ASHIRWAD
ASHIRWAD
ON
“SALES AND INVENTORY
MANAGEMENT SYSTEM”
SUBMITTED BY
NAME: ASHIRWAD SINGH
ROLL NO.: 04
CLASS : XII – ‘B’
GROUP MEMBERS : Ashish Kumar , Ayush Prasad
This is to certify that the Project Report entitled “SALES AND INVENTORY
MANAGEMENT SYSTEM ” which is submitted to the department of
computer science, PM SHRI Kendriya Vidyalaya Ara , Patna region is prepared
by me. All the coding is the result of my personal effort and due
acknowledgement has been made in the text to all other material used.
Date:
APPROVED BY-
1
TABLE OF CONTENT
PAGE
SER DESCRIPTION
NO
01 CERTIFICATE 3
02 ACKNOWLEDGEMENT 4
03 INTRODUCTION 5
10 OUTPUT 24-28
11 TESTING 29-31
13 REFERNCES 33
2
CERTIFICATE
This is to certify that the Project Report entitled “SALES AND INVENTORY
MANAGEMENT SYSTEM ” which is submitted by ASHIRWAD SINGH
and group in partial fulfillment of the requirement for the award of practical
marks for INFORMATICS PRACTICES, CBSE board Examination is a
record of the candidate’s own work carried out by her under my supervision.
3
ACKNOWLEDGEMENT
I pay my gratitude and sincere regards to Dr. Anu Aujla, my project guide for
giving me the cream of his knowledge. I am thankful to her as she has been a
constant source of advice, motivation and inspiration. I am also thankful to her
for giving her suggestions and encouragement throughout the project work.
4
PROJECT ON “SALES AND INVENTORY
MANAGEMENT SYSTEM”
INTRODUCTION
The primary objectives of this project are focused on streamlining sales and
improving the overall user experience for both administrators and customers.
5
3. Improved Customer Experience: To offer customers an easy-to-use
platform where they can view available products, make purchases, and
future growth.
6
PROPOSED SYSTEM
Admin Module :
1. Add New Items: Allows administrators to add new products to the inventory,
4. Display All Items: Displays a comprehensive list of all items in the inventory,
system.
7
Customer Module :
8
SYSTEM DEVELOPMENT LIFE CYCLE (SDLC)
9
PHASES OF SYSTEM DEVELOPMENT LIFE CYCLE
INITIATION PHASE
10
enterprise architecture. The initiation phase begins when an opportunity to add,
improve, or correct a system is identified and formally requested through the
presentation of a business case. The business case should, at a minimum,
describe a proposal’s purpose, identify expected benefits, and explain how the
proposed system supports one of the organization’s business strategies. The
business case should also identify alternative solutions and detail as many
informational, functional, and network requirements as possible.
11
operations. This phase explores potential technical solutions within the
context of the business need.
• It may include several trade-off decisions such as the decision to use
COTS software products as opposed to developing custom software or
reusing software components, or the decision to use an incremental
delivery versus a complete, onetime deployment.
• Construction of executable prototypes is encouraged to evaluate
technology to support the business process. The System Boundary
Document serves as an important reference document to support the
Information Technology Project Request (ITPR) process.
• The ITPR must be approved by the State CIO before the project can
move forward.
12
PLANNING PHASE
This phase formally defines the detailed functional user requirements using
high-level requirements identified in the Initiation, System Concept, and
Planning phases. It also delineates the requirements in terms of data, system
performance, security, and maintainability requirements for the system. The
requirements are defined in this phase to a level of detail sufficient for systems
13
design to proceed. They need to be measurable, testable, and relate to the
business need or opportunity identified in the Initiation Phase. The requirements
that will be used to determine acceptance of the system are captured in the Test
and Evaluation Master Plan.
• Further define and refine the functional and data requirements and
document them in the Requirements Document,
• Complete business process reengineering of the functions to be supported
(i.e., verify what information drives the business process, what
information is generated, who generates it, where does the information
go, and who processes it),
• Develop detailed data and process models (system inputs, outputs, and
the process.
• Develop the test and evaluation requirements that will be used to
determine acceptable system performance.
DESIGN PHASE
14
design techniques often use prototyping tools that build mock-up designs of
items such as application screens, database layouts, and system architectures.
End users, designers, developers, database managers, and network
administrators should review and refine the prototyped designs in an iterative
process until they agree on an acceptable design. Audit, security, and quality
assurance personnel should be involved in the review and approval process.
During this phase, the system is designed to satisfy the functional requirements
identified in the previous phase. Since problems in the design phase could be
very expensive to solve in the later stage of the software development, a variety
of elements are considered in the design to mitigate risk. These include:
15
DEVELOPMENT PHASE
16
Multiple levels of testing are performed, including:
IMPLEMENTATION PHASE
This phase is initiated after the system has been tested and accepted by the user.
In this phase, the system is installed to support the intended business functions.
System performance is compared to performance objectives established during
the planning phase. Implementation includes user notification, user training,
installation of hardware, installation of software onto production computers, and
integration of the system into daily work processes. This phase continues until
the system is operating in production in accordance with the defined user
requirements.
17
modifications or changes are identified, the system may re enter the planning
phase.
The purpose of this phase is to:
18
SOURCE CODE
================================================================
CODING
19
20
21
22
23
OUTPUT
================================================================
MAIN MENU:- LOGGING IN
ADMIN BLOCK
ADDING ITEM
DELETING ITEMS
24
FETCHING DATA
CHANGING PASSWORD
LOGGED OUT
CUSTOMER MENU
ITEM BUCKET
25
PAYMENT DUE
GOING BACK
EXIT
26
USE DATABASE AND SHOW ALL TABLES IN THE DATABASE:1
27
2:
28
TESTING
It can also be stated as the process of validating and verifying that a software
program/application/product meets the business and technical requirements that
guided its design and development, so that it works as expected and can be
implemented with the same characteristics. Software Testing, depending on the
testing method employed, can be implemented at any time in the development
process, however the most test effort is employed after the requirements have
been defined and coding process has been completed.
TESTING METHODS
Software testing methods are traditionally divided into black box testing and
white box testing. These two approaches are used to describe the point of view
that a test engineer takes when designing test cases.
29
partitioning, boundary value analysis, all-pairs testing, fuzz testing, model-
based testing, traceability matrix, exploratory testing and specification-based
testing.
SPECIFICATION-BASED TESTING
The black box tester has no "bonds" with the code, and a tester's perception is
very simple: a code must have bugs. Using the principle, "Ask and you shall
receive," black box testers find bugs where programmers don't. But, on the other
hand, black box testing has been said to be "like a walk in a dark labyrinth
without a flashlight," because the tester doesn't know how the software being
tested was actually constructed.
That's why there are situations when (1) a black box tester writes many test
cases to check something that can be tested by only one test case, and/or (2)
some parts of the back end are not tested at all. Therefore, black box testing has
the advantage of "an unaffiliated opinion," on the one hand, and the
disadvantage of "blind exploring," on the other.
30
WHITE BOX TESTING
White box testing, by contrast to black box testing, is when the tester has access
to the internal data structures and algorithms (and the code that implement
these)
For example, the test designer can create tests to cause all statements in the
program to be executed at least once.
• fault injection methods.
• mutation testing methods.
• static testing - White box testing includes all static testing.
White box testing methods can also be used to evaluate the completeness of a
test suite that was created with black box testing methods. This allows the
software team to examine parts of a system that are rarely tested and ensures
that the most important function points have been tested.
31
HARDWARE AND SOFTWARE REQUIREMENTS
X. Printer : required
SOFTWARE REQUIREMENTS:
• Windows OS
• Python--
• MySQL
32
REFERENCES
www.wikipedia.com
www.youtube.com
33