CAKEWALA.
COM
CONTENTS
CHAPTER:1 Introduction
CHAPTER:2 Objectives
CHAPTER:3 Tools/Environment Used
CHAPTER:4 Analysis Document
CHAPTER:5 SRS
 E-R diagrams
 Data flow diagrams
 Data dictionary
CHAPTER:6 Program code
CHAPTER:7 Testing
CHAPTER:8 Input and Output Screens
CHAPTER:9 Implementation of Security for the Software developed
CHAPTER:10 Limitations of the Project
CHAPTER:11 Future Application of the Project
CHAPTER:13 Bibliography
NAME :
E.No :
CAKEWALA.COM
INTRODUCTION
Cake Wala.Com is the software aimed at providing a wide range of
access to the administrator in managing and monitoring the requirment
registered by the users regarding the problems they face in accessing the
connections extended by the Cake Wala.Com.
The administrator can even maintain the record of the users in the
organization in allocating the cake of attending to the cake booking
request raised by the user. This intranet-based application provides the
user of the system a centralized view of the things maintained in the
software depending on the privileges assigned by the administrator
accordingly.
In this, there are admin are there to solve problems which have posted by
the users. Administrator has to assign the new cake details. Whenever
visitor can view the cake details and user can logging in site he can give
the order for the cake.
NAME :
E.No :
CAKEWALA.COM
Objective & Scope of the project
The main objectives of using Relational Database Management
System are as follows: 1.
CONTROL REDUNDANCY : The System should identify
existence of common data and avoid duplicate recording
relationships of pointers should be used to locate data which are
used many times selective redundancy is sometimes allowed to
improve performance or far better reliability.
2.
DATA INTEGRITY
Consistency of data values and
relationships must be preserved in order to achieve this the system
must ensure validity of data by using good editing, synchronize
updating and propagating changes to other related data element it
also involves maintaining audit trails to enable recovery if errors
are deleted.
3.
DATA SECURITY : This is concerned with protecting
access to data protection is needed at many levels for access,
modification, deletion or display access restriction may be for
individual data items or group of items.
4.
DATABASE PERFORMANCE : The system should be able
to provide timely information as required. The cost of storing and
retrieving the data should be commensurate with the value of
information provided.
NAME :
E.No :
CAKEWALA.COM
5.
MANAGEMENT CONTROL : As the dependence of an
organization on a data base increases positive management controls
should be exercised over addition, deletion, changes and
disposition of data must be protected to start legal accounting and
auditing requirements.
The aim of this project i.e. Tour And Travels is all about tour and
travels from anywhere, anytime. The extra feature involved in our
packages site is that it is secured in a way that user can only
register online.
The main objective of this project is to make CAKEWALA System easy.
The system should have a provision for the administrator to accept/reject
the request by the customer. This process will make CAKEWALA
System. Person who is working we only give command to design his
work this will reduce the human effort and make the system fast.
BRIEF ANALYSIS: After strategizing, I gathered specific information,
analyzed the specific requirements of the Restaurant Waiting System and
then produce a set of clear cut functional requirements that the system
must address. This stage focuses largely on filling in the details for the
system element. Information gathered are analyzed and systematically
dealt in detail by using DFD.
Other Objectives
User friendly interface.
A central database holds the key to system.
All forms are html templates driven
Integration among all functional areas.
The availability of the information is easy.
NAME :
E.No :
CAKEWALA.COM
Routine tasks are easily performed.
It automates the redundant tasks.
It will save time and money.
In summary we can say that main objective of the project is to
make the work easy and smooth.
It will provide the better customer service and enhance the profit of
the organization.
NAME :
E.No :
CAKEWALA.COM
CHAPTER-3
Tools/Environment
Used
NAME :
E.No :
CAKEWALA.COM
PROJECT CATEGORY
ABOUT PHP:-
PHP: Hypertext Preprocessor is a widely used, general-purpose
scripting
language
that
was
originally
designed
for
web
development to produce dynamic web pages. For this purpose,
PHP code is embedded into the HTML source document and
interpreted by a web server with a PHP processor module, which
generates
the web page document. As a general-purpose
programming language, PHP code is processed by an interpreter
application in command-line mode performing desired operating
system operations and producing program output on its standard
output channel. It may also function as a graphical application.
PHP is available as a processor for most modern web servers and
as a standalone interpreter on most operating systems and
computing platforms.
PHP was originally created by Rasmus
been
in
continuous
development
Lerdorf in 1995 and has
ever
since.
The
main
implementation of PHP is now produced by the PHP Group and
serves as the de facto standard for PHP as there is no formal
specification. PHP is free software released under the PHP
License.
PHP is a general-purpose scripting language that is especially
suited to server-side web development where PHP generally runs
NAME :
E.No :
CAKEWALA.COM
on a web server. Any PHP code in a requested file is executed by
the PHP runtime, usually to create dynamic web page content. It
can also be used for command-line scripting and client-side GUI
applications. PHP can be deployed on most web servers, many
operating systems and platforms, and can be used with many
relational database management systems. It is available free of
charge, and the PHP Group provides the complete source code for
users to build, customize and extend for their own use.
PHP primarily acts as a filter, taking input from a file or stream
containing text and/or PHP instructions and outputs another
stream of data; most commonly the output will be HTML. Since
PHP 4, the PHP parser compiles input to produce byte code for
processing by the Zend
Engine, giving improved performance
over its interpreter predecessor.
Originally designed to create dynamic web pages, PHP now
focuses mainly on server-side scripting, and it is similar to other
server-side scripting languages that provide dynamic content
from a web server to a client.
The LAMP architecture has become popular in the web industry as
a way of deploying web applications. PHP is commonly used as
the P in this bundle alongside Linux, Apache and My SQL.. WAMP
packages (Windows/ Apache/ MySQL / PHP) and MAMP packages
(Macintosh / Apache / MySQL / PHP) are also available.
NAME :
E.No :
CAKEWALA.COM
As of April 2007, over 20 million Internet domains had web
services hosted on servers with PHP installed and mod_php was
recorded as the most popular Apache HTTP Server module.
Significant website are written in PHP including the user-facing
portion of Facebook.
ADVANTAGES TO PHP:Open Source, readily available (you can be using it today) and
duallicensed - if you are doing non-profit work or not licensing, there
is no cost.
Very Easy to understand Syntax, some really cool features
(arrays
are something else!)
 Interfaces very easily with Apache/MySQL
 Server side .
 Lots of good source code out there to use and/or learn from, as
well
as many useful libraries for working with PDFs, graphics, etc.
 Lots of good books and on-line help (php.net is great)
 Platform agnostic, can run on Windows Linux or Mac servers.
Also
NAME :
E.No :
CAKEWALA.COM
very scalable.
 Lots of hosting services have it ready to use, no special
configuration (except if you have special security needs)
 Pretty easy to access other web-based tools through PHP (i.e.
google
maps, etc
HOW PHP WORKS.
2) Profile of problem:Problems with conventional system
1. Lack of immediate retrievals: -The information is very difficult
to retrieve
and to find particular information like- E.g. - To find out about the
patients
history, the user has to go through various registers. This results
in inconvenience
and wastage of time.
2. Lack of immediate information storage: - The information
generated by
NAME :
E.No :
10
CAKEWALA.COM
various transactions takes time and efforts to be stored at right
place.
3. Lack of prompt updating: - Various changes to information like
patient
details or immunization details of child are difficult to make as
paper work is
involved.
4. Error prone manual calculation: - Manual calculations are error
prone and
take a lot of time this may result in incorrect information. For
example
calculation of patients bill based on various treatments.
5. Preparation of accurate and prompt reports: - This becomes a
difficult
task as information is difficult to collect from various registers.
8.2 Introduction to HTML
The hypertext markup language (HTML) is a simple markup
language. Used to create a hypertext documents that are
portable from one platform to another HTML documents are
SGML (Standard generalized mark up language) documents with
generic
NAME :
E.No :
semantics
that
are
appropriate
11
for
representing
CAKEWALA.COM
information from a wide range of applications. This specification
defines
HTML
version
3.2.
HTML
3.2
aims
to
capture
recommended practice as of early 96 and as such a replacement
for HTML2.0 (RFC 1866).
A set of instructions embedded in a document is called mark up
language. These instructions describe what the document text
means and how it should look like in a dPaper Less Hospitallay.
Hyper Text Mark Up language (HTML) is the language used to
encode World Wide Web documents.
WHY TO USE HTML?
Website is a collection of pages, publications, and documents that
reside on web server. While these pages publications and a
document as a formatted in a single format, you should use HTML
for home page and all primary pages in the site. This will enable
the millions of web users can easily access and to take advantage
of your website.
HTML is considered first for formatting any new material you plan
to
publish
on
the
web.
HTML
documents
are
platform
independent, meaning that they dont confirm to any standard. If
NAME :
E.No :
12
CAKEWALA.COM
they are created properly you can move home page to any server
platform or you can access them with any complaint www
browser.
STRUCTURE OF HTML
HTML elements perform a defined task. HTML uses two types of
elements
. Empty Tags
. Container Tags
These tags differ because of what they represent. Empty tags
represent formatting constricts such as line breaks and horizontal
rules. Container tags define a section of text, formats and dot all
of the selected text. A container tag has both a beginning and an
ending.
HTML LAYOUT:
An HTML document consists of text, which comprises the content
of the document and tags, which, defines the structure, and
appearance of the document. The structure of an HTML document
is simple, consists of outer.
<HTML>tag enclosing the document header and body
<HTML>
<HEAD>
NAME :
E.No :
13
CAKEWALA.COM
<TITLE>the title of HTML document</TITLE>
</HEAD>
<BODY>
This is where the actual HTML documents
Text lies, which is dPaper Less Hospitallayed in the browser
</BODY>
</HTML>
Each document has a head and body delimited by the <HEAD>
and <BODY> tag. The head is where you give your HTML
document a title and where you indicate other parameters the
browser may use when dPaper Less Hospitallaying the document.
This includes the text for dPaper Less Hospitallaying the text. Tag
also references special and indicates the hot spots that link your
document to other documents.
HTML FORMS:
Creating a form usually involves two independent steps: Creating
the layout for the form itself and then writing a script program on
the server side to process the formation you get back from a
form.
NAME :
E.No :
14
CAKEWALA.COM
To create a form, You use the <FORM> tag. Inside the opening
and closing FORM tags are each of the individual form elements
plus any other HTML content to create a layout for that form.
The opening tag of the FORM element usually includes the
attributes: METHOD and ACTION. The METHOD attributes can be
either GET or POST which determines how your form data is sent
to the script to process it.
The ACTION attribute is a pointer to the script that processes the
form on the server side. The ACTION can be included by a
relative path or by a full URL to a script on your server or
somewhere else. For example, the following <FORM> tag would
call a script called form-name in cgi-bin directory on server
www.myservser.com
<FORM Method= post action=http://www.mytservser.com/cgibin/form-name.pl>
.
</FORM>
METHOD ATTRIBUTE:
NAME :
E.No :
15
CAKEWALA.COM
The other required attribute for the <form> tag sets the methods
by which the browser forms data to the server for processing.
There are two ways: the POST method and GET method. With
POST method, the browser sends the data in two steps: the
browser first contacts the form-processing server specified in the
action attributes, and once contact is made, sends the data.
The GET method in the other hand, contacts the form processing
server and sends the form data in a single transaction step: the
browser appends the data to the forms action URL, separated by
the question mark (?) character.
Introduction to JavaScript
JavaScript:
JavaScript is a new scripting language for WebPages. Scripts
written with java script can be embedded into your HTML pages.
With java script you have many possibilities for enhancing your
HTML page with interesting elements. For example you are able
to respond to user-initiated events quite easily.
Some effects
that are now possible with java script were some time ago only
NAME :
E.No :
16
CAKEWALA.COM
possible with CGI. So you can create really sophisticated pages
with the helps of java script on the Internet.
Difference between java and Java Script
Although the names are almost the same Java is not the same as
Java Script.
These are two different techniques for Internet
programming. Java Paper Less Hospitalrogramming language.
JavaScript is a scripting language as the name implies. The
difference is that we can create real programs with java.
But
java script in not real programming. Java Script is meant to be
easy to understand and easy to use. JavaScript authors should
not have to care too much about programming.
We could say
that Java Script is rather an extension to HTML than a separate
computer language.
Of course this is not the official definition
but it makes it easier to understand the difference between java
and java script.
How can Java Script scripts run?
The first browser to support java script was the Netscape
Navigator 2.0 of course the higher versions do have java script as
well.
You might know that java does not run on all Netscape
Navigators 2.0 (or higher versions) versions. But this is not true
NAME :
E.No :
17
CAKEWALA.COM
for java script -although there are some problems with the
different versions.
The Mac version for example seems to have many bugs. In the
near future there are going to be some other browsers, which
support java script. The Microsoft Internet explorer 3.0 is going
to support java script. JavaScript enabled browsers are going to
spread soon - it is worth learning this new technique now. You
might realize that is really easy to write Java Script scripts. We
have to know is some basic techniques and some work-around for
problems you might encounter.
Of course we need a basic.
Understanding HTML before reading this tutorial you can find
many really good online resources about HTML. Best you make
an online search about html at yahoo if you want to get
informed about HTML. Now I want to show some small scripts so
you can learn how they are implemented into HTML-documents
and to show which possibilities you have with the new scripting
language.
The following is a very small script, which will only
print a text into an HTML document.
<html>
<head>
My first JavaScript
</head>
<body><br>
NAME :
E.No :
18
CAKEWALA.COM
This is a normal HTML document
<br>
<script language=JavaScript>
Document.write (this is a java script)
</script><b r>
Backing HTML again
</body>
</html>
If you are using a java script enabled-browser at the moment
then you will have the possibility to see this script working. If
your browser doesnt support Java Script then this output might
be some kind of strange
This is a normal HTML document
This is java script!
Back in HTML again.
Functions
Functions are bet declared between the <Head> tag of HTML
page.
Functions are called by user-initiated events.
Seems
reasonable to keep the functions between the <Head> tags.
They are loaded first before a user can do anything that might
call a function.
NAME :
E.No :
Scripts can be placed between inside comment
19
CAKEWALA.COM
fields to ensure that older browser do not dPaper Less Hospitallay
the script itself.
<html>
<head>
<script language=JavaScript>
function pushbutton (){
alert (Hello!);
}
</script>
</head>
<body>
<form>
<input
type=button
name=Button1
value=push
me
onclick=pushbutton ()>
</form>
</body>
</html>
If we want to test this one immediately and you are using a Java
Script enabled browser then please go ahead and push the
button.
NAME :
E.No :
20
CAKEWALA.COM
This script will create a button and when you press it a window
will pop up saying hello!. In fact we have a lot of possibilities
just by adding functions to our scripts.
The common browsers transmit the form information by either
method: heres the complete tag including the GET transmission
method attribute for the previous form
Example
<Form method =GET action=http://www.mycompany.com/cgibin/upfdate.pl>
</form>
Input elements.
Use the <input> tag to define any one of a number of common
form elements including text fields multiple choice lists click able
images and submission buttons. There are many attributers for
this tag only that types and name attributes are required for each
element, each type of input element uses only a subset of the
followed attributes.
Additional <input> attributes may be
required based upon which type of the form element you specify.
NAME :
E.No :
21
CAKEWALA.COM
Submit button:
The submit button (<input type=submit> ) does what its name
implies, settings in motion the forms submission to the server
from the browser. We many have more than submit buttons will
be added to the parameter list the browser sends along to the
server.
Example
< Input type =submit>
<Input type=submit value=submit name=name>
Reset button:
The
reset
button
if
firm
<input>
button
is
nearly
self-
explanatory; it lets the user reset erase or set to some default
value all elements in the form.
By default the browser dPaper
Less Hospitallays a reset button worth the label reset. We can
change that by specifying a value attribute with tour own button
label.
INTRODUCTION TO JDBC
NAME :
E.No :
22
CAKEWALA.COM
JDBC (Java Database connectivity) is a front-end tool for
connecting to a server to ODBC in that respect, however JDBC
can connect
only java
client
and
it uses
ODBC
for
the
connectivity. JDBC is essentially a low-level API since any data
manipulation, storage and retrieval has to be done by the
program
itself.
Some
tools,
which
provide
higher-level
abstraction, are expected shortly.
The next question that needs to be answered is why we need
JDBC, once we have ODBC on hand. We can use the same ODBC
to connect the entire database and ODBC is a proven technology.
Problem for doing this is ODBC gives a c language API, which
uses pointers extensively. Since java does not have any pointes
and is object-oriented sun Microsystems, inventor of java
developed to suit its needs.
Requirements to use JDBC:
To use JDBC you need a basic knowledge of databases and SQL.A
part from this you need the jdk1.1 (Java Development Kit1.1
available javasofts website) or a version of Java since jdk1.1 and
above come bundled with JDBC software.
After that you need to have a back-end database engine for
which a JDBC driver is available. When JDBC drivers are not
available JDBC-ODBC bridge drivers are used to access the
database through ODBC. Back-end is not needed when JDBC
NAME :
E.No :
23
CAKEWALA.COM
driver is capable of storing and retrieving the data itself, or if
JDBC-ODBC Bridge and the ODBC driver can be used to store and
retrieve the information.
Introduction To MySql
Modern relational database management systems can perform a
wide range of tasks. It has got the following advantages Define a database
 Query the database
 Add, edit and delete data.
 Modify the structure of the database
 Secure data from public access.
 Communicate within networks
 Export and import data
MySql is one such RDBMS. It provides a set of functional programs
that we use a tool to build structure and performs tasks, in mysql data
is stored and displayed in tables. A table is a data structure that holds
data in a relational database. A table comprises of rows and columns.
Table can also show relationship between entities. The formal name
of table is relation, hence the name Relational Database Management
System.
Access of data in mysql
SQL is a structured query language that we use to communicate with
mysql. It consists of a set of English words like Select, Create etc. The
standard set of SQL command fall into the following category Queries using select clause
 Data definition language (DLL) commands which are for creating
and altering the structure of database.
NAME :
E.No :
24
CAKEWALA.COM
Salient Features of MySql
Open Source
Efficient multi-user support and consistency
Powerful security feature
Fault tolerance
Ease of administration
Application development tools
Networking
SQL compatibility
About SQL
SQL is a structured query language that we use to communicate with
oracle. It consists of a set of English words like Select, Create etc. The
standard set of SQL command fall into the following category-
Tools / Platform, Hardware and Software
Requirement specifications
NAME :
E.No :
25
CAKEWALA.COM
HARDWARE SPECIFICATION
VIRTUAL MEMEORY
PROCESSOR
: 32 BIT, Pentium  IV
RAM
: 1 GB
HARD DISK
: 40 GB
MONITOR
: SVGA Monitor (800 * 600RESOLUTIONS)
CLOCK SPEED
: 266 MHz
SOFTWARE SPECIFICATION
OPERATING SYSTEM
: Windows 2000/XP.
FRONT END
: PHP
BACK END
: My Sql
NAME :
E.No :
26
CAKEWALA.COM
CHAPTER-4
Analysis Document
SYSTEM ANALYSIS
PRELIMINARY INVESTIGATION
NAME :
E.No :
27
CAKEWALA.COM
Things are expected to get even more critical since the companys
growing numbers of clients and related requirements have been
projected to demand a massive number of employees in the coming
future from the past and the todays date. Such events and
projections have forced a strong need for modification in the current
way of handling activities. it is better to implement the latest of it
rather than to go through the pain of updating the system over and
over again.
Also the solution would be developed by in-house
developers.
Their time have to be managed with their other client
dependent schedules.
FEASIBILITY STUDY
Depending on the results of the initial investigation, the
survey is expanded to a more detailed feasibility study. Feasibility
study is a test of system proposal according to its workability,
impact on the organization, ability to meet user needs, and effective
use of resources. The objective of the feasibility
study is not
to solve the problem but to acquire a sense of its scope .
During the study, the
aspects
of
problem
definition
crystallized
and
the problem to be included in the system are
determined.
NAME :
E.No :
is
28
CAKEWALA.COM
Consequently,
greater accuracy
and
benefits
are
described
with
at this stage. It consists of the following:
Statement of
of
costs
the problem: A carefully
worded
statement
the problem that led to analysis.
TECHNICAL FEASIBILITY
This
involves
financial
considerations
to
accommodate
technical enhancements. If the budget is a serious constraint,
then the project is judged not feasible.
ECONOMICAL FEASIBILITY
With the help of banking application it will lead to decrease in
cost of opening and maintaining offices which will be more than the
cost of developing and maintaining the Application.
OPERATIONAL FEASIBILITY
This Application is very easy to operate as it is made user friendly.
Main consideration is users easy access to all the functionality of
the Application.
NAME :
E.No :
29
CAKEWALA.COM
IDENTIFICATION OF NEED
To identify
the
need
for
Requirement Engineering.
software
we
use
the
Principles
of
Requirement engineering provides the
appropriate mechanism for understanding what the customer wants,
analyzing
solution,
need,
assessing
specifying
the
feasibility, negotiating
reasonable
solution unambiguously, validating the
specification and managing the requirement as they are transformed
into an operational system.
The requirement engineering process
can be described in five distinct steps: 
Requirement elicitation.
Requirement analysis & negotiation.
Requirement specification.
System Modeling.
Requirement validation.
Requirement Management.
In other words we can say that requirement analysis is a
software
task
requirement
that
bridges
engineering
and
the
gap
between
software
design.
system
level
Requirement
analysis allows the software engineering to refine the software
allocation and build models of the data, functional and behavioral
domains that will be treated by software.
Requirement analysis
provides the software designer with a representation of information,
function and behavior that can be translated into data, architectural,
NAME :
E.No :
30
CAKEWALA.COM
interface and component level design; finally the requirement
specification provides the developer and the customer with the
means to assess quality once software is built.
The
most
commonly
used
requirement
technique is to conduct a meeting or interview.
elicitation
The first meeting
between a software engineer and customer can be likened to the
awkwardness of a first date between to adolescents. Neither person
knows what to say or ask, Both are worried that what they do say
will be misinterpreted, both are thinking about where it might lead
(Both likely have radically different expectation here) Both want to
get the think over with, but at the same time, both want it to be a
success.
Here according to this principle the analyst starts by
asking context-free-questions. That is a set of question that will lead
to a basic understanding of the problem, the people who want a
solution, the nature of solution that is desired, and the effectiveness
of the first encounter itself.
The first set of Context-free question
focuses on the customer, the overall goals, and the benefits. For
example, the analyst might ask: 
Who is behind the request for this work?
Who will use the solution?
What will be economic benefit of a successful
solution?
NAME :
E.No :
31
CAKEWALA.COM
Is there another source for the Solution that you
need?
The next set of the questions enables the software
engineer to gain a better Understanding of the problem and the
customer to voice his or her perceptions about a solution: 
How would you characterize good output that would be
generated by a successful solution?
What problem(s) will this solution address?
Can you show me (or describe) the environment in which
the solution will be used?
Will special performance issues or constraints affect the way
of the solution is approached?
Are you the right person to answer these questions? Are
your answers? Official?
Are my questions relevant to the problem that you have?
Am I asking too many questions?
Can anyone else provide additional information?
Should I be asking you anything else?
According to the above concepts I went to the various IT companies
and met its staffs, management, and some persons related with the
organizational work, which advised me related with my project.
NAME :
E.No :
32
CAKEWALA.COM
Preliminary Investigation
The first step in the system development life cycle is the preliminary
investigation to determine the feasibility of the System. The purpose
of the preliminary investigation is to evaluate project requests. It is
neither a design study nor does it includes the collection of details
top describe the business system in all respect. Rather, it is collecting
of information that helps committee members to evaluate the merits
of the project request and make an informed judgment about the
feasibility of the proposed project.
Here for the CAKEWALA.COM, I have worked on the preliminary
investigation that accomplished the following objectives:
Clarify and understand the project request.
Determine the size of the project.
Assess costs and benefits of alternative approaches.
Determine
the
technical
and
operational
feasibility
of
alternative approaches.
Report the findings to management with recommendation
outlining the acceptances or rejection of the proposal.
Considering above criteria I also keep in mind that the requirements
are clearly understandable when the clarification of project request is
NAME :
E.No :
33
CAKEWALA.COM
enquired. The data of the IT Companies which are collected by me
during preliminary investigation, are: -
Reviewing organization Documents
Onsite observation and
Conducting interviews.
Feasibility Study
Not
everything
imaginable
is
feasible,
not
evanescent as it may appear to outsiders.
even
in
software,
Feasibility is the
determination of whether or not a project is worth doing. On the
contrary, software feasibility has seven solid dimensions as below: 1.
Technical feasibility.
2.
Operational feasibility.
3.
Economic feasibility.
The process followed in making this determination is called a
feasibility study. This type of study determines when a project can or
should be taken.
Once it has been determined that the project is
feasible, and then analyst can go ahead and prepare the project
specification,
which
finalizes
project
requirements.
Generally,
feasibility studies are undertaken within tight time constraints and
normally culminate in a written and oral feasibility report.
The
contents and recommendation of such a study will be used as a
sound basis for deciding whether to proceed, postpone or cancel the
project.
NAME :
E.No :
Thus,
since the
feasibility
34
study may lead to the
CAKEWALA.COM
commitment of large resources, it becomes necessary that it should
be conducted competently and that no fundamental errors of
judgment are made.
In other words we can say that a feasibility study is
conducted to select the best system that meets performance
requirement.
This
contains
and
identification
description,
an
evaluation of candidate system and the selection of best system for
the job.
The system required a statement of constraints; the
identification of specific system objective and a description of outputs
define performance.
a) Technical Feasibility
Technical feasibility is concerned with specifying equipment and
software that will successfully satisfy the user requirements.
My
project is fit in technical feasibility because it requires neither too
much heavy configuration system for its run nor in its development.
b) Economical Feasibility
Economic
analysis
is
the
most
frequently
used
technique
for
evaluation of the effectiveness of a proposed system. More commonly
known as Cost/Benefit analysis, the procedure is to determine the
benefits and saving that are expected from a proposed system and
compare them with costs.
If benefits outweigh costs, a decision is
taken to design and implement the system.
Other weight costs, a
decision is taken to design and implement the system. Otherwise,
further justification or alternative in the proposed system will have to
NAME :
E.No :
35
CAKEWALA.COM
be made if is to have a chance of being approved. This is an on going
effort that improves in accuracy at each phase of the system life
cycle.
c) Operational Feasibility
My project is also fit in Operational Feasibility Study. As I have
explained before this about Technical Feasibility and Economical
Feasibility, this Software is very easy and user-friendly.
I have used a very easy menu system and also used
some control buttons in the easy way by which one can choose the
options on his desire. Though this is fully protected with the security
by word (Password and user name),If both are matched only then
one can get access of this software . Various Reports, Forms and
Queries can be generated on the fingertips for the user. In nutshell
we can say that it has following operational features:
1.
It is User-Friendly.
2.
It is having less paperwork.
3.
Efficient tractability.
4.
Query can be generated.
Project Planning
The planning, design, and installation of a system termed a project
and is directed by a project leader who uses the available resources
to produce a new or better system for the organisations.
NAME :
E.No :
36
CAKEWALA.COM
Thus, project planning for any company has the following four
main steps:
1. Organising the resources available for the project.
2. Scheduling the events of the project.
3. Evaluating the progress.
4. Establishing standards for the project.
An effective manager is essential for successful project planning.
The techniques of project planning are not a substitute for good
management, but merely a tool to be used by managers to achieve
better results. Only effective management can complete the project
on time, within budget, and with satisfactory results.
Project Scheduling
In project management, a schedule consists of a list of a
project's terminal elements with intended start and finish dates.
Terminal elements are the lowest element in a schedule, which is
not further subdivided. Those items are often estimated in terms of
resource
requirements,
budget
and
duration,
linked
by
dependencies and scheduled.
The charting techniques are the scheduling tools of the project
planner. Even the simplest project should be charted so that
progress can be measured. The Gantt chart is effective in simple
projects, especially when the interrelationships among events are
NAME :
E.No :
37
CAKEWALA.COM
not too complex. Complicated scheduling usually requires a PERT
chart.
A schedule must be flexible because unexpected events may
occur that may affect the schedule of development of the system.
Seldom do systems projects meet the original schedule at each
milestone. This does not imply that schedules are made to be
broken, but a schedule cannot be so rigid that when the unexpected
occurs, subsequent events cannot be rescheduled.
A schedule has two primary functions, it is both a plan and a
device for measuring progress. The key steps in a schedule are
called milestones, or checkpoints. As the project progresses, the
date on which each milestone is completed is compared with the
date for which it was projected. In any project, frequent progress
reviews take place in which the status of events is reported and
evaluated.
When a project is behind schedule, corrective steps must be
taken. Establishing milestones is meaningless unless the project
manager can enforce adherence to schedule. Enforcement is a
normal managerial duty. If a project leader cannot enforce a
schedule, someone else should be leading the project. The following
are variety of options that are open to the project leader:
 Increase the budget.
 Increase manpower in the form of overtime or additional people.
NAME :
E.No :
38
CAKEWALA.COM
 Add equipment.
 Change priorities.
 Replace the individual responsible.
GANTT CHART OF THE ACTIVITY
A Gantt chart is a type of bar chart, developed by Henry Gantt, that
illustrates a project schedule. Gantt charts illustrate the start and
finish dates of the terminal elements and summary elements of a
project. Terminal elements and summary elements comprise the
work breakdown structure of the project. Some Gantt charts also
show the dependency (i.e., precedence network) relationships
between activities.
Gantt charts are useful tools for planning and scheduling projects.
 Gantt charts allow you to assess how long a project should
take.
 Gantt charts lay out the order in which tasks need to be
carried out.
 Gantt charts help manage the dependencies between tasks.
 Gantt charts determine the resources needed.
 Gantt charts are useful tools when a project is under way.
NAME :
E.No :
39
CAKEWALA.COM
 Gantt charts monitor progress. You can immediately see what
should have been achieved at a point in time.
 Gantt charts allow you to see how remedial action may bring
the project back on course.
NAME :
E.No :
40
CAKEWALA.COM
Apr
1st
&2
TASKS
Problem
Analysis
Analysis of
Existing
Systems
like the
proposed
on
Selection
& Learning
the S/W
To be used
Understand
ing
Database
NAME :
E.No :
Apr3
rd &
4th
Week
nd
May
1st
&
2n
d
Wee
k
Jun
3rd
Jul
y
1st
Wee
k
Wee
k
Day
1-12
12
Days
Day
13-22
10
Days
Day
s
2332
10
Day
s
Day
s
3347
15
Day
s
41
Jul
y
2n
d&
Aug
t
3rd
Wee
k
Aug
4rd
&
Sep
t
1st
Wee
k
Sep
t
1st
&
Sep
t
3rd
Wee
k
Sep
t
3rd
&
4th
Wee
k
Sep
t
4th
Wee
k
CAKEWALA.COM
Day
s
4862
Coding
15
day
s
Day
s
6372
10
day
s
Page
Designing
Day
s
7382
10
Day
s
Testing
Day
s8392
10
Day
s
Evaluation
Day
s
9398
6
Day
s
Implemeta
tion
NAME :
E.No :
42
CAKEWALA.COM
NAME :
E.No :
43
CAKEWALA.COM
The list of tasks and events is networked in PERT chart in above
figure. The arrow length is not significant, but the sequence and
interconnections must give a true picture of the precedence of
activities to be completed. The numbers on the activity lines are the
time (in week) required between events.
NAME :
E.No :
44
CAKEWALA.COM
Duration (in weeks) 2 + 3 + 1 + 2 + 2+ 2 + 2 + 1+1 = 16
weeks
The critical path is the longest path through the network.
No. task on the critical path can be held up without delaying the
start of the next tasks and, ultimately, the completion of the
project. So the critical path determines the project completion date.
SOFTWARE REQUIREMENTS SPECIFICATION
SRS is software requirement specification it contains the s/w
requirement details like what is front-end technology, backend
technology, os and hardware architecture of the project.
SRS
stands
for
Software
Requirement
Specification.
It
establishes the basis for agreement between customers and
contractors or suppliers on what the software product is expected to
do, as well as what it is not expected to do.
Some of the features of SRS are 
 It sets permits a rigorous assessment of requirements before
design can begin.
 It sets the basis for software design, test, deployment, training
etc. It also sets pre-requisite for a good design though it is not
enough.
NAME :
E.No :
45
CAKEWALA.COM
 It sets basis for software enhancement and maintenance.
 It sets Basis for Project plans like Scheduling and Estimation.
Thus, SRS should be consistent, correct, unambiguous &
complete, document. The developer of the system can prepare SRS
after detailed communication with the customer. An SRS clearly
defines the following:
External
Interfaces
of
the
system:
They
identify
the
information which is to flow from and to to the system.
 Functional and non-functional requirements of the system.
They stand for the finding of run time requirements.
 Design constraints:
The SRS outline is :
1. Introduction
1.1 Purpose
1.2 Scope
1.3 Definitions, acronyms, and abbreviations
1.4 References
1.5 Overview
2. Overall description
2.1 Product perspective
2.2 Product functions
2.3 User characteristics
2.4 Constraints
NAME :
E.No :
46
CAKEWALA.COM
2.5 Assumptions and dependencies
3. Specific requirements
3.1 External Interfaces
3.2 Functional requirements
3.3 Performance requirements
3.4 Logical Database requirements
3.5 Design Constraints
3.6 Software system attributes
3.7 Organising the specific requirements
3.8 Additional Comments
4. Supporting information
2.1 Table of contents and index
2.2 Appendixes
The requirements gathering process is intensified and
focused specifically on software.
To understand the nature of the
program(s) to be built, the software engineer (analyst) must
understand the information domain for the software, as well as
required
function,
behavior,
performance,
and
interface.
Requirements for both the system and the software are documented
and reviewed with the customer.
DESIGN
Software design is actually a multi step process that focuses on four
distinct attributes of a program data structure, software architecture,
NAME :
E.No :
47
CAKEWALA.COM
interface representations, and procedural (algorithmic) detail.
The
design process translates requirements into a representation of the
software that can be accessed for quality before coding begins. Like
requirements, the design is documented and becomes part of the
software configuration.
Code Generation: The design must be translated into a machine-readable form. The
code generation step performs this task. If design is performed in a
detailed
manner,
code
generation
can
be
accomplished
mechanistically.
Testing: Once code has been generated, program testing begins. The testing
process focuses on the logical internals of the software, ensuring that
all statements have been tested and on the functional externals, that
is, conducting tests to uncover errors and ensure that defined input
will product actual results that agree with required results.
Waterfall Model
It is the simplest, oldest and most widely used process model. In
this model, each phase of the life cycle is completed before the start
of a new phase. It is actually the first engineering approach of
software development.
NAME :
E.No :
48
CAKEWALA.COM
The waterfall model provides a systematic and sequential
approach to software development and is better than the build and
fix approach. But, in this model, complete requirements should be
available at the time of commencement of the project, but in actual
practice, the requirements keep on originating during different
phases.
The
water
fall
model
can
accommodate
the
new
requirements only in maintenance phase. Moreover, it does not
incorporate any kind of risk assessment. In waterfall model, a
working model of software is not available. Thus, there is no
methods to judge the problems of software in between different
phases.
NAME :
E.No :
49
CAKEWALA.COM
A slight modification of the waterfall model is a model with
feedback. Once software is developed and is operational, then the
feedback to various phases may be given.
SOFTWARE ENGINEERING PARADIGM
Linear Sequential Model has been used in carrying out this project
work. The Linear Sequential Model is the oldest and the most widely
used paradigm for Software Engineering. Linear Sequential Model is
called sometimes the Classic Life Cycle or the Waterfall Model.
The Linear Sequential Model suggests a systematic, Sequential
approach to software development that begins at the system level
and progresses through Analysis, Design, Coding, Testing and
Support.
NAME :
E.No :
50
CAKEWALA.COM
Linear Sequential Model contains the following activities:
System / Information Engineering and Modelling: Because software is always part of a larger system (or business),
work begins by establishing requirements for all system elements
and then allocating some subset of these requirements to software.
This system view is essential when software must interact with other
elements
such
as
hardware,
people
and
database.
System
engineering and analysis encompass requirements gathering at the
system level with a small amount of top-level design and analysis.
Information engineering encompasses requirements gathering at the
strategic business level and at the business area level.
In this project, very first I get to know how the processing is
done in the social network system. When I had accepted this project
the purpose is to develop software that should assists to generate
the report. The software will serve them as an automated system in
performing all the operation of the CAKEWALA.COM.
Before starting this project or system there are some informations
needed, they are:
1.
First one is that understand about the working mechanism of
The social site.
2.
Find out that which type of functionality should be adopted by
the proposed project.
3.
Which type hardware and software platform will be most
suitable for the proposed project?
NAME :
E.No :
51
CAKEWALA.COM
As the proposal system was being maintained onto the form of
paper based, literature relating to this system was available in the
forms of various reports. Various documents were available to
collect data about the shortcoming of the existing system. The
system provides information that how the work is being done and
how data are maintained which are useful for the user, what
changes need to be made.
 Requirement specification
Problem clarifications in this case are much more difficult.
In
either case, before any further steps can be taken, the project
requests must be clearly states.
This phase (initial study) involves estimating whether or not a
development project is worthwhile.
Problems with the current
automated or manual system are identified, as well as the benefits
and costs of an alternative system. If the benefits seem to outright
the costs (especially when compared with competing projects), a
green signal may be given to continue the project, and detailed
plans and schedules are drafted for making the system a reality.
The proposed solution to the users problem may involve something
between dramatic change (completely new system) and slight
change to the present system. If the present system is manual and
a computer system is proposed, the development project will
probably be very large.
NAME :
E.No :
52
CAKEWALA.COM
DATA FLOW DIAGRAM
The Data flow diagram can be explained as the separate levels indicating the
individual complexity in the each level of the system and gives a detailed explanation
in the further levels that are following them.
LEVEL 0
Initially in the first level of the Data flow the level 0 explains the basic outline
of the system. The end-user sends the packets to the system to determine the source
and destination address. The diagram marked as the 0 represents the complete Packet
watching system which simply represents the basic operation that is being performed
by it in the initial level.
LEVEL 1
NAME :
E.No :
53
CAKEWALA.COM
The level 1 of the Data flow diagram given explains in detail about the Packet
watching system which was marked as 0 in the previous level. In this level the enduser who passes the request for the system enters into the first process, the capturing
process and then to the processing module. After processing the packets it was send
for storing.
LEVEL 2
The level 2 provides the clear explanation about the whole system. In this
level first we have to select the packet and perform test over that selected packets.
Then identify the end address of the packet and send that packet for processing. After
processing the packet it was send to the identity content. Then send the processed
packet for storing and display the source and destination addresses.
DATA FLOW DIAGRAMS
Context Level DFD
USER
Enters or update users data
CAKEWALA.
COM
NAME :
E.No :
54
Administrate the
entire process
Administrator
Generates the entire
processes reports
REPORT
CAKEWALA.COM
First level (User Module)
Pwd, Username
Updated Successfully
If post the problem
2.0
User
1.0
Login
process
Cake Details
3.0
Online Put
Order
4.0
View Report
NAME :
E.No :
55
Logout
CAKEWALA.COM
First level (Admin Module)
Pwd, Username
Updated Successfully
If post the problem
2.0
Admin
1.0
Login
process
Cake Details
3.0
Booked Cake
Details
4.0
View Report
NAME :
E.No :
56
Logout
CAKEWALA.COM
E-R Diagram
name
Phone
cid
Address
Searc
h
User
Contact
Nam
e
Categrory
Image
Discription
Worksund
er
Has
Workfor
Manag
e
User
Details
No. of
cake
UNam
ee
Report
Has
Admin
Product
Booking Details
Cost
Payment
List
NAME :
E.No :
Dat
e
Cake
57
Total
Payment
Cake
ID
CAKEWALA.COM
USE CASE FOR Admin
NAME :
E.No :
58
CAKEWALA.COM
Fig 4.2: USE CASE FOR User
Activity Daigram
NAME :
E.No :
Admin
59
CAKEWALA.COM
Cake Details
Cake Wala.com
Payment Details
User
NAME :
E.No :
Booked Cake
Information
60
CAKEWALA.COM
Sequence Diagram
Admin
User
Cake
Registration
Cake Details
User List
Change Password
Upload Cake
View Booked Cake
Order List
Project Modules
NAME :
E.No :
61
CAKEWALA.COM
Different Modules In Computerized System
Module 1: Password Module
In this module, Member enters a password and the
software checks its validity. If the password is valid then
he is allowed to enter, otherwise Invalid User/Password
message is displayed. Different data access rights are
assigned to different users. A new member can also be
registered in this module.
Module 2: New User Registration Module
In this module new user can submit his personal details
regarding the users email id, password, contact no, date
of birth etc.
Module 3 Add Cake Module
In this module admin can add the new cake details which
is view by user and admin can also insert the details about
the cake.
Module 4: User list Module
In this module, Admin can view the user list. It is the
details of registered user like name ,email id, contact no
and country etc.
NAME :
E.No :
62
CAKEWALA.COM
Module 5: Cake list Module
In this module, admin can see the cake which one is book
by user. Admin can also view the of booking details and
how much cake was booked.
Module 6: Change Password Module
In this module, user can change password. But user has to
login to first of all login into their account.
NAME :
E.No :
63
CAKEWALA.COM
CHEPTER-5
CODING
NAME :
E.No :
64
CAKEWALA.COM
ABOUTUS.PHP
<!DOCTYPE html>
<html>
<head>
<title>Cake Delights</title>
<meta charset="UTF-8">
<link rel="stylesheet" type="text/css" href="css/style.css">
</head>
<body>
<div id="header">
<div>
<div>
<div id="logo"> <a href="#"><img src="images/logo.gif" alt=""></a>
</div>
<div>
<div> <a href="Help.php">Help</a> <a href="signin.php"
class="last">Sign in</a> </div>
<form action="#">
<input type="text" id="search" maxlength="30">
<input type="submit" value="" id="searchbtn">
</form>
</div>
</div>
<?php
NAME :
E.No :
65
CAKEWALA.COM
include("header.php");
?>
<div id="section">
<ul>
<li><a href="#">cheese cakes</a></li>
<li><a href="#">sponge cakes</a></li>
<li><a href="#">butter cakes</a></li>
<li class="selected"><a href="#">layer cakes</a></li>
<li><a href="#">sheet cakes</a></li>
<li><a href="#">cupcakes</a></li>
<li><a href="#">fondant cakes</a></li>
<li><a href="#">swiss roll</a></li>
<li><a href="#">other desserts</a></li>
</ul>
<a href="#"><img src="images/wedding-cupcakes-large.jpg" alt=""></a>
</div>
</div>
</div>
<div id="content">
<div class="home">
<div class="aside">
<h1>Welcome to our site</h1>
<p>Pastry is the name given to various kinds of baked goods made from
ingredients such as flour, butter, shortening, baking powder or eggs. Small cakes,
tarts and other sweet baked goods are called "pastries".</p>
<p>Pastry may also refer to the dough from which such baked goods are
made. Pastry dough is rolled out thinly and used as a base for baked goods.
Common pastry dishes include pies, tarts and quiches.
NAME :
E.No :
66
CAKEWALA.COM
<p>Pastry is distinguished from bread by having a higher fat content, which
contributes to a flaky or crumbly texture. A good pastry is light and airy and fatty,
but firm enough to support the weight of the filling. When making a shortcrust
pastry, care must be taken to blend the fat and flour thoroughly before adding.
<a href="#" class="readmore">read more</a></p>
</div>
<div class="section">
<div>
<h2>The food story</h2>
<p>
Cake is a form of bread or bread-like food. In its modern forms, it is typically a
sweet baked dessert. In its oldest forms, cakes were normally fried breads or
cheesecakes, and normally had a disk shape. Determining whether a given food
should be classified as bread, cake, or pastry can be difficult. </div>
<ul>
<li class="first"> <a href="#"><img src="images/cake.jpg" alt=""></a>
</li>
<li> <a href="#"><img src="images/burgercake.jpg" alt=""></a> </li>
<li> <a href="#"><img src="images/cupcake.jpg" alt=""></a> </li>
</ul>
</div>
</div>
</div>
<div id="footer">
<div class="home">
<div>
<div class="aside">
<div class="signup">
NAME :
E.No :
67
CAKEWALA.COM
<div> <b>Too <span>BUSY</span> to shop?</b> <a
href="signin.html">Sign up for free</a>
<p>and we'll deliver it on your doorstep</p>
</div>
</div>
<div class="connect"> <span>Follow Us</span>
<ul>
<li><a href="#" class="facebook">Facebook</a></li>
<li><a href="#" class="twitter">Twitter</a></li>
<li><a href="#" class="subscribe">Subscribe</a></li>
<li><a href="#" class="flicker">Flicker</a></li>
</ul>
</div>
</div>
<div class="section">
<div>
<div>
<h3><a href="#">Daily Cake Surprise</a></h3>
<p>
Cake is a form of bread or bread-like food. In its modern forms, it is
typically a sweet baked dessert. In its oldest forms, cakes were normally fried
breads or cheesecakes, and normally had a disk shape. Determining whether a
given food should be classified as bread, cake, or pastry can be difficult.
</div>
</div>
</div>
</div>
</div>
NAME :
E.No :
68
CAKEWALA.COM
<div id="navigation">
<div>
<p>Copyright © 2012 <a href="#">Domain Name</a> All rights
reserved | Website By CakeWala.com</p>
</div>
</div>
</div>
</body>
</html>
SIGNIN.PHP
<!DOCTYPE html>
<html>
<head>
<title>Cake Delights | SignIn</title>
<meta charset="UTF-8">
<link rel="stylesheet" type="text/css" href="css/style.css">
</head>
<body>
<div id="header">
<div>
<div>
<div id="logo"> <a href="#"><img src="images/logo.gif"
alt=""></a> </div>
<div>
NAME :
E.No :
69
CAKEWALA.COM
<div> <a href="Help.php">Help</a> <a href="signin.php"
class="last">Sign in</a> </div>
<form action="#">
<input type="text" id="search" maxlength="30">
<input type="submit" value="" id="searchbtn">
</form>
</div>
</div>
<?php
include("header.php");
?>
<div class="section"> <a href="#"><img src="images/weddingcupcakes-small.jpg" alt=""></a> </div>
</div>
</div>
<div id="content">
<div>
<div id="account">
<div>
<form id="frm" action="Login1.php" method="post">
<fieldset style="height: auto;width: 500px; padding: 20px;">
<legend>Login</legend>
<table align="center" cellpadding="5" cellspacing="5">
<tr>
<table>
<tr>
<td class="text">
NAME :
E.No :
70
CAKEWALA.COM
<input type="radio" name="rdologin"
id="rdodoctor" value="admin"/>  Admin
<input type="radio" name="rdologin"
id="rdopatient" value="user"/>  User
</td>
</tr>
</table>
</tr>
<tr>
<td class="text">User Name:</td>
<td class="text"><input type="text" id="txtemailid"
name="txtemailid" style="font-size: 15px; width: 180px; height: 30px;"></td>
</tr>
<tr>
<td class="text">Password:</td>
<td class="text"><input type="password"
id="txtpass" name="txtpass" style="font-size: 15px; font-weight: bold; height:
30px; width: 180px;"></td>
</tr>
<tr>
<td colspan="2" align="right">
<input type="submit" value="Login"
name="btnlogin" id="btnlogin" class="button">
</td>
</tr>
</table>
NAME :
E.No :
71
CAKEWALA.COM
</fieldset>
</form>
</div>
</div>
</div>
</div>
<div id="footer">
<div class="section">
<div>
<div class="aside">
<div>
<div> <b>Too <span>BUSY</span> to shop?</b> <a
href="signin.html">Sign up for free</a>
<p>and we'll deliver it on your doorstep</p>
</div>
</div>
</div>
<div class="connect"> <span>Follow Us</span>
<ul>
<li><a href="#" class="facebook">Facebook</a></li>
<li><a href="#" class="twitter">Twitter</a></li>
<li><a href="#" class="subscribe">Subscribe</a></li>
<li><a href="#" class="flicker">Flicker</a></li>
</ul>
</div>
</div>
</div>
NAME :
E.No :
72
CAKEWALA.COM
<div id="navigation">
<div>
<p>Copyright © 2012 <a href="#">Domain Name</a> All
rights reserved | Website By CakeWala.com</p>
</div>
</div>
</div>
</body>
</html>
REGISTRATION.PHP
<?php
error_reporting(0);
ob_start();
session_start();
?>
<script type="text/javascript">
//function for balnk field
function validate(){
var img = document.getElementById('fileimage');
if(img.value.trim() == ""){
alert('Please select image.!!');
img.focus();
return false;
}
}
NAME :
E.No :
73
CAKEWALA.COM
</script>
<script type="text/javascript">
function validate(){
var name = document.getElementById("txt_name").value;
if(name == ""){
alert('Name field cannot be blank.');
return false;
}
var dob = document.getElementById("txt_dob").value;
if(dob == ""){
alert('Please Enter Your Date Of Birth.');
return false;
}
var gender = document.getElementById("txt_gndr").value;
if(gender=="na")
{
alert('Please select a gender');
return false;
}
var phone = document.getElementById("txt_phone").value;
if(phone == ""){
alert('Please Enter Your Contact Number.');
return false;
}
var Contact_as = document.getElementById("txt_cntas").value;
if(Contact_as == ""){
NAME :
E.No :
74
CAKEWALA.COM
alert('Please Select Contact As.');
return false;
}
var Email = document.getElementById("txt_eml").value;
if(Email == ""){
alert('Please Enter Your Email.');
return false;
}
var a = document.getElementById("txt_pass").value;
if(a == ""){
alert('Password field cannot be blank.');
return false;
}
var b = document.getElementById("txtcpass").value;
if(b == ""){
alert('Confirm Password field cannot be blank.');
return false;
}
if(a != b){
alert('Confirm password does not matched.');
return false;
}
}
//check for Integer
function checkInteger(i)
{
if(i.value.length>0)
NAME :
E.No :
75
CAKEWALA.COM
{
i.value = i.value.replace(/[^\d]+/g, '');
}
</script>
<script type="text/javascript" src="js/scw.js"></script>
<script type="text/javascript">
function contact(i)
{
if(i.value.length>0)
{
i.value = i.value.replace(/[^\d]+/g, '');
}
}
function CheckForAlphabets(elem)
{
var alphaExp = /^[a-z A-Z]+$/;
if(elem.value.match(alphaExp)){
return true;
}else{
alert("give alphabatic name ");
return false;
}
}
NAME :
E.No :
76
CAKEWALA.COM
function mob()
{
var rl=document.getElementById("txt_phone").value;
if(rl.toString().length<10)
{
alert("Contact No. should be of ten digits");
return false;
}
}
</script>
<script type="text/javascript">
function valid() {
//alert('calling');
var reg = /^([A-Za-z0-9_\-\.])+\@([A-Za-z0-9_\-\.])+\.([A-Za-z]
{2,4})$/;
// var address =
document.forms[form_id].elements[txtemail_id].value;
var address = document.getElementById('txt_eml').value;
if(reg.test(address) == false) {
alert('Invalid Email Address');
return false;
}
}
</script>
<script type="text/javascript">
function pin()
NAME :
E.No :
77
CAKEWALA.COM
{
var rl=document.getElementById("txtpwd").value;
if(rl.toString().length<6)
{
alert("Pin Number should be of Six digits");
return false;
}
</script>
<!DOCTYPE html>
<html>
<head>
<title>Cake Delights | SignUp</title>
<meta charset="UTF-8">
<link rel="stylesheet" type="text/css" href="css/style.css">
</head>
<body>
<div id="header">
<div>
<div>
<div id="logo"> <a href="#"><img src="images/logo.gif" alt=""></a>
</div>
<div>
<div> <a href="Help.php">Help</a> <a href="signin.php"
class="last">Sign in</a> </div>
<form action="#">
NAME :
E.No :
78
CAKEWALA.COM
<input type="text" id="search" maxlength="30">
<input type="submit" value="" id="searchbtn">
</form>
</div>
</div>
<?php
include("header.php");
?>
<div class="section"> <a href="#"><img src="images/wedding-cupcakessmall.jpg" alt=""></a> </div>
</div>
</div>
<div id="content">
<div>
<div id="account">
<div>
<form id="frm" action="Registration1.php" method="post">
<table align="center" cellpadding="5" cellspacing="5">
<tr>
<td class="text1" colspan="2">Registration</td>
</tr>
<tr>
<td colspan="2" valign="middle" align="center">
<?php
if ($_SESSION['MSG'] != '') {
echo '<div class="msgbox">' .
$_SESSION['MSG'] . '</div>';
$_SESSION['MSG'] = "";
NAME :
E.No :
79
CAKEWALA.COM
}
?>
</td>
</tr>
<tr>
<td class="text">Name:</td>
<td class="text"><input type="text"
id="txt_name" name="txt_name" style="width: 250px; height: 25px;"></td>
</tr>
<tr>
<td class="text">DOB:</td>
<td class="text"><input type="text" id="txt_dob"
name="txt_dob"style="width: 250px; height: 25px;" readonly
onclick="scwShow(this,event)"></td>
</tr>
<tr>
<td class="text">Gender:</td>
<td class="text">
<select
id="txt_gndr" name="txt_gndr"
style="width: 250px; height: 25px;">
<option value="select"> - - - -Select - - - </option>
<option value="Male">Male</option>
<option value="Female">Female</option>
</select>
</td>
</tr>
<tr>
NAME :
E.No :
80
CAKEWALA.COM
<td class="text">Phone</td>
<td><input type="text" id="txt_phone"
name="txt_phone" style="width: 250px; height: 25px;"
onkeyup="contact(this,value)" onblur="mob()"></td>
</tr>
<tr>
<td class="text">Location:</td>
<td class="text"><input type="text"
id="txt_adrs" name="txt_adrs" style="width: 250px; height: 25px;"></td>
</tr>
<tr>
<td class="text">City:</td>
<td class="text"><input type="text"
id="txt_cntas" name="txt_cntas" style="width: 250px; height: 25px;"></td>
</tr>
<tr>
<td class="text">Email:</td>
<td class="text"><input type="text" id="txt_eml"
name="txt_eml" style="width: 250px; height: 25px;" onblur="valid()"></td>
</tr>
<tr>
<td class="text">Password:</td>
<td class="text"><input type="password"
id="txt_pass" name="txt_pass" style="width: 250px; height: 25px;"></td>
</tr>
<tr>
<td class="text">Confirm Password:</td>
NAME :
E.No :
81
CAKEWALA.COM
<td class="text"><input type="password"
id="txtcpass" name="txtcpass" style="width: 250px; height: 25px;"></td>
</tr>
<tr>
<td align="center" colspan="2">
<input type="submit" class="button"
value="Submit" onclick="return validate();">
</td>
</tr>
</table>
</form>
</div>
</div>
</div>
</div>
<div id="footer">
<div class="section">
<div>
<div class="aside">
<div>
<div> <b>Too <span>BUSY</span> to shop?</b> <a
href="signin.html">Sign up for free</a>
<p>and we'll deliver it on your doorstep</p>
</div>
</div>
</div>
<div class="connect"> <span>Follow Us</span>
NAME :
E.No :
82
CAKEWALA.COM
<ul>
<li><a href="#" class="facebook">Facebook</a></li>
<li><a href="#" class="twitter">Twitter</a></li>
<li><a href="#" class="subscribe">Subscribe</a></li>
<li><a href="#" class="flicker">Flicker</a></li>
</ul>
</div>
</div>
</div>
<div id="navigation">
<div>
<p>Copyright © 2012 <a href="#">Domain Name</a> All rights
reserved | Website By CakeWala.com</p></div>
</div>
</div>
</body>
</html>
REGISTRATION1.PHP
<?php
error_reporting(0);
ob_start();
session_start();
header("Pragma: no-cache");
header("Cache: no-cahce");
NAME :
E.No :
83
CAKEWALA.COM
include_once "connection/dbconfig.php"; //Connection
$name = $_POST['txt_name'];
$dob = $_POST['txt_dob'];
$gender = $_POST['txt_gndr'];
$phone = $_POST['txt_phone'];
$address = $_POST['txt_adrs'];
$contact_as = $_POST['txt_cntas'];
$email = $_POST['txt_eml'];
$password = $_POST['txt_pass'];
$query = "insert into
regestration(name,dob,gender,phone,address,contact_as,email,password)
values('$name','$dob','$gender','$phone','$address','$contact_as','$email','$pass
word')";
$r = mysql_query($query);
$num = (int) $r;
if ($num > 0) {
$_SESSION['MSG'] = "Your information has been successfully submited.!!";
} else {
$_SESSION['MSG'] = "Your information has not been submited.!!";
}
header("location:Registration.php");
?>
NAME :
E.No :
84
CAKEWALA.COM
LOGIN.PHP
<?php
include_once "connection/dbconfig.php";
?>
<html lang="en">
<head>
<title>Tour And Travel</title>
<link rel="stylesheet" href="styles.css" type="text/css" media="screen" />
<link rel="stylesheet" type="text/css" href="print.css" media="print" />
<script type="text/javascript" src="js/equalcolumns.js"></script>
</head>
<body>
<header>
<h1>Tour And Travel</h1>
</header>
<?php
include("header.php");
?>
<section id="content">
<ul class="column">
<div>
<div class="heading" align="justify">
<h2></h2>
NAME :
E.No :
85
CAKEWALA.COM
<form id="frm" action="login1.php" method="post">
<fieldset style="height: auto;width: 300px;padding: 10px;">
<legend>Login</legend>
<table align="center" cellpadding="5" cellspacing="5">
<tr>
<td colspan="2" valign="middle" align="center">
<?php
if ($_SESSION['MSG'] != '') {
echo '<div class="msgbox">' .
$_SESSION['MSG'] . '</div>';
$_SESSION['MSG'] = "";
}
?>
</td>
</tr>
<tr>
<td class="login-text">
Login As
</td>
<td class="login-text">
<input type="radio" name="rdologin" id="rdodoctor"
value="admin"/>  Admin
<input type="radio" name="rdologin" id="rdopatient"
value="user"/>  User
</td>
</tr>
<tr>
<td class="login-text">User Name:</td>
NAME :
E.No :
86
CAKEWALA.COM
<td><input type="text" id="txtemailid"
name="txtemailid" style="font-size: 15px; width: 180px; height: 30px;"></td>
</tr>
<tr>
<td class="login-text">Password:</td>
<td><input type="password" id="txtpass"
name="txtpass" style="font-size: 15px; font-weight: bold; height: 30px; width:
180px;"></td>
</tr>
<tr>
<td colspan="2" align="right">
<input type="submit" value="Login"
name="btnlogin" id="btnlogin" class="button">
</td>
</tr>
</table>
</fieldset>
</form>
</div>
</div>
</ul>
</section>
<footer>
<?php
include("footer.php");
NAME :
E.No :
87
CAKEWALA.COM
?>
</footer>
</body>
</html>
LOGIN1.PHP
<?php
ob_start(); //start obeject
session_start(); //start sessiong
include('connection/dbconfig.php');
//click on submit button
if (isset($_POST['btnlogin'])) {
//variable and validation
$error_msg = '';
$row_effected = 0;
$status = false;
$loginas = $_POST['rdologin']; //email id
$email = $_POST['txtemailid']; //email id
$password = $_POST['txtpass']; //password
NAME :
E.No :
88
CAKEWALA.COM
if ($loginas == "admin") {
//login for admin
$query = "select id,name from admin_login where username='$email' and
password = '$password'";
$result = mysql_query($query);
while ($row = mysql_fetch_array($result)) {
$name = $row ['id'];
$status = true;
$_SESSION['USERID'] = $name; //patienthome
$_SESSION['NAME'] = $row ['name'];
}
if ($status == true) {
header("location:Welcome.php");
} else {
$_SESSION['MSG'] = "Email id and password are wrong.!!";
header("location:Login.php");
}
} else if ($loginas == "user") {
//login for patient
$query = "select name from regestration where email='$email' and
password = '$password'";
$result = mysql_query($query);
while ($row = mysql_fetch_array($result)) {
$name = $row ['name'];
NAME :
E.No :
89
CAKEWALA.COM
$status = true;
// update login table
//
$query2 = "update regestration set status='4' where id='$name'";
//
mysql_query($query2);
//
$_SESSION['USERID'] = $name;
$_SESSION['NAME'] = $row ['name'];
$_SESSION['EMAIL'] = $email;
}
if ($status == true) {
header("location:Welcome1.php");
} else {
$_SESSION['MSG'] = "Email id and password are wrong.!!";
header("location:Login.php");
}
} else {
$_SESSION['MSG'] = "Email id and password are wrong.!!"; //set message
in sessiong
header("location:Login.php");
}
}
?>
NAME :
E.No :
90
CAKEWALA.COM
CHEPTER-7
TESTING
NAME :
E.No :
91
CAKEWALA.COM
TESTING
The testing of software means measuring or accessing the software
to determine the quality. Testing is a measuring instrument for
software quality with the unit of measurement being the number of
defects found during testing.
Testing activities also help to achieve software quality.
Testing is essential in the development of any system software.
Testing is essential in the development of any software system.
Testing is in order to access what the system actually does and how
well expected to spend approximately40% of development cost and
time in testing in order to achieve reasonable quality levels.
Levels of Testing
 Unit Testing
 Component Integration Testing
 System Testing
 Acceptance Testing
Unit Testing
Unit testing comprises the set of tests performed usually by
the programmers prior to the integration of the unit in to a large
Program. This is the lowest level of testing and is done by the
programmer (Who develops it) who can test it in great detail. The
NAME :
E.No :
92
CAKEWALA.COM
function is done in isolation. This is where the most detailed
investigation of internal working of the individual unit is carried out.
Component Integration Testing
When two or more tested components are combined into a
larger structure, the testing process should look for errors in two
ways: In the interface between the components
 The functions, which can be performed by the new
group
System Testing
After in integration testing is completed, the entire system is
tested as whole. The functional specifications or requirements
specification are used to derive the test case. At this level the system
testing looks for errors in the end-to-end functional quality. Attributes
such as performance, reliability,
Volume, stress tolerance, usability, maintainability, security etc.
Independent testers can carry out this testing.
Acceptance Testing
After system testing was complete, the system was handed
over
to
the
training
section.
Acceptance
testing
mark
the
transaction from ownership by the develop to ownership by the
NAME :
E.No :
93
CAKEWALA.COM
users. The acceptance test is different in nature to the development
testing in three ways.
Firstly, it is a responsibility of the accepting section rather
than development department (computer Centre).
Secondly, the purpose of the acceptance testing was to find
out whether the software is working rather than trying to find
errors.
Thirdly, it also includes the testing of users departments
working practices to ensure that the computer software will fit into
clerical & administrative procedures of the concerned section well.
Acceptance testing gave confidence to the user that the
system is ready for operational use.
Security concern of computer where software is to be
installed:
 Use of name-brand hardware with extensive fault-tolerance.
Fault-tolerance features can keep the computer from going
down even if a single piece of hardware inside of it fails.
 Hardware and software maintenance.
 Facility security, network security, and firewall services.
 Guaranteed service level agreement. Remember to insist on
the highest level of service available  99% availability might
seem great, but it means that our computer might be down
for than three days a year.
NAME :
E.No :
94
CAKEWALA.COM
 Battery and generator power.
 Backup devices like tap drive/zip drive or cd writer should
install. User should keep backup of database every day so
that it could save data during crisis time
Protecting the database
To secure the database, the following steps are taken:
The server logged off and physically locked up when it has
not use.
 The database must be not shared on network. If it is shared
then change the properties.
 The database on oracle provides fine-grained permission
mechanism that allows protecting particular database tables
and columns. The table and column must be the restricted to
administrator of database so that it is not update by the any
one.
 Using NTFS (NT file system) security to further access to the
database, it is used by using ntfs permission dialog to further
protect sensitive information.
NAME :
E.No :
95
CAKEWALA.COM
TESTING OBJECTIVES
No bugs blocks the execution of tasks
System states are visible
All factors affecting the output are visible
Functional simplicity
Distinct output is generated for each input
Debugging
Debugging occurs as a consequence of successful testing. Debugging
refers to the process of identifying the cause for defective behavior
of a system and addressive that problem. In less complex termsfixing a bug. When a test case uncovers an
Error, debugging is the process that results in the removal of the
error. The
debugging process begins with the execution of a test
case. The debugging process attempts to match symptoms with
cause, thereby leading to error correction. The following
are two
alternative outcomes of the debugging:
the cause will be found and necessary action such as correction
or removal will be taken.
The cause will not be found.
Characteristics of bugs
NAME :
E.No :
96
CAKEWALA.COM
1. The symptoms ant the cause may be geographically remote.
That is, the symptoms may appear in one part of a program.
While the cause may actually be located at a site that is far
removed. Highly coupled program structures exacerbate this
situation.
2. The symptoms may disappear (temporarly) when another
error is connected.
3. the Symptom may actually be caused by non error(e.g,
round-Off inaccuracies).
4. The symptoms may be caused by human error that is not
easily traced.
5. The symptom may be a result of timing problems, rather
than processing problems.
6. It
may
be
conditions(e.g,
difficult
a
to
accurately
real-time
application
reproduce
in
which
input
input
ordering is indeterminate).
7. The symptom may be intermittent. This is particularly
common in embedded systems that couple hardware and
software inextricably.
8. The symptoms may be due to causes that are distributed
across a number of tasks running on different processors.
NAME :
E.No :
97
CAKEWALA.COM
Validation Checks
There are six types of validations:
1) Intrinsic control: In this control text Box, label, drop down list
are use for simple input and output.
2) Rich control: Rich control have a two control `Add Repeater`
and Calendar Control.
3) Transfer Control: This control used to redirect pages to next
page like, Buttton, Hyperlink, linkButtons.
4) Validation control: There are six control:
Required Filled Validator:- this control are using for check
the requirement is fulfill or not.
Compare Validator:- This control are used for comparing
two
values
with
help
of
controlToValidate
CompareToValidate.
The Type are taken in compare Validator are following:a) String
b) Integer
c) Double
d) Date
e) Currency
Operator is used to specify a type are following:a) Equal
NAME :
E.No :
98
and
CAKEWALA.COM
b) No Equal
c) Greater Than
d) Greater than equal
e) Less than
f) Less than equal
RangeValidator:- the range validator is used to check if the
value of control lies within a range. The Range can be specified
with the help of two control
a) Min
b) Max
RegularExpressionValidator:- a pre specified format can
excepted only if they form a part of a particular pattern, this
usually occurs in Phone no., credit card number or E-mail
Address from user. The phone no. should be numeric. This is
made possible by regular Expression Validator Control. The
pattern
to
which
the
value
must
specified
in
validationExpression property. The value can be checked agains
mini Pattern or expressions
by separating each expressions
with a pipe Sign and enclosed expression in round bracket.
CustomValidator:- custom validator control can be used to
provide validator in case all validator control are not enough to
validate the input.
NAME :
E.No :
99
CAKEWALA.COM
Validation Summary:- validation error message on the Web
page can be display in two way. The errors can either be
displayed as when the user line the control or summary of error
can be display together. This control can be use to produce
such as summery. The error can be view in the form of list
bullet by setting display made.
CODE EFFICIENCY
MEASURES OF CODE EFFICIENCY
The code is designed with the following characteristics in mind.
1. Uniqueness:
The code structure must ensure that only one
value of the code with a single meaning is correctly applied to
a give entity or attribute.
2. Expandability: The code structure are designed for in a way
that it must allow for growth of its set of entities or
attributes, thus providing sufficient space for the entry of new
items with in each classification.
3. Conciseness: The code requires the fewest possible number
of positions to include and define each item.
4. Uniform size and format:
Uniform size and format is highly
desirable in mechanized data processing system. The addition
of prefixes and suffixes to the root code should not be allowed
especially
as
it
is
incompatible
requirement.
NAME :
E.No :
100
with
the
uniqueness
CAKEWALA.COM
5. Simplicity: The codes are designed in a simple manner to
understand and simple to apply.
6. Versatility:
necessary
The code allows modifying easily to reflect
changes
in
conditions,
relationship of the encoded entities.
characteristics
and
Such changes must
result in a corresponding change in the code or coding
structure.
7. Sortability: Reports are most valuable for user efficiency when
sorted and presented in a predetermined format or order.
Although
data
must
be
sorted
and
collaged,
the
representative code for the date does not need to be in a
sortable form if it can be correlated with another code that is
sortable.
8. Stability: Codes that do not require to be frequently updated
also promote use efficiency. Individual code assignments for
a given entity should be made with a minimal likelihood of
change either in the specific code or in the entire coding
structure.
9. Meaningfulness: Code is meaningful.
Code value should
reflect the characteristics of the coded entities, such as
mnemonic features unless such a procedures results in
inconsistency and inflexibility.
NAME :
E.No :
101
CAKEWALA.COM
OPTIMIZATION OF CODE
A good program is not the one that solves the intended
problem alone but the one that does it efficiently. An ideal compiler
should produce target code that is as good as can be written by
hand crafted meticulously to run on the target machine in the most
efficient manner both in terms of time of execution and memory
requirements. The reality however is that this goal is achieved only
in limited, cases and that too with difficulty. Nonetheless, the code
produced by straight forward compiling algorithms can often be
made more space and time efficient. This is accomplished by
applying
transformations
on
the
produced
code.
These
transformations aiming at optimization of compiled code are known
as code optimization and compilers that apply code improving
transformations are called optimizing compilers.
The
optimization
may
be
machine
dependent
or
machine
independent. A machine independent optimization is a set of
program transformations that improve the target code without
taking into consideration any properties of the target machine.
Machine dependent optimizations, such as register allocation and
utilization of special machine instruction sequences, on the other
hand, depend on the target machine.
The overall performance of a program can be effectively
improved if we can identify the frequently executed parts of a
program and then make these parts as efficient as much as
NAME :
E.No :
102
CAKEWALA.COM
possible. According to Pareto principle, most programs spend ninety
per cent of their execution time in ten percent of the code. While
the actual percentages may vary, it is often the case that a small
fraction of a program accounts for most of the running time.
Profiling the run-time execution of a program on representative
input data accurately identifies the heavily traveled regions of a
program. Unfortunately, a compiler does not have the benefit of
sample input data, so it must make best guess as to where the
program hot spots are.
In practice, the program's inner loops are good candidates for
improvement. In a language that emphasizes control constructs like
while and for statements, the loops may be evident from the syntax
of the program; in general, a process called contra/flow analysis
identifies loops in the flow graph of a program.
The best technique for deciding what transformations are
worthwhile to put into a compiler is to collect statistics about the
source programs and evaluate the benefit of a given set of
optimizations on a representative sample of real source programs
NAME :
E.No :
103
CAKEWALA.COM
CHEPTER-8
Input and Output Screens
ABOUT PAGE
NAME :
E.No :
104
CAKEWALA.COM
REGISTRATION PAGE
NAME :
E.No :
105
CAKEWALA.COM
LOGIN HOME
NAME :
E.No :
106
CAKEWALA.COM
CHEPTER-9
Implementation of Security
for the Software developed
NAME :
E.No :
107
CAKEWALA.COM
SYSTEM SECURITY MEASURES
To do an adequate job on security, a systems analyst must analyze
the risk, exposure, and costs and specify measures such as
passwords and encryption to provide protection. The backup copies
of software and recovery restart procedures must be available when
needed.
SECURITY AGAINST UNAUTHORIZED ACCESS:
(1)
Use of administrator passwords: The password provides
security to the administrator of Associates user so that
unauthorized
user
can
not
access
the
facility
of
Associates User.
(2) User related checks and validations:
For
this
software, The developer uses user related checks and
validations from the user.
(3) User authorization keys: Password checking for logging
of Users.
SECURITY AGAINST DATA LOSS:
(1)
Provision
of
efficient
data
backup
system :
In this
software an efficient system is used for adequate backup facility .
NAME :
E.No :
108
CAKEWALA.COM
(2)
Offline data storage : this system is capable for offline
data Storage.
(3)
Multiple database backup : the efficient system is use for
this Software to give multiple data backup.
User Level:
User are does not change Health, Transport Information. Its only
View Information and its allowed after fill own profile and then
insert username and password. User is sending Matrimonial
information view any other user by allow administrator.
Administrator Level:
Administrator is able to change Health, Transport Information.
Administrator is allowing matrimonial information any Change. And
also allow user view bride picture and groom picture information.
NAME :
E.No :
109
CAKEWALA.COM
CHAPTER-9
Future Application
of the Project
NAME :
E.No :
110
CAKEWALA.COM
FUTURE SCOPE OF THE APPLICATION
The CAKEWALA.COM is for the manage process can
be further developed into a separate, automated system
with the following enhancements:
 Help file can be included. The system, as of now,
does not support any help facility for the users of the
system. A help menu can be provided with a special
function key and help command in the main page
itself. Help can be either introduced as a separate
window, a reference to a printed manual or as one or
two line suggestion produced in a fixed screen
location.
 The system can use typed commands, as they were
once the most common mode of communication with
the system. The typed command can be provided
through control sequence or function keys or typed
word.
 A training module can be included in the system. This
module can be used to train the users of the system
about the systems usage.
NAME :
E.No :
111
CAKEWALA.COM
CHAPTER-11
Bibliography
NAME :
E.No :
112
CAKEWALA.COM
 Software Engineering, A Practitioners Approach,
Pressman McGraw Hill.
 An Introduction To Database Systems by Bipin
C Desai
 Object-Oriented Modelling and Design by James
Rambagh
 Microsoft SQL Server by NIIT
1.PHP-2
Author :
Publisher :
Complete-Reference
Patric Norton & Herberlt Schild
Tata McGraw Hill
2.System Analysis & Designing
Author :
Publisher :
James A. senn
Tata McGraw Hill
3.Software Engineering Concepts
Author :
Publisher :
Edition.
Fairley
Tata McGraw Hill Publication,3rd
4.Software Engineering Principles
NAME :
E.No :
113
CAKEWALA.COM
Author
Pressman
5.Java Server Pages
Author
:
Publisher :
NAME :
E.No :
James Good Will
Techmedia
114