A Project Submitted in Partial Fulfilment of The Requirements For The Award of The Degree OF Bachelor of Computer Application
A Project Submitted in Partial Fulfilment of The Requirements For The Award of The Degree OF Bachelor of Computer Application
ON
OF
INFORMATION TECHNOLOGY
2017-2020
1
DECLARATION
This web development project titled “THE BOMB DIGZ” towards the
completion of my course requirements for Semester V is my original work and
has been carried out under the guidance of MS. XYZ.
The material borrowed from other sources and incorporated in the report has
been duly acknowledged and referenced.
I understand that I will be held liable and accountable for my project, it is all
done by me without having any copyright(s) of any of the organisation. I further
declare that the work reported in this project has not been submitted and will not
be submitted, either in part or in full, for the award of any other degree or
diploma in this institute or any other institute or university.
DATE:
NIKHIL BAJAJ
(04290202017)
2
CERTIFICATE
This is to certify that the project entitled: “THE BOMB DIGZ” done by MR. NIKHIL
BAJAJ having university enrolment number 04290202017 is an authentic work carried out
by them at SRI GURU TEGH BAHADUR INSTITUTE OF MANAGEMENT &
INFORMATION TECHNOLOGY. The matter embodied in this project work has not been
submitted earlier for the award of any degree or diplomas to the best of my knowledge and
belief .The suggestion as approved by the faculty was duly incorporated.
DATE:
Guide:
3
ACKNOWLEDGEMENT
We thank MR. RAJ KUMAR KASHYAP (HOD) for their ongoing support
and encouragement in every aspect.
The successful completion of our project would not have been possible without
the dedicated support from all our mentors, family, and friends.
DATE:
NIKHIL BAJAJ
(04290202017)
4
Abstract
A web page is a selection of website, pictures, video clips and other electronic
resources that is organized on one or several web hosting server, usually
available via the Internet, Mobile phone or a LAN.
The project on web development is made using net beans IDE platform and the
MySQL server. The front end is designed using HTML5, CSS, BOOTSTRAP,
and the back end is designed using JQUERY, JAVASCRIPT, PHP and SQL
DATABASE.
It follows PHP for offering the sessions for the data source connection.
BOOTSTRAP is used for dynamic design of the website. Some frameworks are
used in the project that are available in the internet and are provided the source
code of the project.
The project is e-commerce website for concert ticket booking and merchandise.
User can purchase any merchandise or musical instruments offered by the band
and can book tickets.
5
TABLE OF CONTENT
Chapter no. TOPIC Page no.
1. INTRODUCTION 10
2. REQUIREMENT ANALYSIS 12
3. SOFTWARE DESIGN 16
3.1 INTRODUCTION 17
3.2 HIGH LEVEL/DETAIL DESIGN() 17
3.3 DATA FLOW DIAGRAM(LEVEL 0) 18
3.4 DATA FLOW DIAGRAM(LEVEL 1) 19
4. DATABASE DESIGN 20
4.1 INTRODUCTION 21
4.2 DATABASE FIELD SPECIFICATION 21-22
4.3 ENTITY-RELATIONSHIP DIAGRAM 23
5. TESTING 24
5.1 INTRODUCTION 25
5.2 TESTING METHODS 25-26
5.3 TEST CASES 26-27
6
LIST OF FIGURES
Figure Page
Number
Figure 1:Use Case 15
Figure 2: Data Flow Diagram Level-0 18
7
Figure 3: Data Flow Diagram Level-1 19
Figure 4: E-R Diagram 23
8
LIST OF TABLES
Table Page
Number
LIST OF SYMBOLS 18
DATABASE TABLES DETAILS 22
CART 22
PRODUCTS 22
USER 23
PROFILE 23
PAYMENT 23
9
CHAPTER 1
INTRODUCTION
10
1.1 INTRODUCTION
Introduction of the project :-
1.1.1 Proposed System
The proposed system is a proper data management system which handles all of the band’s
activities like upcoming concerts and ticket bookings, online availability of the merchandise
and products. The system also provides a safe and secure environment for making the
payments for the purchases.
The proposed system has following advantages over the existing system:
Admin login: Admin can login and make any appropriate changes to the
website.
User registration and login: Any new customer can register following which
he/she will be provided with an unique user id and password through which
user will be able to login.
Online booking: The user can book the concert’s ticket on the web
application in couple of minutes instead of going on to any other third-party
apps.
Online shopping: The user can access hundreds of products available on the
website and can buy them through the web application making any user on the
earth to have access to the products.
Online Payment: The website provides a safe and secure payment gateway to
make payments for all of the purchases.
Uses comparatively less bandwidth.
Look and feel is better.
11
Admin can manage or modify the orders placed by the user.
CHAPTER 2
REQUIREMENT ANALYSIS
12
PROJECT TITLE – THE BOMB DIGZ
2.1 SOFTWARE REQUIREMENTS SPECIFICATION
2.1.1 CATEGORY
Web Application.
2.1.2 PURPOSE
The purpose of developing this web application titled ‘THE BOMB DIGZ’ is an effort made
by the renowned band to provide their massive fan following an application that provides
information about their upcoming concerts, ticket bookings, albums, singles and their highly
demanded merchandise and musical products all at one time, one place.
2.1.3 SCOPE
The purpose of the online management system of the band’s activity is to provide a
convenient and user-friendly application that helps them to book tickets, buy products,
albums and make payments in a safe and secure environment. The system is based on a
relational database with its data management and payment functions. Above all, we hope to
provide a comfortable user experience along with the best pricing available.
User must have valid User Id and password to login, thus creating their individual
profiles.
Administration can register new products.
User can choose products.
User can book concert tickets.
User can make a wish list of the products.
All of the chosen products should be sent to the cart for further checking out.
User could be able to make payments through his/her credit or debit card or internet
banking.
User should be told about the successful placement of order and the estimated
delivery date.
Admin can post new concert’s info and new arrival of products.
13
2.1.5 NON-FUNCTIONAL REQUIREMENTS
Requirement that specifies criteria that can be used to judge the operation of a system are
called non-functional requirements. Non-functional requirements of our system are
mentioned below:
2.1.7 DEPLOYEMENT
Operating System Server: Windows 8, LINUX, UNIX.
14
2.2 USE CASE DIAGRAM
SIGN UP
LOGIN
UPLOAD/
MODIFY
PRODUCT
MANAGE
PROFILE
ORDER
PLACING
AND
USER PAYMEN ADMIN
TS
MANAGE
ORDERS
MANAGE
USERS
15
CHAPTER 3
SOFTWARE DESIGN
16
3.1 INTRODUCTION
This chapter will focus on the design of the system using diagrams to illustrate graphically
certain sections of the software system.
LIST OF SYMBOLS
TABLE 1
17
3.3 DFD LEVEL 0
USER LOGIN
PURCHASE
THE RAPTOR
BAND
ADMIN LOGIN
DELETE
ADD PRODUCT
PRODUCT UPDATE
PRODUCT
18
3.4 DFD LEVEL 1
IF NEW USER
SIGN UP
USERS
RETRIEVE
AVAILABLE ADD/UPDATE/DEL
PRODUCTS AND ETE PRODUCTS
TICKETS
PRODUCTS
CART CART
MAKE
PAYMENT
PAYMENT
19
CHAPTER 4
DATABASE DESIGN
20
4.1 Introduction
This article/tutorial will teach the basis of relational database design and explains how to
make a good database design. It is a rather long text, but we advise to read all of it. Designing
a database is in fact fairly easy, but there are a few rules to stick to. It is important to know
what these rules are, but more importantly is to know why these rules exist, otherwise you
will tend to make mistakes!
A small write-up on the database, giving the fields, explaining each field etc should be
written. This write-up can be evaluated on the following points.
1. Clarity and conciseness of the database design. Like, whether key is defined, whether
any redundant fields are there etc.
2. Whether data-storage calculations are made, and if so, whether they are done properly
etc.
Whether any data-backup/recovery mechanism is discussed or being thought of.
User Id is the Key of the database. The range of valid values entered below as examples need
not be taken as such. They can be modified by the team.
21
PRODUCT_IMAGE INT 20 Not Null
PRODUCT_PRICE VARCHAR 100 Not Null
4.2.3 TABLE 4
C) USER
Field Name Data Type Size Constraint
USER_ID INT 11 Primary Key
PASSWORD VARCHAR 20 NOT NULL
CART_ID VARCHAR 100 NOT NULL
ENABLE/DISABLE INT 1 NOT NULL
4.2.4 TABLE 5
D) PROFILE
Field Name Data Type Size Constraint
USER_ID INT 11 Primary Key
CART_ID VARCHAR 100 NOT NULL
NAME VARCHAR 20 NOT NULL
ADDRESS VARCHAR 20 NOT NULL
PIN_CODE INT 20 Not Null
MOBILE VARCHAR 100 Not Null
EMAIL VARCHAR 100 Not Null
GENDER VARCHAR 100 Not Null
IMAGE VARCHAR 100 Not Null
4.2.5 TABLE 6
E) PAYMENT
Field Name Data Type Size Constraint
ORDER_ID INT 11 Primary Key
AMOUNT VARCHAR 20 NOT NULL
PAY_TIME VARCHAR 100 NOT NULL
PAY_MODE INT 1 NOT NULL
4.2.4 TABLE 6
4.3 ER DIAGRAM
EMAIL
PHONE
ADDRESS
NAME CART
_ID
22
USER_ID PASSWORD
PIN_CODE
1 1
USER HAS PROFILE
IMAGE ORDERS
CART_ID USER_ID
ENABLE/DI
SABLE
SEARCHES
CART_ID PRODUCT_ID
ID
QTY
n
1
ADDS
PRODUCTS TO
CART
PRODUCT_ID PRODUCT_PRICE 1
USERID
PRODUCT_NAME
PRODUCT_DETAILS
PRODUCT_IMG
MAKES
AMOUNT
n
PAYMENT
PAY_TIME
ORDER_ID
PAY_MODE
PAY_DATE
23
CHAPTER 5
TESTING
24
5.1 Introduction
Executing a program with the intent of finding errors is called testing. Testing is vital to the
success of any system. Testing is done at different stages within the development phase.
System testing makes a logical assumption that if all parts of the system are correct, the goals
will be achieved successfully. Inadequate testing or no testing at all leads to errors that may
come up after a long time when correction would be extremely implementation. The testing
of the system was done on both artificial and live data. In order to test data test cases are
developed. Following are the various methods that are employed for testing:
In unit testing the module is tested independently. It is done to test that the module
does satisfy the functional specification. This is done to check syntax and logical
errors in programs. At the time of preparation of technical specifications, unit test
data was also prepared. The coding for that program was considered after verifying
its output against this test data.
Following are the unit testing methods:
In Conditional Testing, the logical conditions that are given in the module were
checked to see whether they satisfy the functionality of the module. This is done
by using the test data was prepared.
In Loop Testing, different loops in the module like nested loops were tested using
the data. Attempts to execute the loops to their maximum range are done.
In Integration testing whole system was checked when all the individual modules
were integrated together in order to test whether the system is performing as
according to the requirements specified. Interface errors if any were corrected.
Test data was prepared was fed into the system to check whether the system fails to
detects an error.
25
data,writing test cases,testing for conformance to test cases and preparation of
bug’s listing for non-comformities.
System testing is done when the entire system has been fully integrated. The
purpose of the system testing is to test how the different modules interact with each
other and whether the entire system provides the functionality that was expected.
System testing consists of the following steps:
Program Testing
System Testing
System Documentation
User Acceptance Testing
The test-cases is basically a list of test cases that need to be run on the system. Some of the
test cases can be run independently for some components (report generation from the
database, for example, can be tested independently) and some of the test cases require the
whole system to be ready for their execution. It is better to test each component as and when
it is ready before integrating the components.
26
password password ‘Invalid password’.
3 Unsuccessful Login to the Login should fail Passed
User Verification server with an with an error
due invalid
‘Invalid Login Id’.
to invalid Login id login id
4 The server should An option for Option for Passed
provide the allowing new adding/removing
admin for users and users is shown.
allowing newly deleting old
registered user to users of the
access the system
website.
Login id
6 Unsuccessful user Filling the Field can’t be Passed
verification if they registration empty
do not enter their form without
all details being entering the
asked. whole details
27
CHAPTER-6
28
6.1 Project Roles and Responsibilities
6.1.1 ROLE
6.1.2 RESPONSIBILITIES
29
CHAPTER 7
CONCLUSION
AND
ACHIEVEMENTS
CONCLUSION
30
“THE BOMB DIGZ” Software has been designed to purchase or display different products
with their specifications. It is designed to replace the manual system thereby making it more
efficient and easily approachable.
The system is strong enough to withstand regressive daily operations under conditions
where the database is maintained and cleared over a certain time of span. The
implementation of the system in the organization will considerably reduce manual
generation of tickets and payments, time and also provide readily calculated reports.
The project from a personal point of view also helped us in understanding the following
aspects of project development:
FUTURE SCOPE
The future scope of this project is to provide the best of the services possible. This project
lacks of real payment processing with which it can be more powerful and convenient for
users. Once the payment gateway is incorporated, we can buy a domain name and a web
server for this website to publish it on the internet with which the reach of this website to
anyone would be very easy. We can add the venue’s map to know about the area and space
for the people which would help users to know about the limited tickets of the venue for the
band’s concert.
31
APPENDICE
32
BIBLOGRAPHY
http://www.google.co.in
http://www.youtube.co.in
http://www.wikipedia.com
http://www.w3schools.com
33