Online Mobile Purchase System Computer Science Essay

Published:

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Online Mobile Purchase System is a web based application (online website) to maintain the Mobile Purchasing and other services. Typically, an online mobile purchasing is the interface between a company's website and its organized structure, allowing consumers to access services. It serves as information site as well as ecommerce site.

Background and History

"The Mobile Store" is a shop based in the London, UK. Currently this business operates from shop and they do not have an Online Mobile Purchase System. Here the limitation is they can sell products only from the shop. Their keenness to launch another way to sell products will encourage them in their business operations. Their intention is to get customer orders using online website and dispatch products to those customers using postal service.

Aim

The aim of this project is to develop an Online Mobile Purchase System where net savvy and regular customers are able to purchase Mobile Phones, Accessories and other services via Internet. It allows registered members to access their online profile and keep a record of their purchases.

Objectives

The website allows customers to browse the mobile phones and other commodities so that they can have a better look at the options available from the comfort of their house.

The website facilitates users to become a member of the website and carry out transactions and gain information about different products and services by a simple procedure of registration.

It facilitates the user to rate mobile phones according to their experience and they can give their feedbacks in the forums so that it gives an idea to potential buyers what is good in the market.

User will be able to ask about any products and services related queries directly to the seller by using question forums so that there can be a healthy communication between the buyer and the seller.

The website allows the administrator to maintain products and stock according to the online requirements and make them determine how the sales online are going.

The website facilitates a method to make highly secure payments, so that users can make their payments securely under data protection act.

Project Description and Research

After this project, the business will be able to provide more informative way of selling Mobile Phones using internet. By using this website probably customer will not have any technological questions to ask to the experts when they are buying new mobile phone. The biggest thing is it saves the time. According to my research I found that most of the elderly people and those who are not really attached to new mobile technologies are facing more difficulty while purchasing mobile phones. I am going to add some extra and more user friendly information to aid while purchasing mobile phone. The administrator can check all transactions and place orders using reports. The administrator will be able to produce discount and other promotion using built in functions.

I personally carried out another research survey using particular questionnaire to get opinion from the people and to understand what their needs are when they are buying new mobile phone.

Sample of the questionnaire is attached as Appendix - 1.0 at the end of this document.

Scope

This Online Mobile Purchase System will be very easy and straight forward to use for seller and customers. Seller can upload their products on website in order to sell products over the internet. Amending product information will be also very easy for the seller. By launching this website, business will turn in to two ways to sell and serve their products and services. One of the main important benefits of this project is less effort, more business and low cost investment, which can help them to increase their profit.

Limitation

As per the request from client, the budget to spend on this website is low. Under this request it is difficult to implement features like

Automated order confirmation using Short Message Service (SMS). To use this service at business level client needs to pay according to the usage of service.

Auto Address Finder in user registration process When users are completing their registration process, they need to enter full address with postcode, but with this feature they do not need to enter full address, just by entering their postcode, full list of properties will turn up. Client needs to pay to use this service.

Feasibility study

The feasibility study is meant to establish how the project will be preceded ahead. The feasibility study has the function to provide the project plan and too, the budget estimates for the project's stages of the development which can be possible in the future to come out. The feasibility study basically investigates whether there is any practical solution of any problem. Feasibility study will determine the criteria for successful system and propose and evaluate several alternative solutions. Feasibility is a pointer to determinate that whether the project should go on further process or not. If project is successful for this stage then project planning, estimate budget will decide. After finishing this stage the main part of the project will decide the requirements of the project.

The phase of the project as a next stage is to produce the feasibility study as it is essential and also it investigates or searches for the practical solution to the problem which can be tinted in the problem space.

Feasibility Study

How do we do it?

Is it worth doing?

Plan

Do It!

Project execution

Technical Feasibility

Technical feasibility includes the factor of the tools that exist for the system required. The ASP.net and SQL technology come up to have a number of advantages, as I listed below. Some of them are good for a modern system. ASP.net and SQL are used in the several region of the computing environment that manages data storage and data organization. There are a number of advantages offered by both of these technologies, one of the most important being high speed. Security is well thought-out as an advantage, suitable to all the information being content in one place that manages contentedly. In contrast to other languages, these both are verified to be more robust, safe and in the main have a superior performance. Both software peripherals are considered compatible, which enables them to work with other languages, providing data transfer and development.

Many different software packages were taken into consideration for implementing my system. To make sure the system was designed purposefully and appropriately, research should be conducted on the relevant software.

Programming Language and Tools

ASP.net

Microsoft Visual Studio

Database Technologies

Microsoft SQL server

Image Direction

Adobe cs4 Photoshop

Adobe cs4 Dreamweaver

Adobe cs4 Flash

Ms Paint

Tools and Technologies

Hardware Requirements

Processor : Intel Pentium 4 (Core 2 duo) (Minimum)

RAM : 2 GB

Hard Disk : 250 GB

Software Requirements

Windows XP / Vista / Windows 7 Operating System

Microsoft Visual Studio 2010

SQL SERVER 2008 R2

.Net Framework Version 4.0

Web Browser (e.g. - Internet Explorer, Mozilla Firefox, Netscape)

Web Hosting

Web Hosting (Third party company (To be bought))

Domain Subscription (Third party company (To be bought))

Human computer interaction (HCI)

The name of the title gives the basic simple idea of that is the interaction between the user and computer. We can say that the interaction between user and computer can be occurs at the user interface that involves the hardware or software of the computer. This application is totally based on users' interaction. The different people interact or use the site differently. The main objective of the human computer interaction is that it is very secure for the user's contentment. The important key component of HCI is usability. It shows the use of the system and some basic steps of the usability such as easy to learn, effective use, efficient use and safe use. Some factor that affects the user interface like: Form of Input, feedback, visibility and affordance.

Database Security

Security of database is a complex issue for companies. There are certain key words which are related to database security such as: Attack, control, impact, inference, and security.

The focus of attacks on the company's database are motivated by different factors such as Theft and fraud, Loss of confidentiality/privacy, Loss of integrity,

To ensure a minimum security of the databases the following requirements must be satisfied:

Physical integrity of databases

Logical integrity of databases

The integrity of each element which composes the database

Access control

User identification

Availability

The physical and logical integrity

The physical and logical integrity of databases will require the focus of efforts for protecting the physical integrity of databases, especially the recordings against destruction. The easiest way to do that is represented by regular backups. The integrity of each element forming the database will assume that the value of each field may be written or changed only by authorized users and only if there are correct values.

Server security

Server security involves limiting access to data stored on the server. It is the most important option that has to be taken in consideration and planned carefully.

Access control table

The access control table is the most common form of securing database. An appropriate use of the table access control involves a close collaboration between the administrator and the base developer.

Cancellation of the Server Account

The ability to suspend an account when guessing the password is tried after a predefined number of attempts (usually 3).

User identification

User identification will allow at any time to be known who does anything in the system. All the operations performed by users will be stored and will form a history of access.

Availability

Availability will allow the required data to be available for an authorized user.

Data Flow Diagrams

0 - Level Diagram

F:\Study\Bsc CS LONDON SAM\Final proj\Report\DFD\0-level DFD.bmp

1st - Level Diagram

F:\Study\Bsc CS LONDON SAM\Final proj\Report\DFD\1-Level DFD.bmp

Project Flow Diagram

F:\Study\Bsc CS LONDON SAM\Final proj\Report\DFD\Project Flow.bmp

Requirements

Testing

Implementation

Design

In this model we can say that requirements are converted in to design. Code is created for the duration of implementation that is determined by the design. Testing is the last phase of any activity that covers all phases during the process.

Requirements:

System requirements are the metaphors of the services provided by the system and its working limitations. The system requirements are a sign for the customer's desires for the system that help out to solve the problems. There are several types of requirements includes system requirements, functional requirements, user requirements and so on. System requirement means to know what exactly to be implemented. It could be one type of agreement between system developer and system purchasers. Functional requirements include system performance in different circumstances, system inputs, result or system outputs and many more.

Basic requirements are also preferred for this application like registering, login, selecting Mobile's category wise, secure payment, billing and shipping process.

Design:

A system design is an explanation of the construction of the software to be implemented and this information can be part of the organization. We can say that the design of the system is a blueprint of the whole system. The above diagram shows that the phases of the design should be in sequence .The deliverables of the system design stage will be the outlines of some different practical solutions which will meet up the requirements precise in the earlier stage. Design method actions are interleaved. One phase gives the feedback to another and following design revise is to be expected in all design process. The design of the system software can be possibly integrated with the requirements being gathered first and implemented onto the project. The design of the coding can make the project feasible. System detail design is one part of design stage which includes all the technical design specification which basically includes program design and specification design, specification of user interface, specification of layout of the report and other system outputs, all files and records.

Implementation:

Here the system implementation is dependent on the system design. During this stage the system is physically built. At the finishing phase of point, deploying the system consist of executing all steps required to instruct the clients to make use of the new system. User involvement and participation are the important aspects. Implementation includes basic workflow of the system requirements like program listings, hardware on which the system will run manual operating procedures, manual of clerical procedures and user manual.

Testing:

All the system functions and requirements that should be tested access from first to last. All functions should be tested with correct and incorrect input data. Testing is a process proposed to make self-reliance for both system developer and customers. Here an iterative development process, system testing is apprehensive with testing a growth delivered to the customer. There are mainly two types of testing phases such as integration testing and release testing.

Integration testing is used when there is some problem with coding of the system that find the source of problem and find the object to debug. It is used to finding the defects in the system. The testing is also called "black box" testing. It simply concerned when system works or not works properly. It basically checks that the system requirement meets properly or not.

RAD (Rapid Application Development)

RAD (Rapid Application Development) is an incremental software development process model. It is one of the most widely used and successful running of prototype. It encompasses a strategy for the system that relies on a high degree of user participation and exploits modern high powered software tools. The main aim is to shorten the life cycle and to produce the information systems more quickly in order to respond to rapidly changing business requirements, such as some e-commerce and web based systems.

Traditional Development

Deploy

Compress

Planning

Deploy

RAD

The tools are included in a RAD environment:

A database programming language that embeds knowledge of the database structures and includes fundamental database manipulation operations. SQL is the standard database programming language. The SQL commands may be input directly or generated automatically from forms filled in by an end-user.

An interface generator, which is used to create forms for the data input and display.

A report generator, which is used to define and create reports from information in the database.

Advantages:

RAD is required a high degree of user partition means that the resistance to change in the organization is minimized.

System is developed and delivered faster than traditional approach.

RAD projects seem cheaper than the traditional approach.

RAD systems are more closely related to the current needs of the business.

Disadvantages:

The speed of improvement means how occasionally the known low priority or absent is to be resolved.

Important dependence on the user promise and participation can push up the costs for the client organization.

Long-term alteration of the system can be difficult because of the comparative lack of standard documentation.

Waterfall Model

Waterfall life cycle methodology:

A software process model is an abstract representation of a software process. Each process model represents a process from a particular point of view. The waterfall model takes the fundamental process activities of specification development, validation and evolution and represents them as separate process phases such as requirements, specification, design, implementation and testing.

System and Web Design

Implementation and Unit testing

System and Integration Testing

Operation and Maintenance

Waterfall life cycle methodology

A software process model is an abstract representation of a software process. Each process model represents a process from a particular point of view. The waterfall model takes the fundamental process activities of specification development, validation and evolution and represents them as separate process phases such as requirements, specification, design, implementation and testing.

As a result of each phase are one or more documents that are approved. The following phase should not start until the pervious phase has finished. The software process is not a simple linear model but it includes a sequence of iterations of development activities.

Basic steps of Waterfall Life Cycle Model

Requirements Analysis involves both of the below analysis:

System engineering and analysis

Software requirements analysis

Design as the second step.

Implementation is to be done by the following options:

Coding

Testing

Integration and the system test were to be implemented.

Acceptance test and installation are accomplished.

Operation and maintenance are also completed.

Requirement analysis and definition: The system's services, constraints and goals are established by consultation with system users. They are defined in detail and serve as a system specification.

System and software design: The system and design process partition the requirements to either hardware or software systems. It establishes on the whole system architecture. Software design involves identifying and recitation the essential software system generalization and their relationship.

Implementation and unit testing: During this stage, the software design is realised as a set of programs of program units. Unit testing includes verifying that each unit meets its specification.

Operation and maintenance: This is the longest life cycle phase. The system is installed and put into practical use. Maintenance includes correcting errors which were not exposed in previous stage of the life cycle, which recovering the implementation of system units and improving the system's services while new requirements are exposed.

TABLE: 1

User

FIELDS

DATA TYPE

LENGTH

Constraint

ID

Number

10

Primary Key

Password

Text

20

FirstName

Text

20

MiddleName

Text

20

LastName

Text

20

Address

Text

30

City

Text

20

State

Text

20

Country

Text

20

Postcode

Number

10

Phone

Number

10

Email

Text

20

Post

Number

4

Priviladge

Text

20

ImageURL

Text

50

TABLE: 2

Manufacturer

FIELDS

DATA TYPE

LENGTH

DESCRIPTION

Man_ID

Number

4

Primary Key

Man_Name

Text

30

Not null

Man_img

Text

50

Not null

TABLE: 3

Phone Details

FIELDS

DATA TYPE

LENGTH

DESCRIPTION

Phone_ID

Number

10

Primary Key

Network

Text

100

Man_ID

Number

4

Not Null

Date_pub

Date

8

Status

Text

50

Dimension

Text

50

Weight

Number

4

Disp_typ

Text

20

Disp_size

Text

20

Ring_typ

Text

20

Customization

Text

20

Vibration

Bit

1

Ph_book

Number

4

Call_rec

Bit

1

Card_slot

Bit

1

GPRS

Text

20

WLAN

Bit

1

Bluetooth

Bit

1

Infrared

Bit

1

USB

Bit

1

OS

Text

20

Messaging

Text

20

Browser

Text

30

Clock

Text

20

Camera

Text

30

Colors

Text

200

TABLE: 4

Shopping cart

FIELDS

DATA TYPE

LENGTH

DESCRIPTION

TransID

Number

10

Primary Key

Seccode

Number

15

Foreign Key

UserId

Text

30

Phone_ID

Number

15

Man_ID

Number

4

Price

Number

6

Qty

Number

3

TotalAmt

Number

10

TABLE: 5

User Order

FIELDS

DATA TYPE

LENGTH

DESCRIPTION

Order_ID

Number

10

Foreign Key

User_ID

Text

50

Primary Key

Order Date

Date

8

Qrd_Qty

Number

10

TotalAmt

Number

10

TABLE: 6

Payment

FIELDS

DATA TYPE

LENGTH

DESCRIPTION

Order_ID

Number

10

Foreign Key

User_ID

Text

50

Primary Key

Order Date

Date

8

Amount

Number

10

Card_typ

Text

20

Card_holder

Text

50

Exp_Date

Date

8

IP

Text

16

DelAdd

Text

200

Status

Text

20

Timeline Project Planning

F:\Study\Bsc CS LONDON SAM\Final proj\projecttimelinechart.bmp

Writing Services

Essay Writing
Service

Find out how the very best essay writing service can help you accomplish more and achieve higher marks today.

Assignment Writing Service

From complicated assignments to tricky tasks, our experts can tackle virtually any question thrown at them.

Dissertation Writing Service

A dissertation (also known as a thesis or research project) is probably the most important piece of work for any student! From full dissertations to individual chapters, we’re on hand to support you.

Coursework Writing Service

Our expert qualified writers can help you get your coursework right first time, every time.

Dissertation Proposal Service

The first step to completing a dissertation is to create a proposal that talks about what you wish to do. Our experts can design suitable methodologies - perfect to help you get started with a dissertation.

Report Writing
Service

Reports for any audience. Perfectly structured, professionally written, and tailored to suit your exact requirements.

Essay Skeleton Answer Service

If you’re just looking for some help to get started on an essay, our outline service provides you with a perfect essay plan.

Marking & Proofreading Service

Not sure if your work is hitting the mark? Struggling to get feedback from your lecturer? Our premium marking service was created just for you - get the feedback you deserve now.

Exam Revision
Service

Exams can be one of the most stressful experiences you’ll ever have! Revision is key, and we’re here to help. With custom created revision notes and exam answers, you’ll never feel underprepared again.