Documente Academic
Documente Profesional
Documente Cultură
Jaesars is one of the jewelers that offer a remarkably wide selection of diamond, gemstone, and pearl jewelry. The company is mainly located at the heart of Davao, San Pedro Extension, which allows us immediate access to some of the best resources in the jewelry industry. It was founded way back 15 years by adequate number of jewelry industry
experts and seasoned entrepreneurs that are equipped with sophisticated machinery enabling us to produce in bulk in a short time period. It is a privately held company and it has multiple branches in the Mindanao.
The gemstone
companys jewelry
sources from
and
manufactures
diamond in
and the
specialized
markets
Philippines, making it possible to offer our customers fine jewelry at the best prices. Products are splendidly
designed artisan
in ship
unique and
patterns
and
manifest thus
masterpiece range of
sincere
efforts
making
jewelry a wide one. When a customer is purchasing jewelry at the last minute, often one would feel having no time to add personalized touches. Jaesars makes personalization
trivial by offering many care tips, sweet sayings, nice poems and fun jokes to help the customers create that extra special jewelry gift. Jaesars marked with overnight
delivery state that if a customer orders a gift by noon, it will be shipped on the same day so the gift will arrive on time. But still, time of delivery varies on distance.
Payments shall be made upon delivery and it should be in cash in order to avoid delays and bounds check. Jaesars eliminating buying the ensures the product quality and value in by
"middleman" goods
retailer, the
buying
volume, being
right
from
right
markets,
customer-conscious at every stage of production. Jaesars is looking forward to become an e-tailer of quality jewelry. They are hooked in a dilemma on how to offer their products solely through the Internet. They too requested extending a system that would provide them a wall in
their
education.
However,
they
wanted
to
keep
all
personal
information confidential. They seek to have a system that protects customer information as it travels over the web to their secure servers. Then, protect it again in databases.
1.1
Statement of the Problem The web developers and database programmers generally
are inflicted with the dilemma on how to design and improve an e-tailer application of Jaesars Jewelry; and seek to answer these specific problems: 1. How to maintain confidentiality among customers
information? 2. How would the customers be able to post inquiries, comments and testimonies? 3. How would the customer be updated with the current prices of jewelries placed on his shopping cart? 4. How to automatically update the customers with the
1.2
The web developers and database programmers generally aim to advance the jewelry purchasing in this business
establishment in order to contend in the diverse demands of the public. The system should cater the following explicit objectives:
1.
To maintain confidentiality among customers and maintain a good rapport between the business owners and customers;
2.
To let the customers post inquiries, comments and testimonies on the wall yet upholding
security from unwanted access; 3. To update the buyers with the current price on carts while shopping; 4. To automatically update the customers with the prices, discounts and news feeds without
This study is primarily of great significance to the proponents of the system. Skills on designing web pages and creating a database would be enhanced and from that, wide doors of job opportunities would relatively be opened.
The future researchers could also benefit the system. While the application is established, the adherents could have this as a reference and eventually develop another system that could suffice an impending issue.
Moreover, this study is essential in a business that would likely to compete in the heightening challenges. This is to produce an enormous Jaesars impact would in the emergence the of
jewelry
transaction.
increase
sales
promotion in the jewel industry through the links on the system. The company would be able to monitor the number of registrants in a day as well as the total sales. The
reviews, one of the systems features, would certainly be of great advantage to enhance its operation.
In
this
sense,
customers
will
be
brought
to
the
easy and convenient online store. It would be accessible for the customers to view the prices, avail great deals and shop without going to the jewelry store.
The system is limited only to the online purchasing of Jaesars Jewelry at San Pedro Extension, Davao City. Only customers in Mindanao could access the system.
Therein
is
reviews from costumers, updating necessary information that evolves on selling shipping and and on purchasing the jewelry of to products, and and
accepting
products, establish
implementing
encryption
protract security. It does not support paypal or any credit cards; only, pay-upon delivery.
Moreover, the system is specified with Php and XML as the scripting language for web pages and MySQL 5.0 as the server for database. Web browsers can be Mozilla Firefox, Google Chrome, Internet Explorer 7.0 or higher. At least two cores for processor, 2-4GB memory and 40 GB for system
drive
are
required
for
the
hardware.
It
must
have
sufficient space for the base installation and sufficient space for diagnostics such as logging, debugging, creating memory dumps, and so on. For production use, it also needs additional free disk space for day-to-day operations.
An e-purchasing system that would suffice the existing dilemma of a Jewelry shop was proposed. The system presents an alluring and comprehensive interface wherein the
internet buyers would be persuaded to navigate at the same time to register for further transaction. The company must hire a database and a web administrator, as well as network security head that are knowledgeable and skilled enough to perform handed responsibilities. In this means, the shop will no longer spend for trainings and seminars.
The
system So,
is it
only
limited
to
online online
ordering payment
of nor
jewelries.
accepts
neither
pawning of items. When shopping, the buyer must be a member in order to complete the transaction or at least reserve carts contents otherwise the cart will be empty as soon as the guest leaves the site.
Since the systems features enhance business operation and promotes the this business system itself be to the customers, by the
definitely,
would
supported
management. The company would but face innovation; hence, create an exceptional image. There will be no ethical
the
system
is
operational
to
the and
buyers accounts
confiding
personal
information
demand guarantee of trust, the member has the advantage of paying item upon delivery. Practicality is also practiced here by the consumer since the company is at reach already on the web. and The the writings links and used in the are interface classified are thus
technical
pages
assuring a clear establishment of interaction between the shop and the internet buyer.
Jaesars has 2-3 available computers in every branch that are enough to operate the system. Monitors are all
LCD; processors are two cores and higher; RAM ranges to 24GB and HDD of 40GB. These hardware resources can be
bought in any computer shops wherein diverse styles and specifications are offered at ranging prices and methods of payment. been Through DSL internet connection, the company has this as a way of is monitoring of great each help local in the
employing This
office.
network of
implementation
system.
These
hardware
specifications are integral to that of software as well as to the entire performance of the project.
There
is
also
high
availability
of
web
hosting
wherein PHP, ASP.NET, MSSQL Free Domain Name, and Unlimited Emails are included. These resources can be searched
through the internet and apply for hosting and creating domain. So, there is no need for downloading file transfer software and installer of Apache. The database uses MySQL Server 2005.
The technical expertise required for the system can be acquired since it is just like keeping records
electronically. The proposed platform is pliable for future transaction volume and encroachment so the company does not need to modify the whole system.
The reliability of the system is high due to imposed security, organized features and chosen type of database. Jaesars may tie up with another company like Paypal by
means of this system. This appropriately interface external links hence the operation would be even more efficient.
CSS
(Cascading
Style
Sheet)
is
designed
primarily
to
enable the separation of document content (written in HTML or a similar markup language) from document
E-Commerce (electronic commerce or EC) is the buying and selling of goods and services on the Internet,
E-Tailer One that sells goods or commodities to consumers electronically, as over the Internet.
Hardware is a comprehensive term for all of the physical parts of a computer, as distinguished from the data it contains or operates on, and the software that
HTML
(Hypertext
Markup
Language)
is
the
predominant
Jewelry
is as
form
of
personal rings,
adornment, brooches,
manifesting and
itself
necklaces,
earrings
bracelets.
Links is a word, group of words, or image that you can click on to jump to a new document or a new section within the current document
MySQL - is a relational database management system (RDBMS)[1] that runs as a server providing multi-user access to a number of databases
Normalization database
is
Online
Ordering
System
this
system well
can
be
used image
to and
purchase
publicly
releasable
logged
Online Payment a transaction of goods and money in any form through the online media
Online Shopping the process of whereby consumers directly buy goods or services from a seller in real time over the internet
Software a collection of computer programs and related data that provide the instructions telling a computer what to do and how to do it
Website
collection and
of
online that
content reside
including on a web
documents
applications
server/servers.
Website Design - is a broad term used to encompass the way that content (usually hypertext or hypermedia) is
delivered to an end-user through the World Wide Web, using a web browser or other web-enabled software is displayed.
Chapter II
The
programmers
have
found
related
reviews
of
literature and studies of Jaesars Jewellery E-Tailer. These are ranging from global, national to local perspectives.
The net has become an essential portal for jewellery suppliers and stores. Choosing from the internet jewellery stores is best for buyers also, because browsing by way of different shops and certain decorations are only a matter of clicks. A lot of distinguished brands have an on the internet presence; thus, keying insure keywords on search engines like Google usually takes you to jewellery shops and their exhaustive selections, from anywhere around the world. However, there are also disadvantages which can be discussed below. This trend has grown in most parts around the globe.
By
doing
business
online,
jeweler
avoids
the
overhead costs inherent in owning a traditional jewellery story. No shipping costs or rental costs, among other
things. This means that those savings get passed onto you when the online jeweler is determining prices. This is also an advantage for those residing in smaller cities where jewellery sale isnt regular or for people who are too
busy. A buyer can go to on the internet jewellery store anytime to purchase an item of her preference. Since,
Internet shopping allows you to a wide range of shops all around the world, some of which dont exist on the high street. Online shops usually carry a much larger stock.
On the flip side of the coin, while salespeople can be at time overbearing, sometimes you actually do want to
speak to real person. That real-life interaction is quite simply not available when shopping online. That is why many people are still worried that shopping online, because it means providing private account information, is not to be trusted. But while identify theft and bank account fraud still occurs from time to time and online shipments can get lost or damaged on the way to your house. To avoid having problems with lost shipments, read your online jewellery stores policy on lost or damaged merchandise and make sure that they have some kind of insurance or warranty that
scammers
that
are
taking
advantages
by
using
online
purchasing.
Most of the Internet shoppers surf to the web sites they know and preferably, to the sites that attract them most. What are seem the to be catching of the the site attention of which of can the be
shoppers
content
web
site
typically
consists
of
text, images,
animation and /or video. The first page of a web site is known as the Home page or Index Page. Some web sites use what is commonly called a Splash Page. Splash pages might include a welcome message, language or region selection, or disclaimer, however search engines, in general, favor web sites that don't do this which has caused these types of pages to fall out of favor. Each web page within a web site is a file that has its own URL. After each web page is created, they are typically linked together using a
Once a web site is completed, it must be published or uploaded in order to be viewable to the public over
This article talks about the various advantages and disadvantages associated with website design. You should
Website designing can easily be defined as a specific skill of presenting contents, which are mainly hypertexts, usually delivered to any end user while using the World Wide Web with the help of a web browser or any other web enabled software such as internet television clients, micro blogging, auto blogging clients or as RSS readers. Website design mainly serves the purpose of creating a website with well defined electronic documents and applications which
are meant for a particular web browser, while presenting contents with interfaces to the users, in the typical form called web pages. It is mainly achieved by using HTML or XML tags. If displaying media is required, you can use
Adobe Flash, Quick Time or Java runtime environment plugins, which is usually embedded in the web pages with the help of HTML tags.
Website designing may sound easy, but there are a lot of things that need to be taken care of. Website design has lots of advantages as well as disadvantages. Web designing to promote small business world wide, offers faster product consumption for small businesses, directly communicate with customers, reduce expenses, help advertising hard-to-sell products.
However, most of the times, people feel the need of web design mainly for customization. People also ask for specific requirements which they want on their web pages. But until or unless you are proficient in HTML, catering to such enhancements is not possible at all. Sometimes it gets really difficult to provide the client with exactly what is asked for, because of some technicality involved. If you concentrate more on the look of the website, then it may affect the layout or navigation systems. Or sometimes,
If you need better visual effects for your site, then using flash is certainly a good idea. But if you are trying to draw more visitors through SEO, then it is better to limit Flash as it may distract the visitors. But when you
are
working
with
CSS,
there
are
many
advantages
and
disadvantages. This is mainly a popular style sheet tool for web designers. It helps great in terms of bandwidth, reformatting, progressive enhancement, consistency and
flexibility of the site. But using CSS in website design can have negative aspects lack too. of There may be vertical
control
limitations,
variables,
inconsistent
browser support or even poor layout controls; or in other terms, layout. it may not provide layout control for flexible
Moreover, Website Design is always a better idea when thinking always of building You a website; to keep but in a proper the planning of
helps. your
need
mind
purpose
creating
website;
otherwise
your
website
designing
Web
design
is
different
than an
traditional
print display
publishing.
Every website is
information
container, just as a book is a container; and every web page is like the page in a book. However the end size and shape of the web page is not known to the web designer,
whereas
the
designer
will
know
exactly
what
size
For the typical web sites, the basic aspects of design are:
substance,
and
information
on
the
site should be relevant to the site and should target the area of the public that the website is concerned with.
single style that flows throughout, to show consistency. The style should be professional, appealing and relevant.
These are the top 10 Security Tips for Web Designing. First is to define and assess the security risks. Define what the security a requirements policy, are, how how the information policy will is be
classified,
security
monitored and who is responsible. List everything that is used, interacted with or altered by the website. Classify the data based on sensitivity and the effect unauthorised
modification, release or loss would have on your business. This will assist deciding where the most effort should be placed in protection. data, for is just the more For very on If or simple some the systems standard website with no
includes
sensitive
consider creating a threat model and identify the threats and possible of vulnerabilities. the websites The analysis will and is assist very
development
requirements
Second
is
to
take
holistic
view.
Information
security is not just about preventing theft or damage. It also includes ensuring your website is available, is fast enough, complying with legal and regulatory requirements, providing accurate information, preventing release of
confidential information to unauthorized users, protecting your business data and intellectual property from misuse or loss, inappropriate use, protecting your users, ensuring
business continuity and providing the ability to analyze and learn from incidents. Balance the level of security with ease of use and cost constraints.
Subsequently is not to trust anyone else's data (or your own). Your web site will have input from users, but also from other sources such as news feeds, other purchased data and the back-office systems of your own organization and perhaps of partners. All this data should be validated on input and on output to protect users and systems.
Fourth milepost. By
is
to
enforce a
review review
and of
approval security
at into
each the
undertaking
projects mileposts and formal approval, security becomes built into the development process and security issues can be tackled as soon as possible. The earlier security is thought about, the cheaper it is to mitigate risks. Build change control methodology into the design process.
Fifth is to help the development team code securely. Good development practices should ensure that the
development team is working to a consistent framework and that developers produce high quality code. Software will always contain errors, but with training, use of
development standards and guidelines, security risks can be minimized. Ensure that you provide enough time to develop the website or web application securely not just achieve the functionality requirements.
Next
is
to
integrate
securities
into
the
testing
program. All projects must include structured testing. The threat model (see No 4 above) can be used to help create test scenarios. Security testing involves checking what is not allowed as well as the intended functionality. This requires a change in mindset for conventional testers.
Seventh is to build in audit, logging and alerting. Facilities to audit what has occurred on a website through sufficient logging will assist detection of abnormal
activity and help identify how problems occurred. By having an early warning of issues, it may be possible to reduce the effect of an incident. the logs Protect include the logs from user
alteration.
Ensure
(numeric)
Another
is
to
deploy
the
website
securely.
Development, test and live environments may be configured differently and many security issues can arise because of this. The management of the setup and launch of the website needs to be undertaken in a controlled and defined way to ensure all the security controls are in place and
additional
Ninth is to include security in every contract and service level agreement. Define what security protection
you need from your suppliers, partners and sub-contractors. Use the same processes to assess their security as Identify security what security will monitoring be detected you you and
would require
your and
own. how
breaches
disclosed.
Finally,
consider
disaster
recovery
(and
business
continuity). Consider what might cause loss of availability of the website and identify the likelihood of occurrence and the effect on the business. Examine whether actions should be taken to eliminate, reduce, insure or accept the risks.
of
the
technology to
terms
that
most at web
people or
have while
accustomed the
hearing along
either the
work
internet
with
sites
is
the
database. The database used to be an extremely technical term, however with the rise of computer systems and
information technology throughout our culture, the database has become a household term.
The
definition
of
database
is
structured
collection of records or data that is stored in a computer system. In order for a database to be truly functional, it must not only store large amounts of records well, but be accessed easily. In addition, new information and changes should also be fairly easy to input. In order to have a highly efficient database system, you need to incorporate a program that manages the queries and information stored on the system. This is usually System. referred Besides to as DBMS or a
Database
Management
these
features,
all
databases that are created should be built with high data integrity and the ability to recover data if hardware fails.
The Data Base has a lot of advantages on the normal manual methods for storing data because of the following:
Compactness - Where there is no need for the old paper files that has a big size. Speed - Because of the computer can restore the stored Data Base and upgrading it very fast than the normal human manual hand can do.
Less drudgery - Because the computer do every thing for you. Currency - The more specific you can have when you asking for a Data Base information.
Managing without
information the
of
business of
organization storage,
reducing
flexibility
data
manipulation and retrieval process is the main objective of database programming. It is a well-established fact that the information by of a business organization services. can This best is be the
managed
database
development
reason why its importance has increased in the past few years. Database offers a number of processing and
structuring advantages that have proven extremely helpful to managing business information deftly and precisely. In order to offer tailor-made solutions of clients varied
business requirements, Quality Web Programming has devoted itself in the field of web based database in programming. following
Database
developers
have
expertise
the
databases: MSSQL, MySQL, MS Access etc. The concept of database development has undergone a rapid transformation because of the development of
sophisticated technologies in this specific field. As new technologies are continuously evolving, there is growing
need for database programming service that can cope with the changes successfully. Our database programming service includes these below mentioned sections: Maintaining Workflow How the database solution will
perform in future is directly linked with the actions and the behavior of the users. Designing Interface of the Database A user-friendly
interface of database allows managing and manipulating database by reducing the possibility of data loss. Data Migration application successfully. Reviewing Database Implementation - After the completion of database integration, our seasoned database developers thoroughly check the entire process for minimizing the chance of errors for ensuring a smooth performance of the application. Capacity Strategy - The amount of data will be increased and therefore focus on formulating DBs capacity We with can a integrate newly existing developed data and
database
utilization of space as far as possible and standby facility. Planning and Investigation - Before doing anything else, we try to pinpoint the needs of our clients. This helps us to meet the requirements of our clients with lan and ease.
Database design plays a major role in the stability and the reliability of data. Although there are a number of rules that can be followed in designing a database
structure, the design process is as much an art as it is a science. Follow these rules when at all possible, but not to the point where the database loses the functionality that is so important to the user.
Doing a paper design first has several advantages: It saves time, money, and problems; Makes system more
reliable;
avoids
potential
data-modification
problems;
Serves as a blueprint for discussion; Helps in estimating costs and size; A good design should have the following objectives: Meet the users' needs; Solve the problem; Be free of modification anomalies; Have a reliable and stable
database, where the tables are as independent as possible; and Be easy to use.
The following
design
of
the
database
structure
requires of
the your
steps:
Determine
the
purpose
database - Knowing the purpose will help you decide which facts you want to store; List the facts about the objects; Determine the tables you need - When you have a clear
purpose for your database, you can divide your information into separate subjects, such as "Employees" or "Orders"; Determine the fields you need - Decide what information you want to keep in each table. Each category of information in a table is called a field and is displayed as a column when you browse the table. For example, one field in an Employee table could be Last_name; another could be Hire_date.
Determine the relationships Look at each table and decide how the data in one table is related to the data in other tables. Add fields to tables or create new tables to
clarify the relationships, as necessary. Determine the key and linking columns and determine the constraints. Refine your design - Analyze your design for errors. Create the tables and add a few records of sample data. See if you can get the results you want from your tables. Make adjustments
to the design as needed. Evaluate the design model then implement the database.
To organize our database, we need to normalize. This includes creating tables and establishing relationships between those tables according to rules designed both to protect the data and to make the database more flexible by eliminating redundancy and inconsistent dependency.
Redundant data wastes disk space and creates maintenance problems. If data that exists in more than one place must be changed, the data must be changed in exactly the same way in all locations. A customer address change is much easier to implement if that data is stored only in the Customers table and nowhere else in the database.
What is an "inconsistent dependency"? Inconsistent dependencies can make data difficult to access because the path to find the data may be missing or broken.
There are a few rules for database normalization. Each rule is called a "normal form." If the first rule is
Eliminate repeating groups in individual tables. Create a separate table for each set of related data. Identify each set of related data with a primary key.
Do not use multiple fields in a single table to store similar data. For example, to track an inventory item that may come from two possible sources, an inventory record may contain fields for Vendor Code 1 and Vendor Code 2.
What happens when you add a third vendor? Adding a field is not the answer; it requires program and table
modifications and does not smoothly accommodate a dynamic number of vendors. Instead, place all vendor information in a separate table called Vendors, then link inventory to vendors with an item number key, or vendors to inventory with a vendor code key.
Create separate tables for sets of values that apply to multiple records.
Relate these tables with a foreign key. Records should not depend on anything other than a
For
example,
consider
customer's
address
in
an
accounting system. The address is needed by the Customers table, but also by the Orders, Shipping, Invoices, Accounts Receivable, and Collections tables. Instead of storing the customer's address as a separate entry in each of these tables, store it in one place, either in the Customers
Values in a record that are not part of that record's key do not belong in the table. In general, any time the contents of a group of fields may apply to more than a single record in the table, consider placing those fields in a separate table.
theoretically desirable, is not always practical. If you have a Customers table and you want to eliminate all
possible interfield dependencies, you must create separate tables customer for cities, ZIP codes, other sales representatives, that may be
classes,
and
any
factor
duplicated in multiple records. In theory, normalization is worth pursing. However, many small tables may degrade
It may be more feasible to apply third normal form only to data that changes frequently. If some dependent fields remain, design your application to require the user to verify all related fields when any one is changed.
DE Jewelry Centre is one of the most popular online jewelry shops one can find and search over the internet globally. The company can be searched through this website One can have easy
address http://www.dejewelrystores.com.
One must register in order to purchase a product. In MyAccount Link, the members list of orders, total amount, date of order and other necessary personal information are stored here. This system has also provided an option as to what currency to use when shopping.
Popular
pendants, rings, bangles, accessories etc. can be linked here. This features diverse categories of elegant items
chosen, just click the link to see the image and the prices of that specific item/product. Monthly Special Feature
Items with image, captions and prices are also displayed. New products for the next fashion sense are also in the
other box.
There are also news archive link about the Articles with great fashion sense
In the lower part of this site, you will see links About Us, Contact Us, Site Map, Privacy Policy,
Terms of Use, Return Policy and Shipping Policy. The shop supports Free Shipping for all the products, on all orders, worldwide. via DHL, UPS, the All international shipments are shipped EMS express use mail regular orders are In mainly, Air and at for by
FEDEX,
present
store
does
not
All and
the buyers
are
shipped to
informed the
about
address.
Billing
Link, you can see information on how will you pay. credit card and bank accounts may be accepted.
Part
of
the
success
of
DE
Jewelry
Centre
is
its
accessibility in the internet. Losses were regained after 3 years of operation. The use of MySQL database and online ordering system highly aided the shop in storing and
monitoring the increasing number of customers. Especially noteworthy in e-tailing's growth curve is the role of the fourth quarter. As online shopping spikes every holiday
season, it pulls the rest of the year up with it. "In every year, it brings people online to buy, and so those people shop again the next quarter," Mudd notes. So the fourth quarter, "is important not only because it's as big as it is, but because it exposes the population to e-commerce more than any other." DE Jewelry Centre experiences
Shell
Accessories
Online
Shopping
Store
is
subsidiary of Bedido Fashion Jewelry, one of the leading Manufacturers and Exporters of Philippine made handicrafts. Top quality This items, is all handcrafted in Cebu to perfection, Philippines. are This
assured.
based
City,
Online Shopping Store has the edge of being based in a country skilled that boasts of its rich natural resources and for online
people. are
prices site
especially an
wholesalers
contains
catalogue with clear and sharp item pictures of products, so that customers may conveniently shop anytime, anywhere. Digital catalogues upon request are also available. A
mainly on client needs have also been established. Hence, the company enjoys increasing profit.
In
the
homepage,
wide
selection
of
Shell
from
Philippine Seas, Complete line of Shell Jewelry from Shell Necklaces, Shell Dangling Earrings, Shell Anklets, Shell
Pendants, and Shell Beads pictures are showcased. At the top is where My Account, Cart Contents and Contact Us can be found. In My Account, there are two forms to be filled out one for the new customers to sign up while the other is for the returnees to sign in. The Cart Contents reminds the customers of what has already been shopped as well as the number of items during that time; if it has none, then Your shopping Cart is empty will prompt. The company
supports master card and other credit cards for billing. So, customers need not to worry if they ran out of cash.
At the right side locates the quick search of which keywords are encoded to find the product the customers are looking for. Live support is as well provided for anyone who has difficulty in comprehending the steps of shopping or browsing the interface. everyone visibility Another is thing to is the
advertisements products,
wherein high
invited 200
advertise and
enjoy
over
networks
increase sales. Next are the lists of Information regarding Gift Voucher FAQ, Fashion Topics, Jewelry Forum and Crafts Discussions are linked for the contents. These corners give the customers various tips about jewelry and their reviews help the shop to improve its management. The latest update of their site is the Jewelry Sale wherein the company posts the off-price item of the week.
Rosegold
Pawnshop
&
Jeweler
has
been
one
of
those
jewelry business establishments that built a great name in Davao. Aside from veracity and assiduousness, ingenuity has brought them to come up with an online purchasing and
pawning that would cater the sumptuous desire of customers for jewelry. The features on page sway the customers to revisit and incessantly support the business.
Rosegold Pawnshop & Jeweler page has 11 links at the top portion of the webpage. It is divided into two partsthe upper left side locates the links for Shopper where only Davao-based customers are invited to join; Business where great deals for business inclined individuals are
offered;
Advertise
where
owners
of
small
advertising
in
Davao can post ads; Website where a tour to other websites in Davao takes place; Videos where slideshow of items can be viewed in Youtube; and Ask Us where customers can email questions about Rosegold Pawnshop & Jeweler products. While on the upper right side, the Sign In Register FREE can be found. Account WowBuddy This would that navigate you to a sign up form for
Type: and
has only two choices of textbox the type. These features would
WowBusiness
redirect the consumer to social sites like facebook and twitter and e-businesses such as e-buy wherein more
Internet buyers may have surf the site and purchase items of their choice. In this way, the company has a persistent growth in sales.
Beneath are the online advertisements and information about promos and how to join. Through this, many customers are interested to keep updated with the advantages.
Chapter 3
The programmers wrote a letter to set an interview to the manager address. Questionnaires were also prepared.
The letter and questionnaires were verified. The programmers sent the letter to the companys e-mail address.
The programmers distributed questionnaires that inquire the company manager and staff regarding business transaction problems.
The programmers noted the all the hardware and software requirements available; and observed the business transaction.
The programmers assessed the companys problems from the collected answers on questionnaires
The programmers determined how the problems of the company be derived to state the dilemma of the programmers
Users come in two major categories the administrator and the customer. To maintain security in the system, every user must login using own username and encrypted password. Barely the administrator handles all the administrative
tasks like organizing accounts, enhancing features of the web pages, providing network security and so has the
privilege to access all files such as to hide or delete records that create profanity. The customers on the other hand are not granted with the permission to modify the
system only the selected functions supplied. A member or a guest may post comments and suggestions on the wall but not to edit or remove the post of other customers. All
customers are required to read and comprehend all the terms and conditions as well as supplementary policies set by the company especially when purchasing to avoid delays or
evasion of rights.
Chapter 4
The first information to be keyed in by the user is the register and login. Textboxes are provided for manual input as well as buttons of submit and clear. Invalid User Account will prompt to filter illegal login and so requires users to register. For further inquiry and assistance, the member may post his questions on the wall.
The
administrator
has
all
the
permissions
to
input
The system presents various sections on jewelry types ring, necklaces, bracelets, etc. Once clicked, the customer will see all the products and prices sorted accordingly. Photos of discounted products are also featured at the home page.
It, moreover, provides a page wherein the member may view his profile as well as all the items, date, quantity and amount purchased. The member has also the privilege to add, change and delete the items on cart. Only the member could write comments on the wall. Answers for inquiries will be sent to their emails or a reply be displayed on the same page
4.2.1 ER Diagram
4.2.2
Data Dictionary
Customer Description Data Type Customers ID int number Customers first name Customers 20
Size
varchar 20 varchar 20
last name Customers e- varchar 30 mail Costumers user name Customers Password Street address of varchar 15 varchar 15 varchar 30
city/province
Yes
contact
int
20
Yes
account_img
varchar 20
Yes
varchar 50
Yes
Null
ID number ordered_date Date of timestamp Order total_amount Total amount ordered status items Status of varchar 50 of decimal
Yes
Size 20 No
Null
Description jewelry_type
number Items
varchar
50 20
No No
type jewelry_class Items jewelry date_added class The when admin. added price item_img item Items price Items the
varchar
20
No null
Not
Yes
65, 2 20 10
Column Name
Size No
Null
No No
qty
int
10
Yes
amount
decimal
65, 2
No
Comment Column Name Description Data Type Comment_id Comments int ID number Account_num Customers item_id comment int
Null
comment Date_posted Date when timestamp the Customer posted comment the
Discounts
Size 20 No
Null
Item_id
number Items
20 20
No No No
Date_ended
No
Chapter 5
5.0
Component
Minimum
Recommended Dual processors that are each 3 GHz or faster 4 GB NTFS file systemformatted partition with 3 GB of
Processor 2.5 gigahertz (GHz) RAM 2 gigabyte (GB) NTFS file system formatted partition Disk with a minimum of 3 GB free space for your Web of free space sites DVD drive or the source Drive DVD drive copied to a local or network-accessible drive 1024 768 or higher Display 1024 768 resolution monitor 56 kilobits per second 56 Kbps or faster (Kbps) connection Network between client computers and server computers and server connection between client free space plus adequate
Web browsers IE8, Firefox, Chrome, Opera and Safari. So to check that the page views are good across a variety of platforms.
Gimp For picture editing Dreamweaver MX 2004 text editing mode Xampp Xampp creates a server on PC so as to create a full working page and be tested before uploading Fireftp / Filezilla A Firefox plugin to transfer files. or Windows notepad Mainly used in
To establish logical security, the system would ask the user to register and login. Each username and password is unique so no users have the same username and password at the same time. Passwords are encrypted so that other may fraud the account. Only the administrator is granted with privileges changes. to access all accounts and modify necessary
If with
customer
chooses
to --
the in
personal
information forms
completing
other
which
submitted
through
website - this information is used only to respond to the customers questions or process the forms to complete the requested transactions. No information is shared with other
agencies
unless
it
is
required
by
law.
No
information
Backups are ensured every now and then in order to minimize data loss. System Restore will be the immediate action in case of loss.
It uses "cookies" to customize/enhance the use of this site. A cookie is a tiny piece of text that is placed on computer's hard drive. If a web browser is set to notify before accepting cookies, it will be prompted to accept before it is stored on computer. This cookie by itself only informs us a previous visitor has returned. It in no way
In physical security, the company ensures that the items sold are genuine and are delivered on time. In networking connections, cable wires are separated from power chords to avoid EMS. Hard wares are locked with passwords so that only the delegated personnel can access.
5.2
Users Manual
This manual is provided for better understanding of the interface and functions of this system.
Home - It most often refers to the initial or main web page of a web site, sometimes called the front page. It also includes the login page wherein the system identifies
Register One cannot login unless registered. So the user must register on this page.
Once logged in, the customers may view the above page to
navigate other features like view profile, cart, ordered items, and received items.
Cart The page where the customers shopped items are listed
Profile The member could view his profile information he provided upon registration; change username, edit
Discount
Page
This
is
where
you
can
shop
for
great
New Items - This is where photos of newly arrived items are displayed
About
Us
This
is
where
the
administrator
types
the
Contact Us To establish effective communication, users may contact the company through this page Chapter 6
After a thorough elicitation and analysis of the system, the following are recommended:
Jewelry may tie up with other companies like Paypal in order to establish airtime payment. It may also have s to social sites for faster promotion of business. Hence the operation would be even more efficient.
If Version 2 be produced, the system may have 3D on photos, currency converter, calculator and calendar for
fascinating graphical user interface. Features like online chatting with camera may also be included here. This can be used for simultaneous interaction. A picture may also be included in the account of every user for personal
identification purposes.
References
www.about.com\hardware www.about.com\jewelry www.about.com\msql www.about.com\software www.ask.com\e-commerce www.ask.com\e-tailer www.ask.com\links www.ask.com\transaction www.dejewelrystores.com www.shellaccessories.com