training file ketaki
TRANSCRIPT
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 1/63
A
TRAINING FILE
ON
JAVA
Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal (M.P.)
(University Of Technology of Madhya Pradesh)
I n the partial fu lf il lment of the requi rement for the award of the degree of
Bachelor of Engineeri ng
I n
Computer Science & Engineeri ng
2009-2013
Submitted to Submi tted By
Under the Guidance of Anjali Kaushik
Prof. U Dutta 0903CS091006
(HOD OF CSE) BE- 4th
Year
MAHARANA PRATAP COLLEGE OF TECHNOLOGY
GWALI OR (M .P.) – 474006
DECEMBER, 2013
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 2/63
DECLEARATION BY CANDIDATE
We hereby declare that the work ,which is being presented in the
project entitled “TRANING JAVA ” in partial fulfillment for the
award of degree of “Bachelor of Engineering” in DEPARTMENT
OF COMPUTER SCIENCE & ENGINEERING, MAHARANA
PRATAP COLLEGE OF TECHNOLOGY, GWALIOR carried
under guidance of Prof. UNMUKH DUTTA, Dept of COMPUTER
SCIENCE & ENGINEERING award of any other degree.
Anjali Kaushik
0903CS091006
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 3/63
CERTIFICATION
This is to certify that the project entitled “TRANING ON JAVA”
which is being submitted by Anjali kaushik in partial fulfillment for
the award of the degree of Bachelor of Engineering in Computer
Science and Engineering of Rajiv Gandhi Technical University,
Bhopal (M.P.) is a record of students own work carried by the under
guidance and supervision.
To the best of our knowledge, the matter presented in this
project has not been submitted for the award of any diploma or
degree certificate.
Prof. Unmukh Datta Prof. K.K Joshi
( Academic Di rector Head of Dept. (CS/I T) ( Assistant Professor CS/I T Dept ).
M.P.C.T. Gwalior (M .P.) M .P.C.T. Gwalior(M .P.)
Dr .Ghanshyam Singh
Director
M.P.C.T., Gwalior(M .P.)
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 4/63
ACKNOWLEDGEMENT
It is with great pleasure , we present this “TRANING ON JAVA”.We greatfully acknowledge our profound indebtedness towards
our esteemed Mr. U DUTTA , Designated as Associate Professor of
Computer Science & Engineering, Maharana Pratap College of
Technology , Gwalior for his valuable guidance , excellence
assistance and constant encouragement during the entire course
work.
We also express sincere gratitude to Mr. Unmukh Datta(Director Academic , HOD CS/IT Dept.) and Mr. K.K Joshi for
providing helpful study materials.
Last but of the least ; we would like to thank our beloved
parents for their encouragement and cooperation during the time of
working through the project.
Also thanks to all our friends for their encouragement andsupport.
Anjali Kaushik
0903CS091006
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 5/63
ABSTRACT
A Student Info System (SIS) is a software application for educationestablishment to manage student data. Student information system
provide capabilities for entering student test and other assessment
scores through an electronic grade book , building student
schedules, tracking student attendance,and managing many other
student related data naads in a school , colleges or university. Also
known as Student Information Management System (SIMS),
Student Record System (SRS) , Student Management System (SMS), Campus Management System (CMS) or School Management
System (SMS).
These system vary in size, scope and capability, from package that
are implemented in relatively small organization to cover student
record alone , to enterprise with solution that aim to cover most
aspect of running large multi campus organization with significant
local responsibility many systems can be scaled to different levels offunctionality by purchasing add on “modules” and can typically be
configured by their home instition to meet local needs.
Until recently, the common function of a student record system
are to support the maintainance of personal and study information
relating to:
-Handling inquiries from prospective student.
-Handling the admissions process.
-Automatically creating class and teacher scheduler.
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 6/63
-Handling record of examinations, assessment marks, grade and
academic progression.
-Maintaining record of absence and attendance.
-Recording communications with students.
-Maintaining discipline record.
-Providing stastistical reports.
-Maintainance boarding house details.
-Communicating students details to parents through a parent
portal.
-Special Education/ Individual Education Plan (IEP) services.
-Human resource services.
-Accounting and budgeting services.
-Student health record.
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 7/63
Contents
S. No.TITLE
SIGNATURE
1. Candidate Declaration
2. Certification
3. Acknowladgement
4. Abstraction
5. Company Profi le
6. Daily Diary
7. Problem defi ni tion & identi fi cation
8. Preliminary I nvestigation
9. F inding of Project
10. Overview
11. Document coll ection
12. Data flow diagram
13. Use case diagram
14. ER diagram
15. Time requirement & schedul ing
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 8/63
16. Hardware & software requi rement
17. System conf iguration specif ication
18. Modules
19. Technology Specif ications
20. Designing of modules
21. Designing of tables
22. Testing
23. Appli cation area
24. Reference
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 9/63
DAILY DIARY
Name of the trainee: Anjali Kaushik
College: Maharana Pratap Collage Of Technology, Gwalior
Industry/Workplace: HCL ,GWALIOR
Week No. 1
Department/Section: Computer Science & Engineering
Date: 01-07 June2012
DATE DAY TIMING TOPICS
Theory Practical
01/06/2012 Friday 10-12 AM 12:30-3 PM Learn about SDLC
02/06/2012 Saturday 10-12 AM 12:30-3 PM Learn about DBMS
03/06/2012 Sunday 10-12 AM 12:30-3 PM Seminar or Time Table Management
04/06/2012 Monday 10-12 AM 12:30-3 PM Learn about MS-Access DDL, DCL,DML Statement
05/06/2012 Tuesday 10-12 AM 12:30-3 PM Learn about Constraints, Operators,Functions Joins & Sub Queries
06/06/2012 Wednesday 10-12 AM 12:30-3 PM Learn about Basic java core
07/06/2012 Thursday 10-12 AM 12:30-3 PM Learn about OOPs Concepts
Note: Please include attachment wherever necessary.
Declaration hereby declare that all information provided above is true
215, Garima Arcade Shinde Ki Chhawani, Lashkar, GwaliorMob. : 900904508, 9630883466
(Signed by trainee) ( Date)
________________ ______________
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 10/63
DAILY DIARY
Name of the trainee: Anjali Kaushik
College: Maharana Pratap Collage Of Technology, Gwalior
Industry/Workplace: HCL,GWALIOR
Week No. 2
Department/Section: Computer Science & Engineering
Date: 08-13 June 2012
DATE DAY TIMING TOPICS
Theory Practical
08/06/2012 Friday 10-12 AM 12:30-3 PM Learn about String Functions
09/06/2012 Saturday 10-12 AM 12:30-3 PM Learn about Exception Handling
10/06/2012 Sunday 10-12 AM 12:30-3 PM Seminar on Stress Management
11/06/2012 Monday 10-12 AM 12:30-3 PM Learn about Multi Threading
12/06/2012 Tuesday 10-12 AM 12:30-3 PM Learn about JDBC
13/06/2012 Wednesday 10-12 AM 12:30-3 PM Learn about Web ApplicationTechnologiesIntroduction of HTMLBasics Tags Text Formatting tags
14/06/2012 Thursday 10-12 AM 12:30-3 PM Learn about List, Frameset, Link &Image tag and its Attributes Tabletag with attributes Form & InputTags
Note: Please include attachment wherever necessary.
Declaration hereby declare that all information provided above is true
215, Garima Arcade Shinde Ki Chhawani, Lashkar, Gwalior
(Signed by trainee) ( Date)
________________ ______________
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 11/63
DAILY DIARY
Name of the trainee: Anjali Kaushik
College: Maharana Pratap Collage Of Technology, Gwalior
Industry/Workplace: HCL,GWALIOR
Week No. 3
Department/Section: Computer Science & Engineering
Date: 14-21 June 2012
DATE DAY TIMING TOPICS
Theory Practical
15/06/2012 Friday 10-12 AM 12:30-3 PM Learn about Introduction aboutDHTML, Applying Styles usingCSS, Java script basics
16/06/2012 Saturday 10-12 AM 12:30-3 PM Learn about Java Scripts, methods inJavaScript Introduction about Clientside scripting
17/06/2012 Sunday 10-12 AM Seminar on Personality Development
18/06/2012 Monday 10-12 AM 12:30-3 PM Learn about Introduction to J2ME,Web Application Structure
19/06/2012 Tuesday 10-12 AM 12:30-3 PM Learn about Application Server &Web Server
20/06/2012 Wednesday 10-12 AM 12:30-3PM Learn about SERVLETS What isServlets and ServletsAPI
21/06/2012 Thursday 10-12 AM 12:30-3PM Learn about Roles and Life Cycle ofServlets
Note: Please include attachment wherever necessary.
Declaration hereby declare that all information provided above is true
215, Garima Arcade Shinde Ki Chhawani, Lashkar, Gwalior
(Signed by trainee) ( Date)
________________ ______________
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 12/63
DAI LY DIARY
Name of the trainee: Anjali Kaushik
College: Maharana Pratap Collage Of Technology, Gwalior
Industry/Workplace: HCL,GWALIOR
Week No. 4
Department/Section: Computer Science & Engineering
Date: 22-28 June 2012
DATE DAY TIMING TOPICS
Theory Practical
22/06/2012 Friday 10-12 AM 12:30-3 PM Learn about Configuring Servlet inTomcat Webserver
23/06/2012 Saturday 10-12 AM 12:30-3 PM Learn about Genric Servlet & HTTPServlet
24/06/2012 Sunday 10-12 AM Resume Making Class
25/06/2012 Monday 10-12 AM 12:30-3 PM Learn about Handling HTTP
Request &Response26/06/2012 Tuesday 10-12 AM 12:30-3 PM Learn about Servlet Context
&Servlet configure
27/06/2012 Wednesday 10-12 AM 12:30-3 PM Learn about Session Management
28/06/2012 Thursday 10-12 AM 12:30-3 PM Learn about Using Hidden formfields AND URL Rewriting
Note: Please include attachment wherever necessary.
Declaration hereby declare that all information provided above is true
215, Garima Arcade Shinde Ki Chhawani, Lashkar, Gwalior
(Signed by trainee) ( Date)
________________ ______________
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 13/63
DAILY DIARY
Name of the trainee: Anjali Kaushik
College: Maharana Pratap Collage Of Technology, Gwalior
Industry/Workplace: HCL,GWALIOR
Week No. 5
Department/Section: Computer Science & Engineering
Date: 29-05 July 2012
DATE DAY TIMING TOPICS
Theory Practical
29/06/2012 Friday 10-12 AM 12:30-3 PM Learn about Creating Filters
30/06/2012 Saturday 10-12 AM 12:30-3 PM Learn about Java DatabaseConnectivity (JDBC) with DAO
01/07/2012 Sunday 10-12 AM Group Discursion
02/07/2012 Monday 10-12 AM 12:30-3PM Overview on Project
03/07/2012 Tuesday 10-12 AM 12:30-3 PM Design Data Base
04/07/2012 Wednesday 10-12 AM 12:30-3 PM Design User Registration Form
05/07/2012 Thursday 10-12 AM 12:30-3 PM Design Login Form
Note: Please include attachment wherever necessary.
Declaration hereby declare that all information provided above is true
215, Garima Arcade Shinde Ki Chhawani, Lashkar, GwaliorMob. : 900904508, 9630883466
(Signed by trainee) ( Date)
________________ ______________
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 14/63
DAILY DIARY
Name of the trainee: Anjali Kaushik
College: Maharana Pratap Collage Of Technology, Gwalior
Industry/Workplace: HCL,GWALIOR
Week No. 6
Department/Section: Computer Science & Engineering
Date: 06-12 July 2012
DATE DAY TIMING TOPICS
Theory Practical
06/07/2012 Friday 10-12 AM 12:30-3 PM Design Product Category Form
07/07/2012 Saturday 10-12 AM 12:30-3 PM Design Product Form
08/07/2012 Sunday 10-12 AM Personal Interview
09/07/2012 Monday 10-12 AM 12:30-3 PM Update User Registration From
10/07/2012 Tuesday 10-12 AM 12:30-3 PM DisplayProject Item From andCategory Form
11/07/2012 Wednesday 10-12 AM 12:30-3 PM Bank Form
12/07/2012 Thursday 10-12 AM 12:30-3PM Transition Form
Note: Please include attachment wherever necessary.
Declaration hereby declare that all information provided above is true
215, Garima Arcade Shinde Ki Chhawani, Lashkar, GwaliorMob. : 900904508, 9630883466
(Signed by trainee) ( Date)
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 15/63
________________ ______________
DAILY DIARY
Name of the trainee: Anjali Kaushik
College: Maharana Pratap Collage Of Technology, Gwalior
Industry/Workplace: HCL,GWALIOR
Week No. 7
Department/Section: Computer Science & Engineering
Date: 13-15 July 2012
DATE DAY TIMING TOPICS
Theory Practical
13/07/2012 Friday 10-12 AM 12:30-3PM Project Designing
14/07/2012 Saturday 10-12 AM 12:30-3PM Project Testing
15/07/2012 Sunday 10-12 AM 12:30-3PM Get together
Note: Please include attachment wherever necessary.
Declaration hereby declare that all information provided above is true
215, Garima Arcade Shinde Ki Chhawani, Lashkar, GwaliorMob. : 900904508, 9630883466
(Signed by trainee) ( Date)
________________ ______________
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 16/63
COMPANY PROFILE
Hindustan computer Ltd.
Type Private
Industry IT Services
Founded 11 August 1976
Headquarters Noida, India
Key people Shiv Nadar (Founder& Chairman)
Revenue US$ 6.2 billion (2012)
Employees 90,000 (2012)
Subsidiaries HCL Technologies
HCL Infosystems
Website
www.hcl.com
In 1976, Shiv Nadar, Arjun Malhotra,
Subhash Arora, Badam Kishore Kumar,
T.V Bharadwaj and Arun Kumar H
jointly started a company named
Microcomp Limited.
The focus of the company was design
and manufacturing of scientific
calculators. The venture provided its
founders money to start a company that
focused on manufacturing computers.
The company name "HCL" used to
stand for "Hindustan Computer
Limited" but now HCL is the only one
name that the company goes by. HCL
received support from the Government
of Uttar Pradesh to set up
manufacturing in Noida. On February
1, 2013, Nadar announced that he would
step down as chairman of HCL
Corporation and his daughter Roshni
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 17/63
Nadar would become the next chairman.
Shiv Nadar ,(Chairman)
Shiv Nadar (born 14 July 1945) is anIndian industrialist and philanthropist. He
is the founder and chairman of HCl and
the Shiv Nadar Foundation. As of 2012,
his personal wealth is US$ 8.6 billion.
Nadar founded HCL in the mid-1970s
and transformed the IT hardware
company into an IT Enterprise over the
next three decades by constantl
reinventing his company's focus. In 2008,
Nadar was awarded Padma Bhushan for
his efforts in the IT industry.
Nadar, nicknamed by friends as Magus
(Old Persian for Wizard), since mid-
1990s has focused his efforts in
developing the educational system of
India through the Shiv Nadar Foundation.
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 18/63
OUR GUIDELINES FOR DEVELOPING A QUALITY PRODUCT
The globally accepted Rational Unified Process is followed.
Skilled force ensures a product with international standard.
Focus on successful and robust executable application.
In depth analysis to understand the actual requirement and business
constraint.
Stress for generating new ideas during analysis which will enhance your
business.
Quality is a way of our life, not an afterthought.
Catch the major risks early and continuously and search for their remedy or
alternate solution.
A future vision before developing an application assists in extensibility of
application, less and easy maintenance.
Be in touch with you during whole life cycle of project. This makes the things
transparent that we are doing work on common tasks or requirements.
Standard design patterns (object oriented) are adopted to make the reusability
of the things.
Work with some of the most successful and expertise individuals,
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 19/63
entrepreneurs and corporations and bring solutions to their most challenging
and complex issues of the day.
Formed by a team of young and enterprising IT professionals, ETH LTD.
PUNE.aims at blending knowledge and skills to provide results that match
your requirements
At ETH LTD. PUNE, we believe in listening, analyzing, advising, and
implementing new projects and concepts to effectively present complex
information.
Problem Defi nition & I dentifi cation
System Analysis is the most critical phase of a project. It is during that we learn about the
existing business marketing system, come to understand its problems, define objectives for
improvement, and define the detailed business requirements that must be fulfilled by any
subsequent technical solution. Clearly, any subsequent design and implementation of a new
system depends on the quality of the preceding systems analysis.
System analysis is the dissection of a system into its component pieces to study how those
component pieces interact & work.
System analysis of the pro ject “ONLINE SHOPPING” Consist the following sections.
I denti f ication of the need
As a first step in the analysis of the system, the end-users of the proposed system were
meeting to get first hand information regarding their needs and wants. Ideas from the both the
side were exchanged in order to get a standard and satisfactory system. Once overall goal were
identified, a detailed analysis on the technology needed to make the System functional was made
.
Problem defi ni tion
The first step is to define the problem that led to the client’s request. Let’s first examine the
brief statement of the problem made by the client
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 20/63
Br ief statement of problem
In a market there is lot of work related to the purchasing, marketing and others. Presently the
organization is carrying on all the required processes manually on papers. The recruitment
process, selection process, information related to there products company information, theredesignation, products rates, etc. so the organization finds out that storing entire information on
papers is very difficult because if they want to see the record of a particular item details and
other information.
Preliminary I nvestigation
When the brief statement of the problem made by the Human Resource Management as
explained in Identification of the need, the first system activity begins,
i.e. preliminary investigation. It has 3 parts:-
REQUEST CLARIFI CATION
Many requests from the Staff members in organization are not clearly stated. Therefore,
before any systems investigations can be considered, the project request must be examined to
determine precisely what the originator wants. Clarification of the project request is a must.
For the clarification of the project request the better way out is to conduct interviews with
various level of Staff members of the Company.
FEASIBI LI TY STUDY
The feasibility study is carried out to test if the proposed system worth being
implemented. Given unlimited resources and infinite time, all projects are feasible. Hence it
become booty necessary and prudent to evaluate the feasibility of the project at the earliest
possible time in order to avoid unnecessary wasted of time, effort and professional
embarrassment over an all - conceived system. Feasibility study is a test of system proposedregarding its workability. Impact on the organization ability to meet user need and effective use
of resources. It is usually carried out by the small group of people who are familiar with the
information system technique, understand the part of the business or organization that will be
involved or affected by the project, and are skilled in the System Analysis and Design process.
The purpose of feasibility study is not to solve the problem but to determine if the problem is
worth solving.
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 21/63
REQUEST APPROVAL
After all aspects of the System Analysis of the project “ONLINE SHOPPING” are deeply
explored with starting with problem definition, analysis of problem statement by Human
Resource Management, and brief statement of the expected solution, preliminary investigationcovering each and every level of Staff member of the organization, findings of the investigation
& after feasibility study concluded that the project is feasible in every aspect the request made by
the organization is approved.
FI NDING OF PROJECT(ONLI NE SHOPING)
More people would shop onl ine if they trusted the Online shopping envir onment
Internet users’ attitudes about online shopping are not entirely consistent. They are
willing to shop online because it is convenient and a time-saver, but they also do not like sending personal or credit card information over the internet. Our analysis suggests that if concerns aboutthe safety of the online shopping environment were eased and if shoppers felt that onlineshopping saved them time and was convenient, the number of online shoppers would be higher.
It is possible to sort through these different attitudes to see what matter more in
influencing people’s propensities to shop online.1 Using as the baseline internet users’
response to the question about whether they have ever bought a product such as a book,
music, toy or clothing online, the analysis asks what would happen to levels of online
shopping if certain attitudes were different. We find that concerns about sending personal orcredit card information online loom largest in influencing whether to shop online.
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 22/63
Specifically:
If the three-quarters of internet users who agree that they don’t like sending
personal or credit card information online felt more confident about doing this, the
share of the internet population shopping online would be 7 percentage points higher
than the current average of 66%, or 73%.
If those who disagree that online shopping is convenient felt otherwise, the share of
the internet population shopping online would be 3 percentage points higher than the
current average (or 69% instead of 66%)
If those who disagree that online shopping saves time believed that they could save
time by e-shopping, the share of the online population shopping online would be 2
percentage points higher than the current average (or 68% instead of 66%).
The estimates above are independent effects, showing the impact when the other factors
noted above, as well as other demographic and socio-economic impacts are held constant.
In fact, demographic factors such as race or gender have no significant impact on
predicting levels of online shopping, and the impact of income is small; if low-income
Americans suddenly had at least average incomes the incidence of online shopping
would be one percentage point higher.
Finally, higher broadband deployment would also drive up the size of the e-shopper
cohort by 6 percentage points.
Overview
About Onl ine Shopping
Online shopping or online retailing is a form of electronic commerce wherebyconsumers directly buy goods or services from a seller over the Internet without an intermediary
service. An online shop, eshop, e-store, Internet shop, webshop, webstore, online store, or virtual
store evokes the physical analogy of buying products or services at a bricks-and-
mortar retailer or shopping centre. The process is called business-to-consumer (B2C) online
shopping. When a business buys from another business it is called business-to-business (B2B)
online shopping. The largest online retailing corporations are EBay and Amazon.com, both of
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 23/63
which are US-based.
Online customers must have access to a computer and a method of payment.
In general, higher levels of education, income, and occupation of the head of the
household correspond to more favorable perceptions of shopping online. Also, increased
exposure to technology increases the probability of developing favorable attitudes towards new
shopping channels.
Online shoppers commonly use a credit card to make payments, however some systems enable
users to create accounts and pay by alternative means, such as:
Billing to mobile phones and landlines
Cash on delivery (C.O.D., offered by very few online stores)
Cheque / Check
Debit card
Direct debit in some countries
Electronic money of various types
Gift cards
Postal money order
Wire transfer / delivery on payment
Some sites will not accept international credit cards, some require both the purchaser's billing
address and shipping address to be in the same country in which site does its business, and still
other sites allow customers from anywhere to send gifts anywhere. The financial part of a
transaction might be processed in real time (for example, letting the consumer know their credit
card was declined before they log off), or might be done later as part of the fulfillment process.
Product del ivery
Once a payment has been accepted the goods or services can be delivered in the following ways.
Drop shipping: The order is passed to the manufacturer or third-party distributor, who ships
the item directly to the consumer, bypassing the retailer's physical location to save time,
money, and space.
In-store pickup: The customer orders online, finds a local store using locator software and picks the product up at the closest store. This is the method often used in the bricks and
clicks business model.
Printing out, provision of a code for, or emailing of such items as admission
tickets and scrip (e.g., gift certificates and coupons). The tickets, codes, or coupons may be
redeemed at the appropriate physical or online premises and their content reviewed to verify
their eligility (e.g., assurances that the right of admission or use is redeemed at the correct
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 24/63
time and place, for the correct dollar amount, and for the correct number of uses).
Shipping: The product is shipped to the customer's address or that of a customer-designated
third party.
Will call, lCOBO (in Care Of Box Office), or "at the door" pickup: The patron picks up pre-
purchased tickets for an event, such as a play, sporting event, or concert, either just beforethe event or in advance. With the onset of the Internet and e-commerce sites, which allow
customers to buy tickets online, the popularity of this service has increased.
Shopping cart systems
Simple systems allow the offline administration of products and categories. The shop is then
generated as HTML files and graphics that can be uploaded to a webspace.the systems do not
use an online database. A high end solution can be bought or rented as a standalone program or as an addition to
an enterprise resource planning program. It is usually installed on the company's own
webserver and may integrate into the existing supply chain so that ordering, payment,
delivery, accounting and warehousing can be automated to a large extent.
Commercial systems can also be tailored to one's needs so the shop does not have to be
created from scratch. By using a pre-existing framework, software modules for various
functionalities required by a web shop can be adapted and combined.
Document Collection
I ntroduction to the tools
ABOUT JAVA
JAVA is a platform Independent Language. It is important to Internet programming.
(One of the points to be noted about Java is that, it has developed concurrently with the WEB
Programming in which the APPLETS, SERVLETS, are the ways to enhance the results of
HTML Pages on the Net.) The NET Pages of the Module “Online Bus Reservation” of portal
Destination Travels.Com are also Designed, Developed with functionality by Servlet in the
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 25/63
background, which not only enhance the NET pages in the foreground but also maintains the
requirements of the Visitors. Various remarkable features of Java that makes this language
getting universal acceptance are:
Portability
It can work on all types of computers and operating systems.
Security
It achieves security by confining a Java program to the Java execution environment andnot allowing access to other parts of computer .
Object Oriented
Java is totally object oriented. This provides benefits such as reusability; it decreases
complexity and is easy to debug.
What Java Is
The basics: Java is an object-oriented programming language developed by Sun Microsystems
that plays to the strengths of the Internet.
Object-oriented programming (OOP) is an unusual but powerful way to develop software. In
OOP, a computer program is considered to be a group of objects that interact with each other.
The feature that is best known about Java is that it can be used to create programs that execute
from World Wide Web pages. These programs are called applets.
A Java program is created as a text file with the file extension .java. It is compiled into one
or more files of byte codes with the extension .class. Byte codes are sets of instructions similar to
the machine code instructions created when a computer program is compiled. The difference is
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 26/63
that machine code must run on the computer system it was compiled for, and byte codes can run
on any computer system equipped to handle Java programs.
Java I s Object Oriented
Object-oriented programming (OOP) is a powerful way of organizing and developing software.
The short-form description of OOP is that it organizes a program as a set of components called
objects. These objects exist independently of each other, and they have rules for communicating
with other objects and for telling those objects to do things.
Java inherits its object-oriented concepts from C++ and other languages such as Smalltalk.
The fact that a programming language is object oriented may not seem like a benefit to some.
Object-oriented programming can be an intimidating subject to tackle, even if you have some
experience programming with other languages. However, object-oriented programs are more
adaptable for use in other projects, easier to understand, and more bug proof.
The language includes a set of class libraries that provide basic variable types, system input and
output capabilities, and other functions. It also includes classes to support networking, Internet
protocols, and graphical user interface functions.
Java I s Safe
Another thing essential to Java's success is that it be safe. The original reason for Java to execute
reliably was that people expect their waffle irons not to kill them or to exhibit any other
unreliable behavior. This emphasis on security was well-suited for Java's adaptation to the World
Wide Web.
A Java program that executes from a Web page is called an applet. All other Java programs are
called applications. When an applet is encountered on a Web page (if the user's browser can
handle Java), the browser downloads the applet along with the text and images on the page. The
applet then runs on the user's computer. This act should raise a red flag-danger!danger!-becausea lot of harmful things can occur when programs are executed: viruses, Trojan horses, the
Microsoft Network, and so on.
Java provides security on several different levels. First, the language was designed to make it
extremely difficult to execute damaging code. The elimination of pointers is a big step in this
regard. Pointers are a powerful feature, as the programmers of C-like languages can attest, but
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 27/63
pointers can be used to forge access to parts of a program where access is not allowed, and to
access areas in memory that are supposed to be unalterable. By eliminating all pointers except
for a limited form of references to objects, Java is a much more secure language.
Because of the multiple levels of security, and the continued efforts to improve these measures,
Java is generally regarded as a secure means to execute code over the World Wide Web.
The Java API
The Java Application Programming Interface (API) is a set of classes used to develop Java
programs. These classes are organized into groups called packages. There are packages for the
following tasks:
Numeric variable and string manipulation Image creation and manipulation File input and output Networking Windowing and graphical user interface design Applet programming Error handling
The API includes enough functionality to create sophisticated applets and applications. The Java
API must be supported by all operating systems and Web software equipped to execute Java
programs, so you can count on the existence of Java API class files when developing programs.
The Java API is at version 1.0.2 at this time; Sun will make no changes in future versions that
would require changes to source code. Although enhancements are planned for future releases of
the API, there will be no removals or changes to class behavior.
Extended APIs
In addition to the basic API that must be present with all Java implementations, Sun is
developing extended APIs that extend the features of the language.
All but one of the following classes are in various stages of development at Sun:
Commerce API, for secure commercial transactions Security API, which adds advanced security features, an improved byte code verifier,
encryption, and other features Three Enterprise APIs, to connect programs with enterprise database and legacy
applications
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 28/63
Media API, which adds multimedia classes for graphics, sound, video, 3D, VRML, andtelephony
Java Beans component APIs, to connect Java to reusable software component schemessuch as Microsoft ActiveX, Netscape Live Connect, and OpenDoc
Servlet API, which creates applet-like Java programs that can run on a Web server
Management API, to integrate with network management systems, which will be offeredas part of the Solstice Workshop development tool
Additional Abstract Windowing Toolkit classes, to extend the capabilities of Java'sgraphical user interface
An object serialization API, which enables objects to be stored on and loaded from disks
Java Beans is the most likely of the extended APIs to appear first, although the enhanced security
APIs are close to completion. If you guessed that the Socratic API was the false one, move
forward two spaces-you're right. However, Microsoft could not take the risk that another
company would be first to implement it-the Socratic API will begin development with ActiveX
later this year.
Servlet
A Servlet can be thought of as a server-side applet.servlets are loaded and executed by a web s
the same manner that applets are loaded and execute by web browser.
Fig: Basic Servlet flow
As shown in figure a Servlet accepts requests from a client ((via the Web server), perfor
task, and returns the results.
The following list describes the basic flow when using Servlet.
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 29/63
The client (most likely a web browser) makes a request via HTTP.
The web server receives the request and forwards it to the servlet.if the Servletyet been loaded, the web server will load it into the java virtual machine and exe
The Servlet will receive the HTTP request and perform some type of process.
The Servlet will return a response back to the Web server.
The web server will forward the response to the client.Servlet is executing on the server, the security issues usually associated with applets
apply. This opens up a tremendous number of opportunities that are not possible, or at least
difficult, when working with applets. Communicating with legacy systems via CORB
sockets and native calls are just a few examples. Also keep in mind that the Web Browser
communicate directly with a Servlet, the Servlet is loaded and executed by the Web Ser
means that if Web server is secure behind a firewall, then Servlet is secure as well.
A Servlet is a dynamically loaded module that services requests from a Webserver. It runs entirely inside the Java Virtual Machine. Because the Servlet is running on the
server side, it does not depend on browser compatibility.
Servlet are modules that extend request/response- oriented servers, such as Java-
enabled web servers. For example, a Servlet might be responsible for taking data in an HTML
order entry form and applying the business logic used to update a company’s order database.
Servlet are to servers, what applets are to browser. Unlike applet however Servlet have
no graphical user interface. Servlet can be embedded in many different servers because the
Servlet API, which you use to write Servlet, assumes nothing about server’s environment or
protocol. Servlet have become most widely used within HTTP servers.
Uses of Servlet
Here are a few more of the many applications of Servlet:
Allowing collaboration between people: - A Servlet can handle multiple requests concurrently,
and can synchronize requests. This allows Servlet to support systems such as on-line
conferencing.
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 30/63
Forwarding requests:- Servlet can forward requests to other servers and Servlet. Thus, Servlet
can be used to balance load among several servers that mirror the same content, and to partition a
single logical service over several servers, according to task type or organizational boundaries.
Benefi ts Of Using Servlet
Efficient:- A servlet’s initialization code is executed only the first time the Web server loads it.After the Servlet is loaded, handling new requests is only a matter of calling a service method.This is a much more efficient technique than loading a completely new executable with request.
Persistent:- Servlet can maintain state between requests. When a servlet is loaded, it stays resident inmemory while serving incoming requests. A simple example of this would be a vector that holds a list of
categories used in an online catalog. When the Servlet is initialized, it queries the database for a list of
categories in a Vector .As it services requests, the Servlet accesses the Vector that holds the categories
instead of querying the database again. Taking advantage of the persistent characteristics of Servlets can
improve our applications performance drastically.
Portable:- Servlets are developed using Java; therefore, they are portable. This enables servletsto be moved to a new operating system without changing the source. We can take code that wascompiled on Windows NT platform and move it to a Solaris box without making any changes.
Robust:- Because servlets are developed with access to the entire JDK, they are very powerfuland robust solutions. Java provides a very well defined exception hierarchy for error handling. Ithas a garbage collector to prevent problems with memory leaks. In addition, it includes a verylarge class library that includes network support, file support database access, distributed objectcomponents, security, and many other classes.
Extensible:- Another advantage servlets gain by being developed in an Object -Orientedlanguage like Java is they can be extended and polymorphed into new objects that better suit ourneeds. A good example of this is an online catalog. We might want to display the same catalogsearch tool at the top of every dynamic page throughout our Web site. We definitely don’t want
to add this code to every one of our servlets. So, we implement a base servlet that builds andinitializes the search tool and extend it to display transaction-specific responses.
The Servlet interface declares, but does not implement, methods that manage the servlet and its
communications with clients. Servlet provide some or all of these methods when developing a servlet.
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 31/63
1. Server loads the servlet.
2. Server creates one or more instance of Servlet class.
3. Server calls the init () method of each Servlet instance.
4. Servlet request is received.
5. Servlet selects Servlet instance and calls its service () method.
6. Servlet service () method processes the request and returns output to client.
7. Servlet waits until next request is received or server unloads it.
8. Servlet unloads the servlet after calling it’s destroy () method.
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 32/63
Data flow diagram
catid
User registration
Products
Process To
Store data
ATM
Invoice
Process To
Store Data
User Registration
Process To
Store Data
Process To
Store Data
Invoice
User
Product
Country
State
City
Category Process To
Store Data
Category
Database
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 33/63
Use Case diagram
Country
State
City
Registration
Login
Products
Admin
User
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 34/63
ER diagram
ISD Code Country
NameUser ID First
Name
Second
Name
Password
ICON
Category ID Cat_Name
City Code
City Name
State Code
State Code
State Name
ISD Code
Category ID Product ID Product Name
ATM INVOICE
Category PRODUCTS
USER
REGISRATION
City
State
Country
Bill
Bill NoDescriptionPicture
PriceCompany Rate
UserId
Cust.NoBalance
Account NoCard no
CityAmount
State
Country
Address
Pin no
Card type
Bank NameExpiry Date
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 35/63
TIM E REQUIREMENT AND SCHDULI NG
If we talk about time requirement, there is approximately three month ( 90 days) we will have to
required for to completion of this project. This project required a deep knowledge of C#.Net,
ADO.Net, Asp.Net, Sql Server2005
COST ESTIMATION
Its cost is under the budget and make within given time period. It is desirable to aim for a system
with a minimum cost subject to the condition that it must satisfy the entire requirement.
S/W & H/W REQUIREMENT SPECIFI CATION
Software Requi rement
Microsoft Windows XP, Microsoft Windows NT or Microsoft Windows 2000.
Core Java
JDBC
Servlet
Apache Tomcat 4.0
MS-Access
Hardware Requirement
20 GB HDD 128 MB system RAM (Minimum) PIII /Celeron Or Above 1.Ghz CPU
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 36/63
Modules
A) CLIENT-SIDE MODULES
1) Homepage2) Add in cart3) Login form4) Registration5) Invoice6) Payment
B) ADMIN-SIDE MODULES
1) Admin Login2) Add Category3) Add New Product4) Update Product5) Show All Product
C) TABLES
1) Registration2) Category3) Product4) Invoice5) Atm6) Transaction7) Country8) State9) City
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 37/63
SYSTEM CONF IGURATION SPECIFI CATION
Microsoft Window XP SP -2 Processor: Intel [email protected] GHz RAM: 2GB Hard disk: 40 GB
Technology Specif ication
Core Java
JDBC
Servlet
MS-Access
HTML
CSS
Designing of Modules
ADMI N LOGIN
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 38/63
ADMIN HOME PAGE
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 39/63
ADD CATEGORIES
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 40/63
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 41/63
DI SPLAY CATEGORY
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 42/63
ADD NEW PRODUCTS
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 43/63
PRODUCTS DI SPLAY
DI SPLAY EMPLOYEE
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 44/63
UPDATE EMPLOYEE INFORMATION
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 45/63
CREATE BANK ACCOUNT
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 46/63
USER REGISTRATION
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 47/63
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 48/63
USER HOME PAGE
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 49/63
SEACHING CATEGORY OR PRODUCT
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 50/63
AFTER SEARCHING SHOW PRODUCTS
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 51/63
ADD PROJECT IN CART
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 52/63
PRODUCT CONF IRMATION
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 53/63
USER INVOICE
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 54/63
AFTER PURCHES PRODUCT
Designing of tables
User Registration
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 55/63
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 56/63
TRANSACTION
TESTING
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 57/63
TEST PLAN
The importance of software testing and its implications cannot be over emphasized.
Software testing is a critical element of software quality assurance and represents the ultimate
review of the specifications, design and coding.
TESTING OBJECTIVES:
The main objective of testing is to uncover a host of errors, systematically and with
minimum effort and time. Stating formally we can say,
Testing is a process of executing a program with the intent of finding an error.
A successful test is one that uncovers an as yet undiscovered error.
A good test case is one that has a high probability of finding an error, if it exists.
But there is one thing that testing cannot do (just to quote a very famous sentence)
“Testing cannot show the absence of defects, it can only show that software defects are present”.
As the test results are gathered and evaluated they begin to a qualitative indication of the
reliability of the software. If severe errors are detected, the overall quality of the software is a
natural suspect. If, on the other hand, all the errors, which are encountered, are easily modifiable,
then one of the two conclusions can be made:
The tests are inadequate to detect possibly present errors.
The software more or less confirms to the quality and reliable standards.For the purpose of the current project we are assuming that in the event that errors that
are easily modifiable points to the later possibility, since repeating the entire testing routine can
be very time consuming. What we propose to do instead is to get it tested by one or more persons
who are not a part of the development team. But is well versed with the subject and with the
concept of software testing (alpha testing). If he can detect no serious errors, it will enable us to
state with more confidence that the software does actually confirm to the expected standards.
TESTING STRATEGY:
A testing strategy is a roadway, giving how to conduct a test. Our testing strategy is
flexible enough to promote customization that may be necessary in due course of development
process. For instance during coding we found that a change in design. We maintain a change log
and refer to it at appropriate time during the testing.
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 58/63
The developed application software is tested in the following way:
Knowing the specific functions that the software is expected to perform, tests can be
conducted to confirm that all functions are fully operational.
Knowing the internal workings of the project, tests can be conducted to show that internal
operations of the system perform according to the specifications and all internal
components are adequately exercised.
The first approach is what is known as Black box testing and the second approach is called
White box testing. We apply the white box testing techniques to ascertain the functionalities top
down and then we use black box testing to demonstrate that everything runs as expected
Test Case Design:- Test Case Design M ethods are bel low:
Whi te Box Testing:
It also called glass box Testing ,It is the test case design method that uses the case By this
method we drive following test –
1. Guarentee that all independent pathgs with in a module have been exercised at
least once.
2. Exercise all logical decisions on their true and false sides
3. Exercise all loops at their true and false side .
4. Exercice internal data structures to assure their validity.
Black Box Testing :
1. Exercise all graph based testing method.
2. Exercise all Equivalence partitioning .
3. Exercise all Boundry value analysis.
The techniques that are used in deriving the test cases are explained below.
Condition Testing :-
Condition testing is a test case design method that exercises the logical conditions
contained in the program. The possible components in a condition statement are a Boolean
operator, a Boolean variable, a relational operator, arithmetic expression and parenthesis around
simple or compound conditions. The condition testing method focuses on testing each condition
in the program.
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 59/63
It has two advantages over the pure White box testing:
Measurement of test coverage of conditions in a program provides guidance for generation of
additional tests for the program.
Measurement of test coverage is straightforward
We have used special condition testing method called theDomain Testing where the condition in a form lie E1< Relational operator > E2 will the tested
for three conditions E1>E2, E1 equal to E2 and E1<E2.
Boundary Value Analysis:-
Boundary value analysis leads to a selection of test cases that exercise the boundary
conditions or bounding values. It has been observed that a large number of errors tend to appear
at the boundaries of the input domain that in the center. The guidelines for developing the test
cases in a BVA are given below.
If the input condition has a low and high range then tests should be done at the low and
high boundaries. Values above and below these extremes should be tested.
Apply the same principle to output conditions. E.g. test cases should be designed to
generate the maximum and minimum number of entries in a report that is generated by the
program.
Equivalence parti tioning :-
This is a Black box testing method that divides the input domain of a program into classes of
data from which test cases can be derived. A typical test case uncovers a class of errors that
might otherwise require many more test cases before the error is observed. Equivalence classes
for input determine the valid and invalid inputs for the program. Equivalence class test cases are
generated using the following guidelines.
If an input class specifies a range then one valid and two invalid equivalence classes are
defined. If an input class specifies a value then one valid and one invalid equivalence classes are
defined.
If an input class specifies a member of a set then one valid and one invalid equivalence
classes are defined.
If an input class specifies a Boolean then one valid and two invalid equivalence classes are
defined.
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 60/63
Test cases should be selected so that the largest number of attributes of an equivalence class is
exercised at once.
All the above-described test cases are handled successfully in this project.
Test Execution
Unit testing: - In unit testing we focused verification on the smallest unit of software i.e. the
module. Using the detailed design and the process specifications testing is done to uncover errors
with in the boundary of the module. All modules must be successful in the unit test before the
start of the integration testing begins.
I ntegration Testing:- It is a systematic technique for constructing the program structure
while conducting tests, at the same time to uncover errors associated with interfacing. We have
used incremental integration testing for this project.
Val idation Testing :- At the culmination of integration testing the software is complete as a
package and the interfacing errors have been uncovered and fixed, final tests-validation testing-
may begin. Validation tests succeed when the software performs exactly in the manner as
expected by the user. Software validation is done by a series of Black box tests that demonstrate
the conformance with requirements. Alpha & Beta testing fall in this category. We have done
Alpha testing in this project.
SYSTEM TESTING
Here the system testing involved is the most widely used testing process consists of five stages
as shown in the figure. In general, the sequence of testing activities is component testing,integration testing then user testing. However, as defects are discovered at any one stage, they
required program modifications to correct them and this may required other stages in the
testing process to be repeated.
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 61/63
IMPLEMENTATION
The Implementation of the application developed for Human Resource Management isimplemented in the following way:-
Change over:-
Unit Testing
Sub System
Testing
System Testing
Modul Testing
Acceptance
Testin
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 62/63
The change over process of the project “ONLINE SHOPPING” is implemented in the
following way. The new system involved in installing new hardware and preparing data. The
change over from manual to computerization of the organization has been done by two methods
of handling systems conversion.
Parallel running:-
Parallel running or operation means processing current data by new system to cross check
the results with the old system. Its main attraction is that the old system is kept live and
operational until the new system has been proved as a success one. The application developed is
implemented in this way. Because in this method we have tested the current transactions in both
ways and at the end of analysis of the reports generated by manual and automated system we
come to a conclusion that the application developed meets the requirement of the organization
efficiently. So, the application developed (ONLINE SHOPPING) is implemented directly after parallel running proved to be a success.
Training:-
Training involves creating the right atmosphere and motivating user Staff. The sessions
are targeted to make the computer system more acceptable by reasoning out and explaining the
benefits this package could provide to the user and the amount of clerical effort that is being
reduced. Also the users are educated how there work would get interesting rather than feelingthis would eliminate their jobs. The existing jobs are changed but not eliminated.
Training sessions are targeted on how to work with the package, how to navigate through
the package and so on. Training sessions are felt essential in the client’s work place, as it would
help them to work with the package in a faster and in an efficient manner.
Concluding remarks :-
The customized package Human Resource Management System fulfills the requirements
as stated by the client. This package took the first step in automizing the client’s manual system
but a scope of improvement is a part of life and is inevitable for survival and this is no exception
to this package. Any improvement if found necessary would be incorporated in the next release
of Human Resource Management System.
8/13/2019 Training File Ketaki
http://slidepdf.com/reader/full/training-file-ketaki 63/63
Appli cation area
Online shopping or online retailing is a form of electronic commerce whereby consumersdirectly buy goods or services from a seller over the Internet without an intermediary service. An
online shop, eshop, e-store, Internet shop, webshop, webstore, online store, or virtual store
evokes the physical analogy of buying products or services at a bricks-and-
mortar retailer or shopping centre
Reference
www.google.com
www.w3school.com
www.ebay.com
www.filpcart.com
Black Book
Complete Reference Book …etc.