Furniture
Furniture
INTRODUCTION
1
1.1 GENERAL INTRODUCTION
Accuracy
Storage
Speed of Response
Versatility
Diligence
Shoppers and traders are quickly changing the mode of operation from the
present way. The shopping can be done in a pretty fast and easier manner than the usual
operation.
2
The system is fully menu driven. This application program is efficient,
user-friendly, and error free provides a suitable and creative implementation of the
system.
Online furniture shopping system is a site that handles furnitures and their
corresponding details about purchase, sales etc. It makes the job of the staffs easy and
efficient. A particular furniture can be easily searched by specifying a gender
through Furniture shop.This project includes modules namely purchasing and sales
management. This project also displays details of customer, supplier, date of
purchase, purchasing quantity etc.
3
1.3 SYNOPSIS
Language : PHP
4
SYSTEM STUDY
5
2 SYSTEM STUDY
Record Review:
Many kinds of records and reports can provide analysis with valuable
information about organizations and operations. In record reviews, analysts
examine information that has been recorded about the system and users. Records
include written policy manuals, regulations and standard operating procedures used
by most organization as a guide for managers and employees.
Observation:
Observation allows analysts to gain information they can’t obtain by any other
fact-finding method. Through observation, analysts can obtain firsthand information
about how activities are carried out. This method is most useful when analysts need
to actually observe. How documents are handled, how processes are carried out and
whether specified steps actually followed.
Interview:
Analysts use interviews to collect information from individuals or from
groups .The respondents are generally current users of the existing system or
potential users of the proposed system. In some instances, the respondents may
be managers or employees who provide data for the proposed system or who will
be affected by it.
6
information from respondents who have been chosen for their knowledge of the
system under study. This method is frequently the best source of study.
The existing system is fully manual. The details about furniture’s name,
price, quantity etc are stored by recording them in different files. Thus delays
are inevitable. Manual processing may also lead to human error. Updating
document details also requires a lot of time and effort, which could lead to errors
or omissions.
o Accuracy is missing.
Due to the above mentioned disadvantages in the existing system it has been proposed
for new system, which will overcome these difficulties. So the new system is developed
with the help of PHP and SQL Server .Even though the end user of the system are well
qualified, various help message are to be given both quick references and in help file.
ADVANTAGES
o Listing of items.
8
SYSTEM ANALYSIS
9
3.SYSTEM ANALYSIS
INTRODUCTION
The first step in developing the system is analyzing the problem. Before
developing a system the problem should be well defined. Identifying the need for
a new information system and launching an investigation and a feasible study must
be done to check whether the software is visible for the organization. This unit we have
done this study.
Lack of security is another problem of the existing system. That may lead to serious
problems. It will affect the business career. In the existing system, there is no facility for the
user to see the view his past purchases. The existing system is not reliable because of human
errors. Calculations and maintenance needs a lot of time that produce queuing.
Because of these reasons the existing system needs a change, for the easy and smooth
running of the system.
All projects are feasible given unlimited and resource and infinite time.
Unfortunately, the development of computer-based system is more likely to be plagued
by scarcity of resources and difficult delivery dates. The main objective of feasible
study is to test the technical, social and economical feasibility of developing a
computer system. This is done by investigating the existing system in the area
under investigation or generally ideas about a new system. The proposed system was
evaluated from a technical view point first. Being technically feasible, its impact on the
organization was assessed. After the proposed system was found to be social and technically
acceptable, it was tested for economic feasibility.
Technical Feasibility
10
There are a number of technical issues, which are generally raised during the
feasibility stage of the investigation. A study of function, performance and constraints
that may affect the ability to achieve an acceptable system. The considerations that
are normally associated technical feasibility include.
Development Risk
Resource Availability
Technology.
Economic Feasibility
2. The cost of hardware and software for the class of application of the project being
considered.
To be judged feasible, a proposal for the specific project must pens these tests;
otherwise it is not considered as a feasible project.
Behavioral Feasibility
It centers on the reaction of the users, since the system is not so complicated it
is easily understandable by anyone. User training is also very easy. The user also does
not need to have any concept of the software used for developing the system.
Operational Feasibility
Proposed projects are beneficial only if they can be turned into information
systems that will the operating requirements of the organization. This test of
11
feasibility asks if the system will work when it is developed and installed. ONLINE
FURNITURE SHOPPING SYSTEM satisfies all the operational conditions.
The first step in selection understands user’s requirements within the framework of
the organization’s objectives and the environment in which the system being installed.
Hardware Requirements
RAM : 1 GB or more
Software Requirement
general purposed programming language. As of January 2013, PHP was installed on more
than 240 million websites (39% of those sampled) and 2.1 million web servers. Originally
created by Rasmus Lerdorf in 1994, the reference implementation of PHP is now produced
by The PHP Group. While PHP originally stood for Personal Home Page, it now stands for
PHP code can be simply mixed with HTML code, or it can be used in combination
with various templating engines and web frameworks. PHP code is usually processed by a
Common Gateway Interface (CGI) executable. After the PHP code is interpreted and
executed, the web server sends resulting output to its client, usually in form of a part of the
generated web page – for example, PHP code can generate a web page's HTML code, an
image, or some other data. PHP has also evolved to include a command-line interface (CLI)
PHP is free software released under the PHP License. PHP has been widely ported and can
be deployed on most web servers on almost every operating system and platform, free of
charge.
2. MySQL
MySQL is the world's most popular open source database software, with over 100
million copies of its software downloaded or distributed throughout its history. With its
superior speed, reliability, and ease of use, MySQL has become the preferred choice for
Web, Web 2.0, SaaS, ISV, Telecom companies and forward-thinking corporate IT Managers
because it eliminates the major problems associated with downtime, maintenance and
administration for modern, online applications.
13
Many of the world's largest and fastest-growing organizations use MySQL to save time and
money powering their high-volume Web sites, critical business systems, and packaged
software — including industry leaders
such as Yahoo!, Alcatel-Lucent, Google, Nokia, YouTube, Wikipedia, and Booking.com.
MySQL was originally founded and developed in Sweden by two Swedes and a
Finn: David Axmark, Allan Larsson and Michael "Monty" Widenius, who had worked
together since the 1980's. MySQL, the most popular Open Source SQL database
management system, is developed, distributed, and supported by Oracle Corporation.
MySQL is a database management system. A database is a structured collection of data. It
may be anything from a simple shopping list to a picture gallery or the vast
amounts of information in a corporate network. To add, access, and process data stored in a
computer database, you need a database management system such as MySQL Server. Since
computers are very good at handling large amounts of data, database management systems
play a central role in computing, as standalone utilities, or as parts of other applications.
MySQL databases are relational. A relational database stores data in separate tables
rather than putting all the data in one big storeroom. The database structures are organized
into physical files optimized for speed. The logical model, with objects such as databases,
tables, views, rows, and columns, offers a flexible programming environment. You set up
rules governing the relationships between different data fields, such as one-to- one, one-to-
many, unique, required or optional, and ―pointers‖ between
different tables. The database enforces these rules, so that with a well designed database,
your application never sees inconsistent, duplicate, orphan, out-of-date, or missing data.
The SQL part of ―MySQL stands for ―Structured Query Language. SQL is the
most common standardized language used to access databases. Depending on your
programming environment, you might enter SQL directly (for example, to generate reports),
embed SQL statements into code written in another language, or use a language-specific API
that hides the SQL syntax. SQL is defined by the ANSI/ISO SQL Standard.
The SQL standard has been evolving since 1986 and several versions exist.
14
MySQL software is Open Source. Open Source means that it is possible for anyone
to use and modify the software. Anybody can download the MySQL software from the
Internet and use it without paying anything. If you wish, you may study the source code and
change it to suit your needs.
The MySQL Database Server is very fast, reliable, scalable, and easy to use. If that is
what you are looking for, you should give it a try. MySQL Server can run comfortably on a
desktop or laptop, alongside your other applications, web servers, and so on, requiring little
or no attention. If you dedicate an entire machine to MySQL, you can adjust the settings to
take advantage of all the memory, CPU power, and I/O capacity available.
MySQL can also scale up to clusters of machines, networked together. MySQL Server
was originally developed to handle large databases much faster than existing solutions and
has been successfully used in highly demanding production environments for several years.
Although under constant development, MySQL Server today offers a rich and useful set of
functions. Its connectivity, speed, and security make MySQL Server highly suited for
accessing databases on the Internet. MySQL Server works in client/server or embedded
systems.
3. Wamp Server
WampServer is a Windows web development environment. It allows you to create
web applications with Apache2, PHP and a MySQL database. Alongside, PhpMyAdmin
allows you to manage easily your databases. WampServer refers to a software stack for the
Microsoft Windows operating system, created by Romain Bourdon and consisting of the
Apache web server, Open SSL for SSL support, MySQL database and PHP programming
language. WampServer is a Web development platform on Windows that allows you to
create dynamic Web applications with Apache2, PHP and MySQL. WampServer
automatically installs everything you need to intuitively develop Web applications. You will
be able to tune your server without even touching its setting files. Best of all, WampServer is
available for free (under GPML license) in both 32 and 64 bit versions. Wampserver is not
compatible with Windows XP, SP3, or Windows Server 2003.
SQL CONSTRAINTS
You can place constraints to limit the type of data that can go into a table. Such
constraints can be specified when the table when the table is first created via the
15
CREATE TABLE statement, or after the table is already created via the ALTER
TABLE statement.
Common types of constraints include the following:
NOT NULL Constraint: Ensures that a column cannot have NULLvalue.
DEFAULT Constraint: Provides a default value for a column when none is specified.
UNIQUE Constraint: Ensures that all values in a column are different.
CHECK Constraint: Makes sure that all values in a column satisfy certain criteria.
Primary Key Constraint: Used to uniquely identify a row in the table.
SYSTEM DESIGN
16
4. SYSTEM DESIGN
System design involves the detailed design of the system selected in the system study
phase.
Input design features can ensure the reliability of the system and also determines how
efficiently the user can interact with the system. A good input screen is clear and free from
irrelevant information. Entered data has to be checked for their accuracy and detection of
errors. All the data entry screens should be of interactive nature that user can directly
input data according to prompt messages. The input design determines whether the
user can interact directly with the computer.
17
All the input screens used here have script validations for null checking and
data types whereas required. All the programs inserting data to the table checks the length
of the values in addition to the data type verification. They also prompt the entry of
values in mandatory fields. The goal of designing input data is to make it free from
logical errors. The input data is also used for easy calculation of necessary functions.
Different forms are used for data screens in order to input data into the system. The screen
formats have options like add, delete, edit and update with buttons, which is used for
easy input and retrieving information. All the fields are validated. If the user enters
invalid data, appropriate messages are displayed.
Input specifications describe the manner in which data enter the system for
processing. The design of the input should have:
Attractiveness
One of the most important features of the system for users is the output it
produces. Output design should improve the system relationship with the user it produces
and helps in decision making. Considering the future use of the output required and
depending on the nature, they are displayed on the monitor for immediate need or
obtaining the hardcopy.
The objective of output design is to define the control and formats of all printed,
system. Computer output is the most important and direct source of information to the
user. For many end users output is the main reason for developing the system and the
basis on which they will evaluate the usefulness of the application. Output generally
refers to the results that are generated by the system. The output of the system is
designed so as to include a number of reports. Reports reflect the output design.
18
Objective of output design are design output to serve the intended purpose,
design output to fit the user, deliver the appropriate quantity of output, assures that
output is where it is needed, provide output on time, choose the right output method.
The CRT displays can include a title, column heading, detailed data totals; they must
be described in detailed for programmers. In the case of CRT displays layout design the area
is limited by the size of the screen as the amount of data that can displayed in the record.
The most important aspect of building an application is the design of tables or the
database scheme. The data stored in the tables must be organized in some manner,
which is meaningful. The overall objective in the process of table design has been to
treat data as an organizational resource and as an integrated whole. The organization of
data in a database aims to achieve three major objectives, which are given below.
19
NORMALIZATION
Benefits:
2. Improve performance
3. Query optimization
5. Index improvement
First normal form (1NF) sets the very basic rules for an organized database:
Create separate tables for each group of related data and identify each row with
a unique column or set of columns (the primary key).
Second normal form (2NF) further addresses the concept of removing duplicative data:
Create relationships between these new tables and their predecessors through the use
of foreign keys.
Remove columns that are not dependent upon the primary key.
The Boyce-Codd Normal Form also referred to as the "third and half
(3.5) normal form", adds one more requirement:
RULES OF NORMALIZATION
Rule 1: There should be a one-to-one relationship between the instances of an entity and
the rows of the table
Rule 2: A field should have the same meaning in each row of the table. Rule 3: Each
A data flow diagram is a network that describes the flow of data throughout
a system, data stores, and the processes that change, or transform, data flows. The DFD
network is a formal, logical abstract of a system that may have many possible physical
configurations.
The purpose of the design is to create architecture for the evolving implementation
and established common tactical policies that must be used by desperate elements of the
system. We begin the system process as soon as we have some reasonably completed
model of the behavior of the system. It is important to avoid premature designs,
where in develop designs before analysis reaches closer. It is important to avoid
delayed designing where in the organization crashes while trying to complete and
unachievable a in the organization crashes while trying to complete and unachievable
analysis model.
Throughout my project, the context flow diagram, and flowcharts have been
extensively used to achieve the successful design of the system.
Process
22
Process shows in the work of the system. Each process has one or more data inputs
and produces one or more data outputs. Process are represented by rounded rectangles in
DFD. Each process has unique name and number appears inside the rectangle that
represents the process in a data flow diagram.
Data Store
A data store is a repository of data. Processes can enter data into a store or retrieve the
data from data store. Each data has a unique name.
Data flows
Data flows show the passage of data in the system and are represented
by lines joining system components. An arrow indicates the direction of flow and the
line is labeled by name of the data flow.
External Entity
External entities are outside the system but they either supply input data into the
system or use other system output. They are entities on which the designer has control. They
may be an organization customer or other with which the system interacts. It supply data
into the system called source. External entities that use the system data are sometimes
called sinks. These are represented by rectangles in DFD.
23
outgoing data.
4. The names of data stores, sources and destinations are written in capital letters.
24
25
SYSTEM TESTING
26
Testing:
System Testing is an important phase. Testing represents an interesting anomaly for the software.
Thus a series of testing are performed for the proposed system before the system is ready for user
acceptance testing.
A good test case is one that has a high probability of finding an as undiscovered error. A
successful test is one that uncovers an as undiscovered error.
Testing Objectives:
Testing Principles:
The primary objective for test case design is to derive a set of tests that has the highest
livelihood for uncovering defects in software. To accomplish this objective two different categories
of test case design techniques are used. They are
White-box testing:
White box testing focus on the program control structure. Test cases are derived to ensure
that all statements in the program have been executed at least once during testing and that all logical
conditions have been executed.
27
Block-box testing:
Black box testing is designed to validate functional requirements without regard to the internal
workings of a program. Black box testing mainly focuses on the information domain of the
software, deriving test cases by partitioning input and output in a manner that provides through test
coverage. Incorrect and missing functions, interface errors, errors in data structures, error in
functional logic are the errors falling in this category.
Testing strategies:
A strategy for software testing must accommodate low-level tests that are necessary to verify
that all small source code segment has been correctly implemented as well as high-level tests that
validate major system functions against customer requirements.
Testing fundamentals:
Testing is a process of executing program with the intent of finding error. A good test case is
one that has high probability of finding an undiscovered error. If testing is conducted successfully it
uncovers the errors in the software. Testing cannot show the absence of defects, it can only show
that software defects present.
Information flow for testing flows the pattern. Two class of input provided to test the
process. The software configuration includes a software requirements specification, a design
specification and source code.
Test configuration includes test plan and test cases and test tools. Tests are conducted and all
the results are evaluated. That is test results are compared with expected results. When erroneous
data are uncovered, an error is implied and debugging commences.
Unit testing:
Unit testing is essential for the verification of the code produced during the coding phase and
hence the goal is to test the internal logic of the modules. Using the detailed design description as a
guide, important paths are tested to uncover errors with in the boundary of the modules. These tests
were carried out during the programming stage itself. All units of Vienna SQL were successfully
tested.
28
Integration testing:
Integration testing focuses on unit tested modules and build the program structure that is
dictated by the design phase.
System testing:
System testing tests the integration of each module in the system. It also tests to find
discrepancies between the system and it’s original objective, current specification and system
documentation. The primary concern is the compatibility of individual modules. Entire system is
working properly or not will be tested here, and specified path ODBC connection will correct or not,
and giving output or not are tested here these verifications and validations are done by giving input
values to the system and by comparing with expected output. Top-down testing implementing here.
Acceptance Testing:
This testing is done to verify the readiness of the system for the implementation.
Acceptance testing begins when the system is complete. Its purpose is to provide the end user with
the confidence that the system is ready for use. It involves planning and execution of functional
tests, performance tests and stress tests in order to demonstrate that the implemented system satisfies
its requirements.
Test coverage Analyzer – records the control paths followed for each test case.
Timing Analyzer – also called a profiler, reports the time spent in various regions of the code are
areas to concentrate on to improve system performance.
Coding standards – static analyzers and standard checkers are used to inspect code for deviations
from standards and guidelines.
Test Cases:
Test cases are derived to ensure that all statements in the program have been executed at least once
during testing and that all logical conditions have been executed.
Using White-Box testing methods, the software engineer can drive test cases that
Guarantee that logical decisions on their true and false sides.
Exercise all logical decisions on their true and false sides.
Execute all loops at their boundaries and with in their operational bounds.
Exercise internal data structure to assure their validity.
The test case specification for system testing has to be submitted for review before system testing
commences.
29
SYSTEM
IMPLEMENTATION AND
MAINTENANCE
30
6. SYSTEM IMPLEMENTATION
An import aspect of system analyst’s job is to make sure that the new design is
implemented to established standard. Implementation is used here to mean the process of
converting a new or a reversed system design into operational one.
Conversion
Conversion means changing from one system to another. The objective is to put
the system into operation while holding costs, risks and personal irritation to a minimum. It
involves
User Training
The analyst must have clear idea about the user’s capacity and requirement. A well
designed system may fail because of the way are operated and used. So the user must be trained
before using the new system and the quality of the training must be high
SYSTEM MAINTENANCE
Security is an essential part of the increased scale of computerization and the development
of the system like sensitive area.
Back up
Backups for hardware, the data and the system are inevitable factor to be considered. Data backup
represents insurance against actual loss of data due to equipment malfunction. Program failure
or accident. Hence data can be providing on hard disk or on floppy disk.
After the jobs of testing were completed the whole system as well documented in
clear, Understandable and simple language. This was to ensure that if any updating
has to be performed in the future the users
would not face any difficulties in performing tasks. An acceptance was made to
attain maximum perfection in documentation the software in a simple, precise and
self-explanatory manner.
32
FUTURE SCOPE OF
THE PROJECT
33
CODING:
Index.php
<?php include('include/header.php');
if(isset($_SESSION['email'])){
$custid = $_SESSION['id'];
if(isset($_GET['cart_id'])){
$p_id = $_GET['cart_id'];
$sel_cart = "SELECT * FROM cart WHERE cust_id = $custid and product_id = $p_id ";
$run_cart = mysqli_query($con,$sel_cart);
if(mysqli_num_rows($run_cart) == 0){
$cart_query = "INSERT INTO `cart`(`cust_id`, `product_id`,quantity) VALUES
($custid,$p_id,1)";
if(mysqli_query($con,$cart_query)){
header('location:index.php');
}
}
if(mysqli_num_rows($run_cart) > 0){
while($row = mysqli_fetch_array($run_cart)){
$exist_pro_id = $row['product_id'];
if($p_id == $exist_pro_id){
$error="<script> alert('⚠️This product is already in your cart ');</script>";
}
}
}
}
}
else if(!isset($_SESSION['email'])){
echo "<script> function a(){alert('⚠️Login is required to add this product into
cart');}</script>";
}
?>
<!--Carousel Wrapper-->
<div class="carousel slide mt-5" id="slider" data-ride="carousel">
<!---Indicators-->
<ol class="carousel-indicators">
<li data-target="#slider" data-slide-to="0" class="active"></li>
<li data-target="#slider" data-slide-to="1" ></li>
<li data-target="#slider" data-slide-to="2" ></li>
</ol>
<div class="carousel-inner">
<div class="carousel-item active">
34
<img src="img/cupboard.jpg" class="d-block w-100">
</div>
<div class="carousel-item">
<img src="img/couch.jpg" class="d-block w-100">
</div>
<div class="carousel-item">
<img src="img/bedset_slide.jpg" class="d-block w-100">
</div>
<!---Controlers-->
<a class="carousel-control-prev" data-slide="prev" href="#slider">
<span class="carousel-control-prev-icon"></span>
</a>
</div>
</div>
<!--/.Carousel Wrapper-->
<!--Latest product---->
<section >
<div class="container pt-5 pb-5">
<div >
<?php
if(isset($msg)){
echo $msg;
}
else if(isset($error)){
echo $error;
}
?>
</div>
<?php
$p_query = "SELECT * FROM furniture_product ORDER BY pid DESC
LIMIT 4";
$p_run = mysqli_query($con,$p_query);
35
if(mysqli_num_rows($p_run) > 0 ){
while($p_row = mysqli_fetch_array($p_run)){
$pid = $p_row['pid'];
$ptitle = $p_row['title'];
$pcat = $p_row['category'];
$p_price = $p_row['price'];
$size = $p_row['size'];
$img1 = $p_row['image'];
?>
<div class="row">
<div class="col-md-12 col-sm-12 col-12 text-center">
</div>
</div>
</div>
<?php
}
}
else{
echo "<h3 class='text-center'> No Product Available Yet </h3>";
}
?>
</div>
</div>
</section>
<!---end latest Products-->
36
<!---We deal with-->
<section class="bg-white">
<div class="container pt-4 pb-5">
<h1 class="text-center pt-4">We Deal With </h1>
<!---Row 1-->
<div class="row mt-5">
<div class="col-md-4">
<img src="img/bedset.jpg" class="hover-effect" width="100%" alt="bedset">
<div class="mt-3">
<h4 class="text-center">Modern Bed set Designs</h4>
<p class="text-center">We deal with modern bedset design made from
manufactured wood with solid wood veneers.Affordable price with high quality
products.</p>
</div>
</div>
<div class="col-md-4">
<img src="img/dining-set.jpg" class="hover-effect" width="100%" alt="bedset">
<div class="mt-3">
<h4 class="text-center">Modern Dining Set</h4>
<p class="text-center">We deal with dining Table It oozes class and style and is
very chic and modern in design. Dining table constructed from a durable solid wood.</p>
</div>
</div>
<div class="col-md-4">
<img src="img/chairyellow.jpg" class="hover-effect" width="100%" alt="bedset">
<div class="mt-3">
<h4 class="text-center">Modern Arm Chairs Design</h4>
<p class="text-center">We deal with All Modern Style Arm Chairs It oozes class
and style and is very chic and modern in design, constructed from a durable solid
wood.</p>
</div>
</div>
</div>
<!---end-->
<!---row 2-->
<div class="row mt-5">
<div class="col-md-4">
<img src="img/table.jpg" class="hover-effect" width="100%" alt="bedset">
<div class="mt-3">
<h4 class="text-center">New Table Designs</h4>
<p class="text-center">We deal with All Modern Style tables It oozes class and
style and is very chic and modern in design, constructed from a durable solid wood.</p>
</div>
</div>
37
<div class="col-md-4">
<img src="img/modern-contemp.jpg" class="hover-effect" width="100%"
alt="bedset">
<div class="mt-3">
<h4 class="text-center">Modern Sofa Designs</h4>
<p class="text-center">We deal with All Modern Style Sofas/Couches ,very chic
and modern in design, constructed from a durable solid wood.</p>
</div>
</div>
<div class="col-md-4">
<img src="img/newcupboard.jpg" class="hover-effect" width="100%"
alt="bedset">
<div class="mt-3">
<h4 class="text-center">New Stylish Cupboard Designs</h4>
<p class="text-center">We deal with All Modern Style Cupboards, built-in
cupboards are storage space that forms part of the design of the room.</p>
</div>
</div>
</div>
</div>
</section>
<!--end deal with-->
</div>
</div>
</div>
<!---end choose product-->
38
<!--cash on deliver-->
<div class="col-md-4 p-5">
<div class="card hover-effect" id="border-less">
<div class="card-body mt-3 text-center">
<i class="fal fa-hand-holding-box fa-3x"></i>
<div class="heading mt-2">
<h4>Recieve</h4>
<h6 class="text-secandary">Recieve Your Product</h6>
</div>
<p class="mt-2">After chouckout from cart your product will be deliver at
your door step within 7 working days</p>
</div>
</div>
</div>
<!---end cash on delivery-->
<!--cash on deliver-->
<div class="col-md-4 p-5">
<div class="card hover-effect" id="border-less">
<div class="card-body mt-3 text-center">
<i class="fal fa-wallet fa-3x"></i>
<div class="heading mt-2">
<h4>Cash</h4>
<h6 class="text-secandary">Cash on delivery</h6>
</div>
<p class="mt-2">On delivery of your product hold or recieve your products
then pay cash on that moment.</p>
</div>
</div>
</div>
<!---end cash on delivery-->
</div>
</div>
</section>
<!---end How to shop-->
OUTPUT SCREEN:
39
40
41
42
43
44
45
.
46
7. FUTURE SCOPE OF THE PROJECT
reports for purchase and sales, online purchasing facility for customers. Shops
is necessary to keep up with changing user needs and the operational environment.
adaptive maintenance together. The main advantage of the proposed system is that we
can easily access and maintain the customer information and it helps in saving the time
47
CONCLUSION
48
8. CONCLUSION
The system has been developed keeping in view of the limitations of the
existing manual system and attempt has been made to overcome the limitations. It
would render faster and better services to the user. System has got the feature of
easy generation of various reports of which new system will almost definitely
be preferred over the existing system. However modification can be made
depending on the changing environment.
For maximum utilization of the system, users should make sure that all the
data entries should be complete. This project work is not without
drawbacks even though 'it is unique in its nature.
49
BIBLIOGRAPHY
50
9. BIBLIOGRAPHY
Book Referred:
51