing programs for artificial intelligence. With the utmost capability, this platform will assist
you in all your sales activities. We hope that the brief given above will help you learn about the
use of artificial intelligence in e-commerce.

119
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

● P6 Review the performance of your business application against the


Problem Definition Statement and initial requirements:
• BigMartProject: Ver1.0
• Document require: Document requirement, coding document, design document.
• Time testing: From 01-July-2020 To 07-July-2020

• Hardware requirement:
Computer Hardware Dell i7

Screen Size 13 inches

Client laptop

• Software
Software Visual Studio

Database Microsoft SQL Server 2019

Browser Chrome

Documentation tool Microsoft Word 2018

Computer Operating System Windows 10 Pro, 64bit

• Test Detail (For Each Test):


1) Test identification: Test insert, update, delete, show, block, unblock function.
2) Test objective: All the requirement function will run with no error.

• Test level:
1) Normal scenarios
2) Data validation.
3) Extremes of data.

• Test schedule:
• Testing: Function Test and Unit Test → 3 days
• Regression tests: Test all function and unit of the test case → 3 days
120
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

***Data to be recorded: Data given from system test plan will be record and will be
executed when the system process has no occurred error and run successfully.

• Test case
NO Test function Description
1 Login Log in into system
2 Logout Log out system
3 List Account by role List all account by role
4 Create Account Create new account
5 Change Password Change account’s password
8 List All Staff Show all workers
9 Search customers Search customers
10 Order Items Choose the items that they want
11 Transfer items Customer or other warehouse staff order their
needs
12 Payment Pay bill
13 List Category by Id Show all category
14 Manage Categories Manage categories

• Results compared to reality


N Test Expected Actual Status Notes
O Steps Test Data Output Output Pass/Fail

121
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

1 Login Username: BAdmin Login success Login Pass Successful


success
Password: 9815145577@

(Note Username and


password of staff and

customers are all different)

5 Logout N/A Logout Logout Pass Successful


success success

6 Show N/A Staff profile Staff profile Pass Successful


item page page
Details

7 Edit item Add stock Show N/A Pass Successful


details information
update on the

profile page

8 Order Select the item and add to Display list Display list Pass Successful
check out chosen item chosen item

9 Add Add items to the store Display Display Pass Successful


products, added added
categorie items items in
s, units in page page

10 Payment Pay the bill Pay money Payment Pass Successful


through successful
online
payment

122
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

11 Report Record all the sales Display sold Recorded in Pass Successful
items in database

admin
dashboard

and in
database

User Manual

For Admin
• List role accounts, except admin role.
• Create an account (Create Account) to follow the role. A staff account when newly
created in a locked state, cannot be logged in, they need to be trained by the staff full of
information and activated later, even admin cannot activate.

M5 Analyze the factors that influence the performance of a business


application and use them to undertake a critical review of the design,
development and testing stages of your application. Conclude your review by
reflectively discussing your previously identified risks.
The factors that influence the performance of a business application:
Here’s our list of the top 10 factors impacting application performance. They may cause
problems and downtime issues that disrupt day-to-day operations, decreasing client satisfaction,
harming employee productivity, reputation and revenue. Today’s IT organizations are realizing
that managing complex, modern applications is a costly, tedious and sometimes frustrating
proposition.

So, what are the main factors impacting application performance?

123
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Application Complexity:
Application complexity is one of the biggest factors impacting application performance. Today’s
applications and services, particularly those delivered via the Web, are a mosaic of components
sourced from multiple places: data center, cloud, third-party, et al. While the customer or
employee looking at a browser window sees a single application, multiple moving parts must
execute in the expected manner to deliver a great end-user experience. Maybe the Web server
and app server are running fine, but if the database is faltering, user experience will suffer. Being
able to measure and keep tabs on all those moving parts is the challenge and requires an APM
tool that can provide a view into the performance of all the parts, not just individual components.
As the saying goes, “The more moving parts, the more that can go wrong.”

Application Design:
One of the biggest impacts to application performance is caused by companies
outsourcing/subcontracting their application development outside of their company and their
quality control domain. Application quality and performance needs to be built into the
application platform and cannot be an afterthought or something that “we’ll fix later”. The
subpar app performance that is accepted in the development phase is bound to manifest itself in
the production stage. Modern APM solutions capture this poor performance, but can’t provide
the cure. The only way to prevent poor app performance is to expose your app development to
the rigorous quality controls and processes early on in the application lifecycle — and actually
fix them early in the cycle.

Application Testing:
Today's applications are often developed in simulation labs without testing performance on real-
world networks. Before applications are deployed, transport across today's highly distributed
network architectures should be monitored and optimized. Agile release cycles — the reality is
that less than

124
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

5% of developers performance test their code before it is pushed to production. The “make it
work” over “make it perform” mantra is one of the biggest factors that impacts application
performance today. Most organizations don't have the time, resource or budget to replicate
production environments in test for every agile release, this is why a growing trend of customers
have started to test in production out of working hours. When you consider that the codebase of
an application changes several times per month, you can begin to understand why performance
anti-patterns and bottlenecks make their way into production.

The Capability to Identify Issues


Many organizations still do not have the capability to enable them to determine if their issues
with application performance are caused by network, server or application-related problems.
Organizations are increasingly trying to improve the quality of their end-user experience, yet the
majority are still not able to identify which parts of their enterprise infrastructure is responsible
for causing their application performance problems.

The infrastructure and components of the application service:


Applications are distributed by nature, and unless the underlying infrastructure is responsive on
all the different components of the application service, the entire application service is impacted.

Without a doubt, third-party web components are among the biggest factors impacting web
application performance today. To deliver the functions and features online visitors expect,
websites and web applications are actually a composite of your own resources plus numerous
third-party web components. These include content delivery networks (CDNs), site search
functions, shopping cart and payment processing functions, ad networks, multiple social network
connections, ratings and reviews for gathering feedback and web analytics. Today, the average
website includes components from eight or more different hosts, and a slowdown for any one
service can degrade performance for an entire website or web application. If anything goes
wrong (and inevitably it will), only one party will get the blame: you, as the primary website
owner. Organizations leveraging third-party web components must adopt an end-user focused
approach to APM, in order to better identify and fix performance problems associated with third-
party services beyond one’s own firewall.

125
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

The Network:
Network latency and bandwidth is king for any application that isn't local (remote workforce,
customer facing website, web applications, etc.). Monitoring network bandwidth and web
application performance from multiple locations helps isolate the problem to the network tier.

The network on which the application is used impacts performance tremendously, especially for
mobile and cloud. Inconsistent bandwidth, high jitter, increased latency and packet loss all work
to degrade application performance. While you might not be able to control mobile or most cloud
networks, you can build and test apps with these network conditions in mind. This gives
organizations the best chance to optimize app performance before the network impacts are felt by
users.

The dynamic IT environment: Virtualization and the cloud:


Applications today are an intricate mesh of multi-tier software running on servers, networks, and
storage. In addition, there is a good chance they are running on virtualized hardware that is
shared with other applications. It is very challenging in this dynamic environment to understand
what will impact your application performance as it requires intimate knowledge of your ever-
changing application structure at any given moment. Many IT organizations are very advanced
on the application side but unfortunately still struggle to move beyond managing applications via
a silo approach to the different technology tiers – application, server, network, storage, etc. This
is why many organizations will experience application performance issues without any useful
tools to help them to resolve the problems. Only an application performance management tool
that uses a unified, cross-domain view of the application and its supporting infrastructure
components – with an accurate run-time update of their fast-changing inter-dependencies – can
ensure highly available and optimally performing systems.

126
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

The web browser:


TRAC’s 2013 APM Spectrum shows that the Web browser is the key blind spot for gaining true
end to-end visibility into application performance. With new approaches to application design
and the increased usage of Web Services, the ability to monitor the processing that takes place
within the browser has become one of the key requirements for full visibility into application
performance.

People: Communication:
My vote goes to “a failure to communicate.” Not to steal from Jack Nicholson in A Few Good
Men. There are many good technologies out there, but as APM has evolved to become more than
an introverted, single-domain discipline, sharing information effectively will require an
investment in dialog. This will include next-step process awareness, so that key stakeholders are
identified and know who each other are, and clear avenues for optimizing their collective
insights. But it also requires, in many organizations, a cultural and often a political shift to
promote a willingness to step beyond traditional boundaries and ways of working. As it matures,
social media should also help. But no single technology will count more to promote effective
APM than a revitalized and intelligent willingness to communicate across roles. Without it, most
technology investments are wasted, or at least poorly optimized.

Lack of proactive monitoring:


A lack of visibility impacts application performance. Given today's complex and dynamic
operational environments, traditional management tools are unable to provide a complete picture
of application heath, availability and risk. As more organizations move toward hybrid and
converged compute environments, it becomes challenging to provide complete visibility across
internal and external resources. Organizations need management tools that provide a single pane
of glass view across all IT assets and workloads, regardless of where they reside, to ensure
critical business applications are always available and running at peak performance.

(Anon., 2020)

127
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

D3 Critically evaluate the strengths and weaknesses of your business

application and fully justify opportunities for improvement and further


development:
Here, I justified on further improvement and development of our functional Business
Application:

In today’s world, it is completely impossible to run a successful business without the proper use
of inventory management system. In most firms, inventory control system management refers to
the ways logistics are handled in the company. Inventory control system management is nothing
but management of logistics and the process of eliminating general competences in the company.
It refers to the processes of how the different suppliers and the whole network thereof are
managed. The overall aim of inventory control system management is to produce effective and
efficient operations. The value of inventory control system management goes up all the even
more in retail chain organizations. This is due to the fact that every retail chain organization
works with a number of suppliers at any given point in time. All retail firms have to make a
conscious effort to integrate the logistics, distribution activities with the suppliers, and the
manufacturer’s overall efforts.

Characterizing the quality and shortcoming of my project I need to explain the open doors for
additional improvement and advancement. As I have built up the application for managing an
inventory on a shopping mall like Big Mart, I ought to know that creating and releasing it won't
be a superior choice for application. The application ought to be screen and as a designer of the
application I should make further improvement and advancement with respect to the application.

 Shipping features should be added as there could be many customers from


different countries and continents that should place order. In order to expand the business
of Big Mart Globally we need to work on these features. Promoting the local good and
contributing in its recognition helps to uplift the Big Mart at international level.

128
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

 Customer care features: Must add this feature for solving customers problem and
helping them to shop smartly. This also helps to get some feedbacks on the weakness of
your application and knowledge about the difficulty faced by the user so you can amend
your application according need of your customers.

 The application that I have produce for management of an inventory on a


shopping mall like Big Mart is functional just in Websites/web browsers however we
need to make the application accessible for each stage and gadgets. Along these lines, for
the further improvement of the undertaking I need to code them for the stage like desktop
application (downloaded and installation versions), mobile version (android version and
IOS) and so on.

 We likewise need to remember that what will occur if the created application
circulates around the web or the huge information are travel by the application. In this
way, we need to guarantee that the created application can adapt to the immense measure
of information that will be sent to it and the application foundation can likewise
strengthen all the connected web browsers of devices such as mobile, desktop tab etc.
 Language conversion option features should be added so that people can choose
their preferable language which helps them to shop smarter and less chances of incorrect
inventory and misunderstanding the products.

 Consistently, the latest kind of attacker and hacker is taking a stab at cracking the
application. When an application creates, it stores touchy details about the customer and
the item that should be safe. Therefore, I need to make a day-by-day trial of the request
for information security. As a major part of the application has lost its relevance to the
customer due to lack of research, insufficient programming and inevitable frustration of
the client and lack of certainty.
 More on I need to incorporate the application to the smartphone base and the
cloud base all allowing them greater protection to the application opening to provide
access to administration applications require, for example, Cleanser or REST, SQL
databases and JMS message transport, and so on.

129
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

 At the same time as the application is developed and released for marketing and
promotion of a shop on the web marketplace (building it as an e-commerce platform), I
need to ensure that the application is profoundly sensitive or not. As the application will
be used by the different amounts of the client, the aim of which is that the application can
respond immediately to the client. In this respect, I need to ensure that the application
must have the opportunity to conform to the tempo, engagement and relevance of the
information provided.

Conclusion:
At the end of the day, we can infer that we made our Big Mart Application using Visual Studio
2019. Me, like Bhuvan Subedi and Bijay Pokhrel, were on the same squad, and we have our
application as a team member. We looked at a business-related issue and created a well-defined
problem description statement backed by consumer and device specifications. We also identified
areas of concern relevant to the satisfactory execution of our submission. We evaluated the
business-related dilemma using acceptable approaches. We also justified our approach and
compared it to the software development tools and the approaches we have researched. We've
been researching the use of software creation methods and techniques. We contrasted the
variations between the different technical tools for software creation. We also produced a
structured presentation that efficiently evaluates our company application. We've created a
practical business framework focused on a basic software design document. We analyzed new
perspectives, innovations or possible changes to our method. We checked the results of our
business application against the issue specification argument. We evaluated the factors that affect
the success of the company application and used them to conduct a critical analysis of the design,
implementation and testing phases of our application. We have also assessed objectively the
strengths and weaknesses of our market application and have justified opportunities for change
and further growth.

130
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

References
(n.d.). Retrieved from softwaretestinghelp: https://www.softwaretestinghelp.com/software-
development-life-cycle-sdlc/
(n.d.). Retrieved from tutorialspoint: https://www.tutorialspoint.com/sdlc/sdlc_agile_model.htm
(n.d.). Retrieved from cprime: https://www.cprime.com/resources/what-is-agile-what-is-scrum/
(n.d.). Retrieved from smartsheet: https://www.smartsheet.com/understanding-agile-software-
development-lifecycle-and-process-workflow
(n.d.). Retrieved from searchcio.techtarget:
https://searchcio.techtarget.com/definition/Prototyping-Model
(n.d.). Retrieved from geeksforgeeks: https://www.geeksforgeeks.org/software-engineering-
rapid-application-development-model-rad/
PROJECT-MANAGEMENT.COM. (2020, OCTOBER 7). Retrieved from PROJECT-
MANAGEMENT.COM : risk related to the successful completion of your application.
admin, 2019. [Online]
Available at: https://intelicle.com/7-risks-of-e-commerce-business/

Anon., 2020 . [Online]


Available at: https://course.ccs.neu.edu/cs5010f17/InterfacesClasses2/advantagesADT1.html?

Anon., 2008. [Online]


Available at: http://bluehawk.monmouth.edu/~rclayton/web-pages/f08-305-503/stacks.html

Anon., 2015. [Online]


Available at: http://web.mit.edu/6.005/www/sp15/classes/12-abstract-data-types/

Anon., 2017. testing-ecommerce-applications. [Online]


Available at: https://www.testbytes.net/blog/testing-ecommerce-applications/

Anon., 2019. 2019. [Online]


Available at: https://www.tutorialspoint.com/sdlc/sdlc_agile_model.htm

Anon., 2019. Economictimes. [Online]

131
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])


lOMoARcPSD|44259030

Available at: https://economictimes.indiatimes.com/definition/waterfall-model


[Accessed 2019].

Anon., 2019. Geeksforgeeks. [Online]


Available at: https://www.geeksforgeeks.org/software-engineering-agile-development-models/
[Accessed 2019].
Anon., 2019. Smartdraw. [Onlin
e]
Available at: https://www.smartdraw.com/entity-relationship-diagram/
[Onlin
Anon., 2019. Techopedia. e]
Available at: https://www.techopedia.com/definition/24438/relationship-databases
[Accessed 2019].

Anon., 2019. Techopedia. [Online]


Available at: https://www.techopedia.com/definition/1164/attribute-database-systems

132
Amar Thapa ((BTEC HND in Computing/ Third Semester)

Downloaded by ansu horizon ([email protected])

You might also like