Sunteți pe pagina 1din 30

Table of Contents

1. Introduction 1.1 Overview and issue involved 1.2 Problem Definition 1.3 Proposed Solution 3 3 3 3

2. Litrature Survey 2.1 Methedology 2.2 Technology and Tools 3. Requirement Gathering 3.1 Software requirements 3.1.1 Microsoft Visual Studio 2010 3.1.2 Microsoft SQL Server 2005 3.1.3 Web Browser 3.1.4 Operating System 3.2 Hardware requirements 3.2.1 Processor 3.2.2 Monitor 3.2.3 Mouse 3.2.4 Keyboard 3.2.5 RAM 3.2.6 Harddisk 3.2.7 GUI 3.3 Use Case Model 3.4 Use Case Description 4. Analysis 4.1 Sequence Diagram and Activity Diagram 4.1.1 Login Activity Diagram 4.1.2 Login Sequence Diagram 4.2 Class Diagram 4.2.1 Class Diagram of application 5. Design 5.1 Technology 5.2 Subsystem and their dependencies 5.2.1 Registration Form 5.2.2 Login Form 5.2.3 Customer Form 5.2.4 Enquiry Form 5.2.5 Product Form of Enquiry 5.2.6 Follow up Form 5.3 Class diagram description 5.4 Database design with E-R Diagram 5.4.1 Database table of Registration 5.4.2 Database table of Login

4 4 6 7 7 7 7 7 8 8 8 8 9 9 9 9 9 10 11 12 12 13 14 14 15 16 16 16 17 17 18 18 19 19 20 20 20 21

Institute Of Engineering & Technology (D.A.V.V.) , Indore

Page 1

5.4.3 Database table of Customer 5.4.4 Database table of Enquiry 5.4.5 Database table of Product Detail 5.4.6 Database table of Follow-up 5.4.7 Database table of Products 5.4.8 Database table of Employee 5.4.9 E-R Diagram 6. Testing 6.1 Testing objective 6.2 Testing Principle 6.3 Testing method used 6.4 Testing issue 6.5 Sample test cases and Resuls 6.5.1 Case-1 6.5.2 Case-2 7. Conclusion 7.1 Limitation 6.2 Advantages 6.3 Short Description

21 22 22 23 23 24 24 25 25 25 26 27 28 28 29 30 30 30 30

Institute Of Engineering & Technology (D.A.V.V.) , Indore

Page 2

Chapter 1 Introduction
1.1) Overview and issue involved
Enquiry Management System is a web application designed to manage the Customers, Employee and Products database with a special feature of Follow-up (Reminder for the Employee to follow the customer). The main issue is that many companies and business organizations faces is in the enquiry registration and the follow-up process that gets missed or not responded due to lack of a good Enquiry Management System. This software works the same way as a Lead Management System.

1.2) Problem Definition


As the competition is increasing in todays environment the business organization has to work hard to attain the maximum profit from the market and to do this the company has to provide the maximum input to achieve the desired goal. Due to lack of technology in an organization reflects in a low profit or certain losses like improper communications, no consumer satisfactions and the reputation of the company.

1.3) Proposed solution


This project enables the desired solution for the above problem. This project evolves the complete package of enquiry and its management when a user log in through the Log in form he/she enters the home page. Now the user has several options to add or view the products, add or view the customers database, and his or her interest in the project. The user can view or update any of this informations. This project has a unique feature of follow up which reduces the work load of employee by getting the reminder as per the interest of a customer.

Institute Of Engineering & Technology (D.A.V.V.) , Indore

Page 3

Chapter 2 Literature Survey


2.1) Methodology

Web Applications:
A web application is an application utilizing web and [web] browser technologies to accomplish one or more tasks over a network, typically through a web browser. A web application is also an application that is accessed over a network such as the Internet or an intranet. The term may also mean a computer software application that is coded in a browser-supported language (such as JavaScript, combined with a browser-rendered markup like HTML) and reliant on a common web browser to render the application executable.

Database Management System:


A database management system (DBMS) is a software package with computer programs that control the creation, maintenance, and use of a database. It allows organizations to conveniently develop databases for various applications by database administrators (DBAs) and other specialists. A database is an integrated collection of data records, files, and other objects. A DBMS allows different user application programs to concurrently access the same database. DBMSs may use a variety of database models, such as the relational model or object model, to conveniently describe and support applications. It typically supports query languages, which are in fact high-level programming languages, dedicated database languages that considerably simplify writing database application programs. Database languages also simplify the database organization as well as retrieving and presenting information from it. A DBMS provides facilities for controlling data access, enforcing data integrity, managing concurrency, and recovering the database after failures and restoring it from backup files, as well as maintaining database security. Institute Of Engineering & Technology (D.A.V.V.) , Indore Page 4

Microsoft SQL Server:


Microsoft SQL Server is a relational database server, developed by Microsoft: it is a software product whose primary function is to store and retrieve data as requested by other software applications, be it those on the same computer or those running on another computer across a network (including the Internet). There are at least a dozen different editions of Microsoft SQL Server aimed at different audiences and for different workloads (ranging from small applications that store and retrieve data on the same computer, to millions of users and computers that access huge amounts of data from the Internet at the same time).

ASP.NET:
ASP.NET is a Web application framework developed and marketed by Microsoft to allow programmers to build dynamic Web sites, Web applications and Web services. It was first released in January 2002 with version 1.0 of the .NET Framework, and is the successor to Microsoft's Active Server Pages (ASP) technology. ASP.NET is built on the Common Language Runtime (CLR), allowing programmers to write ASP.NET code using any supported .NET language.

Web Browsers:
A web browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web. An information resource is identified by a Uniform Resource Identifier (URI) and may be a web page, image, video, or other piece of content. Hyperlinks present in resources enable users easily to navigate their browsers to related resources. A web browser can also be defined as an application software or program designed to enable users to access, retrieve and view documents and other resources on the Internet. Protocol, so an IP address is an Internet Protocol address. That mean An Internet Protocol is a set of rules that govern Internet activity and facilitate completion of a variety of actions on the World Wide Web.

Institute Of Engineering & Technology (D.A.V.V.) , Indore

Page 5

2.2)

Technologies and Tools

Technology:
In this project we are using Microsoft Visual Studio 2010 as Front end and Microsoft SQL Server 2005 as back end.

Microsoft Visual Studio 2010- Microsoft Visual Studio is a powerful IDE that ensures quality code throughout the entire application lifecycle, from design to deployment. Whether youre developing applications for SharePoint, the web, Windows, Windows Phone, and beyond.

Microsoft SQL Server 2005- SQL Server 2005 released in October 2005, is the successor to SQL Server 2000. It included native support for managing XML data, in addition to relational data. For this purpose, it defined an xml data type that could be used either as a data type in database columns or as literals in queries.

Tools:
In this project we are using .NET Framework 4.0 and SQL Server 2005 Management Studio as the powerful tools.

.NET Framework 4.0- The .NET Framework's Base Class Library provides user interface, data access, database connectivity, cryptography, web application development, numeric algorithms, and network communications. Programmers produce software by combining their own source code with the .NET Framework and other libraries.

SQL Server 2005 Management Studio- SQL Server Management Studio is a software application first launched with the Microsoft SQL Server 2005 that is used for configuring, managing, and administering all components within Microsoft SQL Server. The tool includes both script editors and graphical tools which work with objects and features of the server.

Institute Of Engineering & Technology (D.A.V.V.) , Indore

Page 6

Chapter: 3 Requirement Gathering


In software (project) development we have the particular requirements that called specific requirements. In this project development have the following requirements:-

3.1) Software Requirement:In this project have following software requirements:-

3.1.1) Microsoft Visual Studio 2010:


Microsoft Visual Studio is a powerful IDE that ensures quality code throughout the entire application lifecycle, from design to deployment. Whether you are developing applications for SharePoint, the web, Windows, Windows Phone, and beyond.

3.1.2) Microsoft SQL Server 2005:


SQL Server 2005 released in October 2005, is the successor to SQL Server 2000. It included native support for managing XML data, in addition to relational data. For this purpose, it defined an xml data type that could be used either as a data type in database columns or as literals in queries.

3.1.3) Web Browser:


A web browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web. An information resource is identified by a Uniform Resource Identifier (URI) and may be a web page, image, video, or other piece of content. Hyperlinks present in resources enable users easily to navigate their browsers to related resources. A web browser can also be defined as an application software or program designed to enable users to access, retrieve and Institute Of Engineering & Technology (D.A.V.V.) , Indore Page 7

view documents and other resources on the Internet. Protocol, so an IP address is an Internet Protocol address. That mean An Internet Protocol is a set of rules that govern Internet activity and facilitate completion of a variety of actions on the World Wide Web. Although browsers are primarily intended to access the World Wide Web, they can also be used to access information provided by web servers in private networks or files in file systems. The major web browsers are Firefox, Google Chrome, Internet Explorer, Opera, and Safari.

3.1.4) Operating system:


An operating system (OS) is a set of programs that manage computer hardware resources and provide common services for application software. The operating system is a vital component of the system software in a computer system. Application programs require an operating system which are usually separate programs, but can be combined in simple systems. For this project we require Windows XP service pack 3 and above version of Windows operating system.

3.2) Hardware requirement


In this project have following Hardware requirements:

3.2.1) Processor:
In this project we require Intel Pentium processor minimum speed of 1 GHz or above.

3.2.2) Monitor: The monitor displays the video and graphics information generated by the
computer through the video card. Monitors are very similar to televisions but usually display information at a much higher resolution. Recommended resolution for this project is 1024X768 or above. The monitor is also known as: Screen, Display, Video display, Video screen

Institute Of Engineering & Technology (D.A.V.V.) , Indore

Page 8

3.2.3) Mouse:
A mouse is a pointing device that functions by detecting twodimensional motion relative to its supporting surface. Physically, a mouse consists of an object held under one of the user's hands, with one or more buttons. It sometimes features other elements, such as "wheels", which allow the user to perform various system dependent operations, or extra buttons or features that can add more control or dimensional input. The mouse's motion typically translates into the motion of a pointer on a display, which allows for fine control of a graphical user interface.

3.2.4) Keyboard:
A keyboard typically has characters engraved or printed on the keys and each press of a key typically corresponds to a single written symbol. However, to produce some symbols requires pressing and holding several keys simultaneously or in sequence. While most keyboard keys produce letters, numbers or signs (characters), other keys or simultaneous key presses can produce actions or computer commands.

3.2.5) RAM:Random access memory (RAM) is a form of computer data storage. Today, it takes the form of integrated circuits that allow stored data to be accessed in any order with a worst case performance of constant time. In this project we need of minimum 512 Mb RAM .

3.2.6) Hard disk:A hard disk drive (HDD) also hard drive, hard disk, or disk drive is a device for storing and retrieving digital information, primarily computer data. In this project we need of minimum 40 GB HDD.

3.2.7) GUI:
The term GUI (Graphical User Interface) is restricted to the scope of twodimensional display screens with display resolutions able to describe generic information, in the tradition of the computer science & information technology Institute Of Engineering & Technology (D.A.V.V.) , Indore Page 9

3.3) Use Case Model


A Use Case Diagram is a type of behavioral diagram defined by and created from a Use-case analysis. It is used to identify the primary elements and processes that form the system. The primary elements are termed as "actors" and the processes are called "use cases." The Use case diagram shows which actors interact with each use case. The main purpose of a use case diagram is to show what system functions are performed for which actors. The elements used for this representation are Actors Use Cases System Boundary

Fig 3.3.1 Use case diagram of Login

Institute Of Engineering & Technology (D.A.V.V.) , Indore

Page 10

Fig 3.3.2 Use case diagram of Application

3.4) Use Case Description

Fig 3.3.1 shows Login use case that is also used by user and administrator. Fig 3.3.2 shows application use case in its use case shows client, server and database also use users but database is not use (look) by users. But all three fields are used by administrator.

Institute Of Engineering & Technology (D.A.V.V.) , Indore

Page 11

Chapter 4 Analysis
4.1) Sequence diagram and Activity diagram

Sequence Diagram:
The Sequence Diagram is used primarily to show the interactions between objects in the sequential order that those interactions occur. One of the primary uses of sequence diagrams is in the transition from requirements expressed as use cases to the next and more formal level of refinement. Use cases are often refined into one or more sequence diagrams. In addition to their use in designing new systems, sequence diagrams can be used to document how objects in an existing (call it "legacy") system currently interact. This documentation is very useful when transitioning a system to another person or organization.

Activity Diagram:
Activity diagrams are diagram technique showing workflows of stepwise activities and actions, with support for choice, iteration and concurrency. In the Unified Modeling Language, activity diagrams can be used to describe the business and operational step-by-step workflows of components in a system. An activity diagram shows the overall flow of control. Activity diagrams are constructed with a limited set of building blocks, consisting of: (a) Nodes: like the initial node and activity final node, and. (b) Activity building blocks. Sometimes activity diagrams also contain building block for decision making, but it is questionable if these diagrams should be called activity diagram. The starting point of the diagram is the initial node, which is mostly located on top or on the left. And the ending of the diagram with an activity final node is on the bottom or on the right. In between there can be zero, one or more activity building blocks, which can be represented by rounded.

Institute Of Engineering & Technology (D.A.V.V.) , Indore

Page 12

Fig 4.1.1 - Login Activity Diagram

Institute Of Engineering & Technology (D.A.V.V.) , Indore

Page 13

Fig 4.1.2 Login Sequence Diagram

4.2) Class Diagrams


A class diagram is a type of static structure diagram that describes the structure of a system by showing the system's classes, their attributes, and the relationships between the classes. Class diagrams are widely used to describe the types of objects in a system and their relationships. Class diagrams model class structure and contents using design elements such as classes, packages and objects. Class diagrams describe three different perspectives when designing a system, conceptual, specification, and implementation. These perspectives become evident as the diagram is created and help solidify the design.

Institute Of Engineering & Technology (D.A.V.V.) , Indore

Page 14

Fig 4.2 Class Diagram of Applications

Institute Of Engineering & Technology (D.A.V.V.) , Indore

Page 15

Chapter :5 Design
5.1) Technology
In this project Application development we are using .NET Technology because we have interest in this technology, this technology is easy to understand and learn this technology provides better performance is provided by using the just-in-time compilation, early binding, caching services and native optimization. Web pages created with the .NET technology perform common tasks such as form submission and client authorization much easier.

5.2) Subsystem and Their Dependencies


In this project there are four Subsystems available: 1) Registration Form 2) Login Form

3) Applications Forms
In this project User need to register by using Registration Form, after completing the registration process user have to log in. After log in, user can fill up the Customers Details and his Enquiry with product details, User can also fill the Follow up form if the Enquiry is not completed yet.

There are some extra features to Administrator to Add/Update new Products and Employee detail.

Institute Of Engineering & Technology (D.A.V.V.) , Indore

Page 16

Fig 5.2.1 - Registration Form

Fig 5.2.2 - Login Form

Institute Of Engineering & Technology (D.A.V.V.) , Indore

Page 17

Fig 5.2.3- Customer Form

Fig 5.2.4- Enquiry Form

Institute Of Engineering & Technology (D.A.V.V.) , Indore

Page 18

Fig 5.2.5- Product detail Form of Respected Enquiry

Fig 5.2.6- Follow Up Form

Institute Of Engineering & Technology (D.A.V.V.) , Indore

Page 19

Fig 5.2.1- Registration form is used to create a new account; for log in, User can create a unique User- id and password through this form. Fig 5.2.2- Log in form in used to log in for accessing all features of Application. Fig 5.2.3- By using Customer form user can fill up the Customer detail. Fig 5.2.4- By using Enquiry form user fill up the Enquiry detail. Fig 5.2.5- By using Product detail form user can fill up the product detail of respected enquiry. Fig 5.2.6- By using Follow up form Employee can fill up the multiple Follow up detail of a customer.

5.3) Class Diagram Description


In chapter 4 fig 4.2 shows the class diagrams of a application. This class diagram shows that a customer can add multiple enquiries and in every enquiry he can select multiple products. If there is an delay in enquiry then we can add follow up with the product enquiry. A product can have multiple follow up.

5.4) Data Base Design with ER Diagram


In this project we are using various database fields/tables for maintaining the Database.

Fig 5.4.1 - Data Base table of Registration.

Institute Of Engineering & Technology (D.A.V.V.) , Indore

Page 20

Fig 5.4.2- Database table for Login details.

Fig 5.4.3- Database table for Customer details.

Institute Of Engineering & Technology (D.A.V.V.) , Indore

Page 21

Fig 5.4.4- Database table for Enquiry details.

Fig 5.4.5- Database table for Product detail of respected Enquiry.

Institute Of Engineering & Technology (D.A.V.V.) , Indore

Page 22

Fig 5.4.6- Database table for Follow up.

Fig 5.4.7- Database table for Products. Institute Of Engineering & Technology (D.A.V.V.) , Indore Page 23

Fig 5.5.8- Database table for Employee.

ER (Entity Relationship) Diagram

Fig 5.5.9- E-R Diagram for Enquiry Management System. Institute Of Engineering & Technology (D.A.V.V.) , Indore Page 24

Chapter :6 Testing
Testing is a method to uncover and correct as many errors as possible before delivery t the customer. In this our goal is to design the series if test cases that can find errors, this is done through various techniques developed for testing. At early stage the developer of the system does testing. But as the testing progresses, testing specialist may become involved. Testing for any software is done from two different perspectives; internal program logic is exercised using "White Box Testing" and software requirement are exercised using "Black Box Testing".

6.1) Testing Objectives


Following are well known testing objectives: Testing is a process of executing a program with the intent of finding an error. A good test is one that has high probability of finding an as-of-yet undiscovered error. A successful test is one that uncovers an as-of-yet undiscovered error.

6.2) Testing Principles


Before applying methods to design effective test case, we must understand the basic principles that guide software testing, following are some principles that must be followed. All tests should be traceable to customer requirements. As we have seen, the objective of software testing is to uncover errors. It follows that the most severe defects are those that cause the program to tail to meet its requirement. Tests should be planned long before testing begins. Testing planning begins as soon as the requirement model is complete. Detail definition of the test case should begin as soon as the design model is solidified. The Pareto principle applies to the software testing. It implies that 80 percent of all errors uncovered during the testing will likely be traceable to 20 percent of all programs, components of the software. The problem is to identify these 20 percent components and test them thoroughly. Institute Of Engineering & Technology (D.A.V.V.) , Indore Page 25

Testing should begin "in small" and progress towards testing "in large" Initial tests planned and executed, generally focus on individual components. As testing progresses, focus shifts in an attempt to find errors in the integrated clusters of components and ultimately in the entire system. Exhaustive testing is not possible. The number of path permutations for even a moderately sized program is exceptionally large. For this reason it is impossible to execute every combination of paths during the testing phase

6.3) Testing Methods Used


The following testing methods have been used in this project: Black Box Testing Black Box testing also called behavioral testing focuses on the functional requirements of the software. That is, black box testing enables the software engineer to derive sets of input conditions that will fully exercise all functional requirements tor a program. It attempts to find error in the following categories: Incorrect or missing functions. Interface errors Error in data structures or external database access Initialization and terminal errors. This testing strategy is applied during later stages of testing. Because black box testing purposely disregards control structure, attention is focused on the information domain. Tests are designed to answer the following questions. How is functional validity tested? How is system behavior and performance tested? What classes of input will make a good test case? Is the system particularly sensitive to certain input values? What effect will specific combination of data have on system operation? The various types of black box testing are: Graph-Based testing Equivalence partitioning Boundary value analysis Comparison testing Orthogonal array testing

Institute Of Engineering & Technology (D.A.V.V.) , Indore

Page 26

6.4) Testing Issues


How was functional validity tested? The functional validity of the project was tested by giving series of input and noting the output and then matching the output obtained with the expected output. All modules were tested individually in different environment and were found to be functionally valid. How is system behavior and performance tested? The system behavior and performance was tested on the basis of the interfunctioning of the modules of the project. The project was stable and the performance of this exceeding well. What classes of input will make a good test case? The project has been tested for all classes of input. The best class of input that will make a good test case would be the input which matches the username and password along with the phone No., and login mode, so that a person can log in and place his call. Is the system particularly sensitive to certain input values? No. The project is not sensitive to any certain input values. What effects will the wrong Username or password on system operation? If the username and password or phone No does not match, then a particular error message is displayed to user and he/she cannot connect to the Server. Login and Registration modules are being tested on many systems of different configuration.

Institute Of Engineering & Technology (D.A.V.V.) , Indore

Page 27

6.5) Sample Test Cases & Results


Case 1 Wrong Registration details (e. g. wrong Password ) Input: o User ID: abhi o Password: abhi123 Desired output: Password not match!!. Obtained output: as Desired.

Fig 6.5.1 Case 2 Cannot put Blank values in Log in. a) User cannot provide blank values in the Log in fields. b) Error generates at the submission of the information. Input: Username: Password: Desired output: Please type Used ID Please type Password! Obtained output: Please type Used ID Please type Password!

Institute Of Engineering & Technology (D.A.V.V.) , Indore

Page 28

Fig 6.5.2

Institute Of Engineering & Technology (D.A.V.V.) , Indore

Page 29

Chapter :7 Conclusion
7.1) Limitation
This Application is used only to maintain Database. There are no facility available send any information to our Mobile no. or Email ID.

7.2) Advantage

Proper maintenance of Enquiries received. History of enquiries for future reference. Maintain Enquiries of Customers, Employees and Products. Follow-up feature which Reminds for the Employee to follow the customer.

7.3) Short Description


Enquiry Management System is a web application designed to manage the Customers, Employee and Products database with a special feature of Follow-up (Reminder for the Employee to follow the customer).

Institute Of Engineering & Technology (D.A.V.V.) , Indore

Page 30

S-ar putea să vă placă și